<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jax</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jax"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/Special:Contributions/Jax"/>
	<updated>2026-05-17T02:00:34Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10472</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10472"/>
		<updated>2013-05-15T22:26:56Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;The course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
*Name:Jaclyn Horowitz / Jax&lt;br /&gt;
*Title: “If you don’t know, now you know”: Rap Genius and Meaningful Ignorance&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Final_RG.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Becca Luberoff&lt;br /&gt;
*Title: Creating and Maintaining a Safe and Supportive Environment in Online Mental Health Communities: A Comparative Study of the National Alliance on Mental Illness and HealthyPlace.com&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Final.docx&lt;br /&gt;
--[[User:BeccaLuberoff|BeccaLuberoff]] 01:34, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: interestingcomments (Student ID#10789842)&lt;br /&gt;
&lt;br /&gt;
*Title:Does The SEC Need To Control &amp;amp; Censor The Message Board Community? &lt;br /&gt;
A comparative observational study of two publically traded company message board communities&lt;br /&gt;
&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Interesting_comments_5.10.13TAG_LSTU_Assignment_.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 17:02, 10 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Pseudonym: Raven&lt;br /&gt;
*Title: A Conversation That Can Change the World&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Raven_Final_Paper.docx&lt;br /&gt;
[[User:Raven|Raven]] 12:39, 14 May 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: sridder&lt;br /&gt;
*Title:  Social Disorganization Theory Proves that Social Commerce Reduces Internet Fraud&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Sridder_Final.docx&lt;br /&gt;
[[User:Saridder|Saridder]] 13:25, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: DearAlice&lt;br /&gt;
&lt;br /&gt;
Title: One Company, Different Social Media Platforms, Different Conversations&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/sites/is2013/images/2013-05-12_DearAlice_Assignment_Final.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 20:55, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Rich&lt;br /&gt;
*Title: Is Wikipedia an Open Collaborative Effort or a Despotic Hierarchy&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Internet_Control_Final_Project_May_12_2013-Modified.docx&lt;br /&gt;
[[User:Rich|Rich]] 14:16, 13 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Milena Grado&lt;br /&gt;
*Title: How Does &amp;quot;Reclame Aqui&amp;quot; Avoid Bias?&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Finalproject_milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 18:14, 13 May 2013 (EDT)&lt;br /&gt;
***&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: MichaeleKeane&lt;br /&gt;
*Title:A Single Site Case Study of the Effect of Censorship on a Web Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Assignment_5_Final_ver9_keane.docx&lt;br /&gt;
*[[User:Michaelekeane|Michaelekeane]] 22:08, 13 May 2013 (EDT)&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: AaronEttl&lt;br /&gt;
*Title: The Successful Balance Achieved By Kickstarter &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Final.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 08:59, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Joshywonder&lt;br /&gt;
*Title: Lawbuzz: The Effects of a SLAPP Law Suit on Anonymous Forum Participation&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Joshywonder_Final_Project.docx [[User:Joshywonder|Joshywonder]] 11:37, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: DanielReissHarris&lt;br /&gt;
*Title: Piracy; the Source, the Cost and the Solution&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/DanielReissHarris_Final.docx&lt;br /&gt;
*[[User:DanielReissHarris|DanielReissHarris]] 11:47, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Maria Jurado&lt;br /&gt;
*Title: Internet Regulation in Argentina, the case of Taringa!&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Maria_Final.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 12:53, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Zak Paster&lt;br /&gt;
*Title: Online Giving: A New Fundraising Era&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Final_Project_Online_Giving-A_New_Fundraising_Era_5-14-13_vFinal.pdf&lt;br /&gt;
[[User:Zak Paster|Zak Paster]] 13:31, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Asmith&lt;br /&gt;
*Title: Grappling with Troublesome Users on Diaspora&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Asmith_FinalProject.pdf&lt;br /&gt;
[[User:Asmith|Asmith]] 15:16, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: Kaley Sweeney&lt;br /&gt;
*Title: A Glance Inside the Hermit Kingdom: Instagram in North Korea&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Assignment5.docx&lt;br /&gt;
15:21, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Rebekah Judson&lt;br /&gt;
*Title: Twitter Gets Weird: On the Transgressive Humor and Community Practices of Weird Twitter&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:RjudsonweirdtwitterFINAL.doc&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 15:26, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Hunter Gaylor&lt;br /&gt;
*Title: Two swords against CISPA “A Comparative Analysis of the Methods Used Obtain Prevention of CISPA”&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/?title=File:Hgaylor_Final.docx&amp;amp;oldid=10445&lt;br /&gt;
[[User:HunterGaylor|HunterGaylor]] 16:39, 14 May 2013 (EDT)&lt;br /&gt;
***&lt;br /&gt;
*Name or Pseudom:  Susan Goldstein&lt;br /&gt;
*Title:  MOOCs:  Higher Education for All?*&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:Susan_Goldstein_Assignment5.docx&lt;br /&gt;
[[User:SusanGoldstein|SusanGoldstein]][[User:Susan Goldstein|Susan Goldstein]] 16:43, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name or Pseudonym: JW&lt;br /&gt;
Title: Reddit Requests More Regulation&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JW_Final.pdf&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Reddit.xlsx&lt;br /&gt;
[[User:JW|JW]] 17:05, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
* Name or Pseudonym: CyberRalph&lt;br /&gt;
* Title: ANONYMOUS, TWITTER, AND LESSIG&#039;S REGULATORS AS A MEANS FOR PROTESTING CISPA&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2013/File:Martins_Assignment4_FinalDraft.docx&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
* Name or Pseudonm: Julian&lt;br /&gt;
* Title: Online Community: The Impact of Anonymous Discussion Forums on Political Outcomes&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Final.docx&lt;br /&gt;
[[User:Julian|Julian]] 17:29, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
* Name or Pseudonm: Phil Dade&lt;br /&gt;
* Title: Sidecar : Manipulating constraints to control driver and passenger behavior and insure value for an entire community&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2013/File:Dade_-_SideCar.pdf&lt;br /&gt;
[[User:Phildade|Phildade]] 18:00, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
* Name or Pseudonym: User777&lt;br /&gt;
* Title: UPSjobs page on the Facebook Platform&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2013/File:User777_Final.docx&lt;br /&gt;
[[User:User777|user777]] 20:25, 14 May 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
* Name or Pseudonym: Muromi&lt;br /&gt;
* Title: Surviving in the Grey Zone of Copyright Regimes&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_Final.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 22:14, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
***&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10461</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10461"/>
		<updated>2013-05-14T21:57:26Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;The course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
Name:Jaclyn Horowitz / Jax&lt;br /&gt;
Title: “If you don’t know, now you know”: Rap Genius and Meaningful Ignorance&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/File:Final_RG.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Becca Luberoff&lt;br /&gt;
*Title: Creating and Maintaining a Safe and Supportive Environment in Online Mental Health Communities: A Comparative Study of the National Alliance on Mental Illness and HealthyPlace.com&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Final.docx&lt;br /&gt;
--[[User:BeccaLuberoff|BeccaLuberoff]] 01:34, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: interestingcomments (Student ID#10789842)&lt;br /&gt;
&lt;br /&gt;
*Title:Does The SEC Need To Control &amp;amp; Censor The Message Board Community? &lt;br /&gt;
A comparative observational study of two publically traded company message board communities&lt;br /&gt;
&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Interesting_comments_5.10.13TAG_LSTU_Assignment_.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 17:02, 10 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Pseudonym: Raven&lt;br /&gt;
*Title: A Conversation That Can Change the World&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Raven_Final_Paper.docx&lt;br /&gt;
[[User:Raven|Raven]] 12:39, 14 May 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: sridder&lt;br /&gt;
*Title:  Social Disorganization Theory Proves that Social Commerce Reduces Internet Fraud&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Sridder_Final.docx&lt;br /&gt;
[[User:Saridder|Saridder]] 13:25, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: DearAlice&lt;br /&gt;
&lt;br /&gt;
Title: One Company, Different Social Media Platforms, Different Conversations&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/sites/is2013/images/2013-05-12_DearAlice_Assignment_Final.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 20:55, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Rich&lt;br /&gt;
*Title: Is Wikipedia an Open Collaborative Effort or a Despotic Hierarchy&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Internet_Control_Final_Project_May_12_2013-Modified.docx&lt;br /&gt;
[[User:Rich|Rich]] 14:16, 13 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Milena Grado&lt;br /&gt;
*Title: How Does &amp;quot;Reclame Aqui&amp;quot; Avoid Bias?&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Finalproject_milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 18:14, 13 May 2013 (EDT)&lt;br /&gt;
***&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: MichaeleKeane&lt;br /&gt;
*Title:A Single Site Case Study of the Effect of Censorship on a Web Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Assignment_5_Final_ver9_keane.docx&lt;br /&gt;
*[[User:Michaelekeane|Michaelekeane]] 22:08, 13 May 2013 (EDT)&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: AaronEttl&lt;br /&gt;
*Title: The Successful Balance Achieved By Kickstarter &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Final.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 08:59, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Joshywonder&lt;br /&gt;
*Title: Lawbuzz: The Effects of a SLAPP Law Suit on Anonymous Forum Participation&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Joshywonder_Final_Project.docx [[User:Joshywonder|Joshywonder]] 11:37, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: DanielReissHarris&lt;br /&gt;
*Title: Piracy; the Source, the Cost and the Solution&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/DanielReissHarris_Final.docx&lt;br /&gt;
*[[User:DanielReissHarris|DanielReissHarris]] 11:47, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Maria Jurado&lt;br /&gt;
*Title: Internet Regulation in Argentina, the case of Taringa!&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Maria_Final.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 12:53, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Zak Paster&lt;br /&gt;
*Title: Online Giving: A New Fundraising Era&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Final_Project_Online_Giving-A_New_Fundraising_Era_5-14-13_vFinal.pdf&lt;br /&gt;
[[User:Zak Paster|Zak Paster]] 13:31, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Asmith&lt;br /&gt;
*Title: Grappling with Troublesome Users on Diaspora&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Asmith_FinalProject.pdf&lt;br /&gt;
[[User:Asmith|Asmith]] 15:16, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: Kaley Sweeney&lt;br /&gt;
*Title: A Glance Inside the Hermit Kingdom: Instagram in North Korea&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Assignment5.docx&lt;br /&gt;
15:21, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Rebekah Judson&lt;br /&gt;
*Title: Twitter Gets Weird: On the Transgressive Humor and Community Practices of Weird Twitter&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:RjudsonweirdtwitterFINAL.doc&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 15:26, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Hunter Gaylor&lt;br /&gt;
*Title: Two swords against CISPA “A Comparative Analysis of the Methods Used Obtain Prevention of CISPA”&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/?title=File:Hgaylor_Final.docx&amp;amp;oldid=10445&lt;br /&gt;
[[User:HunterGaylor|HunterGaylor]] 16:39, 14 May 2013 (EDT)&lt;br /&gt;
***&lt;br /&gt;
*Name or Pseudom:  Susan Goldstein&lt;br /&gt;
*Title:  MOOCs:  Higher Education for All?*&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/File:Susan_Goldstein_Assignment5.docx&lt;br /&gt;
[[User:SusanGoldstein|SusanGoldstein]][[User:Susan Goldstein|Susan Goldstein]] 16:43, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
Name or Pseudonym: JW&lt;br /&gt;
Title: Reddit Requests More Regulation&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/JW_Final.pdf&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Reddit.xlsx&lt;br /&gt;
[[User:JW|JW]] 17:05, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
* Name or Pseudonym: CyberRalph&lt;br /&gt;
* Title: ANONYMOUS, TWITTER, AND LESSIG&#039;S REGULATORS AS A MEANS FOR PROTESTING CISPA&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2013/File:Martins_Assignment4_FinalDraft.docx&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
* Name or Pseudonm: Julian&lt;br /&gt;
* Title: Online Community: The Impact of Anonymous Discussion Forums on Political Outcomes&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Final.docx&lt;br /&gt;
[[User:Julian|Julian]] 17:29, 14 May 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=10372</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Extra_Credit_Submissions&amp;diff=10372"/>
		<updated>2013-05-07T21:49:25Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;The course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 7.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade. If you are presenting in class on the 14th, but do not have material to upload, please indicate so on the section below.&lt;br /&gt;
&lt;br /&gt;
If you do plan on uploading a file, &#039;&#039;please name your file &amp;quot;wikiusername_extracredit,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a PowerPoint document your file should be named &amp;quot;jdoe_extracredit.ppt.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2013/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I would like to participate in the extra credit assignment by sending along a link to an iMovie that will go through &amp;quot;the right to be forgotten&amp;quot; in a narrative format.  &lt;br /&gt;
[[User:Caroline|Caroline]] 12:31, 7 March 2013 (EST)Caroline&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Zak Paster_extracredit - Link to extra credit assignment: http://www.youtube.com/watch?v=Ks5e5KPsWxk&amp;amp;feature=youtube_gdata &lt;br /&gt;
*The presentation is on autopilot - I would like to have it presented during the final class on May 14th.  &lt;br /&gt;
*This slide show provides an overview of two fast-growing online giving communities - Crowdrise.com Razoo.com - and cross-compares two of Lessig&#039;s Internet forces: &#039;&#039;norms and architecture.&#039;&#039;&lt;br /&gt;
*[[User:Zak Paster|Zak Paster]] 23:00, 6 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*interestingcomments_extracredit (Student ID 10789842)- Link to extra credit assignment: https://vimeo.com/65635250&lt;br /&gt;
*I would like to have it presented during the final class on May 14th.  &lt;br /&gt;
*This video lecture gives an overview of my research on the topic: Does The SEC Need To Control &amp;amp; Censor The Message Board Community? A comparative observational study of two publicly traded company message board communities.&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 07:42, 7 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
I can&#039;t upload my little movie because it is in 7zp or mp4 format and the website won&#039;t accept it. I&#039;ve emailed it to the class email address. Could you please confirm that you have it and were able to play it? I can send it again if you need me to. Sorry for the inconvenience. Thanks. [[User:Joshywonder|Joshywonder]] 13:33, 7 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
I would like to present my research paper to the class, through the medium of a website. I will read excerpts of my paper, and the website will feature these excerpts as well as annotations of them, in a fashion similar to Rap Genius. &lt;br /&gt;
[[User:Jax|Jax]] 17:49, 7 May 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=10354</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=10354"/>
		<updated>2013-05-06T13:30:32Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Office Hours */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Internet and Society: Technologies and Politics of Control=&lt;br /&gt;
&#039;&#039;&#039;LSTU E–120 - Harvard Extension School - Spring 2013 - Tuesdays 5:30-7:30 pm EST&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/home/contact Berkman Center for Internet and Society] - 23 Everett Street - Conference room, 2nd floor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
It is hard to overstate the role the Internet plays in our lives. The Net has developed not only as the greatest means of producing and sharing information that the world has ever known, but also as a fundamental tool in global political, social, and economic processes. The Net has been heralded by many as nothing less than a means of fundamentally transforming our world into one that is more just, more democratic, and more affluent, while redrawing the boundaries of political and economic power. But the Net is no longer a frontier, and the early days of the Internet exceptionalism have given way to increased regulatory responses. Just as the Internet allowed users to discover new and interesting ways to transform lives, those who seek to control the levers of power around the Internet have discovered means of controlling its content and dissemination, through technological, monetary, normative, and legal means…(4 credits)  &#039;&#039;&#039;[[course overview|continued...]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Syllabus at a glance&#039;&#039;&#039;==&lt;br /&gt;
{| style=&amp;quot;background-color:#CCCCCC;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Jan 29&lt;br /&gt;
| [[Politics and Technology of Control: Introduction]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 5&lt;br /&gt;
| [[Paradigms for Studying the Internet]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 12&lt;br /&gt;
| [[A Series of Tubes: Infrastructure, Broadband, and Baseline Content Control]]&lt;br /&gt;
| &#039;&#039;(Assignment 1 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Feb 19&lt;br /&gt;
| [[Whose Values? International Issues with Internet Regulation]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 26&lt;br /&gt;
| [[Regulating Speech Online]]&lt;br /&gt;
| &#039;&#039;(Assignment 2 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 5&lt;br /&gt;
| [[Copyright Part 1: Guiding Principles and Online Application]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 12&lt;br /&gt;
| [[Copyright Part 2: Enforcement and Balances]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 19&lt;br /&gt;
| &#039;&#039;No class - Spring Break&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 26&lt;br /&gt;
| [[Collective Action, Politics, and Protests]]&lt;br /&gt;
| &#039;&#039;(Assignment 3 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Apr 2&lt;br /&gt;
| [[Peer Production: Development from the Edges and from the Crowd]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 9&lt;br /&gt;
| [[Hacking, Hackers, and Hacktivism]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 16&lt;br /&gt;
| [[Informing the Public in the Internet Age]] &lt;br /&gt;
|-&lt;br /&gt;
| Apr 23&lt;br /&gt;
| [[Privacy]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 30&lt;br /&gt;
| [[The Profitability of the Internet]]&lt;br /&gt;
| &#039;&#039;(Assignment 4 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| May 7&lt;br /&gt;
|&#039;&#039;No class - final project preparation&#039;&#039;&lt;br /&gt;
| &#039;&#039;(Optional [[Assignments#Extra_Credit|Extra Credit]] due)&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| May 14 &lt;br /&gt;
|Final class - wrap up and student presentations&lt;br /&gt;
|&#039;&#039;([[Final Project]] due)&#039;&#039;&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Course Information:&#039;&#039;&#039;&lt;br /&gt;
* [[Class Participation]]&lt;br /&gt;
* [[Grading]]&lt;br /&gt;
* [[Statement on Plagiarism]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Assignments &amp;amp; Projects:&#039;&#039;&#039;&lt;br /&gt;
* [[Assignments]]&lt;br /&gt;
* [[Assigned Readings|Complete List of Assigned Readings]]&lt;br /&gt;
* [[Final Project]]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Resources:&#039;&#039;&#039;&lt;br /&gt;
* [[Recorded class videos]]&lt;br /&gt;
* [[Powerpoint Slides from Class]]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page How to edit a wiki]&lt;br /&gt;
* [http://www.extension.harvard.edu/resources/writing.jsp Extension School Writing Center]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;External:&#039;&#039;&#039;&lt;br /&gt;
* [[Upcoming Events]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;People:&#039;&#039;&#039;&lt;br /&gt;
* [[Staff Contact Info]]&lt;br /&gt;
* [[List of User Profiles]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating During Class (Tuesdays 5:30-7:30 pm EST)&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
You can participate during class either by attending in person or through Adobe Connect:&lt;br /&gt;
&lt;br /&gt;
* The class will be held in the conference room at the Berkman Center for Internet &amp;amp; Society, 23 Everett St., Second Floor, Cambridge, MA 02138 ([http://cyber.law.harvard.edu/home/contact directions])&lt;br /&gt;
&lt;br /&gt;
* You can use Adobe Connect to participate during class time. &#039;&#039;&#039;Visit [http://continuinged.adobeconnect.com/lstu_e120 our Adobe Connect site] and log in as guest.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: We will be experimenting with remote audiovisual presentation through the Adobe Connect platform. We recommend that, if you would like to speak during class, you use a combination headphone/microphone to participate.  Alternatively, you may use headphones along with your computer&#039;s built-in mic.  As a last resort, you can use your computer&#039;s built-in mic without headphones, but please be aware that this may cause audio issues for both you and the class as a whole.&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;Note: When you log in to Adobe Connect, you will log in as a guest.  Please use your full name or a pseudonym that will allow us to identify who you are so we can give you credit for your class participation. If you use a pseudonym, let one of the TAs know who you are so we can be sure to give you credit.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: If you have any trouble running Adobe Connect, please go to the [https://continuinged.adobeconnect.com/common/help/en/support/meeting_test.htm support page on Adobe Connect&#039;s site] or click on the &amp;quot;Help&amp;quot; button in the upper right corner of the Connect window.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating Asynchronously&#039;&#039;&#039;==&lt;br /&gt;
* The recorded videotapes of the class produced by Harvard Extension School are available [http://cm.dce.harvard.edu/2013/02/23879/dceweb-videopage.shtml here].  Videos are typically available 1-2 days after class.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Contact Information&#039;&#039;&#039;==&lt;br /&gt;
* All questions, comments, etc. should be sent to: [mailto:is2013@cyber.law.harvard.edu is2013@cyber.law.harvard.edu]&lt;br /&gt;
** There are no set office hours; feel free to send an email, and the TAs will respond to it as soon as they can.&lt;br /&gt;
* If you need to contact an instructor or TA individually, please use their personal contact info located on the [[Staff Contact Info]] page.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Office Hours&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please note:&#039;&#039;&#039; we&#039;ve also created a [[Final_Project#Frequently_Asked_Questions|frequently asked questions]] section that may help as you frame your final paper.&lt;br /&gt;
&lt;br /&gt;
Jeff, Andy, David, and Ryan will all be holding office hours during the normally scheduled class time on May 7th. Please make an appointment by filling your name or username in next to a time slot below. Please also indicate if you&#039;d like to meet in class or over Skype. If you are using Skype, please also email us at is2013@cyber.law.harvard.edu with your Skype handle. If you cannot make any of these times but would like to discuss your paper please email us and we&#039;ll set up another time to talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Example:&lt;br /&gt;
* 5:30-5:45 - asellars Skype&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Jeff&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* 5:30-5:45 Asmith in class&lt;br /&gt;
* 5:45-6:00 Kaley Sweeney in class&lt;br /&gt;
* 6:00-6:15 &lt;br /&gt;
* 6:15-6:30&lt;br /&gt;
* 6:30-6:45&lt;br /&gt;
* 6:45-7:00&lt;br /&gt;
* 7:00-7:15 Zak Paster via Skype&lt;br /&gt;
* 7:15-7:30&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Andy&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* 5:30-5:45 Hgaylor In Class&lt;br /&gt;
* 5:45-6:00&lt;br /&gt;
* 6:00-6:15&lt;br /&gt;
* 6:15-6:30&lt;br /&gt;
* 6:30-6:45&lt;br /&gt;
* 6:45-7:00&lt;br /&gt;
* 7:00-7:15 Jaclyn Horowitz via Skype&lt;br /&gt;
* 7:15-7:30&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;David&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* 5:30-5:45&lt;br /&gt;
* 5:45-6:00&lt;br /&gt;
* 6:00-6:15 &lt;br /&gt;
* 6:15-6:30&lt;br /&gt;
* 6:30-6:45&lt;br /&gt;
* 6:45-7:00&lt;br /&gt;
* 7:00-7:15&lt;br /&gt;
* 7:15-7:30&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Ryan&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* 5:30-5:45 Caroline - Skype - carolineharvard&lt;br /&gt;
* 5:45-6:00&lt;br /&gt;
* 6:00-6:15&lt;br /&gt;
* 6:15-6:30&lt;br /&gt;
* 6:30-6:45&lt;br /&gt;
* 6:45-7:00&lt;br /&gt;
* 7:00-7:15&lt;br /&gt;
* 7:15-7:30&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=10316</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=10316"/>
