<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=BrandonAndrzej</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=BrandonAndrzej"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/Special:Contributions/BrandonAndrzej"/>
	<updated>2026-05-20T14:49:32Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6811</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6811"/>
		<updated>2011-05-10T16:56:40Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6810</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6810"/>
		<updated>2011-05-10T16:56:24Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6741</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6741"/>
		<updated>2011-05-07T23:23:07Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Brandon A. Cernaowicz&lt;br /&gt;
Final Draft (long version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc&lt;br /&gt;
This is the completed long version. Abridged version to follow shortly.&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.0 (short version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.0.doc&lt;br /&gt;
This is a rough draft of the abridged version. The sourcing needs to be completely redone. (Also still a little long...)[[User:BrandonAndrzej|BrandonAndrzej]] 18:31, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.1 (short)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.1.doc&lt;br /&gt;
Sourcing fixed. This should be the final product, barring any feedback. &lt;br /&gt;
- [[User:BrandonAndrzej|BrandonAndrzej]] 23:18, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;br /&gt;
&lt;br /&gt;
Onyema, this is a very interesting topic, but I would suggest for an academic paper you need to footnote in your paper information you have found from third party sources.  Although you have original ideas, it gives  your paper credibility to cite third party information you have used to develop the conclusions in your paper. [[[[User:Sjennings|sjennings]] 16:39, 5 May 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Onyema , All in all very interesting paper.  May I suggest that you elaborate about the problems you refer to when you say, “SAT3 submarine cable system that is connecting Africa to India( of which both have had a significant problems).” Do you mean technology, social, political …? I suggest you be more explicit which will help as you lay out your arguments later in the paper. &lt;br /&gt;
&lt;br /&gt;
Also, I saw a typo in your title, “The role National Law is plying.” I think you want “Playing.”&lt;br /&gt;
&lt;br /&gt;
Thanks for the early preview. --[[User:Gclinch|Gclinch]] 20:17, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Guy&lt;br /&gt;
Title: The Transition to Next Generation 9-1-1 in North America &lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28draft_May_6%29.pdf Link:]&lt;br /&gt;
Note: I am still working on my conclusions and I need to clean up endnotes, references etc.. I&#039;ll appreciate any comments. Thanks TGIF! --[[User:Gclinch|Gclinch]] 23:17, 6 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Getting closer. [http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28draft_May_7%29.pdf Click here for May 7] version of my paper. &lt;br /&gt;
Good Luck everybody. --[[User:Gclinch|Gclinch]] 20:17, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
-- Guy: Of negligable importance, I know, but don&#039;t you find the roman numerals to be a bit unwieldy? - [[User:BrandonAndrzej|BrandonAndrzej]] 23:23, 7 May 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6740</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6740"/>
		<updated>2011-05-07T23:18:02Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Brandon A. Cernaowicz&lt;br /&gt;
Final Draft (long version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc&lt;br /&gt;
This is the completed long version. Abridged version to follow shortly.&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.0 (short version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.0.doc&lt;br /&gt;
This is a rough draft of the abridged version. The sourcing needs to be completely redone. (Also still a little long...)[[User:BrandonAndrzej|BrandonAndrzej]] 18:31, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.1 (short)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.1.doc&lt;br /&gt;
Sourcing fixed. This should be the final product, barring any feedback. &lt;br /&gt;
- [[User:BrandonAndrzej|BrandonAndrzej]] 23:18, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;br /&gt;
&lt;br /&gt;
Onyema, this is a very interesting topic, but I would suggest for an academic paper you need to footnote in your paper information you have found from third party sources.  Although you have original ideas, it gives  your paper credibility to cite third party information you have used to develop the conclusions in your paper. [[[[User:Sjennings|sjennings]] 16:39, 5 May 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Onyema , All in all very interesting paper.  May I suggest that you elaborate about the problems you refer to when you say, “SAT3 submarine cable system that is connecting Africa to India( of which both have had a significant problems).” Do you mean technology, social, political …? I suggest you be more explicit which will help as you lay out your arguments later in the paper. &lt;br /&gt;
&lt;br /&gt;
Also, I saw a typo in your title, “The role National Law is plying.” I think you want “Playing.”&lt;br /&gt;
&lt;br /&gt;
Thanks for the early preview. --[[User:Gclinch|Gclinch]] 20:17, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Guy&lt;br /&gt;
Title: The Transition to Next Generation 9-1-1 in North America &lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28draft_May_6%29.pdf Link:]&lt;br /&gt;
Note: I am still working on my conclusions and I need to clean up endnotes, references etc.. I&#039;ll appreciate any comments. Thanks TGIF! --[[User:Gclinch|Gclinch]] 23:17, 6 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Getting closer. [http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28draft_May_7%29.pdf Click here for May 7] version of my paper. &lt;br /&gt;
Good Luck everybody. --[[User:Gclinch|Gclinch]] 20:17, 7 May 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6736</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6736"/>
		<updated>2011-05-07T16:51:27Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&lt;br /&gt;
Slides: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-5.3.11-Cybersecurity_and_Cyberwarfare.pdf Cybersecurity and Cyberwarfare]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastifdonty|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wanted to submit this article to add to the discussion. I found it to be interesting. Cybersecurity is probably the most vital issue to our country&#039;s infrastructure today. The recent military operation to take out  Osama bin Ladin would have failed miserably if knowledge of the raid was disclosed. To keep our intelligence reports under wraps should be among our highest priorities. While the government wages wars on three fronts at once, it is difficult but nessessary to ensure our reports stay out of our enemies hands. By blocking IP addresses and using more sophisticated encryption, we will be well on our way to protecting our great country. The world runs through the Internet, and so does our future.   [http://delivery.acm.org/10.1145/1840000/1839688/p33-brenner.pdf?key1=1839688&amp;amp;key2=5956834031&amp;amp;coll=DL&amp;amp;dl=ACM&amp;amp;ip=74.90.79.253&amp;amp;CFID=18979663&amp;amp;CFTOKEN=55280022] [[User:Joshuasurillo|Joshuasurillo]] 01:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Cyberthreats are real and pervasive.  The people within IT infrastructure have been fighting the battle for years.  It makes no difference whether you work for a government, business or school – every domain (gov, com &amp;amp; edu) is under attack.  Private business and the military arm of the government are the most concerned about security, so they were the first to adopt network access control and identity management.  Security is enforced by verifying the identity of each user and device before allowing them to gain access to the network.  This, of course, runs counter to the idea of a free, open and anonymous Internet.  Yes, we can do a lot to protect the public by having the ISPs filter and block malware (search for SonicWALL and Blue Coat for examples) but it’s not enough to stop all breaches and wastes precious bandwidth.  Our government recognizes this and is actively promoting what would become a national electronic identity “ecosystem.” (Their euphemism; see http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf) Jack Goldsmith had some well reasoned arguments why we should expect more government controls.  Finally, a good taxonomy of Internet security practices can be found in the pages of Chief Security Officer Magazine at http://www.csoonline.com/. [[User:ChrisSura|-Chris Sura]]&lt;br /&gt;
&lt;br /&gt;
Even with additional security measures instituted, there will always be someone looking for a way around it.  Jack Goldsmith&#039;s suggestion (suggested earlier by Zittrain), that additional measures be placed at the ISP level brings in significant risk to the ISPs.  What if the measures are put in place and something (inevitably) gets through?  Are the ISPs then liable for this?  Hacking and break-ins will continue to occur even at some of the most &amp;quot;secure&amp;quot; sites.  RSA, an industry security leader recently had their systems compromised, which led to information being extracted from their systems.  The fact that extremely sophisticated and targeted attacks can happen at secure Nuclear Power plants (Stuxnet worm), means that ISPs have would have their hands full with any targeted attack.&lt;br /&gt;
http://www.rsa.com/node.aspx?id=3872   [[User:Earboleda|Earboleda]]&lt;br /&gt;
&lt;br /&gt;
Although cyberthreats are real and eminent issues, there are not enough resources, mostly human, for countermeasures. In the United States, lack of expert computer scientists in the field of information security poses a serious problem in appropriately handling cyberwarfare. Rouge states such as North Korea rather have a lead on cyberwarfare preparation. I assume that first of all there needs to be a wider recognition for cyberthreats and a determined agreement toward dealing with this &amp;quot;fifth domain of warfare&amp;quot;. --[[User:Yu Ri|Yu Ri]] 21:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The Chatham House report is concerned that there isn&#039;t enough political control over the direction of cybersecurity and cyberwarfare initiatives due to the impenetrability of the technical details - that, as they put it, &amp;quot;the chief engineer&amp;quot; is driving the boat. I find this ironic (though not necessarily invalid); my first instinct is to be more concerned about know-knothing politicians trying to steer when they don&#039;t understand how the ship works or what direction it should go in. Still, education of the polical class, in either case, is the logical solution. - [[User:BrandonAndrzej|BrandonAndrzej]] 16:40, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Just a quick rehash of something I was pondering in class: We have read about Lessig’s &amp;quot;free culture&amp;quot; (as opposed to permissions culture) as well as Benkler&#039;s &amp;quot;sharing nicely&amp;quot; and peer-production models. My project has been on Free and Open Source Software licensing. All this points to the value of sharing, open source business models, and weaker intellectual property rights. IP protections, however, have grown increasingly stronger. What if, I was thinking, we are never really able to secure the net? What will it mean when nation-states and other actors are constantly engaged in strategic and industrial espionage? Will we see, essentially, a culture of sharing &amp;quot;not-nicely&amp;quot; where theft of trade secrets and copying of patent and copyrighted materials regularly occurs outside the reach of law enforcement? Will companies reliant on proprietary business models be pushed more towards open source ones? Will we see the death of copyright as we know it? - [[User:BrandonAndrzej|BrandonAndrzej]] 16:51, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
If you&#039;d like to help us with the collection of data regarding online dating sites please take our survey, it&#039;s anonymous.&lt;br /&gt;
Online Dating site Survey: https://www.surveymonkey.com/s/28VMJWX&lt;br /&gt;
--[[User:Adavies01|Adavies01]] 17:03, 4 May 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6735</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6735"/>
		<updated>2011-05-07T16:40:25Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&lt;br /&gt;
Slides: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-5.3.11-Cybersecurity_and_Cyberwarfare.pdf Cybersecurity and Cyberwarfare]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastifdonty|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wanted to submit this article to add to the discussion. I found it to be interesting. Cybersecurity is probably the most vital issue to our country&#039;s infrastructure today. The recent military operation to take out  Osama bin Ladin would have failed miserably if knowledge of the raid was disclosed. To keep our intelligence reports under wraps should be among our highest priorities. While the government wages wars on three fronts at once, it is difficult but nessessary to ensure our reports stay out of our enemies hands. By blocking IP addresses and using more sophisticated encryption, we will be well on our way to protecting our great country. The world runs through the Internet, and so does our future.   [http://delivery.acm.org/10.1145/1840000/1839688/p33-brenner.pdf?key1=1839688&amp;amp;key2=5956834031&amp;amp;coll=DL&amp;amp;dl=ACM&amp;amp;ip=74.90.79.253&amp;amp;CFID=18979663&amp;amp;CFTOKEN=55280022] [[User:Joshuasurillo|Joshuasurillo]] 01:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Cyberthreats are real and pervasive.  The people within IT infrastructure have been fighting the battle for years.  It makes no difference whether you work for a government, business or school – every domain (gov, com &amp;amp; edu) is under attack.  Private business and the military arm of the government are the most concerned about security, so they were the first to adopt network access control and identity management.  Security is enforced by verifying the identity of each user and device before allowing them to gain access to the network.  This, of course, runs counter to the idea of a free, open and anonymous Internet.  Yes, we can do a lot to protect the public by having the ISPs filter and block malware (search for SonicWALL and Blue Coat for examples) but it’s not enough to stop all breaches and wastes precious bandwidth.  Our government recognizes this and is actively promoting what would become a national electronic identity “ecosystem.” (Their euphemism; see http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf) Jack Goldsmith had some well reasoned arguments why we should expect more government controls.  Finally, a good taxonomy of Internet security practices can be found in the pages of Chief Security Officer Magazine at http://www.csoonline.com/. [[User:ChrisSura|-Chris Sura]]&lt;br /&gt;
&lt;br /&gt;
Even with additional security measures instituted, there will always be someone looking for a way around it.  Jack Goldsmith&#039;s suggestion (suggested earlier by Zittrain), that additional measures be placed at the ISP level brings in significant risk to the ISPs.  What if the measures are put in place and something (inevitably) gets through?  Are the ISPs then liable for this?  Hacking and break-ins will continue to occur even at some of the most &amp;quot;secure&amp;quot; sites.  RSA, an industry security leader recently had their systems compromised, which led to information being extracted from their systems.  The fact that extremely sophisticated and targeted attacks can happen at secure Nuclear Power plants (Stuxnet worm), means that ISPs have would have their hands full with any targeted attack.&lt;br /&gt;
http://www.rsa.com/node.aspx?id=3872   [[User:Earboleda|Earboleda]]&lt;br /&gt;
&lt;br /&gt;
Although cyberthreats are real and eminent issues, there are not enough resources, mostly human, for countermeasures. In the United States, lack of expert computer scientists in the field of information security poses a serious problem in appropriately handling cyberwarfare. Rouge states such as North Korea rather have a lead on cyberwarfare preparation. I assume that first of all there needs to be a wider recognition for cyberthreats and a determined agreement toward dealing with this &amp;quot;fifth domain of warfare&amp;quot;. --[[User:Yu Ri|Yu Ri]] 21:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The Chatham House report is concerned that there isn&#039;t enough political control over the direction of cybersecurity and cyberwarfare initiatives due to the impenetrability of the technical details - that, as they put it, &amp;quot;the chief engineer&amp;quot; is driving the boat. I find this ironic (though not necessarily invalid); my first instinct is to be more concerned about know-knothing politicians trying to steer when they don&#039;t understand how the ship works or what direction it should go in. Still, education of the polical class, in either case, is the logical solution. - [[User:BrandonAndrzej|BrandonAndrzej]] 16:40, 7 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
If you&#039;d like to help us with the collection of data regarding online dating sites please take our survey, it&#039;s anonymous.&lt;br /&gt;
Online Dating site Survey: https://www.surveymonkey.com/s/28VMJWX&lt;br /&gt;
--[[User:Adavies01|Adavies01]] 17:03, 4 May 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6716</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6716"/>
		<updated>2011-05-03T18:40:25Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Brandon A. Cernaowicz&lt;br /&gt;
Final Draft (long version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc&lt;br /&gt;
This is the completed long version. Abridged version to follow shortly.&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.0 (short version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.0.doc&lt;br /&gt;
This is a rough draft of the abridged version. The sourcing needs to be completely redone. (Also still a little long...)[[User:BrandonAndrzej|BrandonAndrzej]] 18:31, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6715</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6715"/>
		<updated>2011-05-03T18:31:42Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Brandon A. Cernaowicz&lt;br /&gt;
Final Draft (long version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc&lt;br /&gt;
This is the completed long version. Abridged version to follow shortly.&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.0 (short version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.0.doc&lt;br /&gt;
This is a rough draft of the abridged version. (Still a little long...)[[User:BrandonAndrzej|BrandonAndrzej]] 18:31, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6714</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6714"/>
		<updated>2011-05-03T18:30:56Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Brandon A. Cernaowicz&lt;br /&gt;
Final Draft (long version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc&lt;br /&gt;
This is the completed long version. Abridged version to follow shortly.&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 1.0 (short version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28short%29_v1.0.doc&lt;br /&gt;
This is a rough draft of the abridged version. (Still a little long...)&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6710</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6710"/>
		<updated>2011-05-03T17:03:31Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Brandon A. Cernaowicz&lt;br /&gt;
Final Draft (long version)&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses.doc&lt;br /&gt;
This is the completed long version. Abridged version to follow shortly.&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6700</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6700"/>
		<updated>2011-05-02T01:27:23Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 3.0:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v3.0.doc&lt;br /&gt;
Theoretical framework is up; barring any major errors, this should be the final draft of the long form version - now I have to condense it into 10 pages... suggestions very much appreciated!&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6699</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6699"/>
		<updated>2011-05-02T01:25:25Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In this paper, Brandon skillfully guides a detailed tour of open source licenses. The composition&#039;s robust structure ably contains the fine points of the subject matter. There is enough information here for several projects. One possible new work would be a more generalized overview of open source licenses for the layman. Even in the paper&#039;s current format, a summary table comparing the basic aspects of the individual licenses would be useful. --[[User:SCL|SCL]] 18:07, 1 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your excellent advice! I have incorporated a visual representation of license content into the next draft.[[User:BrandonAndrzej|BrandonAndrzej]] 01:25, 2 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6693</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6693"/>
		<updated>2011-04-27T23:14:08Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6692</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6692"/>
		<updated>2011-04-27T23:13:51Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6676</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6676"/>
		<updated>2011-04-26T16:18:58Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6675</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6675"/>