		<updated>2013-04-30T21:42:04Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The deadline for this assignment has been extended to April 30th before class.&#039;&#039;&#039;  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment4,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment4.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Project title: &lt;br /&gt;
*Link to rough draft: (add your link here)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
*Name or pseudonym:Raven&lt;br /&gt;
*Project title: If Your Website is Full of Assholes, It&#039;s Your Fault&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Raven_Assignment_4.docx&lt;br /&gt;
[[User:Raven|Raven]] 15:55, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: sridder&lt;br /&gt;
*Project title: Does Social Commerce Reduce Internet Commerce Fraud?&lt;br /&gt;
*Link to rough draft:   http://cyber.law.harvard.edu/is2013/sites/is2013/images/Steve_Ridder_Assignment_4.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 20:25, 21 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Project title: One Company, Different Social Media Platforms, Different Conversations&lt;br /&gt;
 Link to Draft: http://cyber.law.harvard.edu/is2013/sites/is2013/images/DearAlice_Assignment4.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:08, 23 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Zak Paster&lt;br /&gt;
*Project title: Online Giving: A New Fundraising Era&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_4_-_Final_Project_Draft_Online_Giving-A_New_Fundraising_Era_4-25-13.pdf&lt;br /&gt;
[[User:Zak Paster|Zak Paster]] 22:41, 24 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
Rich Cacioppo&lt;br /&gt;
Is Control of Free Speech and Expression on Wikipedia Sincere or Hypocritical&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Internet_Control_Final_Project_paper_Final_Draft_April_30_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 16:10, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
{{Is Control of Free Speech and Expression on Wikipedia Sincere or Hypocritical|Rich Cacioppo|http://cyber.law.harvard.edu/is2013/File:Internet_Control_Final_Project_paper_Final_Draft_April_30_2013.pdf}} [[User:Rich|Rich]] 16:08, 30 April 2013 (EDT)&lt;br /&gt;
*Name: Milena Grado&lt;br /&gt;
*Project title: How Does Reclame Aqui Avoid Bias?&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Assignment4milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 17:28, 26 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
*Name or pseudonym: CyberRalph&lt;br /&gt;
*Project title: Anonymous and Their Use of Twitter to Leverage Lessig&#039;s Regulators as a Means for Attacking CISPA&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Martins_Assignment4.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:46, 28 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: joshywonder&lt;br /&gt;
*Project title: Lawbuzz.ca - Anonymous Forum Participation&lt;br /&gt;
*Link to rough draft:  http://cyber.law.harvard.edu/is2013/File:Joshywonder_Assignment_4.docx&lt;br /&gt;
[[User:Joshywonder|Joshywonder]] 12:05, 29 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: interesting comments&lt;br /&gt;
*Project title:Does The SEC Need To Control &amp;amp; Censor The Message Board Community? A comparative observational study of two publically traded company message board communities&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Z_TAG_LSTU_Assignment_4_(1)_.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:45, 29 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Asmith|A Few Bad Apples: Grappling with Troublesome Users on Diaspora|File:http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment4.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
* Name or pseudonym:Michael Keane&lt;br /&gt;
* Project title:A Single Site Case Study of the Effect of Censorship on a Web Community&lt;br /&gt;
* Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Assignment_4_Draft_ver5_keane.docx&lt;br /&gt;
*[[User:Michaelekeane|Michaelekeane]] 12:03, 30 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: AaronEttl&lt;br /&gt;
Project title: The Successful Balance Achieved By Kickstarter &lt;br /&gt;
Link to rough draft: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment4.docx [[User:AaronEttl|AaronEttl]] 14:56, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or pseudonym: Maria&lt;br /&gt;
*Project title: Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Jurado_Assignment4-1.pdf --[[User:Maria|Maria]] 15:28, 30 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Mattyh|Yelp - throwing the baby out with the bathwater review?|File:http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_4_Rough_Draft%2C_04302013.docx}}&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
{{AssignmentInfo|Susan Goldstein|MOOCs: Higher Education for All?|File:http://cyber.law.harvard.edu/is2013/File:Susan_Goldstein_Assignment4.docx}}&lt;br /&gt;
16:36, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:JW&lt;br /&gt;
*Project title: Reddit: Free Speech vs. Privacy Norms&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:JW_Assignment4.pdf&lt;br /&gt;
[[User:JW|JW]] 16:51, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or pseudonym: Julian&lt;br /&gt;
*Project title: Online Community: The Impact of Anonymous Discussion Forums on Political Outcomes&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment4.docx&lt;br /&gt;
[[User:Julian|Julian]] 17:23, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
*Name or pseudonym: Phildade&lt;br /&gt;
*Project title: Sidecar : Manipulating constraints to control driver and passenger behavior to insure value for an entire community&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Dade_-_Assignment_4_-_Final_Draft.pdf&lt;br /&gt;
[[User:Phildade|Phildade]] 17:37, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Jax&lt;br /&gt;
*Project title: &amp;quot;It&#039;s Not Where You&#039;re From, It&#039;s Where You&#039;re At&amp;quot;: Ignorance and the rank of Rap Genius&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Rap_genius_NEW_DRAFT.docx&lt;br /&gt;
17:42, 30 April 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=The_Profitability_of_the_Internet&amp;diff=10278</id>
		<title>The Profitability of the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=The_Profitability_of_the_Internet&amp;diff=10278"/>
		<updated>2013-04-30T17:39:35Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 30&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The rise of the networked economy is changing economic possibilities around the world. From the call centers in India to eBay and the new Internet entrepreneurs, there are many signs that suggest a flatter world fueled by innovative production and marketing strategies. In this session, we will explore the promise and reality of the changing economic tides associated with rising Internet use including those marketing to the long tail and the new oligopolists.&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft|Assignment #4]] is due before class today. You can upload the assignment [[Assignment_4_Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Dot-com_bubble Wikipedia, Dot-com bubble]&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/wired/archive/12.10/tail.html Chris Anderson, The Long Tail (&#039;&#039;Wired&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.guykawasaki.com/2006/07/the_wrong_tale_.html Guy Kawasaki, The Wrong Tail: A Checklist for Long Tail Implementations]&lt;br /&gt;
&lt;br /&gt;
* [http://www.kk.org/thetechnium/archives/2008/01/better_than_fre.php Kevin Kelly, Better than Free]&lt;br /&gt;
&lt;br /&gt;
* [http://web.mit.edu/evhippel/www/books/DI/Chapter8.pdf Eric Von Hippel, &#039;&#039;Democratizing Innovation&#039;&#039; (Chapter 8)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.digitalmusicnews.com/permalink/2012/120730infamous Digital Music News, The Most Infamous Music Infographic, Updated for 2012]&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/magazine/2011/11/mf_bitcoin/ Benjamin Wallace, The Rise and Fall of Bitcoin (&#039;&#039;Wired&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.technologyreview.com/news/506376/ivy-league-20-or-just-another-petscom/ Lee Gomes, Ivy League 2.0 or Just Another Pets.com? (&#039;&#039;MIT Technology Review&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://money.futureofmusic.org/ The Future of Music Coalition, Artist Revenue Streams] (peruse)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
While the phrase &amp;quot;irrational exuberance&amp;quot; was mentioned in the readings, I&#039;m surprised more was not made of it. In the 1990s there was most certainly a rush to jump on any investments that involved a company that had a .com extension to it&#039;s name with little or no scrutiny of the books or fundamental numbers of that company. While the bubble was partially based on sound fundamental judgment - the advent of the web browser and the world wide web in 1994 which made the Internet accessible for so many more non-technical people around the world and this created a much bigger market for e-commerce. However, the cart was put a bit before the horse and a lot of the growth associated with the explosion of Internet access was over exaggerated and not based on sound fundamentals.&lt;br /&gt;
&lt;br /&gt;
The Long Tail article brought up an even bigger point than it intended. It pointed out how the Internet offers certain opportunities to exploit niche markets in the entertainment industry, but this goes beyond the entertainment industry to all aspects of the economy and even extends outside of commerce. &lt;br /&gt;
&lt;br /&gt;
As far as Bitcoin is concerned, as someone who works in the information security field, I am immediately and significantly skeptical about the protections any digital currencies provide against fraud, especially with regard to duplication. I would absolutely echo some of the concerns relayed in the article - about the security of sharing the Bitcoin architecture with any number of unknown entities (individuals or groups) and relying on them for the integrity of the network as a whole. Although, I will admit that some of the issues discussed in the article - such as not accidentally deleting your Bitcoin wallet - can be prevented via basic data backup technologies and procedures and utilizing a minimal amount of common sense. I think it still has potential and whether Bitcoin is the currency of the future or not, there will be a legitimate virtual currency that catches fire and crosses international boundaries at some point.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 11:10, 28 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
As a risk-averse individual, my emotional reaction to the wikipedia article on the dot-com bubble was, &amp;quot;You irresponsible idiots! Weren&#039;t any of you thinking rationally?&amp;quot; However, I understand the fervor of the time. I felt more favorably about the dot-com bubble once the article posited at its end that &amp;quot;Nothing important has ever been built without irrational exuberance&amp;quot; and that the speculative mania of the dot-com bubble allowed the infrastructure we have today. Besides the bankruptcy of companies and a glutted job market for computer programmers, I wonder what lasting negative effects from the dot-com bubble we are still experiencing now.&lt;br /&gt;
&lt;br /&gt;
Prompted by CyberRalph&#039;s comment, I tried to think of other niche markets for/in the long tail and thought of online fashion rental services that advertise themselves as  Netflix for designer dresses, designer handbags, jewelry, plus-size clothing, etc. Can fashion exist in or take advantage of the long tail? Using the checklist for long tail implementations, I think not, yet online fashion rental services continue to proliferate, seemingly launching every quarter.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Better than Free&amp;quot; crystallized for me why I&#039;m still willing to pay for entertainment. The article also helped me contextualize the abundance of advertising via social media: &amp;quot;In short, the money in this networked economy does not follow the path of the copies. Rather it follows the path of attention, and attention has its own circuits.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
My primary take-away from von Hippel&#039;s chapter is that we need to create policy that allows users to create and become involved with manufacturing because current policy is not as conducive to innovation as the original policymakers intended.&lt;br /&gt;
&lt;br /&gt;
My quick thoughts on Bitcoin are that (1) it sounds like a libertarian dream, (2) I consider it a fascinating social experiment, and (3) it seems too unregulated to be a viable long-term currency.&lt;br /&gt;
&lt;br /&gt;
[[User:JW|JW]] 23:47, 29 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
One of the strangest experiences is reading someone else&#039;s take on a time one has lived through. Participating in this course has made it clear to me how quickly the past can get distorted in the present&#039;s need for a coherent narrative. And brilliant that the final word (as of this reading) on the dot.com bubble belongs to Fred Wilson. &lt;br /&gt;
&lt;br /&gt;
I worked with one of the founders of one of the bigger names mentioned in the article before he founded that company. And went on to work at an investment bank where my role on an unrelated project had me reading the drafts of the funding documents and analyst reports. &lt;br /&gt;
&lt;br /&gt;
I also worked at a dot.com from late 1999 to the summer of 2000. Flying back and forth between New York and LA (once there and back in the same day), meeting with potential investors, negotiating with possible CEO candidates (senior execs from the big three media companies, partners in consulting firms), phone numbers of partners of big NY law firms on my cell phone, but also dealing with the debt. The bills that weren&#039;t going to be paid to creditors who were willing, at least at the beginning, to provide services on the ridiculous valuations not even promised by us, but by the media. Angel investors who were the sons and daughters of some big names in the investment world....And how quickly it stopped once the money ran out. But what we were selling - the ideas - are actually being implemented right now. Wild to see what we dreamed about and pitched finally happening, and how ordinary it all seems now and how offbeat, unusual, hard to get people to get their minds around it was back then.&lt;br /&gt;
&lt;br /&gt;
Kozmo.com isn&#039;t even mentioned in the Wikipedia article, but it was one of the great things about living through the late 90s in NYC. You logged in, ordered a movie, maybe a pint of Ben and Jerry&#039;s and within the hour it was delivered to your door. You dropped the video off with your doorman or en route to work, logged back in, and rented the next night&#039;s video. Compared to the fees Blockbuster charged for even a day late video return, Kozmo was insanely cheap and convenient. Eventually they would deliver anything to your door - video players, tv sets.... They weren&#039;t covering their costs, everyone knew it, but it was amazing while it lasted. &lt;br /&gt;
&lt;br /&gt;
The point being that it is true that some very rich people lost a lot of money with Kozmo.com and other dot.com companies, but they also taught people what is possible, and allowed people to see how little they were settling for and how much they could have, if these companies could get off the ground. To ask what people were thinking as someone did above, they were thinking &amp;quot;Wow. This is cool. I hope they figure out a way to make it profitable without it costing me personally too much, because this is so much better than it was before. And oh by the way, I think this idea is valuable and worthwhile and I believe if I invest some money with you, I might see a higher return than if I left it in the bank or gave it to somebody else&amp;quot;. Also, they were thinking &amp;quot;Can I have a job? because my industry is dying and this one looks like it might have some life in it.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
I was wondering if we were going to get to Bitcoin in this class. The recent Cyprus debacle put Bitcoin front and center, and whether it survives, or another currency similar to it appears, how it is regulated, who will accept it and under what terms, the exchange rate questions, how to mine it, how to store it, the money laundering question, all of this is an entire class on it&#039;s own. However, with so much having been written on the topic so recently, I wonder why we were assigned something from last fall? &lt;br /&gt;
Looking forward to tonight&#039;s class.[[User:Raven|Raven]] 09:35, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Focusing on the market and Internet profitability unites many of the separate topics we’ve covered this semester.  Today, everything is a dot-com business, and as a result: privacy has continuously been questioned; copyright has constantly been battled across diverse frontiers; freedom of speech has taken on new meanings; and peer production has brought unknown products to the forefront. To a certain extent, it&#039;s challenging to remember what shopping was like before the dot-com bubble.  As I read the Wikipedia article I couldn&#039;t help but think about the longevity this definition; it seems much more distant than a decade ago.  &#039;&#039;&amp;quot;[The dot-com bubble] period was marked by the founding (and, in many cases, spectacular failure) of a group of new Internet-based companies commonly referred to as dot-coms&amp;quot;&#039;&#039; (Wikipedia dot-com definition).  The growth of online business has come a long way in the past 15 years, turning into the norm.  What will our Internet shopping experiences look like decades from now?&lt;br /&gt;
&lt;br /&gt;
The final quote in the Long Tail article encapsulates two important points that I’d like to address:  &#039;&#039;&amp;quot;[R]ecommendations are a remarkably efficient form of marketing...the cultural benefit of all of this [online sharing and recommendations] is much more diversity, reversing the blanding effects of a century of distribution scarcity and ending the tyranny of the hit&amp;quot;&#039;&#039; (Anderson, 2004).  First, consumers are the best marketers, because similar to peer production, comments are unfiltered.  Word of mouth has taken on new meanings with online shopping—most websites now has a &amp;quot;comments section&amp;quot; and consumers share thoughts with no reservation, whether positive or negative.  Our shopping decision criteria have thus changed; our purchasing actions have shifted; and our communication practices have helped sell more products (or the contrary in some scenarios).  The new buy-sell model represents countless degrees of separation—when we select a product online, we can view similar recommendations with no end in sight.  Does this mean it&#039;s easier to sell exclusive products today than in the past, or visa-versa?&lt;br /&gt;
&lt;br /&gt;
Second, we are no longer forced to buy what is on the shelves.  Before the Internet, we lived in a finite shopping world limited to geography, but today we can purchase almost anything that comes to mind, in a quick streamlined manner....It is &#039;&#039;fast fulfillment and an infinite selection&#039;&#039; (as mentioned in The Wrong Tail article).  To that end, the target market has transformed from the 80/20 rule to the 99% rule (another interesting point reflected).  &#039;&#039;&amp;quot;What&#039;s really amazing about the Long Tail is the sheer size of it. Combine enough non hits on the Long Tail and you&#039;ve got a market bigger than the hits. The average Barnes &amp;amp; Noble carries 130,000 titles; yet more than half of Amazon&#039;s book sales come from outside its top 130,000 titles.  The average Blockbuster carries fewer than 3,000 DVDs; yet a fifth of Netflix rentals are outside its top 3,000 titles....there are niches by the thousands, genre within genre within genre&amp;quot;&#039;&#039; (Anderson, 2004).   &lt;br /&gt;
&lt;br /&gt;
Online competition can be viewed from two distinct perspectives: 1) products that were previously unable to sell due to less publicity can now become profitable (e.g., unknown books or movies).  2) Products that previously generated high margins must now be sold differently (e.g., music selections, as elaborated in the The Most Infamous Music article).  It is an ever-evolving cycle, and as we continue to assess the online market (as providers and consumers), the market will continue to transform around us. &lt;br /&gt;
&lt;br /&gt;
In closing, by taking this class virtually afar from Cambridge, it has been a pleasure sharing my thoughts on this wiki site for the past few months and reading everyone’s weekly insights.  This course has shed light on valuable analytical tools to examine past and future Internet trends, not only surrounding profitability avenues, but also in relation to societal forces that continuously shape our relationships in cyber space.  I look forward to evaluating the Politics of Internet Control, from a unique perspective, for many years to come! [[User:Zak Paster|Zak Paster]] 10:09, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
These were great articles this week - the Bitcoin article was great background for what is going on in the industry now.   It will be interesting to see how it all shakes out and shows itself in the next year or so. &lt;br /&gt;
&lt;br /&gt;
My main interest this week was something that I have experienced myself and certainly have been a willing participant by voting with my wallet.... Ah Amazon -  how I do enjoy those recommendations based on my prior buying history.  Smart and savvy but when you think of the database of information it is a bit scary.  Someone wanting to profile my life would certainly wonder why I would have such a love of law and technology books yet pepper my purchase history with everything to do with French Vogue....not a standard cluster group by most, but certainly something that makes Amazon try harder to loop me in with shoe purchases on the splash page. : )  I understand this type of marketing, I work with it to advantage one of my clients and I get the philosophy of making a &amp;quot;connection&amp;quot; with someone to make them feel understood .... while of course gently parting them from their hard earned dollars.  I come down on the side of advancement but I do often wonder how business intelligence is disseminated through the servers around the globe - I am a very small cog in the group - but it is interesting how quickly the retailers of products have found a way to suck me in to their lair. [[User:Caroline|Caroline]] 10:16, 30 April 2013 (EDT) Caroline&lt;br /&gt;
&lt;br /&gt;
In his Long Tail article, Chris Anderson discusses how very small niche markets can greatly influence the profit margins of companies like Amazon and Netflix.  Thanks to the internet, consumers like me, who are not part of the target demographic for music and movie executives, can now find entertainment  that they actually find entertaining.  Mr. Anderson had me pegged when he wrote, “You can find everything out there on the Long Tail. There&#039;s the back catalog, older albums still fondly remembered by longtime fans…”   I am one of the se consumers who recently started contributing to Amazon’s market share.  I stopped buying music about 20 years ago because I got tired of not being able to listen to my favorite songs every time a new format was invented.  But, I actually started buying music again a few months ago so I can listen to music on my non-mainstream phone.  About half the songs I’ve bought from Amazon are those I already own that are melting away in a closet in my parents’ house or decaying amongst the spiders in my basement.  Aside from the fact that I still get angry every time I have re-buy a song I already own, I am happy I can listen to them and hope MP3’s never go away.  And, as Anderson pointed out,  it is true that I’m only buying music now because I’m willing to spend 99 cents to purchase a song I love, even though I already own it, but if it were $1.01, I would refuse to buy it.&lt;br /&gt;
&lt;br /&gt;
I was a bit disappointed that neither Anderson nor Von Hippel mentioned how important niche markets and user innovations have been to education.  In the dark ages, before there was such a thing as the internet, I took a couple of women’s studies classes that introduced me to some wonderful female authors from the 1800 and early 1900’s whose work is not widely known.  Unfortunately, we were very limited in what we could read because the only books and short stories available were the few that were still being printed or, in the case of one book, had been reprinted because of the new field of Women’s Studies.   I’m hoping that this inability to find the works of talented writers, artists, musicians, etc. who are not appreciated during their lifetimes is now truly a thing of the past thanks to the cloud.  At the same time, Von Hippel failed to mention how open source books and courseware have been impacting education  in Democratizing Innovation.  It would have been nice to see some mention of how students have been able to access knowledge for free online and that world citizens can reuse, remix and redistribute open source books.&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 11:14, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
While I support how the Long Tail theory encourages the production of specified, diverse material rather than that created for mass consumption,  Chris Anderson&#039;s article only discusses how corporations may benefit from niche market inclinations, ignoring how corporation&#039;s sub-cultural control affects originally specific marketplaces. Both on and offline, niche commerce exists without corporate aggregation. I can indulge in my passion for Mac and Cheese at S&#039;mac in New York, or discover the latest writing utensil technology at JetPens.com. These destinations cater completely and exclusively to a particular interest. However, given the opportunity to order designer mac and cheese and limited edition gel pens at the same time, why would I ever want to fulfill these desires exclusively again? As massively-popular online marketplaces such as eBay and Amazon have the resources to cater to mainstream and fringe consumer passions alike, they inevitably strip these sub-cultural centers of popularity and power. These online epicenters of everything systematically oppress sub-cultural creators, who cannot compete with the low-prices and cultural prominence of the most powerful online distributors. The passion of producers/ collectors of sub-cultural materials is filtered by a dispassionate consumer marketplace. Anderson&#039;s analysis of the Long Tail theory emphasizes the role of independent interests within mass market domain, but neglects the sacrifice of autonomony required of the independent markets that originally catered to these interests.  [[User:Jax|Jax]] 13:39, 30 April 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Informing_the_Public_in_the_Internet_Age&amp;diff=10203</id>
		<title>Informing the Public in the Internet Age</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Informing_the_Public_in_the_Internet_Age&amp;diff=10203"/>
		<updated>2013-04-16T18:57:57Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 16&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector. Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed? Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter? Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Persephone Miel and Rob Faris, News and Information as Digital Media Come of Age] (read executive summary)&lt;br /&gt;
&lt;br /&gt;