		<updated>2011-04-26T16:18:33Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6664</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6664"/>
		<updated>2011-04-20T23:16:36Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 26&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
* And the [http://opennet.net/map ONI global filtering map]&lt;br /&gt;
* Explore the Global Network Initiative website [http://www.globalnetworkinitiative.org/ GNI], with particular attention to the [http://www.globalnetworkinitiative.org/principles/index.php Principles], [http://www.globalnetworkinitiative.org/implementationguidelines/index.php Implementation Guidelines], and [http://www.globalnetworkinitiative.org/governanceframework/index.php Governance Framework]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Here is a link to the link to the extensive Freedom House &amp;quot;Freedom on the Net 2011&amp;quot; report. (Honestly, at 410 pages I haven&#039;t really had time to read and evaulate this, but I thought I would throw it up on the wiki for those who might be interested.)&lt;br /&gt;
http://www.freedomhouse.org/images/File/FotN/FOTN2011.pdf &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 17:12, 20 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6663</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6663"/>
		<updated>2011-04-20T17:13:29Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 26&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
* And the [http://opennet.net/map ONI global filtering map]&lt;br /&gt;
* Explore the Global Network Initiative website [http://www.globalnetworkinitiative.org/ GNI], with particular attention to the [http://www.globalnetworkinitiative.org/principles/index.php Principles], [http://www.globalnetworkinitiative.org/implementationguidelines/index.php Implementation Guidelines], and [http://www.globalnetworkinitiative.org/governanceframework/index.php Governance Framework]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Here is a link to the link to the extensive Freedom House &amp;quot;Freedom on the Internet 2011&amp;quot; report. (Honestly, at 410 pages I haven&#039;t really had time to read and evaulate this, but I thought I would throw it up on the wiki for those who might be interested.)&lt;br /&gt;
http://www.freedomhouse.org/images/File/FotN/FOTN2011.pdf &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 17:12, 20 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6662</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6662"/>
		<updated>2011-04-20T17:12:58Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 26&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
* And the [http://opennet.net/map ONI global filtering map]&lt;br /&gt;
* Explore the Global Network Initiative website [http://www.globalnetworkinitiative.org/ GNI], with particular attention to the [http://www.globalnetworkinitiative.org/principles/index.php Principles], [http://www.globalnetworkinitiative.org/implementationguidelines/index.php Implementation Guidelines], and [http://www.globalnetworkinitiative.org/governanceframework/index.php Governance Framework]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Here is a link to the link to the extensive Freedom House &amp;quot;Freedom on the Internet in 2011&amp;quot; report. (Honestly, at 410 pages I haven&#039;t really had time to read and evaulate this, but I thought I would throw it up on the wiki for those who might be interested.)&lt;br /&gt;
http://www.freedomhouse.org/images/File/FotN/FOTN2011.pdf &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 17:12, 20 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6634</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6634"/>
		<updated>2011-04-17T00:04:05Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 19&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.nytimes.com/2011/02/14/world/middleeast/14egypt-tunisia-protests.html?_r=2&amp;amp;hp A Tunisian-Egyptian Link That Shook Arab History]&lt;br /&gt;
&lt;br /&gt;
* [http://ejournalism.co.uk/?p=739 Clay Shirky on social media in the Middle East and North Africa]&lt;br /&gt;
&lt;br /&gt;
* [http://nms.sagepub.com/content/12/8/1225.full.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
*Problems with the Etling, Kelly, Faris and Palfrey PDF? If you&#039;re off campus and presented with a website saying you need to sign up to access this article . . . you do not. Sign into Harvard&#039;s VPN solution and you&#039;ll then have access or access it while on the Harvard network (on campus). Or ask nicely and I&#039;m sure it can be emailed to you. :-)  --[[User:Adavies01|Adavies01]] 01:29, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Bruce Etling and John Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2010/Public_Discourse_Russian_Blogosphere Etling, Alexanyan, Kelly, Faris, Palfrey, and Gasser, Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Digitally_Networked_Technology_Kenyas_Post-Election_Crisis Josh Goldstein and Juliana Rotich, Digitally Networked Technology in Kenya&#039;s 2007-2008 Post-Election Crisis].&lt;br /&gt;
&lt;br /&gt;
* [http://fletcher.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
I&#039;m inclined to be skeptical of the idea that the internet and social media are making interpersonal connections &amp;quot;shallower&amp;quot;, whether we are talking about &amp;quot;Facebook friends&amp;quot; or social and political activism. Setting aside the question of whether online relationships count as &amp;quot;real&amp;quot; relationships (that is, are qualitatively inferior to real-life relationships), in order for this theory to be correct, online relationships would have to be replacing real-life relationships. While I don&#039;t have any hard data to back this up, I simply don&#039;t see this happening in most cases. The imagined concept is one of young people avoiding traditional social contact in favor of hours spent online. However, I would postulate that the people most inclined to shut themselves off from the &amp;quot;real world&amp;quot; in favor of computers are the same people who would have shut themselves off in favor of books or various solo hobbies in previous decades. Under this model, the quantity and quality of social interaction for persons thus inclined is &#039;&#039;increasing&#039;&#039;, rather than decreasing. What we are talking about is both an increase in reach and a lowering of thresholds. For the average user, social media, first and foremost, provides a vehicle for interaction with people they &#039;&#039;already know&#039;&#039; in real life (friends from school, family, etc... so your kid spending time on the computer rather than playing with friends outside is likely to be interacting with those same friends electronically) and then adds to this a new layer of online friendships and acquaintances which arise as social media provides previously unavailable opportunities to build relationships over distance. (There is, as well, traffic between these two layers, as real-life friends separated by distance use social media to keep in touch, and friends - and potential romantic partners - met online arrange to meet in person). Similarly, when it comes to activism, the increasing availability of &amp;quot;intermediate&amp;quot; levels of support (such as donation or petition signing – hardly new developments) is not likely, to my mind, to decrease the number of active real-world advocates. Verily, the opposite: those inclined to get off the couch and &amp;quot;make a difference&amp;quot; are still likely (or even more likely) to do so, only now with the support of countless others who would not have been reached by the activist&#039;s message otherwise.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 17 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://nakedsecurity.sophos.com/2011/04/12/state-of-texas-leaks-data-on-3-5-million-people/ State of Texas exposes data of 3.5 million people] I mentioned this story in the chat room during last class, seemed to be a good point considered the private vs state accumulation of personal info discussion that we were having.  It&#039;s a quick read, and it&#039;ll make you squirm. [[User:Mcforelle|Mcforelle]] 18:20, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Here is a link to Fareed Zakaria&#039;s 1997 &amp;quot;The Rise of Illiberal Democracy&amp;quot; essay, referenced in the Faris/Etling article, which contrasts &amp;quot;Democracy&amp;quot; with &amp;quot;Constitiutional Liberalism&amp;quot;.  &lt;br /&gt;
http://www.fringer.org/wp-content/writings/fareed.pdf&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:29, 16 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=User_talk:BrandonAndrzej&amp;diff=6633</id>
		<title>User talk:BrandonAndrzej</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=User_talk:BrandonAndrzej&amp;diff=6633"/>
		<updated>2011-04-16T23:29:57Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a talk page!&lt;br /&gt;
&lt;br /&gt;
...but apparently no-one wants to talk to me.&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6632</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6632"/>
		<updated>2011-04-16T23:29:08Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 19&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.nytimes.com/2011/02/14/world/middleeast/14egypt-tunisia-protests.html?_r=2&amp;amp;hp A Tunisian-Egyptian Link That Shook Arab History]&lt;br /&gt;
&lt;br /&gt;
* [http://ejournalism.co.uk/?p=739 Clay Shirky on social media in the Middle East and North Africa]&lt;br /&gt;
&lt;br /&gt;
* [http://nms.sagepub.com/content/12/8/1225.full.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
*Problems with the Etling, Kelly, Faris and Palfrey PDF? If you&#039;re off campus and presented with a website saying you need to sign up to access this article . . . you do not. Sign into Harvard&#039;s VPN solution and you&#039;ll then have access or access it while on the Harvard network (on campus). Or ask nicely and I&#039;m sure it can be emailed to you. :-)  --[[User:Adavies01|Adavies01]] 01:29, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Bruce Etling and John Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2010/Public_Discourse_Russian_Blogosphere Etling, Alexanyan, Kelly, Faris, Palfrey, and Gasser, Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Digitally_Networked_Technology_Kenyas_Post-Election_Crisis Josh Goldstein and Juliana Rotich, Digitally Networked Technology in Kenya&#039;s 2007-2008 Post-Election Crisis].&lt;br /&gt;
&lt;br /&gt;
* [http://fletcher.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://nakedsecurity.sophos.com/2011/04/12/state-of-texas-leaks-data-on-3-5-million-people/ State of Texas exposes data of 3.5 million people] I mentioned this story in the chat room during last class, seemed to be a good point considered the private vs state accumulation of personal info discussion that we were having.  It&#039;s a quick read, and it&#039;ll make you squirm. [[User:Mcforelle|Mcforelle]] 18:20, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Here is a link to Fareed Zakaria&#039;s 1997 &amp;quot;The Rise of Illiberal Democracy&amp;quot; essay, referenced in the Faris/Etling article, which contrasts &amp;quot;Democracy&amp;quot; with &amp;quot;Constitiutional Liberalism&amp;quot;.  &lt;br /&gt;
http://www.fringer.org/wp-content/writings/fareed.pdf&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:29, 16 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6572</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6572"/>
		<updated>2011-04-13T01:44:46Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AudioVideo.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens from their Respected Countries on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Online Platforms-Which one works for you?|http://cyber.law.harvard.edu/is2011/Image:Bonus_Assignment-Pledgebank_Tragedy-Syed_Yasir_Shirazi.pdf}}&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Laura Connell|US Copyright Group - Saving Cinema or Mass Litigation Used as Profit-Center?|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_roughdraft_Assignment4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brandon A. Ceranowicz|A Comparison of Open Source Licenses|http://cyber.law.harvard.edu/is2011/sites/is2011/images/A_Comparative_Study_of_Open_Source_Licenses_v1.0.doc|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6567</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6567"/>
		<updated>2011-04-13T01:04:25Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AudioVideo.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens from their Respected Countries on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Online Platforms-Which one works for you?|http://cyber.law.harvard.edu/is2011/Image:Bonus_Assignment-Pledgebank_Tragedy-Syed_Yasir_Shirazi.pdf}}&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Laura Connell|US Copyright Group - Saving Cinema or Mass Litigation Used as Profit-Center?|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_roughdraft_Assignment4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brandon A. Ceranowicz|A Comparison of Open Source Licenses|Pending....|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6566</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6566"/>
		<updated>2011-04-13T01:03:45Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AudioVideo.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens from their Respected Countries on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Online Platforms-Which one works for you?|http://cyber.law.harvard.edu/is2011/Image:Bonus_Assignment-Pledgebank_Tragedy-Syed_Yasir_Shirazi.pdf}}&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Laura Connell|US Copyright Group - Saving Cinema or Mass Litigation Used as Profit-Center?|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_roughdraft_Assignment4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brandon A. Ceranowicz|A Comparison of Open Source Licenses|Link|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6495</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6495"/>
		<updated>2011-04-11T06:05:59Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regarding Cato Institute Policy Analysis No. 295&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I&#039;m struggling with this analysis piece from the Cato Institute. I used to consider myself to be a libertarian; unfortunately, I&#039;m not sure that term means what I want it to mean anymore. Suffice it to say that some of the core ideas in the Cato Institute piece have resonance for me; namely, the idea that one does not own information, that there is no right &#039;&#039;not&#039;&#039; be annoyed or offended, and that there is (significant) societal and economic value in businesses being able to access information concerning their customers (the Slate article I posted below goes into this). That said, the Cato Institute seems to be taking the (rather undesirable) position that there *is* no &amp;quot;right to privacy&amp;quot;, and the piece itself seems (to my mind) to be riddled with a number of false equivalencies, leaps in reasoning, and glaring oversights. It seems to unduly privilege one portion of the citizenry (those engaged in business) against another (those engaged in consumption). Now, there is nothing wrong with running a business, or turning a profit (verily, the opposite - such activity is key to both individual and national well-being), but I am skeptical at the idea that direct marketing counts as &amp;quot;free speech&amp;quot; and should therefore be immune to government regulation (indeed, there are numerous precedents for limiting marketing speech), that industry self-regulation has proven adequate, or that concerns about privacy, fraud, and identity theft should be so casually dismissed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the ownership of information:&#039;&#039;&#039; clearly we do not “own” information about ourselves; information is not property in the traditional sense, but that does not mean we cannot control the release of certain information under certain circumstances. The article mentions confidentiality for medical records, for instance – but then seems to act as if this is the only sort of information that can or should receive protection. Yet there are other categories of information which we can and do privilege – court proceedings and criminal records, for instance, can be sealed in some cases. While it may be lawful to obtain and publish such information by other means, this is not the sort of free access to information that the article seems to envision. The paper compares gathering (and then selling) statistical information on clients with – of all things – gossip, which (to my mind) is nothing like gathering statistical information. Gossip is a natural social occurrence based on casual observation and the relation of second or third hand accounts. It is nothing like using instruments (in this case computer programs) to take detailed recordings of a person’s circumstances and shopping habits and then processing them mathematically to yield commercially valuable statistics. Gossip is an inevitability that cannot be prevented, or even regulated, beyond the use of social norms (legal means for extreme cases, such as libel, have been shown to be remarkably ineffective). Regulation of business practices, either by law or by voluntary codes of business ethics, is, on the other hand, not merely feasible, but common. Furthermore, no contract (save perhaps the &#039;&#039;social contract&#039;&#039;) exists between the causal observer and those observed. In contrast, a contractual relationship exists between the consumer of a good or service and the provider thereof – contracts which are subject to regulation by law. I reject the false equivalency drawn between gossip and the gathering of marketing data, and with it a large portion of the Cato Institute’s argument, which attempts to convince the reader that such data collection is not only similar too, but in light of its greater accuracy, more beneficial to the subject being observed. We can make this rejection, however, without disputing that such marketing information may be of critical value to the business operator, or bring other, legitimate benefits to the consumer.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the validity of privacy concerns:&#039;&#039;&#039; Furthermore, I find the paper in question entirely too dismissive of consumers’ privacy concerns – as if large corporate marketing databases posed little to no increased risk for those who’s information they contain. Just today, I heard news of a large corporate email database being hacked into (http://losangeles.cbslocal.com/2011/04/04/banks-retailers-warn-customers-after-email-database-hacked/), exposing the customers of several major firms to the potential of spam and fraudulent email. This is not the first such occurrence; indeed, we have seen much more sensitive bank account and credit card data stolen from financial institutions. The Cato institute seems to think that the abuse of cooperate databases can be adequately prevented by industry standards, existing legal penalties, and that the only real danger is that posed by the government. To further its case, it argues that many instances of criminal abuse are essentially inevitable – making the spectacular leap of logic that since certain abuses are not 100% preventable, that there is little value in attempting to increase legal protection against them. This is fallacious at best, disingenuous at worst. It is often said that there is very little one can do to prevent a determined assassin from assassinating a public figure; yet we do not throw up our hands and, say, allow the President to travel unescorted. On the contrary, the Secret Service and other government agencies spend an enormous amount of time, energy, and money attempting to safeguard key public officials by preventing or otherwise making such assassination attempts as difficult as possible. Likewise – to take a considerably more mundane example – even the best bike-lock will not prevent the most determined and organized of bike thieves from stealing or stripping a parked bike. That does not mean we encourage cyclists to leave their bikes unlocked and unattended on the street. I am willing to accept the argument that there is a price to be paid for greater privacy rights and safeguards, and that no such measures provide perfect protection, but I am not willing to entertain the notion that such safeguards are doomed to failure and therefore are of no value to the consumer, and to society as a whole. I am also troubled by the piece’s treatment of direct marketing; namely the glaring omission of any mention of spam email. While direct marketing is no doubt crucial to many businesses, and more tailored marketing would no doubt be a blessing to many consumers, when it comes to email, “junk mail” or “spam” can be crippling to the very businesses who’s interests the Cato Institute seems to have in mind; sorting though hundreds of spam messages a day can have serious impact on productivity for employees who make heavy use of electronic communications as part of their work duties – increasingly efficient spam filters help, but they are not solely responsible for reductions of spam mail; rather governmental regulation and prosecution of spammers has played a vital role in this. I doubt that many recipients of spam mail would be favorably predisposed to the argument that such mail constituted a category direct marketing constitutionally protected as “free speech”. We are not a talking about mere “annoyance” here, as the Cato Institute suggests, but rather a phenomenon that new technology has allowed to grow to such proportion that it has a serious impact on people’s lives, let alone its role as a conduit for illegal and unethical predatory activity. The government is commonly held to have a responsibility to protect citizens from unwanted and intrusive harassment by other private citizens. While the “Lands End” catalogue may not fall into this category, spam mail, as well as persistent telemarketing calls at inappropriate times, increasingly are seen to do so. As a consumer I am inclined to think that the rights of business to conduct their business need to be balanced against the rights of consumers to conduct their lives without undo interference.