* [http://law.wlu.edu/deptimages/Law%20Review/68-2Jones.pdf RonNell Anderson Jones, Litigation, Legislation, and Democracy in a Post-Newspaper America] (Section I only, remaining optional)&lt;br /&gt;
&lt;br /&gt;
* [http://transition.fcc.gov/osp/inc-report/INoC-Executive_Summary.pdf Federal Communications Commission, Information Needs of Communities] (read executive summary, skim overview)&lt;br /&gt;
&lt;br /&gt;
* [http://banyanproject.com/index.php?title=Main_Page Banyan Project, Introduction and Overview]&lt;br /&gt;
&lt;br /&gt;
* [http://thephoenix.com/boston/news/111660-muckrock-city/ Chris Faraone, MuckRock City (&#039;&#039;Boston Phoenix&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2012/05/from-cold-calls-to-community-building-propublica-tries-to-make-crowdsourcing-more-meaningful/ Adrienne LaFrance, From Cold Calls to Community Building, ProPublica Tries to Make Crowdsourcing More Meaningful (&#039;&#039;Nieman Journalism Lab&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=K3TRKPSmoZk Brendan Nyhan, Biases Abound] (video, watch all)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=NXZAIrDI66E&amp;amp;playnext=1&amp;amp;list=PL1E8598023D37F7AC&amp;amp;feature=results_video Jonathan Zittrain, 2009 Richard S. Salant Lecture on Freedom of the Press] (the lecture starts at 19:45)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I tend to agree with the gist of the Miel and Faris, Berkman Report that argues there is a merging of traditional media reporting and online independent blogging. For instance, today at around 2:45 the terror attack occurred in Boston. At 3:15 I saw a notice on twitter and googled it to see what was happening. None of the first page of google links were to major media resources, they were all to minor blogs that were carrying the story which is where I got my information. So for breaking news it can be quite often a minor blogger or on facebook/twitter where a story breaks for the first time. Conversely, I&#039;ve noticed a marked decline in the online stories of the traditional Canadian Newspaper sites. I often go to CBC (Canadian Broadcasting Corporation) to browse the news and I&#039;ve noticed quite often that they revise their online stories continually to add a fact here and there like a blog. In doing so they often make mistakes in their haste and it seems as though their articles are of no higher quality than an independent bloggers... [[User:Joshywonder|Joshywonder]] 20:59, 15 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Like everyone else, I can&#039;t stop thinking about the tragedy in Boston today. The event was particularly timely for a class about journalism, because it is a pretty telling case study about informing the public in the Internet age. Indeed you could see many of the positive and negative effects of public participation in media, as presented by the Berkman report from Persephone Miel and Robert Faris and the FCC report from Steven Waldman. &lt;br /&gt;
&lt;br /&gt;
I  initially heard about the explosions on Facebook from a post by a friend based in NYC who was watching a live stream of the event. Then I immediately searched online to find out more information from a reputable news source. Even though social media broke the news for me, I still needed a journalist for verification and confirmation. But the New York Times and Boston Globe only had basic, incomplete information at this point. So I jumped back over to social media, where information was readily and rapidly flowing. However, finding credible information and assembling a coherent report of what had happened turned out to be incredibly challenging. Twitter became a hot bed of misinformation (i.e. of alleged perpetrators), insensitive scheduled tweets, graphic images I wanted to avoid, general shock, speculation, retweet hoaxes, and conflicting reports. It felt like a highly visible news room flooded with all the crap that usually gets filtered out. One tweet even read, &amp;quot;everyone just chill for a sec until confirmed reports come in.&amp;quot;  &lt;br /&gt;
&lt;br /&gt;
So right away, I could see the advantages and disadvantages of participatory media outlets and traditional news outlets. I needed professional journalists to confirm information for me, to give me an objective  and authoritative source. But the news outlets moved too slow. So I turned to social media to give me updates and reactions, even if they were inaccurate. For me, any information was better than none at the time. Ultimately, I found myself glued to CNN while perusing Twitter and Facebook and texting everyone I knew. It felt as though the participatory and  traditional media were working in concert with one another, satisfying different needs. Looking back now, I think there is a place for both traditional journalists and community driven-news so as long as each focuses on what they do best (news outlets: slower but accurate reports, social media: speedy but not always accurate reports) and not try to serve the function of the other.  The Banyan Project seems like an interesting hybrid. Anyway, my heart goes out to the victims on this sad day. [[User:Asmith|Asmith]] 00:37, 16 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
When I read the assignment summary/description for this week which included a reference to the alternative, citizen-led media sector and asked, &amp;quot;Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed?&amp;quot;, my instinct was to answer with the one word: both. And when I say &amp;quot;both&amp;quot;, I mean that what we are seeing happen with media as a whole is the inclusion of enthusiastic amateurs as well as a fundamental restructuring of the way media and news are contained. One only needs to look at the number of direct references in the so-called mainstream, traditional media to social networking. The initial coverage of yesterday&#039;s bombing of the Boston Marathon including repeated use of amateur (presumably cell phone) video and still shots by the mainstream media as well as repeating twitter posts. On the other hand, there can be no doubt that as the old, traditional media begins to enjoy less consumption (Newsweek gave up its print edition this last December and long gone are the days of the three main news media TV channels - ABC, CBS and NBC, who have all lost their share of the market to the likes of CNN, FOX, MSNBC and online sources) while relatively new media (or at least new compared to the traditional sources) such as Drudge, Huffington Post and any of the millions of bloggers continue to enjoy large and in some cases constantly increasing shares of the market. As the Miel and Faris article states, &amp;quot;The distinctions between professional and amateur are blurring, and the definitions of commercial, public, and community media are shifting.&amp;quot; It&#039;s no longer one or the other, but how much of each component does anyone news/media source choose to use in order to attract information consumers. I would even throw the spectrum of hard news versus opinion in there. I also think the Miel and Faris article summarized it well when they said: &amp;quot;Understanding these trends requires a broader and more holistic view of the media environment than isolating new or &lt;br /&gt;
participatory media, terms that are losing value as meaningful distinctions.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Jones article stated that, &amp;quot;Scholars and commentators have been closely monitoring this decline for several years, and much has been written about the ways in which the demise of traditional mainstream media might negatively impact the flow of information to the public, and ultimately undermine the strength of our democracy.&amp;quot;  I disagree. Information consumers must simply learn to adjust their understanding of the sources of the information they receive. It is absolutely essential to be critical of every source of information and attempt to analyze it objectively and without personal bias if the truth is ultimately the goal. It&#039;s not as if the traditional print media was immune to bias or inaccuracies. Facts are obviously of value. Opinions are also of value if they are viewed as such. The internet and &amp;quot;citizen journalists&amp;quot;, bloggers and individual producers of information have value in that they bring all of these to the table and therefore it becomes critically important to discern what they have to offer before properly consuming it. The most important (and critical to democracy) things that can happen is to be able to draw a distinction between hard news (i.e. what happened) and opinion/editorial pieces. Very often today we have people wearing two hats - they are both consumers as well as producers. And sometimes one effects the other.[[User:CyberRalph|CyberRalph]] 09:42, 16 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
One cannot deny the influence of mass media in all walks of life.  Whether we examine the domestic or international political landscape, consumer trends, economic development, social change, celebrity gossip, humanitarian disasters, or anything else in our modern surroundings, media shapes our thoughts and actions.  Our readings and the video this week draw attention to our current media world:  &#039;&#039;everyone is a reporter, an author, and an editor.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
A few months ago, I read an interesting political science article by Matthew Baum titled: &#039;&#039;Sex, Lies, and War: How Soft News Brings Foreign Policy to the Inattentive Public.&#039;&#039;  Soft news is defined as entertainment-oriented news, much of what we see on late night T.V.  Baum sheds light on an important aspect of news interpretation and analysis, highlighting education as the nucleus.  He notes that soft news diminishes as respondents move up the education ladder.  In other words, as people become more educated, they consider preferences, question validity, and make decisions based on a broader universe of options when presented with new data (they don’t believe everything they read, hear, or watch).  Brendan Nyhan&#039;s video about fact-checking is somewhat associated with this logic.  I’m not implying that those with lower educational levels believe everything they hear and avoid checking facts; nor am I saying that highly educated individuals cannot be influenced by the subtle nuances of mass media.  If false claims are repeated enough, noted in Nyhan&#039;s video, people will tend to believe those claims, whether educated or not.  I do think, however, that examining media-interpretation from an educational slant is an interesting way to approach this analysis.  Does education increase motivation to confirm facts?  Does education change one&#039;s interpretation when obtaining news from social media or other news outlets?  What are your thoughts about the role of education in our high-choice media environment?  &lt;br /&gt;
&lt;br /&gt;
Primary news and social media news are two distinct information-generating avenues.  When evaluating primary news sources, information about the world often comes from &amp;quot;political elites,&amp;quot; i.e., those who own and manage large entities that provide news.  Although the primary networks (NBC/CBS/ABC/CNN/FOX) provide more clear-cut data than other news sources or entertainment equivalents, we obtain information through filters, making us secondhand consumers.  The telephone game is not necessarily the best analogy, because information can often be presented consistently, across media platforms.  However, to some degree, all information about the world is slightly skewed, based on the translator who shares the information and the number of touch-points the information travels through before we receive it.  This is the reality of traditional primary news.&lt;br /&gt;
&lt;br /&gt;
On the other hand, social media news is very different, because it&#039;s not automatically filtered through the eyes of &amp;quot;elites&amp;quot;—the information we obtain often comes from a direct source.  In the article &#039;&#039;From Cold Calls to Community Building&#039;&#039;, an interesting quote merits attention:  &#039;&#039;&amp;quot;Social media creates a new layer of vulnerability for a reporter compared with what we do traditionally, which is less personal....Trust is a huge issue, especially when you think about [it] on a sourcing level.  A lot of people aren&#039;t going to trust a reporter they don&#039;t know or a publication they don’t know....[P]eople are much more willing to trust each other&amp;quot;&#039;&#039; (LaFrance, 2012). We trust others alike and those who have direct experiences with a topic of interest; this is the change that we’re seeing with social media.  We&#039;re moving from a &#039;&#039;filtered news-generating&#039;&#039; world, to a &#039;&#039;streamlined information-gathering reality&#039;&#039;, i.e., those closest to the news who are impacted the most (the real reporters) provide the best information.&lt;br /&gt;
&lt;br /&gt;
Miel and Faris support this claim stating that, &#039;&#039;&amp;quot;members of this growing audience [i.e., the Internet] are not only consumers of the news—many are shaping the news agenda for themselves and others: selecting, combining, and commenting on stories as well as creating their own.  It is driven by the rapid expansion of the number of people and organizations newly engaged as authors, editors, and publishers&amp;quot;&#039;&#039; (Miel and Faris, 2008).  The final statement of this quote illustrates an important aspect of this week&#039;s thesis.  We are all reporters and through social media avenues we now have the potential to share our stories surrounding countless topics, to mass audiences.&lt;br /&gt;
&lt;br /&gt;
What do you think about this transition?  Will we lack factual information as more non-experts transmit news?  Or, will news be better-off as information emerges from diverse sources, across unique platforms, from unfiltered perspectives? [[User:Zak Paster|Zak Paster]] 10:35, 16 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Interesting readings for this class, and in particular the Miel and Faris article. I would tend to agree with our classmate, Joshywonder that noted that future of news would rely upon new major media resources as twitter, Facebook or diverse blogs. I myself, heard about Boston attack thought-out the posts and comments of those social media arenas. Members as myself tend to rely on consumers of the news that “identify areas where core journalists functions in a democracy” which make a potential thread of a new environment of a networked digital media. In my view, sources like Twitter and Facebook give audience a chance to be involved (by commenting, posting/ liking) in operation of what is happening in a series of tweets of information. In my view, this exchange of information raises the social medial in a gathered emergence of new ecosystems. Diverse organizations are being more hostile towards theses new tools of information. In my view, audience is being more inclined to see comments on Facebook and posts by twitter and other forms of social media as valuable adjunct to traditional media. [[User:User777|user777]] 12:38, 16 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Our classes eerily coincide with national news. Through the lens of yesterday&#039;s tragedy, these articles have made me consider how both emotional investment and the means through which information is generated influence fact. Brendan Nyhan discusses several psychological factors that determine how individuals delegate truth. For instance, the &amp;quot;Illusion of Truth&amp;quot; phenomena, in which individuals construct truth based upon familiar narratives, particularly resonated with me. In the aftermath of the Boston Marathon, threads of suspicion  emerged, including accusations against a  &amp;quot;darker-skinned or black male&amp;quot; with &amp;quot;a possible foreign accent.&amp;quot; Despite the lack of evidence necessary to suspect anyone, the most news-making terrorists to attack America share aesthetic characteristics with this &amp;quot;darker-skinned or black male&amp;quot; with a &amp;quot;possible foreign accent.&amp;quot; In the case of the Boston Marathon tragedy, where much uncertainty still remains, we attempt to apply the truth of the past, which foolishly promotes blindness to and over-simplification of our truly ignorant present circumstances. In tandem with our collective social-historical structures, social media and technology enable us to seek and create truth ourselves. Every Facebook status is an op-ed, and every mobile upload is proof. Everyone is a journalist now, yet without the requirement to comply to journalistic principles. Personal blogs may feature publicly meaningful information couched within an author&#039;s bias and lack of fact-checking. While the influx of social media reporting allows readers to seeks information from a spectrum of sources,inaccuracy and personal context may taint these writings, and distract from mainstream news outlets (occasional) adherence to journalistic principles.   [[User:Jax|Jax]] 14:57, 16 April 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=10185</id>
		<title>Hacking, Hackers, and Hacktivism</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=10185"/>
		<updated>2013-04-09T20:50:41Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 9&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.&lt;br /&gt;
&lt;br /&gt;
Our guest speaker this week will be [http://civic.mit.edu/users/msauter Molly Sauter], a student at MIT&#039;s Comparative Media Studies program and researcher at MIT&#039;s Center for Civic Media, who has written and spoken extensively about cultural perception of hackers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://gabriellacoleman.org/wp-content/uploads/2012/08/Coleman-Phreaks-Hackers-Trolls.pdf Gabriella Coleman, Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle (from &#039;&#039;The Social Media Reader&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)&lt;br /&gt;
&lt;br /&gt;
:* Sauter uses the term &amp;quot;DDoS&amp;quot; throughout. This is an abbreviation for &amp;quot;distributed denial of service,&amp;quot; a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].&lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Sundevil Wikipedia, Operation Sundevil]&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/world/national-security/secrecy-surrounding-zero-day-exploits-industry-spurs-calls-for-government-oversight/2012/09/01/46d664a6-edf7-11e1-afd6-f55f84bc0c41_story.html James Ball, Secrecy Surrounding “Zero-Day Exploits” Industry Spurs Calls for Government Oversight]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW)&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
I was particularly interested in this week&#039;s reading: United States Department of Justice, Prosecuting Computer Crimes it was interesting to see the amount of amendments as the years went by that the federal government attempted to control the internet behaviors of the public. This reading relates closely with my topic for my final paper of the governments control on a macro level in contrast to my paper which exams a small micro community that the federal government is attempting to control. In the readings it appears as if the government reacts in the way of a bell shape curve. Initially they are reactive in nature to something that they are late in response to, then they build up the momentum with legislation, then they continue to amend this legislation to be more and more restrictive until overregulation takes place. The federal government should look into addressing this method of over regulation for it does not protect the public from hackers or those that intend to do wrong, as much as it hurts the freedoms of the public citizens. [[User:Interestingcomments|Interestingcomments]] 10:49, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Computer Hacking!  Whether done for national intelligence reasons, protesting for civil rights, or simply causing disarray, hacking is now a common reality.  The articles and video this week shed light on various hacking attributes.  For this post, I’d like to address two:  &#039;&#039;the relationship between hacking and activism (hacktivism), and identify theft.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As noted in Molly Sauter’s presentation, a primary goal of hacking is to attract media coverage that reveals the identity of those participating in a given action.  This concept is an interesting one to consider from a retrospective viewpoint:  before the Internet, how did information about public officials or public entities leak in the same manner?  Did the same amount of information spill?  Or, was there a much greater sense of privacy throughout industries, the government, and civil life?  Mass media is a powerful mechanism that can &amp;quot;change the word&amp;quot; overnight, but how can we examine the interplay between the Internet and media?  From one perspective, they are the same:  messages spread quickly to large audiences across both avenues.  From another perspective, the Internet acts as a stimulus that shapes media coverage.  In other words, it&#039;s the first stepping-stone that turns privacy into publicity, which can begin through hacking. &lt;br /&gt;
&lt;br /&gt;
As defined on the Wikipedia page [http://en.wikipedia.org/wiki/Hacktivism], &#039;&#039;&amp;quot;Hacktivism is the use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics.&amp;quot;&#039;&#039;   One important characteristic to consider with hacktivism, however, is &amp;quot;perspective.&amp;quot;  It’s all about one’s perspective surrounding a given &amp;quot;hacktivist&#039;s act:&amp;quot;  those who believe they are simply exercising their freedom of speech may inevitably be committing felonies that destroy other people&#039;s identity or an organizations&#039; operations.  Hacking Iran&#039;s nuclear system is much different than hacking someone&#039;s bank account, but at the same time they&#039;re both deceitful, correct?  When we think about activism, we think &amp;quot;good:&amp;quot;  activists fight toward a common cause to create positive change in society (most commonly).  When we think about hacktivism, however, &#039;&#039;good&#039;&#039; is not always the first thing that comes to mind.  What do you think about the interplay with these two words?  Can they mean the same thing or are they always different?&lt;br /&gt;
&lt;br /&gt;
The second point I’d like to address is &amp;quot;privacy.&amp;quot;  When examining confidentiality today, I often ask myself what is truly private online?  The article about China infiltrating the New York Times, or the reference about hacking Sarah Pallin&#039;s personal information illustrates that none of us are truly safe from being hacked.  Emails are not private; Facebook is not private; and to certain extent, passwords are not private.  With this in mind, how can we protect ourselves from identity theft?  How can we create passwords that are impossible to hack?  How can we protect our online identity (i.e., our real-world identity)?  As we all file our 2012 taxes, for example, consider IRS refund fraud....Citizens with no IT background are able to earn tens of thousands of dollars through online hacking; and the majority are never caught.  Are these types of hackers also hacktivists, because their united behind a common cause?  What defines a hacker vs. a hacktivist?  Why is it OK to invade one person’s or organization’s privacy, but not another’s?  Is it OK when the vast majority disagree with a person&#039;s viewpoint, or a country&#039;s ideals, or a company&#039;s mission? Or, is hacking always wrong?&lt;br /&gt;
  &lt;br /&gt;
I&#039;ve asked a lot of questions in this post, because hacking in another complex topic to dissect.  Many of  us &amp;quot;live online,&amp;quot; and for that reason I question what will happen in the near- and long-term as our day-to-day lives become even more virtual.   No matter how vigilant we are, no matter how many times we change our password, and no matter how many password characters we use, we may all, eventually, be hacked! [[User:Zak Paster|Zak Paster]] 11:28, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
Having been a student, practitioner as a criminal and Constitutional lawyer, a teacher, a journalism and most importantly an observer of government and political behavior along with these touching subjects of invasion of privacy, free speech, independence, communication, and what should be a global effort at cooperation for the advancement of the entire society, for over 50 years *yee gads, I must be old) I have seen government in action, in inaction and pretending it is in action. The latter is the rule, not the exception. Our elected officials and the real powers behind the throne, non-elected officials and lobbyists create a proverbial chicken coup run by the fox.  The top echelon of elected officials are figureheads who revel in their fame, power and fortune, Whether it be going through the motions at airport security, or passing insignificant laws that are more bark than bite that they expertly market to create the impression of having meat behind them they exist in their ivory towers.  The problem in this country particularly is that most of us are fat cats living a lifestyle greater than an society before and really do not want to upset the real status quo. So they sit back for the most part and not rock the boat.  The Dutch 350 years ago could not care if Holland or England was in power, so long as they were left alone to do their business.  In Sicily where my ancestors lived the so-called &amp;quot;Mafia&amp;quot; operated in a way much like the American Dutch, but of course in a much more violent and way to control others.  Sicily has been &amp;quot;governed&amp;quot; due to its strategic location along the first major trade routes by virtually every seagoing power of the last two millenniums, but early in the 2nd A.D. the Mafia was formed and since until recent attacks by the government as their power lessened has existed as the real governing body.&lt;br /&gt;
&lt;br /&gt;
What does this all have to do with the Internet and government control.  I will tell you, it is a similar scenario, a similar mathematical formula in which the power is in the people, but until the people stop being conned they will never take it. Now, I am not and hope I do not sound like a Communist by our principals claims that we are a country, &amp;quot;By and for the People,&amp;quot; and our only hope and salvation as a society is to wake up and become active participants and uncover the charades we are subject to by those we elect who under the color of authority are paper pushers.&lt;br /&gt;
[[User:Rich|Rich]] 12:24, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
In my view, major corporations and government security departments have acknowledged that hacker break-ins are out of control within the Internet arena. Some companies are too fearful to join networks due to diverse software programs that could develop ample growing problems. Computer security in our days, is portrayed within usage of difficult passcode, however, is it enough? Hackers seem to carry the responsibility of security break-in, however are they truly liable for company’s loss? As clients demand security of their assets, the vulnerability of security breach highlights that it could not be protected eternally. Ample amount of money is spent on protecting devices that target the hackers, however do these systems support this protection, and why it is still an issue? With the advent of modern law, the characteristics of this issue seem to lack a common ground, which hackers and diverse security programs rely upon. And what are the rights of the government to seize documents and computer ware in case of the hacking incident? The responsibilities of system operators seem to be quite inadequate in comparison to a “true” right for protection. Current law acknowledges that a new threat is emerging where computer “criminals” would potentially be capable of industrial espionage and damaging infrastructures. How could the current law be altered or improved upon these various hacking frameworks? And what would be considered a freedom of information in this matter? How could the unauthorized theft be the primary focus of diverse corporation? And how vulnerability of various security measures could prevent drastic corporate or governmental invasions? &lt;br /&gt;