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the government and business ethics:&#039;&#039;&#039; The Cato Institute is quite correct to point out the special danger presented by the government and government information gathering, with the unique powers of enforcement it holds over the citizenry. I applaud this healthy skepticism; however, I think the institute’s libertarian biases have blinded it to potential for abuse posed by corporate databases, both by corporations themselves and – in the most glaring omission of the piece – abuse of said databases by the government with the acquiescence (if not outright support) of their private administrators. We have already seen such (mis)use of corporate marketing databases in our current reading: eloquently detailed by Christopher Soghoian on his weblog (http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html). Keep in mind that these databases were never intended to be used for surveillance purposes, but rather intended for just the sort of marketing uses which the Cato Institute is advocating in favor of. The purity of purpose the institute ascribes to business – that is, the pursuit of profit – did not prevent these companies from secretly divulging customer information for (what the institute itself would surely see as) abuse by government agencies. And why should it have? If businesses are conceived for the sole purpose of making profit, then why should we expect them to do anything but what they have done? – namely seize the opportunity to turn the sale of consumer information to the government into a profitable revenue source. The only potential curb on this sort of behavior would be the ire these corporations’ customer base, but since the widespread sale of geo-location and other private information is largely hidden from the public no outcry is possible. Furthermore, while I am sure that the Cato Institute would be quick to demand new restrictions on the government concerning the acquisition of such information (judicial oversight through a system of warrants, and laws requiring transparency in reporting), I am equally sure that the Institute would casually dismiss any need for tighter regulation on the business end. This is troubling to me. Industry self-regulation is only valuable as far as it achieves the desired results; it is only too easy for self-regulation to be corrupted into a self-serving obfuscation. And, as much as we should respect business’ (entirely necessary) role as an engine of societal growth and prosperity, we can still demand that said businesses conform to certain codes of business ethics. Requiring that businesses respect the privacy of their customers by providing clear explanations of how and to what extent customer information will be used, requesting permission for certain uses, and abiding by terms of service agreements which govern these uses is entirely is, to me, entirely reasonable. Telling customers that they can just “opt out” of internet or cell phone use if they are concerned about privacy seems to me to be about as sensible as relying on abstinence-only education to prevent the spread of STDs and unwanted teen pregnancy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion:&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
To synthesize the thoughts presented here:&lt;br /&gt;
1)	A certain degree of personal privacy is desirable and should be protected.&lt;br /&gt;
2)	Businesses have a legitimate need for marketing information gathered from consumers who use their services.&lt;br /&gt;
3)	Therefore, efforts must be made to balance these two nontrivial concerns.&lt;br /&gt;
4)	Self-regulation is insufficient to guarantee freedom from abuse of corporate consumer information databases.&lt;br /&gt;
5)	Both the government and private corporations should be restricted in this regard.&lt;br /&gt;
&lt;br /&gt;
Highly tailored direct marketing is the wave of the future. This development cannot be stopped; neither should we attempt to stop it, as it promises significant benefits to both business and consumer. This sort of analysis (http://www.theatlantic.com/business/archive/2011/04/how-the-american-man-spends-money/236888/) is not only critical to business, but can tell us important things about society as a whole. However, this does not mean we need to, or should, sacrifice the entirety of our personal privacy rights on the altar of innovation. Privacy is an important issue, and it behooves us to define with a degree of clarity to what extent a citizen’s personal privacy is to be protected. It is naïve to believe that such protection is of little benefit to society, or that the natural (unregulated) course of evolution will adequately provide for its existence. This is not a call for heavy handed regulation; rather it is a call for serious, objective thought on the subject. I am not sure that the Cato Institute’s advocacy piece (as valuable as it its insights might be) qualifies in this regard. &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:36, 10 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Also, a link to the FTC filing mentioned in the above article (regarding Google Buzz): http://www.ftc.gov/opa/2011/03/google.shtm&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:42, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The internet in action: &amp;quot;My Dad is Li Gang!&amp;quot;, courtesy of Know Your Meme. http://knowyourmeme.com/memes/my-dad-is-li-gang-%E6%88%91%E7%88%B8%E6%98%AF%E6%9D%8E%E5%88%9A &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 06:05, 11 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6487</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6487"/>
		<updated>2011-04-10T03:36:29Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regarding Cato Institute Policy Analysis No. 295&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I&#039;m struggling with this analysis piece from the Cato Institute. I used to consider myself to be a libertarian; unfortunately, I&#039;m not sure that term means what I want it to mean anymore. Suffice it to say that some of the core ideas in the Cato Institute piece have resonance for me; namely, the idea that one does not own information, that there is no right &#039;&#039;not&#039;&#039; be annoyed or offended, and that there is (significant) societal and economic value in businesses being able to access information concerning their customers (the Slate article I posted below goes into this). That said, the Cato Institute seems to be taking the (rather undesirable) position that there *is* no &amp;quot;right to privacy&amp;quot;, and the piece itself seems (to my mind) to be riddled with a number of false equivalencies, leaps in reasoning, and glaring oversights. It seems to unduly privilege one portion of the citizenry (those engaged in business) against another (those engaged in consumption). Now, there is nothing wrong with running a business, or turning a profit (verily, the opposite - such activity is key to both individual and national well-being), but I am skeptical at the idea that direct marketing counts as &amp;quot;free speech&amp;quot; and should therefore be immune to government regulation (indeed, there are numerous precedents for limiting marketing speech), that industry self-regulation has proven adequate, or that concerns about privacy, fraud, and identity theft should be so casually dismissed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the ownership of information:&#039;&#039;&#039; clearly we do not “own” information about ourselves; information is not property in the traditional sense, but that does not mean we cannot control the release of certain information under certain circumstances. The article mentions confidentiality for medical records, for instance – but then seems to act as if this is the only sort of information that can or should receive protection. Yet there are other categories of information which we can and do privilege – court proceedings and criminal records, for instance, can be sealed in some cases. While it may be lawful to obtain and publish such information by other means, this is not the sort of free access to information that the article seems to envision. The paper compares gathering (and then selling) statistical information on clients with – of all things – gossip, which (to my mind) is nothing like gathering statistical information. Gossip is a natural social occurrence based on casual observation and the relation of second or third hand accounts. It is nothing like using instruments (in this case computer programs) to take detailed recordings of a person’s circumstances and shopping habits and then processing them mathematically to yield commercially valuable statistics. Gossip is an inevitability that cannot be prevented, or even regulated, beyond the use of social norms (legal means for extreme cases, such as libel, have been shown to be remarkably ineffective). Regulation of business practices, either by law or by voluntary codes of business ethics, is, on the other hand, not merely feasible, but common. Furthermore, no contract (save perhaps the &#039;&#039;social contract&#039;&#039;) exists between the causal observer and those observed. In contrast, a contractual relationship exists between the consumer of a good or service and the provider thereof – contracts which are subject to regulation by law. I reject the false equivalency drawn between gossip and the gathering of marketing data, and with it a large portion of the Cato Institute’s argument, which attempts to convince the reader that such data collection is not only similar too, but in light of its greater accuracy, more beneficial to the subject being observed. We can make this rejection, however, without disputing that such marketing information may be of critical value to the business operator, or bring other, legitimate benefits to the consumer.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the validity of privacy concerns:&#039;&#039;&#039; Furthermore, I find the paper in question entirely too dismissive of consumers’ privacy concerns – as if large corporate marketing databases posed little to no increased risk for those who’s information they contain. Just today, I heard news of a large corporate email database being hacked into (http://losangeles.cbslocal.com/2011/04/04/banks-retailers-warn-customers-after-email-database-hacked/), exposing the customers of several major firms to the potential of spam and fraudulent email. This is not the first such occurrence; indeed, we have seen much more sensitive bank account and credit card data stolen from financial institutions. The Cato institute seems to think that the abuse of cooperate databases can be adequately prevented by industry standards, existing legal penalties, and that the only real danger is that posed by the government. To further its case, it argues that many instances of criminal abuse are essentially inevitable – making the spectacular leap of logic that since certain abuses are not 100% preventable, that there is little value in attempting to increase legal protection against them. This is fallacious at best, disingenuous at worst. It is often said that there is very little one can do to prevent a determined assassin from assassinating a public figure; yet we do not throw up our hands and, say, allow the President to travel unescorted. On the contrary, the Secret Service and other government agencies spend an enormous amount of time, energy, and money attempting to safeguard key public officials by preventing or otherwise making such assassination attempts as difficult as possible. Likewise – to take a considerably more mundane example – even the best bike-lock will not prevent the most determined and organized of bike thieves from stealing or stripping a parked bike. That does not mean we encourage cyclists to leave their bikes unlocked and unattended on the street. I am willing to accept the argument that there is a price to be paid for greater privacy rights and safeguards, and that no such measures provide perfect protection, but I am not willing to entertain the notion that such safeguards are doomed to failure and therefore are of no value to the consumer, and to society as a whole. I am also troubled by the piece’s treatment of direct marketing; namely the glaring omission of any mention of spam email. While direct marketing is no doubt crucial to many businesses, and more tailored marketing would no doubt be a blessing to many consumers, when it comes to email, “junk mail” or “spam” can be crippling to the very businesses who’s interests the Cato Institute seems to have in mind; sorting though hundreds of spam messages a day can have serious impact on productivity for employees who make heavy use of electronic communications as part of their work duties – increasingly efficient spam filters help, but they are not solely responsible for reductions of spam mail; rather governmental regulation and prosecution of spammers has played a vital role in this. I doubt that many recipients of spam mail would be favorably predisposed to the argument that such mail constituted a category direct marketing constitutionally protected as “free speech”. We are not a talking about mere “annoyance” here, as the Cato Institute suggests, but rather a phenomenon that new technology has allowed to grow to such proportion that it has a serious impact on people’s lives, let alone its role as a conduit for illegal and unethical predatory activity. The government is commonly held to have a responsibility to protect citizens from unwanted and intrusive harassment by other private citizens. While the “Lands End” catalogue may not fall into this category, spam mail, as well as persistent telemarketing calls at inappropriate times, increasingly are seen to do so. As a consumer I am inclined to think that the rights of business to conduct their business need to be balanced against the rights of consumers to conduct their lives without undo interference.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the government and business ethics:&#039;&#039;&#039; The Cato Institute is quite correct to point out the special danger presented by the government and government information gathering, with the unique powers of enforcement it holds over the citizenry. I applaud this healthy skepticism; however, I think the institute’s libertarian biases have blinded it to potential for abuse posed by corporate databases, both by corporations themselves and – in the most glaring omission of the piece – abuse of said databases by the government with the acquiescence (if not outright support) of their private administrators. We have already seen such (mis)use of corporate marketing databases in our current reading: eloquently detailed by Christopher Soghoian on his weblog (http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html). Keep in mind that these databases were never intended to be used for surveillance purposes, but rather intended for just the sort of marketing uses which the Cato Institute is advocating in favor of. The purity of purpose the institute ascribes to business – that is, the pursuit of profit – did not prevent these companies from secretly divulging customer information for (what the institute itself would surely see as) abuse by government agencies. And why should it have? If businesses are conceived for the sole purpose of making profit, then why should we expect them to do anything but what they have done? – namely seize the opportunity to turn the sale of consumer information to the government into a profitable revenue source. The only potential curb on this sort of behavior would be the ire these corporations’ customer base, but since the widespread sale of geo-location and other private information is largely hidden from the public no outcry is possible. Furthermore, while I am sure that the Cato Institute would be quick to demand new restrictions on the government concerning the acquisition of such information (judicial oversight through a system of warrants, and laws requiring transparency in reporting), I am equally sure that the Institute would casually dismiss any need for tighter regulation on the business end. This is troubling to me. Industry self-regulation is only valuable as far as it achieves the desired results; it is only too easy for self-regulation to be corrupted into a self-serving obfuscation. And, as much as we should respect business’ (entirely necessary) role as an engine of societal growth and prosperity, we can still demand that said businesses conform to certain codes of business ethics. Requiring that businesses respect the privacy of their customers by providing clear explanations of how and to what extent customer information will be used, requesting permission for certain uses, and abiding by terms of service agreements which govern these uses is entirely is, to me, entirely reasonable. Telling customers that they can just “opt out” of internet or cell phone use if they are concerned about privacy seems to me to be about as sensible as relying on abstinence-only education to prevent the spread of STDs and unwanted teen pregnancy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion:&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
To synthesize the thoughts presented here:&lt;br /&gt;
1)	A certain degree of personal privacy is desirable and should be protected.&lt;br /&gt;
2)	Businesses have a legitimate need for marketing information gathered from consumers who use their services.&lt;br /&gt;
3)	Therefore, efforts must be made to balance these two nontrivial concerns.&lt;br /&gt;
4)	Self-regulation is insufficient to guarantee freedom from abuse of corporate consumer information databases.&lt;br /&gt;
5)	Both the government and private corporations should be restricted in this regard.&lt;br /&gt;
&lt;br /&gt;
Highly tailored direct marketing is the wave of the future. This development cannot be stopped; neither should we attempt to stop it, as it promises significant benefits to both business and consumer. This sort of analysis (http://www.theatlantic.com/business/archive/2011/04/how-the-american-man-spends-money/236888/) is not only critical to business, but can tell us important things about society as a whole. However, this does not mean we need to, or should, sacrifice the entirety of our personal privacy rights on the altar of innovation. Privacy is an important issue, and it behooves us to define with a degree of clarity to what extent a citizen’s personal privacy is to be protected. It is naïve to believe that such protection is of little benefit to society, or that the natural (unregulated) course of evolution will adequately provide for its existence. This is not a call for heavy handed regulation; rather it is a call for serious, objective thought on the subject. I am not sure that the Cato Institute’s advocacy piece (as valuable as it its insights might be) qualifies in this regard. &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:36, 10 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Also, a link to the FTC filing mentioned in the above article (regarding Google Buzz): http://www.ftc.gov/opa/2011/03/google.shtm&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:42, 9 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6486</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6486"/>
		<updated>2011-04-09T03:42:53Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Also, a link to the FTC filing mentioned in the above article (regarding Google Buzz): http://www.ftc.gov/opa/2011/03/google.shtm&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:42, 9 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6485</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6485"/>
		<updated>2011-04-09T03:42:20Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Also, a link to the FCC filing mentioned in the above article (regarding Google Buzz): http://www.ftc.gov/opa/2011/03/google.shtm&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:42, 9 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6484</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6484"/>
		<updated>2011-04-09T03:34:58Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6483</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6483"/>
		<updated>2011-04-09T03:25:02Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_Infrastructure_and_Regulation&amp;diff=6448</id>
		<title>Internet Infrastructure and Regulation</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_Infrastructure_and_Regulation&amp;diff=6448"/>
		<updated>2011-03-30T00:28:13Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Links from Class */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will cover the politics, policy, economics and technology of deploying broadband infrastructure.  We will look at the year-old US National Broadband Plan and the Berkman Center review of international experiences in broadband policy. Additionally, we will look at the substance and politics of the net neutrality debate. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* Executive Summary of the National Broadband Plan [http://www.broadband.gov/plan/executive-summary/]&lt;br /&gt;
&lt;br /&gt;
* National Broadband Plan Commission Meeting: National Purposes Update, February 18th 2010 [http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-296353A1.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world, Berkman Center [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Berkman_Center_Broadband_Final_Report-C1_15Feb2010.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Net Neutrality 101 [http://www.savetheinternet.com/frequently-asked-questions?gclid=CKbclcK65KcCFULf4AodaxmJCg]&lt;br /&gt;