[[User:User777|user777]] 12:46, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Rules that the Supreme Court regarding writing computer code and whether it is protected under a free speech clause is interesting, but I believe for the most part addressed under the Department of Justice Computer Fraud and Abuse Act, which deliniates in detail the federal crimes that an individual or group may commit, for example, by performing acts of trespassing on other peoples&#039; or organizations computers by &amp;quot;exceeding authorized access&amp;quot; and taking National Security information. In my mind, if and individual or group is proven to show that they create a mechanical device for the purpose of terrorism, accessing National Security information, or in anyway creating code to exceed access for a non-authorized user, that is very obviously a federal crime. When one wishes to create that which defends such information protected by National Security acts, then that group or individual can do it in an authorized area with an authorized group, such as the military or a government authorized facility. It is difficult to overemphasize how seriously the US and other governments take hacking. Mostly it is viewed as organized crime at the lowest level if it does not cross international borders, terrorism if it does. One has to bring up humorously the movie Hackers with Angelina Jolie. Even though it is over 20 years old, it most accurately describes what is happening today in a prophetic manner. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 15:58, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Discussion: Last week I succeeded at programming the wiki to not include my name when I signed it, as required; this week I have a discussion about radicalism and hackers and the knowledge of a cat. So in reviewing the substance of this assignment I have realized that the understanding on the wall of this page is the problem not the other way around. Therefore this is not the conclusion,. A bit of haste will make anyone impuctual as I have just demonstrate. Now I will discuss the necessity for review: Jonathan Zittrian is not a type of ready made rice snack in the grocer aisle or the Webster of deconstructivist lexicography, and memory loss, he was pretending to be Dave Navarro not Jimmy Fallon. I have a cat named Nipper, she loved the lecture about internet attacks. If anyone of you think this is Wall Street, think again! This is how my cat thinks. So I guess that the problem is not the computer, but, merely the author of the program and this association is FALSE. So basically, I am hot and ready for a frozen pizza but I cannot remember the brand. I guess my computer has a memory problem. That is my goal as I continue on the last assignment (which I received a 1 on, if people missed that comment [last week]).[[User:Johnathan Merkwan|Johnathan Merkwan]] 13:32, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
These articles were absolutely fascinating! I was particularly intrigued by the &amp;quot;Phreaks, Hackers, and Trolls&amp;quot; chapter, especially the theatrical aspect of modern internet hacking. While hackers were once limited to the 256 character options of ASCII text available on usenet and .alt boards, modern multimedia possibilities can arouse more shock value, such as the flying phallus prank in Second Life. However, disguised behind elaborate digital costumes, the authentic human voice and political intention is lost. Not only has the increasing unhuman-ness of internet technology impacted the real-life, humanitarian aims of hackers, but also as Gabriella Coleman articulates, &amp;quot;Aesthetic hyperbole has made it difficult to parse out truth from lie,&amp;quot; resulting in &amp;quot;cultural obfuscation.&amp;quot; She later asserts that many breeds of hackers use the internet as a stage to parody real life. This strategy often seems at odds with producing legitimate social change or reformation of systems that hackers attack. For instance, trolls who employ racist and sexist language to mock and exploit chauvinistic real world structures are generally met with three types of responses. 1. They are flamed, criticized, or exiled for their behavior. 2. Their behavior approves of others to express similarly bigoted language and opinions. 3. Their trolling is met with a disaffected awareness that they are indeed trolls, and other users are not to pay them attention. This public awareness of trolls trolling grants internet communities a free pass to write off real racism that may manifest. As these trolls wrap legitimate social issues in absurdism/idiotism, the internet public feels less threatened by these hateful contributions and more neglectful of the power structures that such bigotry reaffirms, even in an anonymous online venue. [[User:Jax|Jax]] 16:49, 9 April 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=10184</id>
		<title>Hacking, Hackers, and Hacktivism</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=10184"/>
		<updated>2013-04-09T20:49:28Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 9&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.&lt;br /&gt;
&lt;br /&gt;
Our guest speaker this week will be [http://civic.mit.edu/users/msauter Molly Sauter], a student at MIT&#039;s Comparative Media Studies program and researcher at MIT&#039;s Center for Civic Media, who has written and spoken extensively about cultural perception of hackers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://gabriellacoleman.org/wp-content/uploads/2012/08/Coleman-Phreaks-Hackers-Trolls.pdf Gabriella Coleman, Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle (from &#039;&#039;The Social Media Reader&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)&lt;br /&gt;
&lt;br /&gt;
:* Sauter uses the term &amp;quot;DDoS&amp;quot; throughout. This is an abbreviation for &amp;quot;distributed denial of service,&amp;quot; a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].&lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Sundevil Wikipedia, Operation Sundevil]&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/world/national-security/secrecy-surrounding-zero-day-exploits-industry-spurs-calls-for-government-oversight/2012/09/01/46d664a6-edf7-11e1-afd6-f55f84bc0c41_story.html James Ball, Secrecy Surrounding “Zero-Day Exploits” Industry Spurs Calls for Government Oversight]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW)&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
I was particularly interested in this week&#039;s reading: United States Department of Justice, Prosecuting Computer Crimes it was interesting to see the amount of amendments as the years went by that the federal government attempted to control the internet behaviors of the public. This reading relates closely with my topic for my final paper of the governments control on a macro level in contrast to my paper which exams a small micro community that the federal government is attempting to control. In the readings it appears as if the government reacts in the way of a bell shape curve. Initially they are reactive in nature to something that they are late in response to, then they build up the momentum with legislation, then they continue to amend this legislation to be more and more restrictive until overregulation takes place. The federal government should look into addressing this method of over regulation for it does not protect the public from hackers or those that intend to do wrong, as much as it hurts the freedoms of the public citizens. [[User:Interestingcomments|Interestingcomments]] 10:49, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Computer Hacking!  Whether done for national intelligence reasons, protesting for civil rights, or simply causing disarray, hacking is now a common reality.  The articles and video this week shed light on various hacking attributes.  For this post, I’d like to address two:  &#039;&#039;the relationship between hacking and activism (hacktivism), and identify theft.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
As noted in Molly Sauter’s presentation, a primary goal of hacking is to attract media coverage that reveals the identity of those participating in a given action.  This concept is an interesting one to consider from a retrospective viewpoint:  before the Internet, how did information about public officials or public entities leak in the same manner?  Did the same amount of information spill?  Or, was there a much greater sense of privacy throughout industries, the government, and civil life?  Mass media is a powerful mechanism that can &amp;quot;change the word&amp;quot; overnight, but how can we examine the interplay between the Internet and media?  From one perspective, they are the same:  messages spread quickly to large audiences across both avenues.  From another perspective, the Internet acts as a stimulus that shapes media coverage.  In other words, it&#039;s the first stepping-stone that turns privacy into publicity, which can begin through hacking. &lt;br /&gt;
&lt;br /&gt;
As defined on the Wikipedia page [http://en.wikipedia.org/wiki/Hacktivism], &#039;&#039;&amp;quot;Hacktivism is the use of computers and computer networks to promote political ends, chiefly free speech, human rights, and information ethics.&amp;quot;&#039;&#039;   One important characteristic to consider with hacktivism, however, is &amp;quot;perspective.&amp;quot;  It’s all about one’s perspective surrounding a given &amp;quot;hacktivist&#039;s act:&amp;quot;  those who believe they are simply exercising their freedom of speech may inevitably be committing felonies that destroy other people&#039;s identity or an organizations&#039; operations.  Hacking Iran&#039;s nuclear system is much different than hacking someone&#039;s bank account, but at the same time they&#039;re both deceitful, correct?  When we think about activism, we think &amp;quot;good:&amp;quot;  activists fight toward a common cause to create positive change in society (most commonly).  When we think about hacktivism, however, &#039;&#039;good&#039;&#039; is not always the first thing that comes to mind.  What do you think about the interplay with these two words?  Can they mean the same thing or are they always different?&lt;br /&gt;
&lt;br /&gt;
The second point I’d like to address is &amp;quot;privacy.&amp;quot;  When examining confidentiality today, I often ask myself what is truly private online?  The article about China infiltrating the New York Times, or the reference about hacking Sarah Pallin&#039;s personal information illustrates that none of us are truly safe from being hacked.  Emails are not private; Facebook is not private; and to certain extent, passwords are not private.  With this in mind, how can we protect ourselves from identity theft?  How can we create passwords that are impossible to hack?  How can we protect our online identity (i.e., our real-world identity)?  As we all file our 2012 taxes, for example, consider IRS refund fraud....Citizens with no IT background are able to earn tens of thousands of dollars through online hacking; and the majority are never caught.  Are these types of hackers also hacktivists, because their united behind a common cause?  What defines a hacker vs. a hacktivist?  Why is it OK to invade one person’s or organization’s privacy, but not another’s?  Is it OK when the vast majority disagree with a person&#039;s viewpoint, or a country&#039;s ideals, or a company&#039;s mission? Or, is hacking always wrong?&lt;br /&gt;
  &lt;br /&gt;
I&#039;ve asked a lot of questions in this post, because hacking in another complex topic to dissect.  Many of  us &amp;quot;live online,&amp;quot; and for that reason I question what will happen in the near- and long-term as our day-to-day lives become even more virtual.   No matter how vigilant we are, no matter how many times we change our password, and no matter how many password characters we use, we may all, eventually, be hacked! [[User:Zak Paster|Zak Paster]] 11:28, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
Having been a student, practitioner as a criminal and Constitutional lawyer, a teacher, a journalism and most importantly an observer of government and political behavior along with these touching subjects of invasion of privacy, free speech, independence, communication, and what should be a global effort at cooperation for the advancement of the entire society, for over 50 years *yee gads, I must be old) I have seen government in action, in inaction and pretending it is in action. The latter is the rule, not the exception. Our elected officials and the real powers behind the throne, non-elected officials and lobbyists create a proverbial chicken coup run by the fox.  The top echelon of elected officials are figureheads who revel in their fame, power and fortune, Whether it be going through the motions at airport security, or passing insignificant laws that are more bark than bite that they expertly market to create the impression of having meat behind them they exist in their ivory towers.  The problem in this country particularly is that most of us are fat cats living a lifestyle greater than an society before and really do not want to upset the real status quo. So they sit back for the most part and not rock the boat.  The Dutch 350 years ago could not care if Holland or England was in power, so long as they were left alone to do their business.  In Sicily where my ancestors lived the so-called &amp;quot;Mafia&amp;quot; operated in a way much like the American Dutch, but of course in a much more violent and way to control others.  Sicily has been &amp;quot;governed&amp;quot; due to its strategic location along the first major trade routes by virtually every seagoing power of the last two millenniums, but early in the 2nd A.D. the Mafia was formed and since until recent attacks by the government as their power lessened has existed as the real governing body.&lt;br /&gt;
&lt;br /&gt;
What does this all have to do with the Internet and government control.  I will tell you, it is a similar scenario, a similar mathematical formula in which the power is in the people, but until the people stop being conned they will never take it. Now, I am not and hope I do not sound like a Communist by our principals claims that we are a country, &amp;quot;By and for the People,&amp;quot; and our only hope and salvation as a society is to wake up and become active participants and uncover the charades we are subject to by those we elect who under the color of authority are paper pushers.&lt;br /&gt;
[[User:Rich|Rich]] 12:24, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
In my view, major corporations and government security departments have acknowledged that hacker break-ins are out of control within the Internet arena. Some companies are too fearful to join networks due to diverse software programs that could develop ample growing problems. Computer security in our days, is portrayed within usage of difficult passcode, however, is it enough? Hackers seem to carry the responsibility of security break-in, however are they truly liable for company’s loss? As clients demand security of their assets, the vulnerability of security breach highlights that it could not be protected eternally. Ample amount of money is spent on protecting devices that target the hackers, however do these systems support this protection, and why it is still an issue? With the advent of modern law, the characteristics of this issue seem to lack a common ground, which hackers and diverse security programs rely upon. And what are the rights of the government to seize documents and computer ware in case of the hacking incident? The responsibilities of system operators seem to be quite inadequate in comparison to a “true” right for protection. Current law acknowledges that a new threat is emerging where computer “criminals” would potentially be capable of industrial espionage and damaging infrastructures. How could the current law be altered or improved upon these various hacking frameworks? And what would be considered a freedom of information in this matter? How could the unauthorized theft be the primary focus of diverse corporation? And how vulnerability of various security measures could prevent drastic corporate or governmental invasions? &lt;br /&gt;
[[User:User777|user777]] 12:46, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Rules that the Supreme Court regarding writing computer code and whether it is protected under a free speech clause is interesting, but I believe for the most part addressed under the Department of Justice Computer Fraud and Abuse Act, which deliniates in detail the federal crimes that an individual or group may commit, for example, by performing acts of trespassing on other peoples&#039; or organizations computers by &amp;quot;exceeding authorized access&amp;quot; and taking National Security information. In my mind, if and individual or group is proven to show that they create a mechanical device for the purpose of terrorism, accessing National Security information, or in anyway creating code to exceed access for a non-authorized user, that is very obviously a federal crime. When one wishes to create that which defends such information protected by National Security acts, then that group or individual can do it in an authorized area with an authorized group, such as the military or a government authorized facility. It is difficult to overemphasize how seriously the US and other governments take hacking. Mostly it is viewed as organized crime at the lowest level if it does not cross international borders, terrorism if it does. One has to bring up humorously the movie Hackers with Angelina Jolie. Even though it is over 20 years old, it most accurately describes what is happening today in a prophetic manner. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 15:58, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Discussion: Last week I succeeded at programming the wiki to not include my name when I signed it, as required; this week I have a discussion about radicalism and hackers and the knowledge of a cat. So in reviewing the substance of this assignment I have realized that the understanding on the wall of this page is the problem not the other way around. Therefore this is not the conclusion,. A bit of haste will make anyone impuctual as I have just demonstrate. Now I will discuss the necessity for review: Jonathan Zittrian is not a type of ready made rice snack in the grocer aisle or the Webster of deconstructivist lexicography, and memory loss, he was pretending to be Dave Navarro not Jimmy Fallon. I have a cat named Nipper, she loved the lecture about internet attacks. If anyone of you think this is Wall Street, think again! This is how my cat thinks. So I guess that the problem is not the computer, but, merely the author of the program and this association is FALSE. So basically, I am hot and ready for a frozen pizza but I cannot remember the brand. I guess my computer has a memory problem. That is my goal as I continue on the last assignment (which I received a 1 on, if people missed that comment [last week]).[[User:Johnathan Merkwan|Johnathan Merkwan]] 13:32, 9 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
These articles were absolutely fascinating! I was particularly intrigued by the &amp;quot;Phreaks, Hackers, and Trolls&amp;quot; chapter, especially the theatrical aspect of modern internet hacking. While hackers were once limited to the 256 character options of ASCII text available on usenet and .alt boards, modern multimedia possibilities can arouse more shock value, such as the flying phallus prank in Second Life. However, disguised behind elaborate digital costumes, the authentic human voice and political intention is lost. Not only has the increasing unhuman-ness of internet technology impacted the real-life, humanitarian aims of hackers, but also as Gabriella Coleman articulates, &amp;quot;Aesthetic hyperbole has made it difficult to parse out truth from lie,&amp;quot; resulting in &amp;quot;cultural obfuscation.&amp;quot; She later asserts that many breeds of hackers use the internet as a stage to parody real life. This strategy often seems at odds with producing legitimate social change or reformation of systems that hackers attack. For instance, trolls who employ racist and sexist language to mock and exploit chauvinistic real world structures are generally met with three types of responses. 1. They are flamed, criticized, or exiled for their behavior. 2. Their behavior approves of others to express similarly bigoted language and opinions. 3. Their trolling is met with a disaffected awareness that they are indeed trolls, and other users are not to pay them attention. This public awareness of trolls trolling grants internet communities a free pass to write off real racism that may manifest. As these trolls wrap legitimate social issues in absurdism/idiotism, the internet public feels less threatened by these hateful contributions and more neglectful of the power structures that such bigotry reaffirms. [[User:Jax|Jax]] 16:49, 9 April 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10135</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10135"/>
		<updated>2013-03-26T21:38:45Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 26.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://yourlinkhere}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 {{AssignmentInfo|Asmith|A Few Bad Apples: Grappling with Troublesome Users on Diaspora|http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Milenagrado|How does Reclame Aqui avoid bias?|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Milenagrado_assignment_3_.doc|File: Milenagrado_assignment_3_.doc}} [[User:Milenagrado|Milenagrado]] 21:10, 25 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Raven|If Your Website&#039;s Full of Assholes It&#039;s Your Fault|http://cyber.law.harvard.edu/is2013/File:Raven_Assignment_3.docx}}[[User:Raven|Raven]] 17:24, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|RichCacioppo|Hypocritical or Sincere Users and Restrictions of Free Speech|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Hypocritical_or_Sincere_Users_and_Restrictions_of_Free_Speech.pdf}}&lt;br /&gt;
[[User:Rich|Rich]] 08:12, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Maria Jurado|Internet regulation in Argentina, the case of Taringa!|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Maria_Jurado_Assignment3.pdf}} --[[User:Maria|Maria]] 09:16, 26 March 2013 (EDT)&lt;br /&gt;
{{AssignmentInfo|Jaclyn Horowitz / Jax|Rap Genius and Meaningful Ignorance|http://cyber.law.harvard.edu/is2013/File:Rap_Genius_and_Meaningful_Ignorance.docx}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|TAG Interesting Comments|Does The SEC Need To Control &amp;amp; Censor The Message Board Community?|http://cyber.law.harvard.edu/is2013/File:TAG_LSTU_Assignment_3.docx}}[[User:Interestingcomments|Interestingcomments]] 09:54, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Muromi|Surviving in the Grey Zone Between Copyright Regimes|http://cyber.law.harvard.edu/is2013/File:Muromi_Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|AaronEttl|Compromising Crowdfunding Through Copyright Law|http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment3.docx}} [[User:AaronEttl|AaronEttl]] 11:31, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
 {{AssignmentInfo|Zak Paster|Online Giving: A New Fundraising Era|http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_3_Online_Giving-A_New_Fundraising_Era_3-26-13.pdf}} [[User:Zak Paster|Zak Paster]] 11:37, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|DearAlice|One Company, Different Social Media Platforms, Different Conversations|http://cyber.law.harvard.edu/is2013/File:Dear_Alice_Assignment3.docx}}--[[User:Dear Alice|Dear Alice]] 11:42, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Johnathan Merkwan|Exploring Facebook and Casey Anthony|http://cyber.law.harvard.edu/is2013/File:Assignment_3.docx}} [[User:Johnathan Merkwan|Johnathan Merkwan]] 12:50, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Rich Cacioppo|Hypocritical or Sincere Uses and Restrictions of Free Speech|http://cyber.law.harvard.edu/is2013/sites/is2013/images/Assignment_3_Final_ProjectOutline_and_Methodology_March_26_2013.pdf}} [[User:Rich|Rich]] 13:11, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Steve Ridder|Kickstarter - Fraud or Not|http://cyber.law.harvard.edu/is2013/sites/is2013/images/Steve_Ridder_Assignment_3.docx}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Hgaylor|“Access for Open and Secure Communication&lt;br /&gt;
An In-depth analysis of government’s role&lt;br /&gt;
in the Global Collaborative Data Network”&lt;br /&gt;
|http://cyber.law.harvard.edu/is2013/File:Hgaylor_Assignment3.docx}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Joshywonder|Lawbuzz.ca the Effects of a SLAPP suit on internet forum participation|http://cyber.law.harvard.edu/is2013/File:Joshywonder_Assignment_3.docx}} [[User:Joshywonder|Joshywonder]] 14:02, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Matthew Haney|&amp;quot;Yelp – review filtering and its impact on brand perception&amp;quot;|http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_3_Outline%2C_03262013.docx }}[[User:Mattyh|Mattyh]] 16:04, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Goldstein|MOOCs: They Are Massive and They Are Open, but Are They Accessible?|http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment3.docx}}[[User:Susan Goldstein|Susan Goldstein]] 16:14, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Phillip Dade|How Sidecar Insures Value|http://cyber.law.harvard.edu/is2013/File:Dade_-_Assignment_3_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Cyber Ralph|Anonymous and Their Methodologies for Conducting Protests via the Twittersphere|http://cyber.law.harvard.edu/is2013/File:CyberRalph_Assignment3.docx}}&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 17:05, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Caroline|Right to be forgotten and FB|http://cyber.law.harvard.edu/is2013/File:Assignment-3.doc}}[[User:Caroline|Caroline]] 17:23, 26 March 2013 (EDT)Caroline&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Julian|Online Community Discussion: Requiring Congressmen &amp;amp; Senators to Wear Logos of Their Financial Backers|http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment3.rtf}}[[User:Julian|Julian]] 17:28, 26 March 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=9986</id>
		<title>Copyright Part 1: Guiding Principles and Online Application</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=9986"/>
		<updated>2013-03-06T00:26:00Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost. The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to recut, reframe, and recycle previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain.&lt;br /&gt;
&lt;br /&gt;
Over the next two classes, this course will take up the some of the issues related to copyright protection and enforcement online. Today’s class will focus on the legal regime of copyright: what it protects, what it doesn’t protect, and how the doctrine has transformed in light of digital reproduction and distribution.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://cyber.law.harvard.edu/is2013/File:2013-03-05-Copyright1.pdf Download slides for this week&#039;s class.]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The second half of assignment 2 (commenting on prospectuses) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Copyright_Clause Wikipedia, Copyright Clause]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Circular 1: Copyright Basics] (read only Who Can Claim Copyright?, What Works Are Protected?, What is Not Protected by Copyright?, How to Secure a Copyright, and How Long Copyright Protection Endures)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/text/17/107 17 U.S.C. § 107 - Limitations on Exclusive Rights: Fair Use]&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688 Lawrence Lessig, It is About Time: Getting Our Values around Copyright] (watch first 6 minutes)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2012/08/why-johnny-cant-stream-how-video-copyright-went-insane/ James Grimmelmann, Why Johnny Can’t Stream: How Video Copyright Went Insane]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyhype.com/2012/08/there-is-no-magic-bullet/ Terry Hart, There is No Magic Bullet]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bloomsburyacademic.com/view/Remix_9781849662505/chapter-ba-9781849662505-chapter-0001.xml Lawrence Lessig, &#039;&#039;Remix: Making Art and Culture Thrive in the Hybrid Economy&#039;&#039;] (Introduction only)&lt;br /&gt;
&lt;br /&gt;
* Creative Commons, [https://www.youtube.com/watch?v=1DKm96Ftfko A Shared Culture] (video, watch all) and [http://wiki.creativecommons.org/Spectrumofrights_Comic1 Spectrum of Rights]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www-personal.umich.edu/~jdlitman/papers/read.htm Jessica Litman, The Exclusive Right to Read] (introduction and Sections I and II only)&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2008/10/dodgy-digits-behind-the-war-on-piracy/ Julian Sanchez, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
The gloss we&#039;re doing in class on the duration of copyright terms is a bit simplified. For a more detailed chart discussing copyright duration, check out the chart developed by [http://copyright.cornell.edu/resources/publicdomain.cfm Cornell&#039;s Copyright Information Center].&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I was somewhat surprised by the tone of Julian Sanchez&#039;, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy. It reads as if it were written by some type of torrent-freak railing against legitimate business, and is about as informative. While his fundamental point that it is hard to quantify the harm copyright piracy does in terms of economic loss and jobs lost is reasonable, he does nothing to argue against the undeniable fact that the United States (and Canada) do lose jobs and money due to the piracy. Sanchez&#039; point &amp;quot;When someone torrents a $12 album that they would have otherwise purchased, the record industry loses $12, to be sure. But that doesn&#039;t mean that $12 has magically vanished from the economy. On the contrary: someone has gotten the value of the album and still has $12 to spend somewhere else&amp;quot; is just flat out wrong. It may be valid when an American steals from an American, or a Canadian steals from a Canadian, but it does not apply when a Canadian steals from an American, or more problematically, when China and the rest of the world steal from America. The US trade deficit with China is enormous. This is due in quite a significant part to the fact that we import and pay for enormous amounts of manufactured goods from China, while China imports, but does not pay for enormous amounts of IP from the US and Canada (think fake Apple phones, hacked MS office, every single hollywood movie and song, serious technical data and research). While Sanchez might not want to pay $100 for MS Word or $20 for a movie, he should think twice before accepting the argument that the 6.1 billion people in the rest of the world do not have to pay the US for IP. [[User:Joshywonder|Joshywonder]] 10:18, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for the very thoughtful comment, Josh. I&#039;m not sure if Sanchez meant to take on the second question as to how much damage is caused to the American economy by piracy. As to the &amp;quot;$12&amp;quot; discussion you mentioned, I agree that Sanchez is being a bit too fast and loose here, but I think what he is driving at is more macroscopic: that the presence of downloading for consumption of works doesn&#039;t have a substantial impact on the discretionary spending budgeted by citizens in America – the same amount of money is being spent, it is just being reallocated. I have no idea if that is true or not, but I do know that studies that have looked at the microeconomic dimension of that – that is, whether each download should be valued as a lost sale – have suggested largely that it does not. Felix Oberholzer-Gee and Koleman Strumpf have the [http://www.hss.caltech.edu/~mshum/ec106/strumpf.pdf most famous examination on point] (and their study has [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1014399 its critics]), but other studies done by [http://www.nytimes.com/2004/11/21/business/yourmoney/21view.html?_r=4&amp;amp; Wharton] and others have reinforced the general point. My point in including in today&#039;s reading was not to suggest that the RIAA is wrong and that Sanchez is right; it is rather to highlight the fact that we are trying to legislate in an area that is famous for a lot of hyperbolic talk and little empirical analysis. [[User:Asellars|asellars]] 12:16, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Andy - That&#039;s useful background. I do believe Joshywonder&#039;s point is an important one. Having lived in a country (briefly) in which powerful anti-U.S. forces are a component of the government, and frequently finding U.S. movies on the street with sophisticated packaging materials for @$1, it was hard not to come to the conclusion that a little bit of economic warfare was occurring. People used their (hard to get) European student and travel visas for copious copying of US programming and would distribute these free among friends (think in terms of hours or days of constant downloading and in terms of multiple seasons of multiple TV shows), and you could understand why they were willing to do this because US programming was expensive to get and came from outside this country, and also because US movies and TV shows purchased legally were insanely expensive. Most of us living there on US salaries and with housing and food subsidies were living quite well, but when I went to legally purchase a movie as a gift, I was astonished at the cost (close to $30 US dollars).&lt;br /&gt;
[[User:Raven|Raven]] 14:14, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
::And of course, you don&#039;t even have to go to overseas to see US movies on the street for $1. [http://piracy.americanassembly.org/the-report/ The Social Science Research Council] did a deep dig into it in 2011 and found that the rampant piracy in many countries is attributable to a few different factors, but principally what you flagged: a lack of antipiracy education and the overwhelmingly high cost of local legal alternatives. I would also be remiss not to mention that America&#039;s longstanding legacy in the international community was as pirates ourselves – we were very, very slow to recognize international copyright standards (over 100 years late in joining the Berne Convention), and used [https://en.wikipedia.org/wiki/Manufacturing_clause all sorts of legal tricks] to inject foreign works into the public domain here. As small anecdotal example, Charles Dickens [http://www.victorianweb.org/authors/dickens/pva/pva75.html very famously railed] against the lack of copyright protection of his works in the United States. [[User:Asellars|asellars]] 14:50, 5 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
The Ars Technica article was very intriguing and made me think of the landscape of Internet access with the high fixed costs of transitioning to a fiber optic network. I’m sure that laying cables, etc. was extremely costly (which we have reviewed in previous lectures). However it opened the doors to much greater advancements in technology. I believe that if subsidies were somehow provided to entice companies to build fiber optic networks then the internet may experience a harkening much to the likes of cable television. And with greater technological advancement will surely come greater legal points of contention. I wonder if the legal battle for transmitting copyrighted information will become more heated as technology continues to progress. [[User:AaronEttl|AaronEttl]] 11:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Grimmelman’s article on the madness of the Cablevision case really encapsulated the crux of the copyright debate for me. Grimmelman concludes: “Instead of asking which back-end technologies are legal, it might make more sense to ask what it is legal for users to do with computers on the front end.” An astute point that should be obvious (and I personally loved Grimmelman’s irreverent tone to reinforce this). The protection of  copyright is a dense, complicated problem in the digital era, but to make progress, we have to be able to agree on some sensible underlying assumptions. Namely, that “copying” and “performing” is different in the digital world than in the analog world. Consequently 1.) we can&#039;t directly apply old copyright regulations to new ones and 2.) we ought to apply copyright regulations as they relate to users’ uses rather than some obscure behind the scenes minutiae. &lt;br /&gt;
&lt;br /&gt;
Reading Grimmelman’s article, I was blown away by the technical intricacies of de-duplicaton, public performance, and what constitutes as a “copy.” Absent from the discussion surrounding Cablevision were issues of user practices, fair use, and rethinking the nature of a digital copy. As Lawrence Lessig points out, the technology with which we access our culture today has changed – copying is ubiquitous in our creative “remix” culture. And so while I think few people fall into the extremes of “abolish copyright altogether” or “preserve everything bout old copyright” it’s important to recognize, as Lessig says of Aaron Swartz’s work, when to recognize “dumb copyright.” I think by focusing too heavily on analog metaphors and technical loop-holes, we do little to combat dumb copyright. &lt;br /&gt;
&lt;br /&gt;
Film major side note, here are some brilliant video essays on the subject: &lt;br /&gt;
&lt;br /&gt;
Everything is a Remix: http://www.everythingisaremix.info/watch-the-series/&lt;br /&gt;
A Fair(y) Use Tale:  http://www.youtube.com/watch?v=CJn_jC4FNDo&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 22:18, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
The prosecution of You Tube videos when a &amp;quot;performance&amp;quot; is uploaded  of a toddler dancing to a pop music hit seems to me to be self-defeating and more in the sphere of 20th century thinking, such as when the music industry flailed about trying to stop digital downloads of their music. Times change, and the intellectual property laws that were lobbied for at one time and passed must be re-thought in the digital age. Needless to say, other countries around the world mercilessly copy and sell material such as DVD&#039;s of movies and music. This is nothing new, and it has not stopped. Clothing is copied in the same manner. Prosecuting citizens of your own country for enthusiatically promoting a brand for free on You Tube or anywhere else on social media or in person at a non-profit exhibition, or even for profit in a cover performance is to me the worse excess of over regulation. Performers can make money off of live performance instead of through digital sales. A copy of clothing is not the real thing, and those who can afford the real thing would never wear a copy, such as a Rolex on the corner. The customer base is grown through copies, not diminished. The global economy solves that problem. When corporations and laws focus on free trade in the global market and seek their profit points from live performance and pushing related items such as digital memberships for exclusive content, and interaction with the performers and creators of the art, intellectual property law will no longer be grasping at straws attempting to regulate across national lines into another country and have when that fails, go after their own fan base! Profit centers change, and in the digital age regulation and control have a place, but are not a replacement for the free market and competition that is able to flourish on world stage. &lt;br /&gt;
&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 13:15, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wikipedia&#039;s and the U.S. Copyright Office&#039;s explanation of copyright made the law seem straightforward and easy to understand. But once the readings and video started tackling the copyright issues in the internet realm, everything became rather confusing. This is partly my fault for not knowing a lot about copyright law, but from what I&#039;ve read, it seems like the courts (and legislatures?) are also still trying to figure how the copyright system should work in cyberspace.&lt;br /&gt;
&lt;br /&gt;
Is the problem because we&#039;re trying to apply a system of laws that was originally developed to regulate mostly ideas fixated on tangible objects (books, cds, records) on a virtual platform? The debate about what kind of &amp;quot;copies&amp;quot; are legal (see e.g. the Ars Technica reading on Video Copyright) result in strange rules/law, as Grimmelmann summarizes: &amp;quot;A million viewers and a million copies—OK. A million viewers but only one copy—not OK.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If the copyright law is interpreted broadly, I think a lot of normal online activity infringes the law. And yet it&#039;s so easy to click to a page, save a chunk of text, movie, and/or image one likes, then share it somewhere else, making more and more copies. Are these activities infringing copyright law? It&#039;s not fair use, it&#039;s more like sharing. In the physical world, I would share a book I like by actually lending it to a friend and not photocopying it because of the hassle; but when applied online, the matter is as simple as a right click of a file, then &amp;quot;copy&amp;quot; then &amp;quot;paste.&amp;quot; And the paste can result in tons of copies without much effort.&lt;br /&gt;
&lt;br /&gt;
Perhaps a new system should be created for the internet, instead of just applying the old principles of copyright. Creative Commons is a step in that direction, but the issues dealing with traditional intellectual property (such as music and books published by by brick-and-mortar businesses) going online still aren&#039;t solved.&lt;br /&gt;
&lt;br /&gt;
I think Lawrence Lessig made an important point reminding his audience that the purpose of copyright law isn&#039;t supposed to make money for the rights holder, although that&#039;s a nice reward, and there are business models built around that (e.g. the music and movie industry). Rather, the purpose of copyright is to provide the incentives to create an environment that fosters creativity and discussion. Any thinking on how copyright should apply to the internet should keep these goals in mind.&lt;br /&gt;
&lt;br /&gt;
--[[User:Muromi|Muromi]] 06:27, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
I found the video Creative Commons very inspiring. This video really harnessed my view on the globalization of technology. The view that sharing content can advance education, technology, medicine, just to name a few areas is not new. While most countries and companies hold their intellectual property close to their chest and will fight tooth and nail to take anyone down who infringes on it, we should evolve as a culture to allow for a shared space. This shared space could provide the insight to allow for advancement rather than stagnation. One little binary code, or biological sequence can inspire another individual to change the world. [[User:Interestingcomments|Interestingcomments]] 06:35, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
The readings this week are well balanced: past, present, and future.  The overview about Limitations on Exclusive Rights (17 USC § 107) and Exclusive Rights in Copyrighted Works (17 USC § 106) sets the stage for copyright regulations, dating back to the U.S. Constitution.  The examples in the other articles draw attention to present-day legal debates, such as Internet streaming (i.e., the son of cable).  And, the Creative Commons (CC) video/article, is a segue to the future of copyright regulation and knowledge transfer.  From my perspective, the future outlook is an interesting scenario to consider.&lt;br /&gt;
&lt;br /&gt;
During the first month of this course, we&#039;ve learned that the boundaries surrounding online regulation and sovereignty are complex.  Online copyright follows suite.  Literary, musical, dramatic arts, choreographic works, and motion pictures, among the other forms of communication (outlined in 17 USC § 106) are continuously shared, yet who becomes the ultimate online police?  Much like freedom of speech, it seems almost impossible to define the boundaries of copyright infringement in cyberspace.  When intellectual capital (IC) is shared without approval, where is the line drawn?  From the standpoint of last week’s “third-party provider articles,” the stakeholder web appears even more convoluted.  IC passes from hand to hand, server to server, website to website.  Who assumes accountability?&lt;br /&gt;
&lt;br /&gt;
CC is interesting because it opens the door for knowledge sharing, and anyone can participate.  It promotes “creativity, collaboration, and access.”  I personally like the mission stated in the video:  &#039;&#039;CC moves away from content control and thinks in terms of communications, bringing communities together through open-ended collaboration.&#039;&#039;  This concept is in-line with the “online freedom of speech argument,” promoting creativity as a means to become more united.  Creating and sharing within an online global community generates different outcomes versus building legal walls (i.e., copyright restrictions).  &lt;br /&gt;
&lt;br /&gt;
What do others think about the CC-form of communication and expression?  Can this collaborative concept dominate the web, or will restrictions trump open-ended communication?  Are there parallel online communities that mirror the Creative Commons’ concept? [[User:Zak Paster|Zak Paster]] 11:22, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
I really enjoyed reading material for today’s lecture, however the main question arises as to why can’t we apply the laws of intellectual property in a simple and coherent manner? In my view, the law of copyright seems to be falling apart, while restricting the information that can change the world and [could] alter the research and development of new and improved results of diverse frameworks. What about community? How can we share intellectual information if it’s so drastically protected? The article of Grimmelmann portrays an interesting view of copyright of video industry, which has its own architecture of copyright law (fees for Netflix and hulu as an example), however, how about those individuals/countries that cannot afford the copyright [fees] conditions? While watching the video about Creative Commons on A Shared Culture, I was definitely inspired about the comments that were made, which I completely agree with. I believe that laws do get in the way; furthermore, a shared community must exist (and it does at some extend) in order for diverse societies to be able to adapt by the laws, which must portray a source of freedom within creative and intellectual spectrums. &lt;br /&gt;
[[User:User777|user777]] 11:44, 5 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Wikipedia gave a brief and general description of the Copyright clause of the US Constitution, the history and origin of the copyright language and its effects. I&#039;ve come to expect a bit more out of the Wikipedia community and was a bit surprised that there wasn&#039;t more content on it, especially considering the controversial nature of copyright laws.&lt;br /&gt;
&lt;br /&gt;
The first six minutes of the Lessig speech and his first point - the elephant in the room - seemed to me to neglect the idea that while the Internet is a place where massive amount of information is available virtually, the same information is still available through more traditional means and in physical form. This point is important because much of the world has access to traditional (i.e. pre-online) access to information and do not need to violate copyright law in order to access it. The counterpoint to my point would obviously be that much of the world does not have access to traditional forms of information and the Internet is their best and only means to obtain such information. However, I think it remains important to point out that convenience should not be a justification, in and of itself, to tear down copyright laws.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Finally, I struggle to understand the perspective those who are hostile towards the very existence of any copyright law. Copyright law protects the motivation and incentive for profit-seeking institutions to create and help advance the world by offering more choices, whether the purposes of their products or services are educational, entertainment, scientific or other purposes. It is true that those with altruistic motivations (i.e. those who create for the purposes of the proverbial &amp;quot;greater good&amp;quot; of society or the world) can and have made major contributions, but to ignore the value in protecting intellectual property of profit-seekers and those who want to protect what they create for any other purposes, will remove the incentive for a massive portion of the creative world to continue to produce.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 11:54, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks, Ralph. If you&#039;re still hungry for more reading about the Copyright Clause and its history, I would strongly recommend Dotan Oliar&#039;s [https://cyber.law.harvard.edu/ip/oliar_ipclause.pdf The Origins and Meanings of the Intellectual Property Clause]. His is probably the leader in the space about what was going on in the Framers&#039; minds when the clause was drafted. And I wouldn&#039;t presume to speak for Lessig, but he has been rather insistent throughout all of his scholarship that he is not a copyright abolitionist. The question for him (and for me, and for many, many legal scholars out there) is not the whether, but the how – what is the appropriate calibration of rights and limitations that would afford authors sufficient (and appropriate) compensation for their works, while also allowing the general public sufficient freedom to expand and build upon existing works in order to further our scientific and artistic progress.[[User:Asellars|asellars]] 13:56, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
This week at the computer was pure ecstasy. I love the articles that we read for class and the informative nature of this material. The copyright problem as exasperated with the current issues is probably the most interesting thing ever. So, when I went to that site called Creative Commons, I felt like the world was lifted off by back. I sat in front of my computer and was elated. Then, I realized that the articles listed there were open copyright copyrights and basically send up the idea that the whole situation there is just about as fabulous as a Project Runway show where intelligent designers get their ideas stolen by people with more intellectual capital. So regardless as this is, the differing platforms and the differing modes of media interpretation, show how people online can steal eachother&#039;s ideas, even if not the spellcheck. So this weeks readings left me in a tizzy about lecture today and I know that regardless of this exoneration of say, multiple cycles of cyclical group therapy, aka communism, that the internet is certainly a place I will continue to play on for years to come. Thank you for you time. [[User:Johnathan Merkwan|Johnathan Merkwan]] 12:49, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
I thought this was a good basic overview of copyright law and the Creative Commons license. However I would have liked a bit more background (thanks for providing the link) on current copyright law, and a bit more critique on the Creative Commons licenses. I found a Wikipedia page, http://en.wikipedia.org/wiki/Creative_Commons, on the Creative Commons license that contained some links to critical voices. I also found a paper that went a bit into who is using the licenses and how they are using them herehttp://www.law.ed.ac.uk/ahrc/script-ed/vol4-1/coates.asp. The author of the article, Jessica Coates, was the Project Manager at the Creative Commons Clinic at Queensland University of Technology at the time the paper was written. The Creative Commons website contains a list of articles here:http://wiki.creativecommons.org/Scholarship_and_critique_regarding_Creative_Commons&lt;br /&gt;
&lt;br /&gt;
According to the Creative Commons website, this is the current breakdown of usage, charts are available on the site. See the site for how the data was gathered and the caveats on usage) http://wiki.creativecommons.org/License_statistics&lt;br /&gt;
&amp;quot;These charts show a breakdown of the types of licenses deployed and the properties of deployed licenses, based on Yahoo! queries as of 2006-06-13. (As above the Google API is now superior for an aggregate count, but Yahoo link: searches are superior for measuring the relative deployment of specific licenses and thus specific license types.)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
by: 96.6%&lt;br /&gt;
&lt;br /&gt;
nc: 67.5%&lt;br /&gt;
&lt;br /&gt;
nd: 24.3%&lt;br /&gt;
&lt;br /&gt;
sa: 45.4%&lt;br /&gt;
&lt;br /&gt;
Finally, knowing little more about current copyright law and use then can be found in this class and in the media, one of the critiques mentioned in the Wikipedia article on the Creative Commons had me wanting to know more:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Péter Benjamin Tóth asserts that Creative Commons&#039; objectives are already well served by the current copyright system, and that Creative Commons&#039; &amp;quot;some rights reserved&amp;quot; slogan, as opposed to the &amp;quot;all rights reserved&amp;quot; principle, creates a false dichotomy. &amp;quot;Copyright provides a list of exclusive rights to the rightholder, from which he decides which ones he wishes to &#039;sell&#039; or grant and which to retain. The &#039;some rights reserved&#039; concept is therefore not an alternative to, but rather the very nature of classical copyright.&amp;quot; The link for this quote is here:^ Tóth, Péter Benjamin (2009). Creative Humbug. Indicare Project http://www.indicare.org/tiki-read_article.php?articleId=118&lt;br /&gt;
&lt;br /&gt;
I suppose the response to this argument is that one would have to track the creator down and request permission for use, whereas the Creative Commons license allows this info to be embedded by machine language and carried across the web with the material, but without digging into the articles on the Creative Commons website and elsewhere on the web, I really don&#039;t know enough (and obviously, I&#039;d like to) to have an opinion on whether or not the Creative Commons licenses are truly a solution to the problem to which tonight&#039;s readings point.&lt;br /&gt;