&lt;br /&gt;
* More Confusion about Internet Freedom [http://techliberation.com/2011/03/01/more-confusion-about-internet-freedom/]&lt;br /&gt;
&lt;br /&gt;
* Hands Off the Internet [http://www.youtube.com/watch?v=tlhSbJYxOnc]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.fcc.gov The Federal Communications Commission]&lt;br /&gt;
* [http://www.broadband.gov National Broadband Plan]&lt;br /&gt;
* [http://www.openinternet.gov OpenInternet.gov]&lt;br /&gt;
* [http://www.ietf.org The Internet Engineering Task Force (IETF)]&lt;br /&gt;
* [http://www.icann.org The Internet Corporation for Assigned Names and Numbers]&lt;br /&gt;
* [http://www.fcc.gov/Reports/tcom1996.txt The Telecommunications Act of 1996]&lt;br /&gt;
* [http://wireless.fcc.gov/auctions/default.htm?job=auctions_home  FCC - Wireless Spectrum Auctions]&lt;br /&gt;
* [http://www.isp-planet.com/cplanet/tech/2004/prime_letter_040301_powell.html Powell&#039;s Four Freedoms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
A number of things came to mind during the readings.  The one that I&#039;d like to discuss here is what the economic impact on startup and small businesses and the potential negative effects pipeline tiering might have on the US economy.  Pipeline tiering could and most likely would have a negative effect on the US economy if small and startup businesses seek creating revenue in other countries due to class A and class B access by US ISP&#039;s. This said, it could mean many companies opting not to setup shop in the US.  This in turn means less innovation within our own borders.  In the end the ISP&#039;s lose out on a source of revenue and the US loses it&#039;s position as world class innovator.&lt;br /&gt;
&lt;br /&gt;
Further, if another country dictates that all content is free to anyone, how can it be enforced if our own ISP&#039;s charge a tier pricing to access such sites, data and content?  It would also be a requirement for protection of such sources to be made law or included in the requirement to pay for access.  But how do you collect against a foreign country where the services are housed?  Are this ISP&#039;s really thinking this through?  Are they prepared to lose a large amount of business to foreign providers?  To the majority of us we would not notice if we are going to say the UK for content.&lt;br /&gt;
&lt;br /&gt;
If Sealand were still in existence would it help protect against the possibility of tiered charges?&lt;br /&gt;
--[[User:Adavies01|Adavies01]] 20:38, 29 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
After reading all this week&#039;s assignment readings, I started to dig websites to see what is going on in my country, which is South Korea, regarding the &amp;quot;Net Neutrality&amp;quot; issue. It was quite a surprise to find out that Korea, nominated as one of the leading Internet police states in the world, is, in fact, suggesting a rather positive vision in this aspect. ([http://www.koreainformationsociety.com/2010/09/net-neutrality-view-from-korea.html]) --[[User:Yu Ri|Yu Ri]] 21:37, 29 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thought this was relative and very interesting:&lt;br /&gt;
Article referring to common carriage; http://www.economist.com/node/16106593 -- [[User:Alex|Alex]]&lt;br /&gt;
 &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
A follow-up to our discussion on limits to free speech and indirect political pressure on third-party private intermediaries.  In this case, four senators are &amp;quot;requesting&amp;quot; Google, Apple, and RIM (maker of Blackberry) to remove apps from their device app stores that identify police DUI checkpoints.  This article is the more passionate and argues for the freedom-of-speech angle: [http://www.eweek.com/c/a/Mobile-and-Wireless/Senators-Pressure-Mobile-App-Stores-to-Kill-Politically-Incorrect-Apps-337124/ Senators Pressure Mobile App Stores to Kill Politically Incorrect Apps.]  While this one is more neutral: [http://news.yahoo.com/s/pcworld/20110323/tc_pcworld/groupsdefenddrunkdrivingcheckpointsoftware Groups Defend Drunk-driving Checkpoint Software.]  But it certainly looks like we&#039;ll see more and more instances of individuals in congress finding favorite online bogeymen to show how patriotic/principled/family-valued/tough-on-crime/fill-in-the-blank they can be! [[User:Smithbc|Smithbc]] 07:05, 24 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*[http://cyber.law.harvard.edu/is2011/User:Smithbc Smithbc] thanks for pointing out this topic. There’s a couple of interesting discussion topics here. One is, if the purpose of drunken driving checkpoints is to get drunk drivers off the road, why would you combat a technology that would allow a potential offender to see active checkpoints before leaving the bar and maybe think twice, get a cab or stay home? It’s like people being pulled over for flashing their lights at oncoming traffic to let others know about a speed trap or ticketing for speed trap scanners in cars. If the purpose is to get people to slow down, don’t all of these accomplish the goals as much as the presence of enforcement? Of course for this logic to be valid one must assume that the goal is keeping drunk drivers off the road and slowing people down as opposed to arrest quotas and the revenue associated with fines. &lt;br /&gt;
&lt;br /&gt;
-- Putting the soapbox aside, a more focused question about the above related to the topics of class is: is it an effective policy tool to attack one set of social problems by diminishing the fundamental rights insured by the First Amendment or aren’t there many other innovative and direct ways? How about directing enforcement or remediation at the offenders instead of stripping the rest of society of basic rights in an attempt to control the actions of a few? It’s seems arcane. It’s akin to thinking you can cure someone who is anemic by using the ancient medical technique of bloodletting. --[[User:Gclinch|Gclinch]] 14:18, 26 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Classmates: Is it just me or are the subjects we are  studying in this class some of the most real world relevant in any class you’ve taken? Every week it seems like the syllabus tracks the headlines. We studied Wikileaks while in the real world events directly related to the topic unfolded. We studied collaborative technologies and the power of the individual to influence the world through digital technologies while dramatic examples of technology propelling individuals as catalysts for social change and crowd sourced political revolutions continue to unfold across large regions of the globe.&lt;br /&gt;
 &lt;br /&gt;
This week we are studying the Internet Infrastructure and Regulation and the National Broadband Plan and in the news important implications of this topic shout out to us.&lt;br /&gt;
 &lt;br /&gt;
The reason I say these things is that I below are a couple of specific examples that I would like your thoughts on.  May I have your opinion on the following? &lt;br /&gt;
&lt;br /&gt;
Last class we talked about Title V of the Telecommunications Act of 1996 commonly known as the ([http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Section 230 of the Communications Decency Act]). One of the primary goals of the 1996 Telecom act was advertised as creating an environment within which competition would flourish. &lt;br /&gt;
  &lt;br /&gt;
Flourish it did, for a relatively short period of time, but in the long run, not so much. This week’s business news started with one of the few remaining independent major wireless carriers in the US agreeing to merger terms with a massive firm that is itself the contemporary result of a string of industry consolidations that have take place in the intervening years since the passage of the Telecom Act of 1996 (see: [http://wwww.networkworld.com/news/2011/032111-att-tmobile-duopoly.html Will AT&amp;amp;T&#039;s T-Mobile buy lead to a duopoly?])&lt;br /&gt;
&lt;br /&gt;
In this week’s class we will be studying [http://www.broadband.gov/ National Broadband Plan] and again recent headlines including, [http://www.govtech.com/public-safety/FCC-Endorses-4G-Wireless-Standard-022411.html “FCC endorsed long term evolution (LTE) as the required standard for any government”] are about highly relevant topics.  One of the goals of the National Broadband Plan is to, “ensure public safety” through addressing the, “lack a nationwide public safety mobile broadband communications network.”&lt;br /&gt;
&lt;br /&gt;
One of the ways the National Broadband Plan proposed to address the lack of a nationwide public safety mobile broadband network was a proposal to auction off a block of spectrum known as the “D Block.” The D Block is a segment of the 700 MHz band that was proposed to be sold to a private entity that would use part of it for commercial purposes and as part of the purchase agreement, the organization would make available and manage part of the spectrum block in support of public safety communications. It’s a very complicated issue, but the bottom line was that the numbers didn’t work out and no private company stepped up to bid enough to cover  the auction reserve (see [http://arstechnica.com/old/content/2008/09/fcc-considering-new-d-block-auction-plan.ars FCC considering new D Block auction]). &lt;br /&gt;
&lt;br /&gt;
This all brings me to a couple of questions I hope we can discuss. Both the Telecommunications Act of 1996 and National Broadband Plan are OMNIBUS initiatives by government to address social challenges.  [http://en.wikipedia.org/wiki/Omnibus_spending_bill Omnibus] is a term that originated (in terms of its use by US government) in the 1970’s for the purpose of handling the national budget when large numbers of funding items would be consolidated into a single piece of legislation.  (This is yet again another topic related to recent headlines see [http://www.heritage.org/Research/Reports/2007/12/Omnibus-Spending-Bill-Busts-the-Budget-to-Pay-for-Pork Omnibus Spending Bill Busts the Budget to Pay for Pork ...])&lt;br /&gt;
&lt;br /&gt;
My first question begins with, “is the omnibus approach a valid way to address challenges?” Can government effectively tackle challenging issues with all encompassing approaches such as omnibus intiatives and legislation? Isn&#039;t it more effective to solve complex problems by chunking them up in more manageable pieces? &lt;br /&gt;
&lt;br /&gt;
Other questions we might discuss tie last week’s readings to this week’s topics. In [https://www.socialtext.net/codev2/free_speech chapter 12 subsection] &#039;&#039;The Regulators of Speech: Distribution&#039;&#039;, Professor Lessig talks about the idea of how the, “deeply held assumption at the core of our jurisprudence governing broadcasting technologies: Only a fixed amount of ‘spectrum’ is available for broadcasting,” and that the way to manage it is to, “allocate slices of it to users,” is a misconception routed in the decades ago understanding of the technology.  Today’s technologies are vastly different and no longer constrain the use of broadcast spectrum in the same ways, yet governance mentality seems stuck in the 1920’s. &lt;br /&gt;
&lt;br /&gt;
What are your thoughts about this idea that even in forward thinking initiatives including the National Broadband Plan policy making seeks to be progressive, yet often is trapped by historical context? &lt;br /&gt;
Thank you. I look forward to your thoughtful comments. --[[User:Gclinch|Gclinch]] 14:18, 26 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
====Thoughts on Net Neutrality and Open Access====&lt;br /&gt;
This week’s readings on the Omnibus Broadband Initiative, net neutrality and Internet freedom are pure advocacy papers.  (Only the Berkman Center study of next generation connectivity conveyed a sense of impartiality.)  Each presents big business or big government as the enemy of the people’s Internet.  Each is correct to a degree, but neither paints a fair and complete picture.  Theirer warns of inefficient bureaucracy should the government get involved, yet it was a government project from DARPA that created the Internet.  The populist sounding organizations “SaveTheInternet.com” and “HandsOff.org” alternately blame the greedy motives of big businesses like AT&amp;amp;T and Google without discussing the natural competition between content providers and common carriers.  The simple fact of the Internet is that traffic management has existed long before the Internet did – and it has been an integral part of the Internet for most of its life.  The electric company and the telephone company each have business and residential service tiers.  These public utilities are regulated by government to insure and even subsidize a minimum level of residential service.  Business customers pay more for higher service levels.&lt;br /&gt;
This public utility model can serve the Internet as well.  Just as the phone company cannot restrict who you can call (although you may have to pay more for long distance), no Internet service provider should block a particular site’s traffic (although there can be different data plans for capacity and speed).  Many of us perform our own traffic shaping using “Quality of Service” settings (QoS) to grant higher priority “fast lane” access to voice-over-IP (Skype) while relegating email to the slow lane (big deal).  In fact, we welcome the intervention of our ISP for filtering all that spam!  I think the Berkman Center paper gets the concept right by emphasizing “open access” policy – i.e., that every business or other entity has the ability to connect to the infrastructure – but not mandating any policy beyond it.  Promote innovation by allowing tiered service levels with an opportunity to profit from risk, while still guaranteeing basic access to all as a public good in the spirit of the First Amendment. [[User:ChrisSura|-Chris Sura]] 02:51, 29 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Nice thoughts Chris...I share your opinion as regard your last two sentences...To be honest, I did not know how far net neutrality issue is. Till now I though that it is more problem of future than issue of current days. I was wrong...Information about the blocking skype by T-Mobile in Germany in 2009 made me sure in how important the topic is. ([http://en.wikipedia.org/wiki/Network_neutrality#Law_in_Germany T-Mobile blocking Skype in Germany])&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;br /&gt;
[http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202486102650&amp;amp;Manhattan_Federal_Judge_Kimba_Wood_Calls_Record_Companies_Request_for__Trillion_in_Damages_Absurd_in_Lime_Wire_Copyright_Case Fed Judge Kimba Wood Calls Record Companies&#039; Request for Trillions in Damages Absurd in LimeWire Copyright Case]  The most interesting part of the article is not the outrageousness of the record companies&#039; claims, but the way the judge reached her decision.  She stated that legislature could not have foreseen the way the internet would interact with copyright law, and thus you can&#039;t use legislative history.  Reasonableness, instead, was the issue to rule on.&lt;br /&gt;
&lt;br /&gt;
Wall Street Journal Op Ed by Yochai Benkler [http://www.nytimes.com/2010/03/21/opinion/21Benkler.html Ending the Internet’s Trench Warfare] March 20, 2010 &lt;br /&gt;
&amp;quot;The Federal Communications Commission’s National Broadband Plan, announced last week, is aimed at providing nearly universal, affordable broadband service by 2020. And while it takes many admirable steps — including very important efforts toward opening space in the broadcast spectrum — it does not address the source of the access problem: without a major policy shift to increase competition, broadband service in the United States will continue to lag far behind the rest of the developed world.&amp;quot; --[[User:Gclinch|Gclinch]] 23:32, 28 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New America Foundation link concerning differing broadband service and pricing in the US vs that in Japan:&lt;br /&gt;
http://newamerica.net/publications/policy/u_s_vs_japan_residential_internet_service_provision_pricing&lt;br /&gt;
The brief posted is from 2009 and contains a generous quantity of data which should serve to give you a clear idea of the difference in service availability between the US and a country which is considered to be half a generation ahead of the international standard.[[User:BrandonAndrzej|BrandonAndrzej]] 00:28, 30 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6302</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6302"/>
		<updated>2011-03-22T18:41:23Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions Instructions===&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline:&lt;br /&gt;
**Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|yourname|assignment description|link to assignment document}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
{{AssignmentInfo|Susan Jennings|Annuity Companies&#039; Social Media Communities(Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:_Outline_of_annuity_social_media.doc‎}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kristina Meshkova&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kristina Meshkova|Music sharing sites (Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:Kristina_Meshkova_Assignement_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Elisha Surillo|Homophilic Tendencies and the Online Tea Party Movement|http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Lemont|The Cancer Bioinformatics Grid|http://cyber.law.harvard.edu/is2011/Image:Project_Outline_Lemont.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Richard Kundiger|A Study on Free Riding in the Bitorrent Peer-to-Peer (P2P) network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_3_Research_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brian Smith|Foursquare Privacy: Data Exposure, Service Architecture, and User Attitudes|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_3_Brian_Smith_v1.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
{{AssignmentInfo|Brandon A. Ceranowicz|A Comparative Study of Open Source Licenses|http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_3_-_Outline_BAC.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alokika Singh|Feminist Movement in India and the Internet (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:MARCH_22_singh.singh.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Lorena Abuín|Media role in the contribution to prosecuted online activities (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Assignment_3_-_Lorena_Abu%C3%ADn.pdf}}&lt;br /&gt;
&lt;br /&gt;
Jillian York&lt;br /&gt;
{{AssignmentInfo|Jillian C. York|Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon_Outline.pdf}}&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6301</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6301"/>
		<updated>2011-03-22T18:31:33Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions Instructions===&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline:&lt;br /&gt;
**Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|yourname|assignment description|link to assignment document}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
{{AssignmentInfo|Susan Jennings|Annuity Companies&#039; Social Media Communities(Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:_Outline_of_annuity_social_media.doc‎}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kristina Meshkova&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kristina Meshkova|Music sharing sites (Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:Kristina_Meshkova_Assignement_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Elisha Surillo|Homophilic Tendencies and the Online Tea Party Movement|http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Lemont|The Cancer Bioinformatics Grid|http://cyber.law.harvard.edu/is2011/Image:Project_Outline_Lemont.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Richard Kundiger|A Study on Free Riding in the Bitorrent Peer-to-Peer (P2P) network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_3_Research_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brian Smith|Foursquare Privacy: Data Exposure, Service Architecture, and User Attitudes|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_3_Brian_Smith_v1.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brandon A. Ceranowicz|A Comparative Study of Open Source Licenses|http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_3_-_Outline_BAC.doc}}&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alokika Singh|Feminist Movement in India and the Internet (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:MARCH_22_singh.singh.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Lorena Abuín|Media role in the contribution to prosecuted online activities (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Assignment_3_-_Lorena_Abu%C3%ADn.pdf}}&lt;br /&gt;
&lt;br /&gt;
Jillian York&lt;br /&gt;
{{AssignmentInfo|Jillian C. York|Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon_Outline.pdf}}&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6286</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6286"/>
		<updated>2011-03-22T12:52:25Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions Instructions===&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline:&lt;br /&gt;
**Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|yourname|assignment description|link to assignment document}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kristina Meshkova&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kristina Meshkova|Music sharing sites (Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:Kristina_Meshkova_Assignement_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Elisha Surillo|Homophilic Tendencies and the Online Tea Party Movement|http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Lemont|The Cancer Bioinformatics Grid|http://cyber.law.harvard.edu/is2011/Image:Project_Outline_Lemont.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Richard Kundiger|A Study on Free Riding in the Bitorrent Peer-to-Peer (P2P) network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_3_Research_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brian Smith|Foursquare Privacy: Data Exposure, Service Architecture, and User Attitudes|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_3_Brian_Smith_v1.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brandon A. Ceranowicz|A Comparative Study of Open Source Licenses|http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_3_-_Outline_BAC.doc}}&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=6144</id>
		<title>Law&#039;s Role in Regulating Online Conduct and Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Law%27s_Role_in_Regulating_Online_Conduct_and_Speech&amp;diff=6144"/>