&lt;br /&gt;
[[User:Raven|Raven]] 13:03, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for sharing that, Raven. We will (time permitting) be digging into the limitations of the Creative Commons solutions tonight, but I do appreciate you flagging them here as well. More criticism can be found [https://en.wikipedia.org/wiki/Creative_commons#Criticism here]. I&#039;d note that much of the modern criticism around Creative Commons (especially as version 4.0 of the licenses is soon to be deployed) is not based on the premise, but on the execution – wondering whether and to what extent the licenses may develop inconsistencies or may be incompatible with other open source licenses (such as the GNU FSF or MIT licenses). My response to Tóth would begin with what you flagged already – that it would be impossible to actually track down each specific user to secure the rights to do many things online. Tóth is correct that the rights granted under copyright (for the most part) are optionally enforceable, but there&#039;s a big difference in execution between deciding whether to exercise that option in the moment and communicating to the world that you can use this affirmatively. As to whether it &amp;quot;erodes&amp;quot; copyright, another popular criticism, perhaps most famously brought by ASCAP, I personally don&#039;t find much credence in it. Creative Commons very much depends on copyright in order to work, as enforcement for violation of a CC term (e.g., using CC-BY-NC works for commercial purposes, or CC-BY works without attribution) would be an action for copyright infringement. The [https://en.wikipedia.org/wiki/Jacobson_v._Katzer only major US case addressing open licenses] used this to find liability for violation of the GNU GPL. And by empowering authors to decide for themselves work-by-work the fundamental choice remains with the party who – as Tóth said – is empowered always under copyright law to make the choice. [[User:Asellars|asellars]] 13:47, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
As a nonphysical and interactive medium, the internet alters concepts of ownership, reproduction, and exchange. On the internet, people can can claim others&#039; media and ideas much more subtly than in the physical world. Technologies that aggregate massive amounts of content, such as Google and Wikipedia, strip owners of control over their work . As Lessig argues, the internet has changed the way we interact with out culture, and thus, necessitated revision of how culture creators establish ownership. While less prohibitive licenses such as the Creative Commons have developed, these new terms of ownership do not mitigate the disconnect between content creators and online users/viewers. Not just copyright law must change, but also internet users&#039; awareness of copyright law in of online work they hope to use. On the creators end, while uploading content, they should be able to designate copyright preferences. At the user endpoints, perhaps web browsers could have a feature that allows users to view the specified copyright of web content elements, similar to the web inspector tool. If there were more apparent ways for users and creators to interact with copyright, I wonder whether this would constrain accessibility to and sharing of information.  EDIT: Well, just learned in class that this search function with meta-tags does indeed exist! Cool. [[User:Jax|Jax]] 13:17, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Lessig&#039;s article is an illustration of the aggressive silliness of intellectual property laws in the age of arbitrary replication. The conference by the state of monopolies on the creations of its citizens imputes a kind of religious reverence for intellectual labor as such that is totally unwarranted, particularly in view of the particular technical characteristics of the Internet. UMG is no more responsible for the existence of its artists&#039; works than was James Joyce for the authorship of Ulysses; as cultural products, both represent the final outputs of endlessly old systems of replication, deletion, and signification between people and institutions. The notion that &amp;quot;creators&amp;quot; are imbued with particular rights and prerogatives on account of their proximity and behavioral involvement in cultural inventions promotes a peculiar brand of neurologically illiterate creationism.&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 17:25, 5 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lessig&#039;s article very much reminded me of a peice written by Adam Ludwin,  venture capitalist focused on early stage finacing. The article is entiled The Age of the Meme (http://finance.fortune.cnn.com/2011/12/09/the-age-of-the-meme/  )  In it he writes &amp;quot;We are an always-on culture now. Social networks have reached critical mass. Inexpensive tools for creating and remixing content have been widely adopted. Our collective consciousness has come online. The intelligence in the system is now coming from below, not above.  The sage on the stage is no more. And our collective mind is pumping out memes that are shaping every conceivable domain&amp;quot;  We&#039;re  creating culture from the bottom up not the top-down. The hive mind  cycles through and collects inofrmation and spits out new beats of culture faster than any design firm or ad agency ever could These peices which &amp;quot; go viral;&amp;quot; have a histroy un to their own. Cultural relevence  for fleeting and passing moments. Who do these artifacts eally belong to?  Is an image when captured by the hive mind still the property of its owner? How about a piece of music sampled in a youtube clip?  Do the owners of Grumpy Cat own the image of grumpy cat? At what point does surrendering something to the internet mean giving it up as  celebrities give up some of their writes as private individuals when entering the spotlight? The internet after all is a giant copying machine.   Lessig talks about unintended casualties. I hope our freedom to create, rehash, redesign, copy paste, delete, morph, mash isn&#039;t one of them. [[User:Alybarbour|Alybarbour]] 16:42, 5 March 2013 (EST)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Here is pic of the monkey that hi-jacked the camera!&lt;br /&gt;
http://2.bp.blogspot.com/-FahGRKZ6vL4/T51NeFxZPII/AAAAAAAATXk/quOXJ0_NtEQ/s1600/pic.jpg&lt;br /&gt;
&lt;br /&gt;
[[User:Phildade|Phildade]] 18:36, 5 March 2013 (EST)&lt;br /&gt;
****&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=9942</id>
		<title>Copyright Part 1: Guiding Principles and Online Application</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=9942"/>
		<updated>2013-03-05T18:17:08Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost. The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to recut, reframe, and recycle previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain.&lt;br /&gt;
&lt;br /&gt;
Over the next two classes, this course will take up the some of the issues related to copyright protection and enforcement online. Today’s class will focus on the legal regime of copyright: what it protects, what it doesn’t protect, and how the doctrine has transformed in light of digital reproduction and distribution.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[https://cyber.law.harvard.edu/is2013/File:2013-03-05-Copyright1.pdf Download slides for this week&#039;s class.]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The second half of assignment 2 (commenting on prospectuses) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Copyright_Clause Wikipedia, Copyright Clause]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Circular 1: Copyright Basics] (read only Who Can Claim Copyright?, What Works Are Protected?, What is Not Protected by Copyright?, How to Secure a Copyright, and How Long Copyright Protection Endures)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/text/17/107 17 U.S.C. § 107 - Limitations on Exclusive Rights: Fair Use]&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688 Lawrence Lessig, It is About Time: Getting Our Values around Copyright] (watch first 6 minutes)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2012/08/why-johnny-cant-stream-how-video-copyright-went-insane/ James Grimmelmann, Why Johnny Can’t Stream: How Video Copyright Went Insane]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyhype.com/2012/08/there-is-no-magic-bullet/ Terry Hart, There is No Magic Bullet]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bloomsburyacademic.com/view/Remix_9781849662505/chapter-ba-9781849662505-chapter-0001.xml Lawrence Lessig, &#039;&#039;Remix: Making Art and Culture Thrive in the Hybrid Economy&#039;&#039;] (Introduction only)&lt;br /&gt;
&lt;br /&gt;
* Creative Commons, [https://www.youtube.com/watch?v=1DKm96Ftfko A Shared Culture] (video, watch all) and [http://wiki.creativecommons.org/Spectrumofrights_Comic1 Spectrum of Rights]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www-personal.umich.edu/~jdlitman/papers/read.htm Jessica Litman, The Exclusive Right to Read] (introduction and Sections I and II only)&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2008/10/dodgy-digits-behind-the-war-on-piracy/ Julian Sanchez, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
The gloss we&#039;re doing in class on the duration of copyright terms is a bit simplified. For a more detailed chart discussing copyright duration, check out the chart developed by [http://copyright.cornell.edu/resources/publicdomain.cfm Cornell&#039;s Copyright Information Center].&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I was somewhat surprised by the tone of Julian Sanchez&#039;, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy. It reads as if it were written by some type of torrent-freak railing against legitimate business, and is about as informative. While his fundamental point that it is hard to quantify the harm copyright piracy does in terms of economic loss and jobs lost is reasonable, he does nothing to argue against the undeniable fact that the United States (and Canada) do lose jobs and money due to the piracy. Sanchez&#039; point &amp;quot;When someone torrents a $12 album that they would have otherwise purchased, the record industry loses $12, to be sure. But that doesn&#039;t mean that $12 has magically vanished from the economy. On the contrary: someone has gotten the value of the album and still has $12 to spend somewhere else&amp;quot; is just flat out wrong. It may be valid when an American steals from an American, or a Canadian steals from a Canadian, but it does not apply when a Canadian steals from an American, or more problematically, when China and the rest of the world steal from America. The US trade deficit with China is enormous. This is due in quite a significant part to the fact that we import and pay for enormous amounts of manufactured goods from China, while China imports, but does not pay for enormous amounts of IP from the US and Canada (think fake Apple phones, hacked MS office, every single hollywood movie and song, serious technical data and research). While Sanchez might not want to pay $100 for MS Word or $20 for a movie, he should think twice before accepting the argument that the 6.1 billion people in the rest of the world do not have to pay the US for IP. [[User:Joshywonder|Joshywonder]] 10:18, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for the very thoughtful comment, Josh. I&#039;m not sure if Sanchez meant to take on the second question as to how much damage is caused to the American economy by piracy. As to the &amp;quot;$12&amp;quot; discussion you mentioned, I agree that Sanchez is being a bit too fast and loose here, but I think what he is driving at is more macroscopic: that the presence of downloading for consumption of works doesn&#039;t have a substantial impact on the discretionary spending budgeted by citizens in America – the same amount of money is being spent, it is just being reallocated. I have no idea if that is true or not, but I do know that studies that have looked at the microeconomic dimension of that – that is, whether each download should be valued as a lost sale – have suggested largely that it does not. Felix Oberholzer-Gee and Koleman Strumpf have the [http://www.hss.caltech.edu/~mshum/ec106/strumpf.pdf most famous examination on point] (and their study has [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1014399 its critics]), but other studies done by [http://www.nytimes.com/2004/11/21/business/yourmoney/21view.html?_r=4&amp;amp; Wharton] and others have reinforced the general point. My point in including in today&#039;s reading was not to suggest that the RIAA is wrong and that Sanchez is right; it is rather to highlight the fact that we are trying to legislate in an area that is famous for a lot of hyperbolic talk and little empirical analysis. [[User:Asellars|asellars]] 12:16, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
The Ars Technica article was very intriguing and made me think of the landscape of Internet access with the high fixed costs of transitioning to a fiber optic network. I’m sure that laying cables, etc. was extremely costly (which we have reviewed in previous lectures). However it opened the doors to much greater advancements in technology. I believe that if subsidies were somehow provided to entice companies to build fiber optic networks then the internet may experience a harkening much to the likes of cable television. And with greater technological advancement will surely come greater legal points of contention. I wonder if the legal battle for transmitting copyrighted information will become more heated as technology continues to progress. [[User:AaronEttl|AaronEttl]] 11:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Grimmelman’s article on the madness of the Cablevision case really encapsulated the crux of the copyright debate for me. Grimmelman concludes: “Instead of asking which back-end technologies are legal, it might make more sense to ask what it is legal for users to do with computers on the front end.” An astute point that should be obvious (and I personally loved Grimmelman’s irreverent tone to reinforce this). The protection of  copyright is a dense, complicated problem in the digital era, but to make progress, we have to be able to agree on some sensible underlying assumptions. Namely, that “copying” and “performing” is different in the digital world than in the analog world. Consequently 1.) we can&#039;t directly apply old copyright regulations to new ones and 2.) we ought to apply copyright regulations as they relate to users’ uses rather than some obscure behind the scenes minutiae. &lt;br /&gt;
&lt;br /&gt;
Reading Grimmelman’s article, I was blown away by the technical intricacies of de-duplicaton, public performance, and what constitutes as a “copy.” Absent from the discussion surrounding Cablevision were issues of user practices, fair use, and rethinking the nature of a digital copy. As Lawrence Lessig points out, the technology with which we access our culture today has changed – copying is ubiquitous in our creative “remix” culture. And so while I think few people fall into the extremes of “abolish copyright altogether” or “preserve everything bout old copyright” it’s important to recognize, as Lessig says of Aaron Swartz’s work, when to recognize “dumb copyright.” I think by focusing too heavily on analog metaphors and technical loop-holes, we do little to combat dumb copyright. &lt;br /&gt;
&lt;br /&gt;
Film major side note, here are some brilliant video essays on the subject: &lt;br /&gt;
&lt;br /&gt;
Everything is a Remix: http://www.everythingisaremix.info/watch-the-series/&lt;br /&gt;
A Fair(y) Use Tale:  http://www.youtube.com/watch?v=CJn_jC4FNDo&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 22:18, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
The prosecution of You Tube videos when a &amp;quot;performance&amp;quot; is uploaded  of a toddler dancing to a pop music hit seems to me to be self-defeating and more in the sphere of 20th century thinking, such as when the music industry flailed about trying to stop digital downloads of their music. Times change, and the intellectual property laws that were lobbied for at one time and passed must be re-thought in the digital age. Needless to say, other countries around the world mercilessly copy and sell material such as DVD&#039;s of movies and music. This is nothing new, and it has not stopped. Clothing is copied in the same manner. Prosecuting citizens of your own country for enthusiatically promoting a brand for free on You Tube or anywhere else on social media or in person at a non-profit exhibition, or even for profit in a cover performance is to me the worse excess of over regulation. Performers can make money off of live performance instead of through digital sales. A copy of clothing is not the real thing, and those who can afford the real thing would never wear a copy, such as a Rolex on the corner. The customer base is grown through copies, not diminished. The global economy solves that problem. When corporations and laws focus on free trade in the global market and seek their profit points from live performance and pushing related items such as digital memberships for exclusive content, and interaction with the performers and creators of the art, intellectual property law will no longer be grasping at straws attempting to regulate across national lines into another country and have when that fails, go after their own fan base! Profit centers change, and in the digital age regulation and control have a place, but are not a replacement for the free market and competition that is able to flourish on world stage. &lt;br /&gt;
&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 13:15, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wikipedia&#039;s and the U.S. Copyright Office&#039;s explanation of copyright made the law seem straightforward and easy to understand. But once the readings and video started tackling the copyright issues in the internet realm, everything became rather confusing. This is partly my fault for not knowing a lot about copyright law, but from what I&#039;ve read, it seems like the courts (and legislatures?) are also still trying to figure how the copyright system should work in cyberspace.&lt;br /&gt;
&lt;br /&gt;
Is the problem because we&#039;re trying to apply a system of laws that was originally developed to regulate mostly ideas fixated on tangible objects (books, cds, records) on a virtual platform? The debate about what kind of &amp;quot;copies&amp;quot; are legal (see e.g. the Ars Technica reading on Video Copyright) result in strange rules/law, as Grimmelmann summarizes: &amp;quot;A million viewers and a million copies—OK. A million viewers but only one copy—not OK.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
If the copyright law is interpreted broadly, I think a lot of normal online activity infringes the law. And yet it&#039;s so easy to click to a page, save a chunk of text, movie, and/or image one likes, then share it somewhere else, making more and more copies. Are these activities infringing copyright law? It&#039;s not fair use, it&#039;s more like sharing. In the physical world, I would share a book I like by actually lending it to a friend and not photocopying it because of the hassle; but when applied online, the matter is as simple as a right click of a file, then &amp;quot;copy&amp;quot; then &amp;quot;paste.&amp;quot; And the paste can result in tons of copies without much effort.&lt;br /&gt;
&lt;br /&gt;
Perhaps a new system should be created for the internet, instead of just applying the old principles of copyright. Creative Commons is a step in that direction, but the issues dealing with traditional intellectual property (such as music and books published by by brick-and-mortar businesses) going online still aren&#039;t solved.&lt;br /&gt;
&lt;br /&gt;
I think Lawrence Lessig made an important point reminding his audience that the purpose of copyright law isn&#039;t supposed to make money for the rights holder, although that&#039;s a nice reward, and there are business models built around that (e.g. the music and movie industry). Rather, the purpose of copyright is to provide the incentives to create an environment that fosters creativity and discussion. Any thinking on how copyright should apply to the internet should keep these goals in mind.&lt;br /&gt;
&lt;br /&gt;
--[[User:Muromi|Muromi]] 06:27, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
I found the video Creative Commons very inspiring. This video really harnessed my view on the globalization of technology. The view that sharing content can advance education, technology, medicine, just to name a few areas is not new. While most countries and companies hold their intellectual property close to their chest and will fight tooth and nail to take anyone down who infringes on it, we should evolve as a culture to allow for a shared space. This shared space could provide the insight to allow for advancement rather than stagnation. One little binary code, or biological sequence can inspire another individual to change the world. [[User:Interestingcomments|Interestingcomments]] 06:35, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
The readings this week are well balanced: past, present, and future.  The overview about Limitations on Exclusive Rights (17 USC § 107) and Exclusive Rights in Copyrighted Works (17 USC § 106) sets the stage for copyright regulations, dating back to the U.S. Constitution.  The examples in the other articles draw attention to present-day legal debates, such as Internet streaming (i.e., the son of cable).  And, the Creative Commons (CC) video/article, is a segue to the future of copyright regulation and knowledge transfer.  From my perspective, the future outlook is an interesting scenario to consider.&lt;br /&gt;
&lt;br /&gt;
During the first month of this course, we&#039;ve learned that the boundaries surrounding online regulation and sovereignty are complex.  Online copyright follows suite.  Literary, musical, dramatic arts, choreographic works, and motion pictures, among the other forms of communication (outlined in 17 USC § 106) are continuously shared, yet who becomes the ultimate online police?  Much like freedom of speech, it seems almost impossible to define the boundaries of copyright infringement in cyberspace.  When intellectual capital (IC) is shared without approval, where is the line drawn?  From the standpoint of last week’s “third-party provider articles,” the stakeholder web appears even more convoluted.  IC passes from hand to hand, server to server, website to website.  Who assumes accountability?&lt;br /&gt;
&lt;br /&gt;
CC is interesting because it opens the door for knowledge sharing, and anyone can participate.  It promotes “creativity, collaboration, and access.”  I personally like the mission stated in the video:  &#039;&#039;CC moves away from content control and thinks in terms of communications, bringing communities together through open-ended collaboration.&#039;&#039;  This concept is in-line with the “online freedom of speech argument,” promoting creativity as a means to become more united.  Creating and sharing within an online global community generates different outcomes versus building legal walls (i.e., copyright restrictions).  &lt;br /&gt;
&lt;br /&gt;
What do others think about the CC-form of communication and expression?  Can this collaborative concept dominate the web, or will restrictions trump open-ended communication?  Are there parallel online communities that mirror the Creative Commons’ concept? [[User:Zak Paster|Zak Paster]] 11:22, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
I really enjoyed reading material for today’s lecture, however the main question arises as to why can’t we apply the laws of intellectual property in a simple and coherent manner? In my view, the law of copyright seems to be falling apart, while restricting the information that can change the world and [could] alter the research and development of new and improved results of diverse frameworks. What about community? How can we share intellectual information if it’s so drastically protected? The article of Grimmelmann portrays an interesting view of copyright of video industry, which has its own architecture of copyright law (fees for Netflix and hulu as an example), however, how about those individuals/countries that cannot afford the copyright [fees] conditions? While watching the video about Creative Commons on A Shared Culture, I was definitely inspired about the comments that were made, which I completely agree with. I believe that laws do get in the way; furthermore, a shared community must exist (and it does at some extend) in order for diverse societies to be able to adapt by the laws, which must portray a source of freedom within creative and intellectual spectrums. &lt;br /&gt;
[[User:User777|user777]] 11:44, 5 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Wikipedia gave a brief and general description of the Copyright clause of the US Constitution, the history and origin of the copyright language and its effects. I&#039;ve come to expect a bit more out of the Wikipedia community and was a bit surprised that there wasn&#039;t more content on it, especially considering the controversial nature of copyright laws.&lt;br /&gt;
&lt;br /&gt;
The first six minutes of the Lessig speech and his first point - the elephant in the room - seemed to me to neglect the idea that while the Internet is a place where massive amount of information is available virtually, the same information is still available through more traditional means and in physical form. This point is important because much of the world has access to traditional (i.e. pre-online) access to information and do not need to violate copyright law in order to access it. The counterpoint to my point would obviously be that much of the world does not have access to traditional forms of information and the Internet is their best and only means to obtain such information. However, I think it remains important to point out that convenience should not be a justification, in and of itself, to tear down copyright laws.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Finally, I struggle to understand the perspective those who are hostile towards the very existence of any copyright law. Copyright law protects the motivation and incentive for profit-seeking institutions to create and help advance the world by offering more choices, whether the purposes of their products or services are educational, entertainment, scientific or other purposes. It is true that those with altruistic motivations (i.e. those who create for the purposes of the proverbial &amp;quot;greater good&amp;quot; of society or the world) can and have made major contributions, but to ignore the value in protecting intellectual property of profit-seekers and those who want to protect what they create for any other purposes, will remove the incentive for a massive portion of the creative world to continue to produce.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 11:53, 5 March 2013 (EST)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
This week at the computer was pure ecstasy. I love the articles that we read for class and the informative nature of this material. The copyright problem as exasperated with the current issues is probably the most interesting thing ever. So, when I went to that site called Creative Commons, I felt like the world was lifted off by back. I sat in front of my computer and was elated. Then, I realized that the articles listed there were open copyright copyrights and basically send up the idea that the whole situation there is just about as fabulous as a Project Runway show where intelligent designers get their ideas stolen by people with more intellectual capital. So regardless as this is, the differing platforms and the differing modes of media interpretation, show how people online can steal eachother&#039;s ideas, even if not the spellcheck. So this weeks readings left me in a tizzy about lecture today and I know that regardless of this exoneration of say, multiple cycles of cyclical group therapy, aka communism, that the internet is certainly a place I will continue to play on for years to come. Thank you for you time. [[User:Johnathan Merkwan|Johnathan Merkwan]] 12:49, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
I thought this was a good basic overview of copyright law and the Creative Commons license. However I would have liked a bit more background (thanks for providing the link) on current copyright law, and a bit more critique on the Creative Commons licenses. I found a Wikipedia page, http://en.wikipedia.org/wiki/Creative_Commons, on the Creative Commons license that contained some links to critical voices. I also found a paper that went a bit into who is using the licenses and how they are using them herehttp://www.law.ed.ac.uk/ahrc/script-ed/vol4-1/coates.asp. The author of the article, Jessica Coates, was the Project Manager at the Creative Commons Clinic at Queensland University of Technology at the time the paper was written. The Creative Commons website contains a list of articles here:http://wiki.creativecommons.org/Scholarship_and_critique_regarding_Creative_Commons&lt;br /&gt;
&lt;br /&gt;
According to the Creative Commons website, this is the current breakdown of usage, charts are available on the site. See the site for how the data was gathered and the caveats on usage) http://wiki.creativecommons.org/License_statistics&lt;br /&gt;
&amp;quot;These charts show a breakdown of the types of licenses deployed and the properties of deployed licenses, based on Yahoo! queries as of 2006-06-13. (As above the Google API is now superior for an aggregate count, but Yahoo link: searches are superior for measuring the relative deployment of specific licenses and thus specific license types.)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
by: 96.6%&lt;br /&gt;
&lt;br /&gt;
nc: 67.5%&lt;br /&gt;
&lt;br /&gt;
nd: 24.3%&lt;br /&gt;
&lt;br /&gt;
sa: 45.4%&lt;br /&gt;
&lt;br /&gt;
Finally, knowing little more about current copyright law and use then can be found in this class and in the media, one of the critiques mentioned in the Wikipedia article on the Creative Commons had me wanting to know more:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Péter Benjamin Tóth asserts that Creative Commons&#039; objectives are already well served by the current copyright system, and that Creative Commons&#039; &amp;quot;some rights reserved&amp;quot; slogan, as opposed to the &amp;quot;all rights reserved&amp;quot; principle, creates a false dichotomy. &amp;quot;Copyright provides a list of exclusive rights to the rightholder, from which he decides which ones he wishes to &#039;sell&#039; or grant and which to retain. The &#039;some rights reserved&#039; concept is therefore not an alternative to, but rather the very nature of classical copyright.&amp;quot; The link for this quote is here:^ Tóth, Péter Benjamin (2009). Creative Humbug. Indicare Project http://www.indicare.org/tiki-read_article.php?articleId=118&lt;br /&gt;
&lt;br /&gt;
I suppose the response to this argument is that one would have to track the creator down and request permission for use, whereas the Creative Commons license allows this info to be embedded by machine language and carried across the web with the material, but without digging into the articles on the Creative Commons website and elsewhere on the web, I really don&#039;t know enough (and obviously, I&#039;d like to) to have an opinion on whether or not the Creative Commons licenses are truly a solution to the problem to which tonight&#039;s readings point.&lt;br /&gt;
&lt;br /&gt;
[[User:Raven|Raven]] 13:03, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As a nonphysical and interactive medium, the internet alters concepts of ownership, reproduction, and exchange. On the internet, people can can claim others&#039; media and ideas much more subtly than in the physical world. Technologies that aggregate massive amounts of content, such as Google and Wikipedia, strip owners of control over their work . As Lessig argues, the internet has changed the way we interact with out culture, and thus, necessitated revision of how culture creators establish ownership. While less prohibitive licenses such as the Creative Commons have developed, these new terms of ownership do not mitigate the disconnect between content creators and online users/viewers. Not just copyright law must change, but also internet users&#039; awareness of copyright law in of online work they hope to use. On the creators end, while uploading content, they should be able to designate copyright preferences. At the user endpoints, perhaps web browsers could have a feature that allows users to view the specified copyright of web content elements, similar to the web inspector tool. If there were more apparent ways for users and creators to interact with copyright, I wonder whether this would constrain accessibility to and sharing of information.  [[User:Jax|Jax]] 13:17, 5 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9913</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9913"/>
		<updated>2013-03-05T15:27:47Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: interestingcomments&lt;br /&gt;
*Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
*Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi ASmith. i think that your work it´s a perfect oportunity in order to expose a new theory, or an alternative of the concept of Intellectual Property in the network. because if the community make their own rules, maybe, can construct new limits, exceptions etc, in this area. Natalia ´´´´&lt;br /&gt;
*&lt;br /&gt;
:Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User: Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Asmith – Your proposal is clear and the questions you&#039;ve set forth are important.  In reference to your final paragraph, it may also be interesting to evaluate pros and cons surrounding centralized content control versus the lack thereof.  For example, from one perspective, a collaborative online community is important because everyone is considered equal (there is a flat/circular management structure).  From another perspective, however, when a primary leader (site administrative team) who controls online content is absent, decision-making processes change, i.e., when controversies or disputes arise, who addresses them?  Comparing Diaspora with other collaborative communities, such as Wikipedia, is an interesting approach to analyze the pros and cons of online community management.  As a conclusion, based on your findings, you may be able to set forth some important content management recommendations that highlight best practices for the Diaspora user-base. [[User:Zak Paster|Zak Paster]] 11:44, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hello Asmith: This is a very interesting topic, I am intrigued to see what model you use to best compare the benefits and the limitations of introducing this new type of platform.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
ASmith:&lt;br /&gt;
&lt;br /&gt;
It will be interesting to note if there are any major points of contention that arise with regards to where the community wants to take Diaspora which causes a significant number of its members to break off and take a separate version in a different direction. I&#039;m not sure if the way its copyrighted will allow this but they could always start from scratch. Linux, for example, allows for the source code to be  modified and distributed for commercial or non-commercial purposes by anyone and this aspect of it has resulted in several very powerful flavors emerging (Red Hat, Ubuntu, Debian, SUSE, CentOS, etc...)&lt;br /&gt;
&lt;br /&gt;
I think it will also be interesting to compare the values of the community as it exists today compared to the values to the community as it grows and changes. For example, I&#039;d guess that the community that is taking interest in Diaspora today is largely between the ages of approximately mid teens and late 20&#039;s/early 30&#039;s. I&#039;d also venture a guess that they are fairly tech saavy. If the community continues to grow and appeal to the general population and in three to five years from now enjoys more mainstream popularity, it&#039;s probably safe to say that different decisions about what direction to take the project will emerge. &lt;br /&gt;
&lt;br /&gt;
In any case, this is a great topic choice. I&#039;m sure it will be interesting to observe and write about.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 08:32, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Rich Cacioppo&lt;br /&gt;
*Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:HI RICH: Is an interesting topic, i think that you can make an introduction, about what is the meaning of &amp;quot;free speech&amp;quot;, because, at the end, this is a relative concept, that depends, precisely, of the cultural context.  Natalia. &#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Hello Rich: I think as Natalia suggested defining your definition of free speech is critical to gain a greater understanding of the argument you will make within the parameters of the paper. Within different cultures this can be defined in many different ways and once you establish this it will be an easier journey to state and prove your case.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: AaronEttl&lt;br /&gt;
*Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Aaron,&amp;lt;br /&amp;gt;&lt;br /&gt;
:I think focusing on the consequence these search engines have on the users, rather than the websites in the search results, is unique and will be really fascinating to look at. Although you did narrow down the specific community you would look at -- the SEO community -- I think you will need to narrow it down further, perhaps to a specific website or set of websites serving a larger online community.&amp;lt;br /&amp;gt;&lt;br /&gt;
:One thing you didn&#039;t mention in your prospectus was how you would go about researching the SEO community. I think finding a specific community would be beneficial here as well -- it would give you a better idea as to what specific research methods you could employ. Once you have a more specific community I think everything else will fall into place.&amp;lt;br /&amp;gt;&lt;br /&gt;
:[[User:BeccaLuberoff|BeccaLuberoff]] 17:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aaron: I think you pose many questions in your prospectus that would each individually be enough for a ten page paper.  To narrow your feild of research i think it might be interesting to observe and stdy what goes into a successful kickstarter fund and derive from that observation conclusions about what the operations guide of kickstarter influences the kinds of funs that do well. &amp;quot;For Kickstarter, how does the level of regulation affect the integrity of those projects and is there any bias in the type of projects seen? &amp;quot; I think if you flip this around and look at the question from the bottom-up rather than the top-down you may have a more successful research question.  All my best. [[User:Alybarbour|Alybarbour]] 04:36, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication” &amp;lt;br /&amp;gt;&lt;br /&gt;
:An In-depth analysis of government’s role in the Global Collaborative Data Network. &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/? title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
*&lt;br /&gt;
:Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hunter, your idea is magnificent. I enjoy your paradox. The thing I notice best about your proposal is that you are using your own ideas, when you could always plagiarize unintentionally. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Hunter, &lt;br /&gt;
:The idea of &amp;quot;digging&amp;quot; in to find out the real and factual government approach on this matter is great. I think you have alot of great material to work with and you are moving in the right direction. I would just advise you to order your ideas in a clearer way so that your reader doesn&#039;t get lost. Great idea! [[User:GregB23|GregB23]] 15:29, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Hunter, i think that this theme is a little too wide, so, in order to be more specific, you can take one of the liberties than can be affect by governments control, and analyze that.  Natalia. ´´´´&lt;br /&gt;
&lt;br /&gt;
Hello Hunter: The broad scope of you paper may make it difficult to cover all the avenues in 8-10 pages. I think you should consider making this a thesis topic. There is a lot of areas and directions you can really go which would make it very thorough. It sounds very interesting and I am looking forward to seeing your paper progress. Good Luck.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Dear Alice&lt;br /&gt;
*Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Alice: I think this is a great starting point for a research paper, and I love the idea of looking at Starbucks, since it is such a huge corporation. However, I think your hypotheses are too easily proved. I think you could go much further with your topic if you think about questions after answering your initial questions...for instance, say posts/comments are regulated differently. Some questions to consider could be, shy would Starbucks spend more/less time managing comments on one site than another? Is there a pattern to how Starbucks regulates comments/posts on their different social media websites? What are the consequences of managing comments differently between websites? Does the user body have anything to do with how Starbucks regulates comments?…etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:36, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Michael Keane  &lt;br /&gt;
*&amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; &amp;lt;br /&amp;gt;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Michael,&lt;br /&gt;
:I believe that your idea for this assignment fulfills the essence of it. I think you should define for this prospectus what type of content control you will focus your analysis on. You might also include what reactions the members have to the various forms of censorship.[[User:GregB23|GregB23]] 15:34, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:You’ve chosen a very interesting topic that most of us have probably considered at some point. It’s often difficult to know where to draw the line when making policy decisions of this sort – to create a system that handles edge cases judiciously – and some people clearly aren’t even trying to create a fair system. I wonder what you can generalize from a case study like this. In short, how much variance do you think there is in the forms that censorship takes in web communities? It seems that there are powerful conventions and practical limitations with regards to how content control is done, such that many of the same features keep reappearing again and again.&lt;br /&gt;
&lt;br /&gt;
:At the end of your final paragraph, you say that removing entire discussions is a highly effective approach to content control. Would you mind elaborating on this? What standard of effectiveness are you using? Is something that merely keeps the community silent effective, or something that keeps it happy? What makes banning members sometimes less effective in comparison?&lt;br /&gt;
:[[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Natalia&lt;br /&gt;
*Prospectus title: “INTELLECTUAL PROPERTY RIGHTS, RIGHTS TO INFORMATION AND FREEDOM OF SPEECH ON INTERNET: CONFLICTING RIGHTS?”&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2013/File:Natalia_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris comments: Natalia, Your topic is very interesting, like mine (please comment!) quite broad and could as a suggestion focus completely on one case study that you think most illustrates and answers your hypothesis. I saw that you gave three, just curious as to is there one that is the overarching example for national and internatinal jurisprudence, or does this fall more into the realm of international governing bodies... or decided by national standards? Ultimately are you asking, is freedom of speech or protection of ideas more important on the internet? I like how you tie in that curbing freedom of expression starts to curb human rights, but that some regulation is necessary in civilization. A suggestion is to offer a framework that can be used interactively, involving a way for future bodies looking at legislation on intellectual property and freedom of speech and benchmarks for them to judge whether a law or regulation is infringes on human rights, or is necessary for to preserve civilization. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 20:33, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Kaley Sweeney comments: Hi Natalia, I agree with Daniel that your paper can use more focus. The topic of intellectual property is exceptionally broad and can encompass an enormous number of cases, law, international interpretation, etc. It might be helpful to narrow down on one or two case studies that particularly peak your interest that you feel make a major statement for the future of IP and confirm your hypotheses. Perhaps you can also focus on one of your three questions, as there are many discussion points buried within each, within the context of one particular country. Intellectual property is interesting to explore, particularly as the changing nature of social sharing is entirely shifting the concept. If you can hone in on one refined idea, I think you can find yourself developing some fascinating ideas and predictions.  &lt;br /&gt;
:Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Rebekahjudson&lt;br /&gt;
*Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rabekah- Your proposal sounds like an interesting subject. Is this group something that you have taken part in, or is your statement “Critique from Within” to be interpreted that Weird Twitter is critiquing Twitter or the Twitter community from within? It looks like you have a good outline and a method that will lead you to interesting material. I am wondering how this relates to censorship or control. Does the tweeting of Weird Twitter have any sort of influence on the broader Twitter community? Do members of a group in Twitter influence one another in a way that has some sort of an influence on the group as a whole?[[User:Tessa May|Tessa May]] 20:07, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekah, this is an interesting online community - one I hadn&#039;t previously been familiar with, but fascinating to learn about. My main thought while reading this is the longevity of this community. Google Analytics has shown the search rate for &amp;quot;Weird Twitter&amp;quot; drop dramatically in the past month. I wonder if the loose group of individuals may be fluid in their terminology, and therefore be a bit difficult to track down. On that note, well done selecting several twitter users from the start to monitor. I imagine if they are consistent in their &amp;quot;Weird Twitter&amp;quot; tweets, you will also find yourself becoming familiar with the online community that extends beyond these users. My second thought would be the impact this community - fluid as it may be - has on the wider twitter community. If they are not operating under a single hashtag, how do new users find them?  How do they distinguish themselves?&lt;br /&gt;
:Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekah, I love this topic! I&#039;ve been a fan of horse_ebooks and Riff Raff, but was unaware of any umbrella term under which they belonged. &lt;br /&gt;
:Though both personalities tweet in this poetical anarchist fashion, disregarding traditional language conventions,  I would never associate them together because of their vastly motivations. Riff Raff wants fame and fortune. Horse_ebooks wants to be invisible. However, according to the Chicago Reader&#039;s Weird Twitter map, Riff Raff and Horse_ebooks hold similarly prominent positons in spite of their real life differences. The concept of &amp;quot;Weird Twitter&amp;quot; is completely reader-defined, and I think requires exploration of the population who appreciates these aliases and associates them with one another, perhaps in contrast to Weird Twitter author&#039;s real motivations. One last thing is to explore is how Twitter&#039;s architecture (i.e. the 150 character confines) have altered how we think to use language  and enable/prevent &amp;quot;weird Twitter.&amp;quot; Here are some relevant articles about Horse_ebooks and Riff Raff: http://gawker.com/5887697/    http://gawker.com/5912835/riff-raffs-got-a-record-deal-making-sense-of-the-most-viral-human-being-in-music  &lt;br /&gt;
:[[User:Jax|Jax]] 21:07, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Joshywonder&lt;br /&gt;
*Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: I think you have a fabulous idea and have sources that have interested you on this topic. I wonder if you are interested in discussing the difference between Canadian English versus either the United States English or &amp;quot;Official English&amp;quot; as it may be. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:13, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: This is a very interesting case that you site. Was there a public response to this incident? Did the individual who brought the suit suffer in reputation either from the content of the site or from the attention given to the lawsuit? Is the site something that you personally took part in? Do you think that anonymous posters or posters using pseudonyms make a valuable contribution to discussion in public internet forums? It looks like you have developed your method and you have plenty of interesting information to choose from. I think that an important factor in your write-up will be to narrow your presentation to the details you think will best inform your audience of the issues at stake and best illuminate the specific case as a study subject. [[User:Tessa May|Tessa May]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Matthew D. Haney&lt;br /&gt;
*&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
*&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Matthew, your writing is very scientific; and I applaud you for this. The reader can be left skeptical and that is a matter of definition. Keep up the good work. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Matthew: Wonderful topic, I think you’ll have a lot of fun with this research topic. Although you have wonderful sources, I was wondering to know how you will gather the data, and do you think that Yelp will be able to provide you with clarification of removed posts? Censorship plays an important role within this topic; will you use any interesting cases to defend your paper? [[User:User777|user777]] 18:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Milenagrado&lt;br /&gt;
*&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Milena, what an interesting topic. Duolingo reminds me of a wikipedia of sorts in the ways it relates to copyrighted information. As crowdsourced information has grown in the past few years, I imagine you may also find similar information on how copyright is addressed in recent case studies. Another question to ask would be how users can ensure the translation is accurate? If you delve into the terms &amp;amp; conditions, you may also wish to see how Duolingo holds users accountable and verify the information is indeed an accurate representation of the initial intent. There are many concepts to delve into here, but I think you have done a very nice job of boiling it down to the main concerns the site may encounter moving forward.Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Milena Grado, I found your paper proposal quite interesting. I haven’t heard about Duolingo, however I have few questions: What about the translation [if] being out of context? What about sentence structure? Culture/ How precise is the translation? If so, what kind of copy rights will this serve gather, in order to protect the translation services? I noted that you will be gathering information through “Twitter, Facebook and Duolingo&#039;s blog- very interesting! Do you have specific way of analyzing this data? Use/volume based? Good luck with the paper, I think it’s quite an interesting topic to write a paper on. &lt;br /&gt;
:[[User:User777|user777]] 17:42, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Tessa,&amp;lt;br/&amp;gt;&lt;br /&gt;
:This looks really, really fascinating! I&#039;m curious - are you considering comparing multiple groups in differing categories? I ask because it may be interesting to see if two groups in similar categories have similar patterns in deleting posts. &amp;lt;br /&amp;gt;&lt;br /&gt;
:Another thing that came to mind: it may be interesting to look at the profiles of the group members to see if there is any pattern between those whose posts are deleted, those who tend to align with group moderators, etc….since LinkedIn profiles generally provide members&#039; current, and often prior, employment and education, you may be able to identify a pattern based on members&#039; socioeconomic status.&amp;lt;br /&amp;gt;&lt;br /&gt;
:[[User:BeccaLuberoff|BeccaLuberoff]] 18:15, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Tessa,&lt;br /&gt;
:This looks very interesting and you seem to have your ideas extremely clear. I love the idea of having a survey sent to group owners at the end of your investigation period. I would also suggest, if I may, to contact Linkedin directly and see if they have a comment in regard. [[User:GregB23|GregB23]] 15:22, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Tessa: I think you’ve picked out a great topic for your research paper. I am an active user of Linkedin, and participate in quite a few groups, and you are correct, that posts are being deleted without notice, which sometimes makes it hard to fallow the group/topic itself. I see that you have a perfect strategy for your paper, which I think will definitely help you generate a great paper. How many groups will you audit? How often will you review a group? Good luck on your paper, and I look forward to read your final work (if class permits). &lt;br /&gt;
:[[User:User777|user777]] 18:21, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris comments: Tessa, exploring the idea of censorship on LinkedIn groups sounds good. My suggestion is perhaps attempting to see why some might censor or remove content, for example, if the poster is attempting to get them to go to another group on the same topic. Perhaps content subtractions occur when the owner(s) of the group want simply to exert more control over the group as opposed to encouraging as many comments as possible. Other times, comments might be deleted due to not fitting into the general standards of professionalism that is expected on LinkedIn. Mabye you can come up with your own categories for deleted comments to expand on this, and determine if the deletions are leaning more toward censorship or content control. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 19:52, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Greetings Daniel: Moderation or Censorship in Linkden Groups really caught my, in regards to the fact that this is a very provocative title. In your prospectus it is interesting to note how you plan on gathering data with regards to specific groups within the site. Being that LinkedIn has captured the social media market for the professional, how will you be able to identify would would need to be cencsorn in a group that is by membership only? Secondly I am very much looking forward to see how Moderation is pulled in to groups. I like the idea of individuals within groups being limited in comments and mailing so that a, &amp;quot;only bully&amp;quot; in a specific network will not hog all of the conversation and in turn add to a more healthy convention of conversation- Hunter [[User:HunterGaylor|HunterGaylor]] 15:57, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