		<updated>2011-03-08T04:17:37Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
What is law&#039;s role in regulating online conduct and speech?  At this point in the course you should be ready to tackle this question from a number of different perspectives. In this class we will begin to explore what role law is &#039;&#039;capable&#039;&#039; of playing as well as what role it &#039;&#039;should&#039;&#039; play.  Remember John Perry Barlow&#039;s [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] which you read earlier in the course?  Has his view of law&#039;s limited role been borne out?  The sources of law impacting online conduct and speech are many, from intellectual property to tort to the First Amendment.  Throughout today&#039;s class, we’ll tie the legal doctrines together with three themes:&lt;br /&gt;
&lt;br /&gt;
* How regulation changes when it’s carried out by computers, rather than by people.&lt;br /&gt;
* Whether going online increases or decreases government control.&lt;br /&gt;
* The new kinds of power possessed by online intermediaries.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/JohnsonPost.pdf David Johnson &amp;amp; David Post, Law and Borders] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kerr.pdf Orin Kerr, The Problem of Perspective in Internet Law] (excerpts)&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/8.07/haven_pr.html Simson Garfinkel, Welcome to Sealand, Now Bugger Off, Wired (July 2000)]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yahoo.pdf Yahoo! Inc v. La Ligue Contra Le Racisme, 433 F.3d 1199 (9th Cir. 2006)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* [http://www.ejiltalk.org/in-the-dock-in-paris/ Prof. Joseph Weiler: In the Dock, in Paris]&lt;br /&gt;
* [http://www.salon.com/technology/dan_gillmor/2010/12/03/the_net_s_soft_underbelly/index.html Salon: Online, the censors are scoring big wins]&lt;br /&gt;
* [https://www.eff.org/deeplinks/2010/12/amazon-and-wikileaks-first-amendment-only-strong EFF: Amazon and WikiLeaks - Online Speech is Only as Strong as the Weakest Intermediary]&lt;br /&gt;
* David Ardia, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part IV) &lt;br /&gt;
* James Grimmelmann, [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1760151 Sealand, HavenCo, and the Rule of Law]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
Perhaps I am missing some of the complex nuances of the arguments, but to me the resolution seems straightforward.  Laws exist to govern people not machines.  The legal entities are citizens, companies and governments, not routers and servers.  Every Internet web service is a transaction between two legal entities at each endpoint with subcontractors facilitating the transport.  The Internet or, more precisely, the collection of independent service providers that comprise the Internet, should be regulated in the same manner that all domestic and foreign commerce is managed today.  Germany, for example, requires every German web site to include an &amp;quot;impressum&amp;quot; page listing the legal owner of the site and contact information.  Just as it is more complex to import and export goods across national boundaries, we should expect similar complexities with transnational web services.  Whether or not we agree with the laws of a particular sovereign nation, it seems prudent that international law should preside in cyberspace as surely as anywhere else on the planet. [[User:ChrisSura|-Chris Sura]] 03:12, 7 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi. I just want to encourage anyone who hasn&#039;t yet read the optional reading by Grimmelmann on the fate of HavenCo to do so; it&#039;s a terrific read. I find the central irony of the piece - essentially that HavenCo, ostensibly an organization devoted avoidance of the law, was actually heavily dependent on the rule of law to operate, and that lack of law, not the opposite, is what ultimately destroyed HavenCo - to be fascinating. [[User:BrandonAndrzej|BrandonAndrzej]] 04:17, 8 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6031</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6031"/>
		<updated>2011-03-05T04:34:55Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
Comment&lt;br /&gt;
Hi Uduak, &lt;br /&gt;
&lt;br /&gt;
Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, &amp;quot;reputation&amp;quot;, and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook &#039;friends&#039; of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to &#039;friending&#039; vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
*Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous&#039; posting are applicable here as well.  It&#039;s good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Greetings Margaret! I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6028</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6028"/>
		<updated>2011-03-05T03:57:00Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
Comment&lt;br /&gt;
Hi Uduak, &lt;br /&gt;
&lt;br /&gt;
Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Greetings Margaret! I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6027</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6027"/>
		<updated>2011-03-05T03:55:43Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
Comment&lt;br /&gt;
Hi Uduak, &lt;br /&gt;
&lt;br /&gt;
Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
* Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It&#039;s a good perspective that you bring to light.  Alan --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Greetings Margaret! I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Comment: Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
* Comment: Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. &lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6022</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=6022"/>
		<updated>2011-03-05T02:57:41Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
*Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt&lt;br /&gt;
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)&amp;gt;&amp;gt; &lt;br /&gt;
*Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)&lt;br /&gt;
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn&#039;t a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)&lt;br /&gt;
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&amp;amp;utm_medium=grid&amp;amp;utm_source=grid&lt;br /&gt;
&lt;br /&gt;
*Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt&#039;s Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Saam Batmanghelidj --[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It&#039;s a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it&#039;s completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it&#039;s anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It&#039;s already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan [[User:adavies01]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Kimberly Nevas --[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Can the U.S. Prosecute Julian Assange?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf&lt;br /&gt;
*Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
*Comment: Your statement, &amp;quot;In this respect, Assange cannot be considered any more liable than the New York Times.&amp;quot; is a bold one, which some might strongly disagree with, given Assange&#039;s postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jamil Buie &lt;br /&gt;
*Prospectus Title: Profiteering via &amp;quot;Public Privacy&amp;quot; The use/misuse of your data&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Jamil, For me this is a an extremely important issue, I&#039;m glad to see you&#039;re looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it&#039;s invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan [[User:ajdavies]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Uduak Patricia Okon&lt;br /&gt;
*Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you? &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf&lt;br /&gt;
Comment&lt;br /&gt;
Hi Uduak, &lt;br /&gt;
&lt;br /&gt;
Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful. &lt;br /&gt;
&lt;br /&gt;
Re:&lt;br /&gt;
-	In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?&lt;br /&gt;
-	Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.&lt;br /&gt;
-	I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.&lt;br /&gt;
- It&#039;s important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they&#039;re getting paid. Formally employed journalists can&#039;t bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.&lt;br /&gt;
-	You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc&lt;br /&gt;
&lt;br /&gt;
Hi Yaerin, I think this is a great topic.  Being a part of F/OSS environment has pushed forward a number of wonderful software innovations.  Scratch is an example of MIT&#039;s commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I&#039;m sure there are tons of other open source software that would interest you.  I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint.  Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it&#039;s been morphed.  Best regards, Alan [[User:ajdavies]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: William Bauser -- [[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf&lt;br /&gt;
*Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won&#039;t be interesting.  How does is promote community discussions without advocating a position?  I&#039;m sure you&#039;ll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*Name: Yu Ri Jeong --[[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Building a Sustainable News Org&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc&lt;br /&gt;
&lt;br /&gt;
Hi La Keisha, It&#039;s good to see you&#039;re approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the &amp;quot;first-to-line&amp;quot; efforts in advertising &amp;amp; classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan [[User: ajdavies]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus Title: Understanding &amp;quot;Lesbanon&amp;quot;: Lebanon&#039;s Online Lesbian Community&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc&lt;br /&gt;
Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet.  The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that &amp;quot;Lesbanon&amp;quot; existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you&#039;re finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)    &lt;br /&gt;
&lt;br /&gt;
*Name:  Caroline McLoughlin[[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title:  Privacy and Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf&lt;br /&gt;
*Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work.  If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites.  Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Anthony Crowe [[User:Acrowe|Acrowe]]&lt;br /&gt;
*Prospectus title: Tagging and Metadata on the Internet and in New Media&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of &amp;quot;conspiracies&amp;quot; from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a &amp;quot;popular&amp;quot; topic, blurring the &amp;quot;secret&amp;quot; component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that&#039;s on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the &amp;quot;accused&amp;quot; by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the &amp;quot;right cause&amp;quot;, that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don&#039;t you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I see a potential flaw in your methodology, and find it potentially invasive of a web surfer&#039;s privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Fringe Forums for the Under-represented&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Role of Bittorrent in the Internet Society&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf&lt;br /&gt;
*Comment: This is a great example of &amp;quot;code is law.&amp;quot;  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It&#039;s also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There&#039;s also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan [[User: ajdavies]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Mary Van Gils&lt;br /&gt;
*Prospectus title: Yelp Case Study - Freedom of Expression&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc&lt;br /&gt;
*Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp.  If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]&lt;br /&gt;
*Prospectus title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
*Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff &amp;quot;Jazzed.com&amp;quot; which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn&#039;t all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the &amp;quot;single and ready to mingle.&amp;quot;Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it&#039;ll be an exciting project, I&#039;m looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let&#039;s chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as &#039;neutral point of view&#039;, &#039;verifiability&#039;. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
*Comment: Joshua, I am very much looking forward to your final product.  Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus.  I wonder if you will reach an opinion as to where to draw the line on &amp;quot;free speech,&amp;quot; or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus.  If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be &amp;quot;going to far?&amp;quot;  I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Lorena Abuín &lt;br /&gt;
* Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf&lt;br /&gt;
&lt;br /&gt;
I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove    &lt;br /&gt;
&lt;br /&gt;
I found that some of your research objectives coincide with mine. I can assure you that people do use what is called &amp;quot;hacktivism&amp;quot; to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler&#039;s Army is not a secret nowadays because of the &amp;quot;hacktivism&amp;quot;, although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the &amp;quot;wrong way&amp;quot; is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the &amp;quot;uniformed criminals&amp;quot; employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&amp;amp;task=view&amp;amp;id=17&amp;amp;Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers&#039; dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.   Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, &amp;quot;[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]&amp;quot; describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Margaret Tolerton [[User: deinous|deinous]]&lt;br /&gt;
* Prospectus title: Hackers, hacking groups, and Hacktivism: Anonymous v. Telecomix as a case study&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Anonymous_v_Telecomix_with_References.doc&lt;br /&gt;
&lt;br /&gt;
Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about &amp;quot;hacktivism&amp;quot;, I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every &amp;quot;hacktivist&amp;quot; action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called &amp;quot;cyber-crimes&amp;quot; that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: &amp;quot;Happy to help others who are not as advanced?&amp;quot;. I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don&#039;t hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
LOL, I don&#039;t know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment &amp;quot;happy too help others who are not as advanced&amp;quot; is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem.  For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  &lt;br /&gt;
&lt;br /&gt;
Greetings Margaret! I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where &amp;quot;I can do this, I can do that&amp;quot; type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus&#039;s sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thank you for your response and comments.  I will certainly take them into consideration.  However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it.  As for an original angle, I am still waffling a bit, and welcome any further comments.====:)[[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
* Name: Guy Clinch --[[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: An Examination of Internet and Society Coursework through the Metaphor of web.alive&lt;br /&gt;
* Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
- It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html &lt;br /&gt;
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Syed Yasir Shirazi [User: syedshirazi]&lt;br /&gt;
* Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Transparency and Participation in Crowd Funding&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out.  Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site?  Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]&lt;br /&gt;
*Prospectus title: Analysis of E-Government Practices in Brazil&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).&lt;br /&gt;
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Does providing a legal alternative act as a deterrent to internet piracy?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
Laura, here is a link to a recent study that you may find of use:&lt;br /&gt;
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] &lt;br /&gt;
&lt;br /&gt;
Hi Laura, glad to see this topic on the list.  It&#039;s a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM&#039;ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content.  Manufacturers of CD and DVD technology has traditionally tried to work with the &amp;quot;Hollywoods&amp;quot; of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we&#039;re moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It&#039;s a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM&#039;ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan [[User: ajdavies]]&lt;br /&gt;
&lt;br /&gt;
Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]&lt;br /&gt;
*Prospectus title: Online Political Activism in India&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf&lt;br /&gt;
&lt;br /&gt;
Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). &lt;br /&gt;
I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India.&lt;br /&gt;
Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Crowd-Sourcing of Starbucks Product Development&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Don, this is a really ambitious project.  I think it&#039;s a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: User Generated Sites: Defining Superusers and Their Monetization&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Tymoteusz, I find you topic very interesting.&lt;br /&gt;
&lt;br /&gt;
I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?&lt;br /&gt;
&lt;br /&gt;
It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Gclinch, Thanks for all of your input! I initially didn&#039;t think to so much as include corporations, but taking a second glance at the subject you&#039;re right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I&#039;d like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the &amp;quot;ball game&amp;quot; with individuals following. I suspect the latter isn&#039;t true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]]&lt;br /&gt;
*Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc&lt;br /&gt;
* Comments:&lt;br /&gt;
&lt;br /&gt;
Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I&#039;m jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I&#039;m eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I&#039;m also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I&#039;m curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  &amp;lt;&amp;lt;[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and &amp;quot;catch&amp;quot; the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jose Uscanga&lt;br /&gt;
*Prospectus Title: Cummunity reporting or social activism?  The New Age of media reporting in Mexico.   &lt;br /&gt;
*Link to prospectus:  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc&lt;br /&gt;
&lt;br /&gt;
Jose, you have identified a truly compelling topic.&lt;br /&gt;
  &lt;br /&gt;
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions. &lt;br /&gt;
&lt;br /&gt;
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved.  It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?   Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=5758</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=5758"/>
		<updated>2011-02-22T08:29:22Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=5756</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=5756"/>
		<updated>2011-02-22T08:21:22Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;  Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Prospectus title:&lt;br /&gt;
*Link to prospectus: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (&#039;&#039;&#039;Remember to sign your comments!&#039;&#039;&#039;)&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Kristina Meshkova&lt;br /&gt;
*Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Trojak--[[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) &lt;br /&gt;
*Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf&lt;br /&gt;
*Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: Trolls and vandals on Epinions.com &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011&lt;br /&gt;
*Prospectus title: Groooveshark music application&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf&lt;br /&gt;
*Comments:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Robert Cunningham&lt;br /&gt;
*Prospectus title: The Archive Team&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: [[Joshuasurillo]]&lt;br /&gt;
*Prospectus title: The effect of government transparency websites- Wikileaks&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Lemont&lt;br /&gt;
*Prospectus title: Why do people cultivate large online networks?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)&lt;br /&gt;
*Prospectus title: The Java Community Process: How Does It Really Work?&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)&lt;br /&gt;
* Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Elisha Surillo&lt;br /&gt;
* Prospectus title: The Tea Party and Internet Freedom&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz&lt;br /&gt;
* Prospectus title: A Comparative Study of Open Source Licenses&lt;br /&gt;
* Link to prospectus: pending&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Peer_Production_and_Collaboration&amp;diff=5578</id>
		<title>Peer Production and Collaboration</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Peer_Production_and_Collaboration&amp;diff=5578"/>
		<updated>2011-02-15T00:57:15Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */ Added thoughts on wikipedia&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 15&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: To make up for the snow day on February 1, tonight&#039;s class will run an extra hour, until 8:30pm.&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
The free software movement is one example of a trend towards distributed volunteer networks of individuals collaborating on collective projects that were formerly the domain of the for-profit private sector.  In this session, we explore how far such peer production can go in redefining the economic and social structures of modern society. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
* Yochai Benkler, [http://mitworld.mit.edu/play/394/ News, Information and the Wealth of Networks] (watch from 8:32 to 26:07)&lt;br /&gt;
* Zittrain, [http://yupnet.org/zittrain/archives/13 Chapter 4: The Generative Pattern]&lt;br /&gt;
* Joseph Reagle, [http://reagle.org/joseph/2010/06/reagle-nrhm-special-collab-norms.html ”Be Nice”: Wikipedia Norms for Supportive Communication]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources==&lt;br /&gt;
The following audio streams from NPR may be interesting:&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4986453 Wikipedia, Open Source and the Future of the Web]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=6051103 Wikipedia Wins Users and Critics by Jenny Lawton]&lt;br /&gt;
* [http://www.npr.org/templates/story/story.php?storyId=4506421 Wikipedia&#039;s Growth Comes with Concerns by Laura Sydell]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
Listening to, and reading, various pieces on Wikipedia I am struck by the amount of effort that Jimmy Wales seems to put into promoting the idea of Wikipedia as, to paraphrase, &amp;quot;a close-knit community of dedicated users&amp;quot; with emphasis on user reputation and his role as &amp;quot;benevolent dictator&amp;quot;, and distancing himself from the more &amp;quot;democratic&amp;quot; (read: anonymous contributors) aspects of the site which (I assume) are generally the first things that come to most peoples&#039; minds when Wikipedia is mentioned. I wonder if this attitude was always a core part of the site&#039;s conception, or whether it was developed in response to outside criticism of the encyclopedia’s (lack of) credibility. Or if it is merely an accurate description of how the site has evolved... I would hazard to guess that Wikipedia, despite what Mr. Wales may say, is *both* a close-knit community *and* a conglomeration of faceless, unorganized (naturally organizing?) &amp;quot;ants&amp;quot;; I doubt the site could survive without both aspects. I am also struck by the parallel between this view and the criticism of Wikipedia skeptics: they see &amp;quot;peer review&amp;quot; being essential, where a &amp;quot;peer&amp;quot; is a responsible member of the academic community, while Mr. Wales sees &amp;quot;peer review&amp;quot; as equally essential, only with &amp;quot;peer&amp;quot; defined as a responsible member of the Wikipedia community. I wonder that seems to occur to no one that the &amp;quot;Wikipedia community&amp;quot; (let alone the &amp;quot;faceless ants&amp;quot;) might very well contain those self-same learned academics who compose and edit articles for Britanica. And if companies are hiring PR agents to &amp;quot;protect&amp;quot; their image on Wikipedia, then I wonder why University faculties have not taken it upon themselves to jointly, publicly venture into Wikipedia to improve the quality of the articles found there in. Surely, after 10 years we should have started to take this thing seriously.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:57, 15 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links  ==&lt;br /&gt;
Chris Anderson: [http://www.wired.com/wired/archive/14.07/people.html People Power]&lt;br /&gt;
&lt;br /&gt;
Business Week: [http://www.businessweek.com/magazine/content/05_25/b3938601.htm The Power of Us]&lt;br /&gt;
&lt;br /&gt;
Nasa: [http://clickworkers.arc.nasa.gov/top Clickworkers Study]&lt;br /&gt;
* the link to the NASA Clickworkers Study seems to be broken. Here is a link to the [http://www.nasa.gov/open/plan/peo.html program&#039;s home page] --[[User:Gclinch|Gclinch]] 13:14, 14 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Yochai Benkler&#039;s Seminal Work on Peer Production: [http://www.benkler.org/CoasesPenguin.html Coase&#039;s Penguin]&lt;br /&gt;
&lt;br /&gt;
Jimbo Wales: [http://webcast.oii.ox.ac.uk/?view=Webcast&amp;amp;ID=20050711_76 Talk on the Wikipedia Community]&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=User_talk:BrandonAndrzej&amp;diff=5393</id>
		<title>User talk:BrandonAndrzej</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=User_talk:BrandonAndrzej&amp;diff=5393"/>
		<updated>2011-02-08T09:09:11Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: New page: This is a talk page!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is a talk page!&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=User:BrandonAndrzej&amp;diff=5392</id>
		<title>User:BrandonAndrzej</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=User:BrandonAndrzej&amp;diff=5392"/>
		<updated>2011-02-08T08:56:55Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: New page: A former ex-patriot English teacher, I have returned to the US with the intention of perusing a degree in international law. I have a deep and abiding love for history and a strong interes...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A former ex-patriot English teacher, I have returned to the US with the intention of perusing a degree in international law. I have a deep and abiding love for history and a strong interest in things geo-political.&lt;br /&gt;
&lt;br /&gt;
- Brandon&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=5391</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=5391"/>
		<updated>2011-02-08T08:55:41Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */  Submitted Assignment 1 at 3:55 EST&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 00:17, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Internet_censorship#Burma&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Jillian_C_York_-assignment_1.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Guy Clinch --[[User:Gclinch|Gclinch]] 17:24, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Enhanced_9-1-1&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_1_%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Kruglyak: [[User:VladimirK|VladimirK]] 20:27, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:The_rule_you_chose.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Gagan Panjhazari [[User:gpanjhazari|gpanjhazari]] 07:24, 6 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:GP-Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Joshua Surillo [[User:Joshuasurillo|Joshuasurillo]] 04:21, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Polling_is_not_a_substitute_for_discussion&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/DSR-570&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Assignment-1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alex Solomon&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brandon A Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 03:52, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/History_of_crossbows&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:BrandonAndrzejAssignment_1.doc&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=5384</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=5384"/>
		<updated>2011-02-08T03:52:22Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 5&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;The &#039;&#039;&#039;upload file&#039;&#039;&#039; link is to the left, under &#039;&#039;&#039;toolbox&#039;&#039;&#039;.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
*Name: Jillian York[[User:Jyork|Jyork]] 00:17, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Internet_censorship#Burma&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:Jillian_C_York_-assignment_1.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Guy Clinch --[[User:Gclinch|Gclinch]] 17:24, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Enhanced_9-1-1&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_1_%28gclinch%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Vladimir Kruglyak: [[User:VladimirK|VladimirK]] 20:27, 5 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to your report: http://cyber.law.harvard.edu/is2011/Image:The_rule_you_chose.txt&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name:Gagan Panjhazari [[User:gpanjhazari|gpanjhazari]] 07:24, 6 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Voting_machines&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/Image:GP-Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Alex Solomon&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
*Link to report: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Brandon A Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 03:52, 8 February 2011 (UTC)&lt;br /&gt;
*Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
*Link to article: http://en.wikipedia.org/wiki/History_of_crossbows&lt;br /&gt;
*Link to report:  pending&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Paradigms_for_Studying_the_Internet&amp;diff=5351</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Paradigms_for_Studying_the_Internet&amp;diff=5351"/>
		<updated>2011-02-06T00:14:16Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */ added some spaces for readability&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 1&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: Due to snow in Cambridge, class is canceled today.  To make up for the cancellation, we&#039;ll be adding an hour to each of the next two class sessions (February 8 and 15).&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s -- we need to answer the critical question of &#039;&#039;&#039;how.&#039;&#039;&#039; Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to &#039;&#039;understand&#039;&#039; what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought.&lt;br /&gt;
&lt;br /&gt;
This class will propose and develop one framework for the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (Read pages 379-396. The rest of this chapter expands the discussions of each layer in more detail, if you want to read more about them)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.mu.oz.au/~zs/decl.html John Perry Barlow, A Declaration of Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/printerfriendly.msp?id=961 Jack Goldsmith &amp;amp; Tim Wu, Digital Borders]&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/ Jonathan Zittrain, The Future of the Internet - Chapters 1 &amp;amp; 2]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
For people interested in a more technical primer on the architecture of the web, how email works, etc. check out ethan zuckerman and andrew mclaughlin&#039;s [http://cyber.law.harvard.edu/digitaldemocracy/internetarchitecture.html Introduction to Internet Architecture and Institutions]&lt;br /&gt;
&lt;br /&gt;
Some fred turner resources: [http://blip.tv/file/125930 video presentation], [http://blogs.law.harvard.edu/mediaberkman/2006/12/01/from-counterculture-to-cyberculture-the-rise-of-digital-utopianism/ audio presentation], and [http://www.stanford.edu/group/fredturner/cgi-bin/drupal/ homepage]&lt;br /&gt;
&lt;br /&gt;
[http://en.citizendium.org/wiki/Welcome_to_Citizendium Citizendium]&lt;br /&gt;
&lt;br /&gt;
Jason Scott on [http://ascii.textfiles.com/archives/808 The Great Failure of Wikipedia] (2004)&lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/news/2011/012611-internet-providers-are-the-new.html Internet providers are the new secret police, says report]&lt;br /&gt;
 &lt;br /&gt;
[http://www.nytimes.com/2011/01/31/business/media/31link.html Define Gender Gap? Look Up Wikipedia&#039;s Contributor List] &lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/community/blog/open-source-fail Open Source #FAIL]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For all its allure, the Internet can be a dangerous place with electronic pipelines that run directly into everything from our personal bank accounts to key infrastructure to government and industrial secrets.&amp;quot; - US Senator Joe Lieberman, chairman of the U.S. Homeland Security Committee [http://www.dailymail.co.uk/news/article-1352375/Plan-Obama-kill-switch-powers-cut-internet-access-event-national-cyber-crisis.html Call to give Obama &#039;kill switch&#039; powers to cut internet access in the event of national cyber crisis] 1 Feb 2011&lt;br /&gt;
&lt;br /&gt;
[http://www.nytimes.com/2011/01/30/weekinreview/30shane.html  Spotlight Again Falls on Web Tools and Change - article on how repressive regimes can use the internet and new media to their advantage]&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:RebekahHeacock|RebekahHeacock]] 14:15, 27 January 2011 (UTC)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While reading this Declaration of Independence of Cyberspace i can not shake a thought of Technological Singularity which is supposed to come by the earliest estimates around the year 2020... Science fiction or a true possibility? --[[User:Jastify|Jastify]] 22:28, 29 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Although Wikipedia offers knowledge on extensive topics, holding the better model, is there not a huge concern that there is no longer postings of validated facts versus mere opinion?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a link to the BBC World Service documentary Wikipedia at 10 - a 22.5 minute retrospective on the occasion of Wikipedia’s 10th anniversary. It covers a number of topics, some of which may be relevant to the upcoming Wikipedia editing assignment. &#039;&#039;(Reposted from the January 25th discussion page, as it seems more appropriate here. - BrandonAndrzej)&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
http://www.bbc.co.uk/worldservice/documentaries/2011/01/110111_wikipedia_at_10.shtml&lt;br /&gt;
&lt;br /&gt;
The rhetorical use of the euphemism of the monolithic corporation in the [http://www.cluetrain.com/ Cluetrain Manifesto] undermines the effectiveness its message. Thesis number two states, “Markets consist of human beings...” Last time I looked, so do corporations. &lt;br /&gt;
&lt;br /&gt;
In fact corporations are highly organized social creatures with diverse internal cultures, rules, mores and recognized standards of behavior. They respond to a broad spectrum of internal and external influence. If only solving today’s problems were so easy as to point our finger and say “off with their heads.” The real challenge, however, is much more complicated and a matter of personal responsibility. &lt;br /&gt;
&lt;br /&gt;
Corporations come in all flavors. Some are highly democratic. As requirements of participating in the public capital markets all have democratic institutions: a constitution (articles of incorporation), boards of directors, shareholders, external advocates and most importantly customers. The Manifesto takes the all too easy out of blaming the generic “them.” The truth is that the reason corporations are as they are today is because the majority of corporate stakeholders abdicate their responsibility to guide the direction of the organization through exercise of their enfranchisement as shareholders and customers. &lt;br /&gt;
&lt;br /&gt;
The behavior of corporations is a function of &#039;&#039;our&#039;&#039; collective actions and inactions.  We have cheap goods made by slave labor because in the exercise of our conspicuous consumption we don’t want to - or without sacrificing our consumption &lt;br /&gt;
&lt;br /&gt;
volume can’t afford to - pay the price of having the same goods manufactured by the un-oppressed. The result is that we send our dollars to evil places rather than fund the social infrastructure that improves the standard of living of more humane societies. &lt;br /&gt;
&lt;br /&gt;
Further we have out-of-control executive salaries, unrestrained executive actions, boards of directors driven by motivations other than the interests of the shareholders and other unsavory corporate behaviors because we fail to fulfill our responsibilities. Too few read the prospectus, attend shareholder meetings, or even vote shares beyond granting proxy to the someone else. I am guilty as charged because like so many, I seek to maximize my ability to profit by pooling my finances in investment cartels and leaving decision making to fund managers, investment advisors and other members of the vested interest.  &lt;br /&gt;
&lt;br /&gt;
Many say we need more regulations. I say we have the regulations that we desire. This is true because through our collective actions we drive corporate investment decisions. If we did not want corporations to spend scarce investment dollars to employ the more than 45,000 lobbyists in Washington who water down and fight against regulation, the corporations would find other places to invest. If instead we used our purchasing power and shareholder votes to direct investment elsewhere, there it would flow. &lt;br /&gt;
&lt;br /&gt;
The Icelandic version of Microsoft Windows mentioned in [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] proves the point. On the other hand our abdication of this power as Digital Borders expresses results in the fact that the, “[http://www.legalaffairs.org/printerfriendly.msp?id=961 technologies of control in China are essentially the same technologies designed to satisfy consumer demand for geographically tailored Internet products.]” Due in part to our marketplace behaviors, oppressors are given the tools they so effectively use as an unintended consequence of our desire for applications to tell us how many of our friends are in close proximity who might be interested in a game of beer pong. &lt;br /&gt;
&lt;br /&gt;
Chasing our dollars and with our benign assent, corporations have followed the instruction we have given them. Let’s stop blaming “them;” for we are them and start taking responsibility for the results of our actions.  --[[User:Gclinch|Gclinch]] 00:06, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Enjoyed watching the BBC anniversay documentary on Wikipedia. As businesses start to utilize this media, I wonder how the controls put in place by Wikipedia for neutral content can possibly be effective. I compared an entry for the holding company for which the company where I am employed is a subsidiary and compared it to one of our competitors. The difference was substantial. The competitor&#039;s had a distinct advertising (promotion) flavor along with company&#039;s graphics on the right hand border of the page. My company&#039;s was a four sentence historical overview providing little relevant information to any potential customer or employee. After checking with our PR Department, I was told no one in the company had written the posting. They assume it was done by a third party contributor. Just by comparing these two companies, the lack of uniformity is readily apparent.--[[User:Sjennings|sjennings]] 20:59, 31 January 2011 (UTC) sjennings&lt;br /&gt;
&lt;br /&gt;
Hello. First remark is concerning [http://www.cluetrain.com/ Cluetrain Manifesto]. These 3 &#039;Conversations among human beings sound human. They are conducted in a human voice.&#039; I think that big part of our current comminucation has a sound of &#039;message&#039; or &#039;MS Outlook Email Sound&#039; if you know what I mean. Sad, but true.&lt;br /&gt;
&lt;br /&gt;
Another remark is about [http://ww2.cs.mu.oz.au/~zs/decl.html A Declaration of the Independence of Cyberspace].&#039;You claim there are problems among us that you need to solve.[...]...governance will arise according to the conditions of our world, not yours. Our world is different.&#039; I think this is very good statement for discussion. I am not sure to what extend Internet shoudl be independent from real world. Should not be there governing rules? Should it be for intance ISP who decides what they do with my personal data, or information about what kind of webpages I visit, or even where am I located?We do not need any law for that?&lt;br /&gt;
We do not need Ecommerce directive or DMCA in US? I am not sure whether I get it right but to me it looks like declaration wanted to say somethink like we do not need them (nbot particular those ones but in general). Any suggestions?&lt;br /&gt;
--[[User:VladimirTrojak|VladimirTrojak]] 15:46, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Principal ideas expressed “The Cluetrain Manifesto“ and „The Great Failure of Wikipedia” I have found in sharp contradiction. The “Cluetrainers” consider the conversation and trading of information and traverse of ideas over the Internet as the essence for present corporations, markets and cultures. On the other hand the author of “Great Failure of Wikipedia” considers gathering and structuring information through communication of masses over the Internet as a work of “wonks”, “twiddlers”, which amount to “ procedural whackjobs”.  &lt;br /&gt;
The clash between these two ideological approaches to the essence of the Internet remind me challenges between the governance of majority expressed in democracy and democratic system and governance of elite represented by oligarchic system. These two philosophical, sociological and political approaches are well reasoned and analyzed in the work of Jose Ortega y Gasset “ The Revolt of the Masses” (http://en.wikipedia.org/wiki/José_Ortega_y_Gasset).  &lt;br /&gt;
To make a short summary of this scholar ś ideas, only elite “content generators” formed by some “barriers of entry” could produces welfare “content” in all aspects of human society “the Internet”. I believe that this struggle would never have the winner. [[User:Zholakova|Zholakova]] 21:02, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Regarding the concept of a “borderless Internet,” the article [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] claims it is reflective of both government and consumer pressure for an Internet that conforms to their individual preferences and laws. I would also argue that such filtered content delivery also arose out of huge corporate demand. Yahoo! has a wealth of user data (geographic, demographic, behavioral, etc) at its disposal, and advertisers are willing to pay a premium to be able to leverage that. So, while a formidable blow to Internet freedom, Mr. Yang and his company have ultimately benefited greatly from the byproduct of their legal defeat, which is a highly profitable business in localized content delivery.&lt;br /&gt;
&lt;br /&gt;
This also raises the controversial topic of how relevant is &#039;&#039;too&#039;&#039; relevant. Internet consumers are keenly aware that their personal information is being collected and repurposed, but it does not seem the boundaries are permanently drawn yet. [[User:Jsanfilippo|Jsanfilippo]] 19:50, 2 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I just had some initial comments before we discuss further in class.  Digital technology and the Internet have revolutionized the cross-border communication and information sharing, and this has benefited everyone unimaginably.  However, the Internet also has created many great issues and problems that are very serious and threatening (i.e.  privacy issues, cyber-terrorism, support for terrorism and other criminal activities, etc.).  In order to maximize/protect the benefits and minimize/eliminate damages caused by the Internet, I feel that law, regulation and censorship sometimes are necessary.  Anarchy eventually leads to destruction, and I do not think the cyberspace is an exception. Thus, I was a bit uncomfortable with the ideas portrayed in either the [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] or the [http://www.cluetrain.com Cluetrain Manifesto].  Moreover, as discussed in the [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders], there are vast differences in laws, regulations, cultures and traditions among countries around the world, and they must be respected in the cyberspace as they are aimed to be as such in the “real world.”  Through this course, I hope I can gain more ideas about the extent to which the Internet should be regulated and controlled by governments.[[User:Edwardshinp|Edwardshinp]] 17:39, 4 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The idea of a free, humanistic and borderless Internet expressed in the Declaration of Independence of Cyberspace and Cluetrain Manifesto is simply romantic but naïve idealism.   Certainly the Internet is a wonderfully powerful communication medium, but we must recognize that it stands upon the shoulders of television, radio and the various printed media.  Egyptians are using twitter to challenge Hosni Mubarak’s authority in the same way Thomas Paine printed Common Sense to challenge the authority of King George III.  But the Internet can just as easily be used as a tool of government to monitor and control its people.  Benkler (The Wealth of Networks), Goldsmith and Wu (Digital Borders) understand the reality that government regulation of the Internet is a natural and inevitable process, and that it’s a messy business.  The ubiquitous nature of the Internet means that it will be subject to both international and every sovereign state’s laws simultaneously.  Of this there can be no doubt, as we have already seen Egypt’s “kill switch” in action. [[User:ChrisSura|-Chris Sura]] 20:30, 5 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some thoughts regarding Wikipedia: Wikipedia presents itself as a &amp;quot;democratic entity” - one which gathers its content from users around the globe and allows everyone to freely participate. However, many observers (such as in the BBC Worldservice documentary) have noted that the majority Wikipedia&#039;s content is derived from a relatively small number of regular users. The picture painted is one of an oligarchy where a limited number of &amp;quot;elite&amp;quot; users control the content of the encyclopedia via enforcement strict of policy rules, essentially erecting barriers to casual users. I am trying to reconcile this picture with that painted by Jason&#039;s Scott&#039;s &amp;quot;Great Failure of Wikipedia&amp;quot;, in he describes a small number of &amp;quot;content generators&amp;quot; under siege from a great mass of &amp;quot;wonks, twiddlers, and procedural whackjobs&amp;quot; who are essentially negative contributors to the site. &amp;quot;Content generators&amp;quot; become &amp;quot;content defenders&amp;quot;, with only those few contributors willing to put extensive effort into protecting their content actually seeing that content become (more or less) permanent additions to the encyclopedia. I am unsure of how accurate this depiction (or either depiction, for that matter) is... The central question here is whether the &amp;quot;elite&amp;quot; users generating the majority of the content are also the users most active in enforcing policy/policing entry barriers, or whether these roles are largely divided between separate user populations. [[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 6 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Some (pessimistic) links regarding social networking technologies and political change:&lt;br /&gt;
First, a blog post dismissive of the impact of the internet and social networks in the current crisis in Egypt:&lt;br /&gt;
&amp;quot;Tell Mubarak we don&#039;t need his damn internet&amp;quot; http://www.al-bab.com/blog/2011/blog1102c.htm&lt;br /&gt;
Second, a Slate Magazine book review looking at the way politically repressive regimes are using the internet and social networks to their advantage:&lt;br /&gt;
Evgeny Morozov&#039;s The Net Delusion http://www.slate.com/id/2281743/&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:13, 6 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Paradigms_for_Studying_the_Internet&amp;diff=5350</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Paradigms_for_Studying_the_Internet&amp;diff=5350"/>
		<updated>2011-02-06T00:13:08Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 1&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: Due to snow in Cambridge, class is canceled today.  To make up for the cancellation, we&#039;ll be adding an hour to each of the next two class sessions (February 8 and 15).&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s -- we need to answer the critical question of &#039;&#039;&#039;how.&#039;&#039;&#039; Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to &#039;&#039;understand&#039;&#039; what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought.&lt;br /&gt;
&lt;br /&gt;
This class will propose and develop one framework for the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (Read pages 379-396. The rest of this chapter expands the discussions of each layer in more detail, if you want to read more about them)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.mu.oz.au/~zs/decl.html John Perry Barlow, A Declaration of Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/printerfriendly.msp?id=961 Jack Goldsmith &amp;amp; Tim Wu, Digital Borders]&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/ Jonathan Zittrain, The Future of the Internet - Chapters 1 &amp;amp; 2]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
For people interested in a more technical primer on the architecture of the web, how email works, etc. check out ethan zuckerman and andrew mclaughlin&#039;s [http://cyber.law.harvard.edu/digitaldemocracy/internetarchitecture.html Introduction to Internet Architecture and Institutions]&lt;br /&gt;
&lt;br /&gt;
Some fred turner resources: [http://blip.tv/file/125930 video presentation], [http://blogs.law.harvard.edu/mediaberkman/2006/12/01/from-counterculture-to-cyberculture-the-rise-of-digital-utopianism/ audio presentation], and [http://www.stanford.edu/group/fredturner/cgi-bin/drupal/ homepage]&lt;br /&gt;
&lt;br /&gt;
[http://en.citizendium.org/wiki/Welcome_to_Citizendium Citizendium]&lt;br /&gt;
&lt;br /&gt;
Jason Scott on [http://ascii.textfiles.com/archives/808 The Great Failure of Wikipedia] (2004)&lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/news/2011/012611-internet-providers-are-the-new.html Internet providers are the new secret police, says report]&lt;br /&gt;
 &lt;br /&gt;
[http://www.nytimes.com/2011/01/31/business/media/31link.html Define Gender Gap? Look Up Wikipedia&#039;s Contributor List] &lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/community/blog/open-source-fail Open Source #FAIL]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For all its allure, the Internet can be a dangerous place with electronic pipelines that run directly into everything from our personal bank accounts to key infrastructure to government and industrial secrets.&amp;quot; - US Senator Joe Lieberman, chairman of the U.S. Homeland Security Committee [http://www.dailymail.co.uk/news/article-1352375/Plan-Obama-kill-switch-powers-cut-internet-access-event-national-cyber-crisis.html Call to give Obama &#039;kill switch&#039; powers to cut internet access in the event of national cyber crisis] 1 Feb 2011&lt;br /&gt;
&lt;br /&gt;
[http://www.nytimes.com/2011/01/30/weekinreview/30shane.html  Spotlight Again Falls on Web Tools and Change - article on how repressive regimes can use the internet and new media to their advantage]&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:RebekahHeacock|RebekahHeacock]] 14:15, 27 January 2011 (UTC)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While reading this Declaration of Independence of Cyberspace i can not shake a thought of Technological Singularity which is supposed to come by the earliest estimates around the year 2020... Science fiction or a true possibility? --[[User:Jastify|Jastify]] 22:28, 29 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Although Wikipedia offers knowledge on extensive topics, holding the better model, is there not a huge concern that there is no longer postings of validated facts versus mere opinion?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a link to the BBC World Service documentary Wikipedia at 10 - a 22.5 minute retrospective on the occasion of Wikipedia’s 10th anniversary. It covers a number of topics, some of which may be relevant to the upcoming Wikipedia editing assignment. &#039;&#039;(Reposted from the January 25th discussion page, as it seems more appropriate here. - BrandonAndrzej)&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
http://www.bbc.co.uk/worldservice/documentaries/2011/01/110111_wikipedia_at_10.shtml&lt;br /&gt;
&lt;br /&gt;
The rhetorical use of the euphemism of the monolithic corporation in the [http://www.cluetrain.com/ Cluetrain Manifesto] undermines the effectiveness its message. Thesis number two states, “Markets consist of human beings...” Last time I looked, so do corporations. &lt;br /&gt;
&lt;br /&gt;
In fact corporations are highly organized social creatures with diverse internal cultures, rules, mores and recognized standards of behavior. They respond to a broad spectrum of internal and external influence. If only solving today’s problems were so easy as to point our finger and say “off with their heads.” The real challenge, however, is much more complicated and a matter of personal responsibility. &lt;br /&gt;
&lt;br /&gt;
Corporations come in all flavors. Some are highly democratic. As requirements of participating in the public capital markets all have democratic institutions: a constitution (articles of incorporation), boards of directors, shareholders, external advocates and most importantly customers. The Manifesto takes the all too easy out of blaming the generic “them.” The truth is that the reason corporations are as they are today is because the majority of corporate stakeholders abdicate their responsibility to guide the direction of the organization through exercise of their enfranchisement as shareholders and customers. &lt;br /&gt;
&lt;br /&gt;
The behavior of corporations is a function of &#039;&#039;our&#039;&#039; collective actions and inactions.  We have cheap goods made by slave labor because in the exercise of our conspicuous consumption we don’t want to - or without sacrificing our consumption &lt;br /&gt;
&lt;br /&gt;
volume can’t afford to - pay the price of having the same goods manufactured by the un-oppressed. The result is that we send our dollars to evil places rather than fund the social infrastructure that improves the standard of living of more humane societies. &lt;br /&gt;
&lt;br /&gt;
Further we have out-of-control executive salaries, unrestrained executive actions, boards of directors driven by motivations other than the interests of the shareholders and other unsavory corporate behaviors because we fail to fulfill our responsibilities. Too few read the prospectus, attend shareholder meetings, or even vote shares beyond granting proxy to the someone else. I am guilty as charged because like so many, I seek to maximize my ability to profit by pooling my finances in investment cartels and leaving decision making to fund managers, investment advisors and other members of the vested interest.  &lt;br /&gt;
&lt;br /&gt;
Many say we need more regulations. I say we have the regulations that we desire. This is true because through our collective actions we drive corporate investment decisions. If we did not want corporations to spend scarce investment dollars to employ the more than 45,000 lobbyists in Washington who water down and fight against regulation, the corporations would find other places to invest. If instead we used our purchasing power and shareholder votes to direct investment elsewhere, there it would flow. &lt;br /&gt;
&lt;br /&gt;
The Icelandic version of Microsoft Windows mentioned in [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] proves the point. On the other hand our abdication of this power as Digital Borders expresses results in the fact that the, “[http://www.legalaffairs.org/printerfriendly.msp?id=961 technologies of control in China are essentially the same technologies designed to satisfy consumer demand for geographically tailored Internet products.]” Due in part to our marketplace behaviors, oppressors are given the tools they so effectively use as an unintended consequence of our desire for applications to tell us how many of our friends are in close proximity who might be interested in a game of beer pong. &lt;br /&gt;
&lt;br /&gt;
Chasing our dollars and with our benign assent, corporations have followed the instruction we have given them. Let’s stop blaming “them;” for we are them and start taking responsibility for the results of our actions.  --[[User:Gclinch|Gclinch]] 00:06, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Enjoyed watching the BBC anniversay documentary on Wikipedia. As businesses start to utilize this media, I wonder how the controls put in place by Wikipedia for neutral content can possibly be effective. I compared an entry for the holding company for which the company where I am employed is a subsidiary and compared it to one of our competitors. The difference was substantial. The competitor&#039;s had a distinct advertising (promotion) flavor along with company&#039;s graphics on the right hand border of the page. My company&#039;s was a four sentence historical overview providing little relevant information to any potential customer or employee. After checking with our PR Department, I was told no one in the company had written the posting. They assume it was done by a third party contributor. Just by comparing these two companies, the lack of uniformity is readily apparent.--[[User:Sjennings|sjennings]] 20:59, 31 January 2011 (UTC) sjennings&lt;br /&gt;
&lt;br /&gt;
Hello. First remark is concerning [http://www.cluetrain.com/ Cluetrain Manifesto]. These 3 &#039;Conversations among human beings sound human. They are conducted in a human voice.&#039; I think that big part of our current comminucation has a sound of &#039;message&#039; or &#039;MS Outlook Email Sound&#039; if you know what I mean. Sad, but true.&lt;br /&gt;
&lt;br /&gt;
Another remark is about [http://ww2.cs.mu.oz.au/~zs/decl.html A Declaration of the Independence of Cyberspace].&#039;You claim there are problems among us that you need to solve.[...]...governance will arise according to the conditions of our world, not yours. Our world is different.&#039; I think this is very good statement for discussion. I am not sure to what extend Internet shoudl be independent from real world. Should not be there governing rules? Should it be for intance ISP who decides what they do with my personal data, or information about what kind of webpages I visit, or even where am I located?We do not need any law for that?&lt;br /&gt;
We do not need Ecommerce directive or DMCA in US? I am not sure whether I get it right but to me it looks like declaration wanted to say somethink like we do not need them (nbot particular those ones but in general). Any suggestions?&lt;br /&gt;
--[[User:VladimirTrojak|VladimirTrojak]] 15:46, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Principal ideas expressed “The Cluetrain Manifesto“ and „The Great Failure of Wikipedia” I have found in sharp contradiction. The “Cluetrainers” consider the conversation and trading of information and traverse of ideas over the Internet as the essence for present corporations, markets and cultures. On the other hand the author of “Great Failure of Wikipedia” considers gathering and structuring information through communication of masses over the Internet as a work of “wonks”, “twiddlers”, which amount to “ procedural whackjobs”.  &lt;br /&gt;
The clash between these two ideological approaches to the essence of the Internet remind me challenges between the governance of majority expressed in democracy and democratic system and governance of elite represented by oligarchic system. These two philosophical, sociological and political approaches are well reasoned and analyzed in the work of Jose Ortega y Gasset “ The Revolt of the Masses” (http://en.wikipedia.org/wiki/José_Ortega_y_Gasset).  &lt;br /&gt;
To make a short summary of this scholar ś ideas, only elite “content generators” formed by some “barriers of entry” could produces welfare “content” in all aspects of human society “the Internet”. I believe that this struggle would never have the winner. [[User:Zholakova|Zholakova]] 21:02, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Regarding the concept of a “borderless Internet,” the article [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] claims it is reflective of both government and consumer pressure for an Internet that conforms to their individual preferences and laws. I would also argue that such filtered content delivery also arose out of huge corporate demand. Yahoo! has a wealth of user data (geographic, demographic, behavioral, etc) at its disposal, and advertisers are willing to pay a premium to be able to leverage that. So, while a formidable blow to Internet freedom, Mr. Yang and his company have ultimately benefited greatly from the byproduct of their legal defeat, which is a highly profitable business in localized content delivery.&lt;br /&gt;
&lt;br /&gt;
This also raises the controversial topic of how relevant is &#039;&#039;too&#039;&#039; relevant. Internet consumers are keenly aware that their personal information is being collected and repurposed, but it does not seem the boundaries are permanently drawn yet. [[User:Jsanfilippo|Jsanfilippo]] 19:50, 2 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I just had some initial comments before we discuss further in class.  Digital technology and the Internet have revolutionized the cross-border communication and information sharing, and this has benefited everyone unimaginably.  However, the Internet also has created many great issues and problems that are very serious and threatening (i.e.  privacy issues, cyber-terrorism, support for terrorism and other criminal activities, etc.).  In order to maximize/protect the benefits and minimize/eliminate damages caused by the Internet, I feel that law, regulation and censorship sometimes are necessary.  Anarchy eventually leads to destruction, and I do not think the cyberspace is an exception. Thus, I was a bit uncomfortable with the ideas portrayed in either the [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] or the [http://www.cluetrain.com Cluetrain Manifesto].  Moreover, as discussed in the [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders], there are vast differences in laws, regulations, cultures and traditions among countries around the world, and they must be respected in the cyberspace as they are aimed to be as such in the “real world.”  Through this course, I hope I can gain more ideas about the extent to which the Internet should be regulated and controlled by governments.[[User:Edwardshinp|Edwardshinp]] 17:39, 4 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The idea of a free, humanistic and borderless Internet expressed in the Declaration of Independence of Cyberspace and Cluetrain Manifesto is simply romantic but naïve idealism.   Certainly the Internet is a wonderfully powerful communication medium, but we must recognize that it stands upon the shoulders of television, radio and the various printed media.  Egyptians are using twitter to challenge Hosni Mubarak’s authority in the same way Thomas Paine printed Common Sense to challenge the authority of King George III.  But the Internet can just as easily be used as a tool of government to monitor and control its people.  Benkler (The Wealth of Networks), Goldsmith and Wu (Digital Borders) understand the reality that government regulation of the Internet is a natural and inevitable process, and that it’s a messy business.  The ubiquitous nature of the Internet means that it will be subject to both international and every sovereign state’s laws simultaneously.  Of this there can be no doubt, as we have already seen Egypt’s “kill switch” in action. [[User:ChrisSura|-Chris Sura]] 20:30, 5 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Some thoughts regarding Wikipedia: Wikipedia presents itself as a &amp;quot;democratic entity” - one which gathers its content from users around the globe and allows everyone to freely participate. However, many observers (such as in the BBC Worldservice documentary) have noted that the majority Wikipedia&#039;s content is derived from a relatively small number of regular users. The picture painted is one of an oligarchy where a limited number of &amp;quot;elite&amp;quot; users control the content of the encyclopedia via enforcement strict of policy rules, essentially erecting barriers to casual users. I am trying to reconcile this picture with that painted by Jason&#039;s Scott&#039;s &amp;quot;Great Failure of Wikipedia&amp;quot;, in he describes a small number of &amp;quot;content generators&amp;quot; under siege from a great mass of &amp;quot;wonks, twiddlers, and procedural whackjobs&amp;quot; who are essentially negative contributors to the site. &amp;quot;Content generators&amp;quot; become &amp;quot;content defenders&amp;quot;, with only those few contributors willing to put extensive effort into protecting their content actually seeing that content become (more or less) permanent additions to the encyclopedia. I am unsure of how accurate this depiction (or either depiction, for that matter) is... The central question here is whether the &amp;quot;elite&amp;quot; users generating the majority of the content are also the users most active in enforcing policy/policing entry barriers, or whether these roles are largely divided between separate user populations. [[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 6 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Some (pessimistic) links regarding social networking technologies and political change:&lt;br /&gt;
First, a blog post dismissive of the impact of the internet and social networks in the current crisis in Egypt:&lt;br /&gt;
&amp;quot;Tell Mubarak we don&#039;t need his damn internet&amp;quot; http://www.al-bab.com/blog/2011/blog1102c.htm&lt;br /&gt;
Second, a Slate Magazine book review looking at the way politically repressive regimes are using the internet and social networks to their advantage:&lt;br /&gt;
Evgeny Morozov&#039;s The Net Delusion http://www.slate.com/id/2281743/&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:13, 6 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Paradigms_for_Studying_the_Internet&amp;diff=5349</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Paradigms_for_Studying_the_Internet&amp;diff=5349"/>
		<updated>2011-02-06T00:04:02Z</updated>

		<summary type="html">&lt;p&gt;BrandonAndrzej: /* Class Discussion */ added comment on Wikipedia&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;February 1&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Note: Due to snow in Cambridge, class is canceled today.  To make up for the cancellation, we&#039;ll be adding an hour to each of the next two class sessions (February 8 and 15).&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s -- we need to answer the critical question of &#039;&#039;&#039;how.&#039;&#039;&#039; Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to &#039;&#039;understand&#039;&#039; what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought.&lt;br /&gt;
&lt;br /&gt;
This class will propose and develop one framework for the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (Read pages 379-396. The rest of this chapter expands the discussions of each layer in more detail, if you want to read more about them)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.mu.oz.au/~zs/decl.html John Perry Barlow, A Declaration of Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/printerfriendly.msp?id=961 Jack Goldsmith &amp;amp; Tim Wu, Digital Borders]&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/ Jonathan Zittrain, The Future of the Internet - Chapters 1 &amp;amp; 2]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
For people interested in a more technical primer on the architecture of the web, how email works, etc. check out ethan zuckerman and andrew mclaughlin&#039;s [http://cyber.law.harvard.edu/digitaldemocracy/internetarchitecture.html Introduction to Internet Architecture and Institutions]&lt;br /&gt;
&lt;br /&gt;
Some fred turner resources: [http://blip.tv/file/125930 video presentation], [http://blogs.law.harvard.edu/mediaberkman/2006/12/01/from-counterculture-to-cyberculture-the-rise-of-digital-utopianism/ audio presentation], and [http://www.stanford.edu/group/fredturner/cgi-bin/drupal/ homepage]&lt;br /&gt;
&lt;br /&gt;
[http://en.citizendium.org/wiki/Welcome_to_Citizendium Citizendium]&lt;br /&gt;
&lt;br /&gt;
Jason Scott on [http://ascii.textfiles.com/archives/808 The Great Failure of Wikipedia] (2004)&lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/news/2011/012611-internet-providers-are-the-new.html Internet providers are the new secret police, says report]&lt;br /&gt;
 &lt;br /&gt;
[http://www.nytimes.com/2011/01/31/business/media/31link.html Define Gender Gap? Look Up Wikipedia&#039;s Contributor List] &lt;br /&gt;
&lt;br /&gt;
[http://www.networkworld.com/community/blog/open-source-fail Open Source #FAIL]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;For all its allure, the Internet can be a dangerous place with electronic pipelines that run directly into everything from our personal bank accounts to key infrastructure to government and industrial secrets.&amp;quot; - US Senator Joe Lieberman, chairman of the U.S. Homeland Security Committee [http://www.dailymail.co.uk/news/article-1352375/Plan-Obama-kill-switch-powers-cut-internet-access-event-national-cyber-crisis.html Call to give Obama &#039;kill switch&#039; powers to cut internet access in the event of national cyber crisis] 1 Feb 2011&lt;br /&gt;
&lt;br /&gt;
[http://www.nytimes.com/2011/01/30/weekinreview/30shane.html  Spotlight Again Falls on Web Tools and Change - article on how repressive regimes can use the internet and new media to their advantage]&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:RebekahHeacock|RebekahHeacock]] 14:15, 27 January 2011 (UTC)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While reading this Declaration of Independence of Cyberspace i can not shake a thought of Technological Singularity which is supposed to come by the earliest estimates around the year 2020... Science fiction or a true possibility? --[[User:Jastify|Jastify]] 22:28, 29 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Although Wikipedia offers knowledge on extensive topics, holding the better model, is there not a huge concern that there is no longer postings of validated facts versus mere opinion?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Here is a link to the BBC World Service documentary Wikipedia at 10 - a 22.5 minute retrospective on the occasion of Wikipedia’s 10th anniversary. It covers a number of topics, some of which may be relevant to the upcoming Wikipedia editing assignment. &#039;&#039;(Reposted from the January 25th discussion page, as it seems more appropriate here. - BrandonAndrzej)&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
http://www.bbc.co.uk/worldservice/documentaries/2011/01/110111_wikipedia_at_10.shtml&lt;br /&gt;
&lt;br /&gt;
The rhetorical use of the euphemism of the monolithic corporation in the [http://www.cluetrain.com/ Cluetrain Manifesto] undermines the effectiveness its message. Thesis number two states, “Markets consist of human beings...” Last time I looked, so do corporations. &lt;br /&gt;
&lt;br /&gt;
In fact corporations are highly organized social creatures with diverse internal cultures, rules, mores and recognized standards of behavior. They respond to a broad spectrum of internal and external influence. If only solving today’s problems were so easy as to point our finger and say “off with their heads.” The real challenge, however, is much more complicated and a matter of personal responsibility. &lt;br /&gt;
&lt;br /&gt;
Corporations come in all flavors. Some are highly democratic. As requirements of participating in the public capital markets all have democratic institutions: a constitution (articles of incorporation), boards of directors, shareholders, external advocates and most importantly customers. The Manifesto takes the all too easy out of blaming the generic “them.” The truth is that the reason corporations are as they are today is because the majority of corporate stakeholders abdicate their responsibility to guide the direction of the organization through exercise of their enfranchisement as shareholders and customers. &lt;br /&gt;
&lt;br /&gt;
The behavior of corporations is a function of &#039;&#039;our&#039;&#039; collective actions and inactions.  We have cheap goods made by slave labor because in the exercise of our conspicuous consumption we don’t want to - or without sacrificing our consumption &lt;br /&gt;
&lt;br /&gt;
volume can’t afford to - pay the price of having the same goods manufactured by the un-oppressed. The result is that we send our dollars to evil places rather than fund the social infrastructure that improves the standard of living of more humane societies. &lt;br /&gt;
&lt;br /&gt;
Further we have out-of-control executive salaries, unrestrained executive actions, boards of directors driven by motivations other than the interests of the shareholders and other unsavory corporate behaviors because we fail to fulfill our responsibilities. Too few read the prospectus, attend shareholder meetings, or even vote shares beyond granting proxy to the someone else. I am guilty as charged because like so many, I seek to maximize my ability to profit by pooling my finances in investment cartels and leaving decision making to fund managers, investment advisors and other members of the vested interest.  &lt;br /&gt;
&lt;br /&gt;
Many say we need more regulations. I say we have the regulations that we desire. This is true because through our collective actions we drive corporate investment decisions. If we did not want corporations to spend scarce investment dollars to employ the more than 45,000 lobbyists in Washington who water down and fight against regulation, the corporations would find other places to invest. If instead we used our purchasing power and shareholder votes to direct investment elsewhere, there it would flow. &lt;br /&gt;
&lt;br /&gt;
The Icelandic version of Microsoft Windows mentioned in [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] proves the point. On the other hand our abdication of this power as Digital Borders expresses results in the fact that the, “[http://www.legalaffairs.org/printerfriendly.msp?id=961 technologies of control in China are essentially the same technologies designed to satisfy consumer demand for geographically tailored Internet products.]” Due in part to our marketplace behaviors, oppressors are given the tools they so effectively use as an unintended consequence of our desire for applications to tell us how many of our friends are in close proximity who might be interested in a game of beer pong. &lt;br /&gt;
&lt;br /&gt;
Chasing our dollars and with our benign assent, corporations have followed the instruction we have given them. Let’s stop blaming “them;” for we are them and start taking responsibility for the results of our actions.  --[[User:Gclinch|Gclinch]] 00:06, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Enjoyed watching the BBC anniversay documentary on Wikipedia. As businesses start to utilize this media, I wonder how the controls put in place by Wikipedia for neutral content can possibly be effective. I compared an entry for the holding company for which the company where I am employed is a subsidiary and compared it to one of our competitors. The difference was substantial. The competitor&#039;s had a distinct advertising (promotion) flavor along with company&#039;s graphics on the right hand border of the page. My company&#039;s was a four sentence historical overview providing little relevant information to any potential customer or employee. After checking with our PR Department, I was told no one in the company had written the posting. They assume it was done by a third party contributor. Just by comparing these two companies, the lack of uniformity is readily apparent.--[[User:Sjennings|sjennings]] 20:59, 31 January 2011 (UTC) sjennings&lt;br /&gt;
&lt;br /&gt;
Hello. First remark is concerning [http://www.cluetrain.com/ Cluetrain Manifesto]. These 3 &#039;Conversations among human beings sound human. They are conducted in a human voice.&#039; I think that big part of our current comminucation has a sound of &#039;message&#039; or &#039;MS Outlook Email Sound&#039; if you know what I mean. Sad, but true.&lt;br /&gt;
&lt;br /&gt;
Another remark is about [http://ww2.cs.mu.oz.au/~zs/decl.html A Declaration of the Independence of Cyberspace].&#039;You claim there are problems among us that you need to solve.[...]...governance will arise according to the conditions of our world, not yours. Our world is different.&#039; I think this is very good statement for discussion. I am not sure to what extend Internet shoudl be independent from real world. Should not be there governing rules? Should it be for intance ISP who decides what they do with my personal data, or information about what kind of webpages I visit, or even where am I located?We do not need any law for that?&lt;br /&gt;
We do not need Ecommerce directive or DMCA in US? I am not sure whether I get it right but to me it looks like declaration wanted to say somethink like we do not need them (nbot particular those ones but in general). Any suggestions?&lt;br /&gt;
--[[User:VladimirTrojak|VladimirTrojak]] 15:46, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Principal ideas expressed “The Cluetrain Manifesto“ and „The Great Failure of Wikipedia” I have found in sharp contradiction. The “Cluetrainers” consider the conversation and trading of information and traverse of ideas over the Internet as the essence for present corporations, markets and cultures. On the other hand the author of “Great Failure of Wikipedia” considers gathering and structuring information through communication of masses over the Internet as a work of “wonks”, “twiddlers”, which amount to “ procedural whackjobs”.  &lt;br /&gt;
The clash between these two ideological approaches to the essence of the Internet remind me challenges between the governance of majority expressed in democracy and democratic system and governance of elite represented by oligarchic system. These two philosophical, sociological and political approaches are well reasoned and analyzed in the work of Jose Ortega y Gasset “ The Revolt of the Masses” (http://en.wikipedia.org/wiki/José_Ortega_y_Gasset).  &lt;br /&gt;
To make a short summary of this scholar ś ideas, only elite “content generators” formed by some “barriers of entry” could produces welfare “content” in all aspects of human society “the Internet”. I believe that this struggle would never have the winner. [[User:Zholakova|Zholakova]] 21:02, 1 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Regarding the concept of a “borderless Internet,” the article [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders] claims it is reflective of both government and consumer pressure for an Internet that conforms to their individual preferences and laws. I would also argue that such filtered content delivery also arose out of huge corporate demand. Yahoo! has a wealth of user data (geographic, demographic, behavioral, etc) at its disposal, and advertisers are willing to pay a premium to be able to leverage that. So, while a formidable blow to Internet freedom, Mr. Yang and his company have ultimately benefited greatly from the byproduct of their legal defeat, which is a highly profitable business in localized content delivery.&lt;br /&gt;
&lt;br /&gt;
This also raises the controversial topic of how relevant is &#039;&#039;too&#039;&#039; relevant. Internet consumers are keenly aware that their personal information is being collected and repurposed, but it does not seem the boundaries are permanently drawn yet. [[User:Jsanfilippo|Jsanfilippo]] 19:50, 2 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I just had some initial comments before we discuss further in class.  Digital technology and the Internet have revolutionized the cross-border communication and information sharing, and this has benefited everyone unimaginably.  However, the Internet also has created many great issues and problems that are very serious and threatening (i.e.  privacy issues, cyber-terrorism, support for terrorism and other criminal activities, etc.).  In order to maximize/protect the benefits and minimize/eliminate damages caused by the Internet, I feel that law, regulation and censorship sometimes are necessary.  Anarchy eventually leads to destruction, and I do not think the cyberspace is an exception. Thus, I was a bit uncomfortable with the ideas portrayed in either the [http://www.cs.mu.oz.au/~zs/decl.html Declaration of Independence of Cyberspace] or the [http://www.cluetrain.com Cluetrain Manifesto].  Moreover, as discussed in the [http://www.legalaffairs.org/printerfriendly.msp?id=961 Digital Borders], there are vast differences in laws, regulations, cultures and traditions among countries around the world, and they must be respected in the cyberspace as they are aimed to be as such in the “real world.”  Through this course, I hope I can gain more ideas about the extent to which the Internet should be regulated and controlled by governments.[[User:Edwardshinp|Edwardshinp]] 17:39, 4 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The idea of a free, humanistic and borderless Internet expressed in the Declaration of Independence of Cyberspace and Cluetrain Manifesto is simply romantic but naïve idealism.   Certainly the Internet is a wonderfully powerful communication medium, but we must recognize that it stands upon the shoulders of television, radio and the various printed media.  Egyptians are using twitter to challenge Hosni Mubarak’s authority in the same way Thomas Paine printed Common Sense to challenge the authority of King George III.  But the Internet can just as easily be used as a tool of government to monitor and control its people.  Benkler (The Wealth of Networks), Goldsmith and Wu (Digital Borders) understand the reality that government regulation of the Internet is a natural and inevitable process, and that it’s a messy business.  The ubiquitous nature of the Internet means that it will be subject to both international and every sovereign state’s laws simultaneously.  Of this there can be no doubt, as we have already seen Egypt’s “kill switch” in action. [[User:ChrisSura|-Chris Sura]] 20:30, 5 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Some thoughts regarding Wikipedia: Wikipedia presents itself as a &amp;quot;democratic entity” - one which gathers its content from users around the globe and allows everyone to freely participate. However, many observers (such as in the BBC Worldservice documentary) have noted that the majority Wikipedia&#039;s content is derived from a relatively small number of regular users. The picture painted is one of an oligarchy where a limited number of &amp;quot;elite&amp;quot; users control the content of the encyclopedia via enforcement strict of policy rules, essentially erecting barriers to casual users. I am trying to reconcile this picture with that painted by Jason&#039;s Scott&#039;s &amp;quot;Great Failure of Wikipedia&amp;quot;, in he describes a small number of &amp;quot;content generators&amp;quot; under siege from a great mass of &amp;quot;wonks, twiddlers, and procedural whackjobs&amp;quot; who are essentially negative contributors to the site. &amp;quot;Content generators&amp;quot; become &amp;quot;content defenders&amp;quot;, with only those few contributors willing to put extensive effort into protecting their content actually seeing that content become (more or less) permanent additions to the encyclopedia. I am unsure of how accurate this depiction (or either depiction, for that matter) is... The central question here is whether the &amp;quot;elite&amp;quot; users generating the majority of the content are also the users most active in enforcing policy/policing entry barriers, or whether these roles are largely divided between separate user populations. [[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 6 February 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>BrandonAndrzej</name></author>
	</entry>
</feed>