Tessa May: &lt;br /&gt;
&lt;br /&gt;
I suspect LinkedIn will be a good platform from which to derive your observations as it is obviously intended to be for professional/career/business purposes and therefore just about everyone with an account will ultimately be driven by the motivation to enhance their career goals. While I haven&#039;t observed too much conflict on LinkedIn (as opposed to say, Facebook, for example where disagreements can be sharp and common) I suppose egos can quickly flare up and agendas can easily clash as individuals attempt to push their company, career and professional point of view on to others. &lt;br /&gt;
&lt;br /&gt;
I noticed that you are using the deletion of a post as the metric for censorship. You may also want to consider a slightly less rigid although probably no less effective metric for censorship - bullying and pig-piling. I&#039;ve noticed, based on my personal use of social networks, that there is a tendency for a community to post overly large quantities of aggressive and oppositional rhetoric in response to something they disagree with, even if similar (and seemingly redundant in message) responses have already been posted. In other words, there is more than one way to censor and you may want to consider people applying the herd mentality to discussions when adding little to no additional minimal value as another form of censorship to your list of observable behavior. Granted it may be difficult to define and therefore measure this behavior, but it may prove valuable just the same.&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 09:09, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Alicia Phan | APhan&lt;br /&gt;
*&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris User Comments: Alicia, Your examination of privacy rights on social networking sites such as Facebook is fascinating. I would ask, &#039;Are our intellectual property rights waived automatically when we use a limited privacy social network site?&#039; The topic seems really hot right now, and going into the various privacy settings on Facebook and arguments pro and con in light of legal decisions in the United States and other nations, even international bodies, will be enlightening to fellow Facebook fans. A suggestion could be analysis of each privacy setting, with pro and con arguments for personal privacy being intellectual property that must be waived to share with others. Pretty sure that is what already happens, but really without the examination my comments are just speculation. I await your comments on my proposal as well. Thanks!&lt;br /&gt;
:[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 22:07, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 _USER777 . &lt;br /&gt;
*Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Muromi&lt;br /&gt;
*Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my Chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
:[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak: Great Topic. The notion that online fundraising has been getting in recent months is overwhelming. The effective fundraising idea comes with the clear revelation that the internet is very powerful tool. With tools like Kick starter, and rocket hub are able to cast a wider net that will allow more individuals to participate in supporting a cause. However, with regards to control one must ask themselves with a wider net and more individuals having the ability to contribute, how will one be able to control how that money is being accounted for and that it is coming from individuals that are proper for that organization. This is a new eara of Fundraising, both in the public and private sector. On must not loose focus on how effective is new era will be providing an easier access to funds. I am very much looking forward to your final project. Best of Luck and great Topic choice! I am very encouraged that someone is shedding light on potential positive effect this can have for the NGO world. Hunter [[User:HunterGaylor|HunterGaylor]] 16:06, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
Zak:&lt;br /&gt;
&lt;br /&gt;
You have a strong, well thought-out structure to your research. I don&#039;t know if it will help, but the US government hosts the Combined Federal Campaign (http://www.opm.gov/combined-federal-campaign/) which tracks and publishes the efficiency of the charities it sponsors. Another suggestion: You may want to consider looking at http://www.kickstarter.com/ as another possible target of evaluation. Among many other things, they helped launch Diaspora, a social networking alternative to Facebook and MySpace, which is still going strong. &lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 10:26, 5 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*RobMcLain&lt;br /&gt;
*Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
*&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
RobMcLain: Fantastic topic. I&#039;ve personally experienced some of yelp&#039;s connivery. When I was running a popular downtown restaurant in Texas we held the top Yelp ranking until we decided not to pay for advertising on Yelp. After that decision  our 5-star ratings began to disappear into thin air.  I am curious how you plan to track and observe so many actions on such a large site where moderation isn&#039;t necessarily noted. I&#039;d be very interested to see how you narrow your research. All my best. [[User:Alybarbour|Alybarbour]] 03:58, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Caroline&lt;br /&gt;
*The Right to be Forgotten &lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*Caroline: I love your ideas but you have so many i don&#039;t know where your focus is. I think your primary topic, &amp;quot;research how this regulation [ the right to forget] and potential similar regulations in North America would impact the Internet.  &amp;quot;  will be difficult to approach as that&#039;s all theoretical. What would be something you could actively observe? Perhaps looking at a community and following the recency of topics posted? Cheers. [[User:Alybarbour|Alybarbour]] 04:46, 5 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alan Ginsberg: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Johnathan Merkwan: Johnathan, it seems like you have a lot of ideas and are attempting to address several broad areas, including international, sociological, and architectural perspectives through field world. Reading this prospectus, I was confused at a few points, such as &amp;quot;According to each face as an old friend, I have been studying the relativity of facial recognition.. &amp;quot; This sounds interesting, but I&#039;m not entirely certain what it means. Does this mean you are comparing the new friends you are adding to the old friends you deleted? You say, &amp;quot;Now  Facebook has deemed my friendships “real,”&amp;quot; but do not specify how Facebook has promoted this realness. I think something valuable in your prospectus so far is your investigation of  &amp;quot;the spellcheck, autocorrect, and various prompted questions Facebook has alerted me to, and in doing so shall see how each action makes a difference, contextually.&amp;quot; I think you should continue with this line of questioning, investing how facebook&#039;s suggestions influence our behavior on the site. Here is a tool to analyze your personal facebook behavior: http://www.wolframalpha.com/facebook/ and another useful facebook statistic link http://blog.hubspot.com/blog/tabid/6307/bid/6128/The-Ultimate-List-100-Facebook-Statistics-Infographics.aspx .&lt;br /&gt;
:[[User:Jax|Jax]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you, Jax, for your comment. I will try to elucidate some of these issues that are inherent in my document. I admit it may be difficult for people to accurately spell my name. That addressed, how about a brief understanding of my perspective. With the War on Terror as it were, why is it necessary to altercate between various nations of power the mere definition of a word? Susan Goldstein, or Einstein, are not tangentially related; wherefore, the understanding of this situation is supposed to be confusing. I do dearly appreciate your response, yet it was and is not directed at me; much less johnathan Merkwan, or alan Ginsberg. If this has made things worse, I can only say things in person, not via computer. Thus, your links are a fabulous addition to my ideas, as intentionally, crude and misleading as they might be... (I call this, &amp;quot;intrigue&amp;quot;. So, as this idea develops, I will keep you updated with pop culture as I see it, in the light of the Lacanian disposition this proposal defined cohesively, yet, clearly has accepted your suggestions sic collaboration.[[User:Johnathan Merkwan|Johnathan Merkwan]] 22:24, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
::: I am very confused! Did I edit the wrong prospectus? [[User:Jax|Jax]] 10:22, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Free speech, &lt;br /&gt;
*Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx &lt;br /&gt;
([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
*&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. :[[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
::* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hey Phillip, I am very excited to see the direction that you take regarding the DLPA, specifically in regards to the potential subtractiveness of the organization. It is always interesting&lt;br /&gt;
to see the how the members of the community will add to the over all effectiveness of engagement with regards to organization. Because DLPA is stated that, “The hope is that broad access to scientific results will encourage faster progress on research and will let anyone apply the knowledge for technological advances. The ability to shed light on the effectiveness will be exciting to see. &amp;quot;-HunterGaylor&amp;quot; [[User:HunterGaylor|HunterGaylor]] 15:50, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:I thought the title was a bit odd. Since so few people are familiar with the DPLA, wouldn’t it be better to give more context? “Additive” and “subtractive” can be a little confusing when one doesn’t know what the noun means, since those words are used regularly in very different ways. I would suggest something along the lines of “Evaluating the Effectiveness of the DPLA.”&lt;br /&gt;
&lt;br /&gt;
:The argument about it contributing to social stratification was quite familiar for me; it seems to be used against many new technologies and developments.&lt;br /&gt;
&lt;br /&gt;
:Good luck with your project. It sounds quite interesting. I think it’s a good idea to implement it as a video, in terms of accessibility. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Goldstein&lt;br /&gt;
*Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
::JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
*&lt;br /&gt;
:Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
::Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan [[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Kaley Sweeney&lt;br /&gt;
*Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Kaley: I like your topic because it sheds light on democratic freedoms.  Will the expansion of Internet usage in North Korea bring new forms of democracy to a select group of citizens?  Will outside influences, that emerge via the Internet, begin to alter government relations?  At the end of your prospectus, you mention that you...&#039;&#039;”wish to examine the forces that have perpetuated the insulation of the country from the technological revolution and the changes that are beginning to unfold with the rise in mobile internet access in the country.”&#039;&#039;  To narrow your focus, you may want to consider highlighting a few primary forces, i.e., norms, market, etc., with descriptions surrounding each force.  To answer the latter part (changes that are beginning to unfold in North Korea), what types of changes are you referring to?  Do you plan to analyze technological changes, societal changes, or both?  To this end, defining a few categories may bring additional structure/clarity to your analysis. [[User:Zak Paster|Zak Paster]] 11:37, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
: Hi Kaley, you have a very interesting topic here. But for such a topic, are there enough data and info that&#039;s accessible? Because Kim JungUn&#039;s policy shifts are so recent, it might be too soon and more difficult to observe and analyze any social and cultural changes within North Korea as a result of mobile internet access. Are there any websites and/or organizations that track internet usage in North Korea? Their reports may be helpful resources.  --[[User:Muromi|Muromi]] 10:16, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Raven,  It will be interesting to see which site (anonymous vs. registered users) create more tolls, flame wars, and other aspects to the online world that does not seem to exist in the offline space.  The reverse is to see if the sites that require registration will create more fruitful conversations or of they’re equal in quality/quantity to the ones that allow anonymous commenters.  [[User:Saridder|Saridder]] 16:00, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
: Hi Raven, interesting topic you have there! I agree with Asmith that it&#039;s important that you define &amp;quot;quality of comments.&amp;quot; Relatedly, I think you should consider the demographics that frequent The NYTimes, The Economist, and Boing Boing - the type of demographics will affect the type of comments as well. Also to consider is that both The New York Times and The Economist require digital subscription after a limited number of free articles, so that again too may affect what kind of people are reading those two. --[[User:Muromi|Muromi]] 09:47, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*saridder: Steve Ridder&lt;br /&gt;
&lt;br /&gt;
*The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
*Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Saridder – First, I have to say that I think you are very ambitious! You have a lot going into your prospectus. I think 8-10 pages will only allow you to skim the surface of this broad subject area. I suggest that you select one of these companies or forums and use it as a model to explore your question. I would also suggest narrowing your question to one main question with a couple of sub-questions. This part of the exercise is often the hardest part, but it will allow you to dig a little deeper into one most interesting topic. I am looking forward to reading your perspective in this emerging subject. [[User:Tessa May|Tessa May]] 21:11, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*María Paz Jurado&lt;br /&gt;
*Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*John Floyd&lt;br /&gt;
*Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
:Hi John, it will be interesting to see if the behaviors found in these online communities will differ from the politics, alliances, and cabals of the real world.  I&#039;m most interested to see if the internet is a better coordination and orchestration mechanism for organizing, and can people online respond quicker, more effectively, and efficiently than offline groups to adapt to the changing political landscapes this game provides. [[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi John,&lt;br /&gt;
Great choice of subject, i find it fascinating how these communities of random people from around the globe come together and work together to a certain goal as a community. [[User:DanielReissHarris|DanielReissHarris]] 17:27, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: CyberRalph&lt;br /&gt;
*Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi CyberRalph: This is an interesting topic.  As I read your prospectus, the notion of responsibility and liability came to mind.  If this group advertises cyber-attacks, can they inevitably be held accountable?  For example, could law enforcement officials follow the leads to IP addresses, and ultimately discover the group(s) behind such attacks?  It may be interesting to compare the concepts of online crime with other forms of illicit activities (is online crime more isolated and easier to commit without paying the consequences?).  As an intro or conclusion, you may also want to consider highlighting current trends with cyber-attacks and security measures that governments/large companies take.  Furthermore, to strengthen your analysis, it would be interesting if you state your personal hypothesis upfront, followed by your question surrounding motivation for these types of attacks. [[User:Zak Paster|Zak Paster]] 11:34, 3 March 2013 (EST)  &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Julian&lt;br /&gt;
*Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
*Aly Barbour&lt;br /&gt;
*Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
*&lt;br /&gt;
:Hi Aly, it was shocking to read about these communities, very interesting subject to investigate. I think it’s a good idea to focus in comparing activities in pro anorexia communities and recovery support groups in reddit.com, leaving aside the other platforms to narrow your scope. I think you should also define what will you observe from these communities in order to reach a conclusion for your investigation: do you want to know how control is being implemented? Or maybe focus in one particular constraint and see how it plays a role in regulating the community?--[[User:Maria|Maria]] 11:40, 3 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Aly, this is a very interesting topic! I was not aware of the Pro-Ana movement at all - When I saw the title I thought Ana was a person. Because of country laws and the way companies like Facebook have been clamping down on these communities, will you be able to directly observe any specific  communities? Are they operating overtly? I browse Lookbook.nu now and then and once came upon the criticism that only super skinnies gather there (if you google it, there are communities against Lookbook because of this). Perhaps this might be helpful.  --[[User:Muromi|Muromi]] 09:30, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
*Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt&lt;br /&gt;
[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:I think that’s an interesting topic, which surprisingly we haven’t covered much in class yet. It raises many interesting questions. In what ways, and how does the legal system protect anonymity? And are those protections by design, or unintentional as Section 230 was by operating separately from the rest of the legislation with which it was supposed to be packaged? Should those laws be there, or were they mistakes? Often, normative questions reduce to tradeoffs. In this case, it’s the classic tradeoff between privacy and incentivizing socially advantageous behavior.&lt;br /&gt;
&lt;br /&gt;
:Also, have you decided which of Lessig’s four constraints you’ll be using? Are you sure you’ll only be using one? It seems that there are critical points to be made from more angles, and could probably be done without extending scope to beyond what is manageable with the time and length constraints. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
*Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Becca, Interesting topic and it will be interesting to see how the online components and ‘permanent record’ of comments (architecture) might prohibit and skew the conversation vs. offline, real-world conversations. Will questions asked be inhibited by the semi-public aspect of online forums, preventing people from receiving better care than the privacy the offline world affords?  Or will the open aspect of the community allow the best comments to bubble up and be connected to experts who would otherwise not have seen the question if it was asked in the offline world.&lt;br /&gt;
:[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Becca, nice work! This is a really important topic, and I like the focus you have in terms  comparing three different sites around one issue, bipolar disorder. You may want to evaluate the &amp;quot;explicitness and freedom&amp;quot; around specific criteria.  If posts contain unique identifying information such as location of medical care or personal qualities (birthdates, current location, physical features) , if posters are frequent posters, if posters refer directly to one another by (user)name are just a few factors that may indicate how intimate, free, and explicit the forums are. Though I have never been on any of these message boards, I could imagine that market forces may influence the community&#039;s behavior as well. For instance, are there advertisements on the site? Spam? Doctor&#039;s opinions? Donation links? Another perspective to consider, though this could probably be another paper in and of itself, is how does the specific disorder affect the user&#039;s online experience and how well does the site cater to these differences? I know you will probably not get to explore this, but just something that I was considering while reading your prospectus. Thanks for this project, and I look forward to reading your work! [[User:Jax|Jax]] 10:22, 5 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: baughller&lt;br /&gt;
*Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
*Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
*&lt;br /&gt;
:I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  :[[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Laurence Girard&lt;br /&gt;
&lt;br /&gt;
*Laurence Girard Prospectus &lt;br /&gt;
&lt;br /&gt;
*Question: What effect does reading online health information have on the health of our society?&lt;br /&gt;
&lt;br /&gt;
Many people search for online health information on a daily basis, but most of this information is not reviewed by physicians. As a result, many people self-diagnose and as a result this can result in very dangerous health outcomes. I am interested in studying websites such as WebMD and seeing what type of impact this has on people’s health. &lt;br /&gt;
&lt;br /&gt;
I am particularly interested in seeing how online health  content relates to online health products. For example, perhaps someone reads an article on WebMD about how Vitamin D affects their health and then as a result they buy it on Amazon.com. What types of supplements are people buying and what affect is this having on their health?I am also interested in websites such as Teladoc.com where users can consult with physicians. In other words, I am interested in studying how people access health information, products, and consultations online.  I have read one statistic that says 80% of people in our country search for online health information. For this reason, I think this will be a particularly interesting project to complete and is relevant to the healthcare debate in our country. We need to focus more on prevention and less on treatment and the Internet can certainly be one modality for doing this. I am interested to hear about what my fellow classmates have to say about my chosen assignment.&lt;br /&gt;
*&lt;br /&gt;
:Laurence: This sounds like a very interesting topic, but would be a huge project to undertake.  Can you find one community where people are talking about health issues?  I imagine every major disease or condition has some kind of community such as the American Cancer Societies’ Online Communities and Support [[http://www.cancer.org/treatment/supportprogramsservices/onlinecommunities/index]]  and choose one or two subgroups to study.  Then I think you would be able to look at issues similar to those that Becca will be looking at for her project about Issues of Privacy in Online Mental Health Communities.  [[User:Susan Goldstein|Susan Goldstein]] 14:48, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Laurence – Your subject is interesting. Is there a data source containing the information that you are interested in? How would it be known if someone looked up a disease on WebMD, then went to Amazon and purchased a supplement that might be suggested for treating it? Google or other companies that send out tacking cookies might collected this type of information. Access to this data is an important factor for your study. Also, does your subject relate to control or censorship? If the data cannot be collected easily, the subject might need to be narrowed or focused on an area where you can collect data. [[User:Tessa May|Tessa May]] 21:32, 4 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9911</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9911"/>
		<updated>2013-03-05T15:22:32Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: interestingcomments&lt;br /&gt;
*Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
*Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi ASmith. i think that your work it´s a perfect oportunity in order to expose a new theory, or an alternative of the concept of Intellectual Property in the network. because if the community make their own rules, maybe, can construct new limits, exceptions etc, in this area. Natalia ´´´´&lt;br /&gt;
*&lt;br /&gt;
:Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User: Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Asmith – Your proposal is clear and the questions you&#039;ve set forth are important.  In reference to your final paragraph, it may also be interesting to evaluate pros and cons surrounding centralized content control versus the lack thereof.  For example, from one perspective, a collaborative online community is important because everyone is considered equal (there is a flat/circular management structure).  From another perspective, however, when a primary leader (site administrative team) who controls online content is absent, decision-making processes change, i.e., when controversies or disputes arise, who addresses them?  Comparing Diaspora with other collaborative communities, such as Wikipedia, is an interesting approach to analyze the pros and cons of online community management.  As a conclusion, based on your findings, you may be able to set forth some important content management recommendations that highlight best practices for the Diaspora user-base. [[User:Zak Paster|Zak Paster]] 11:44, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hello Asmith: This is a very interesting topic, I am intrigued to see what model you use to best compare the benefits and the limitations of introducing this new type of platform.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
ASmith:&lt;br /&gt;
&lt;br /&gt;
It will be interesting to note if there are any major points of contention that arise with regards to where the community wants to take Diaspora which causes a significant number of its members to break off and take a separate version in a different direction. I&#039;m not sure if the way its copyrighted will allow this but they could always start from scratch. Linux, for example, allows for the source code to be  modified and distributed for commercial or non-commercial purposes by anyone and this aspect of it has resulted in several very powerful flavors emerging (Red Hat, Ubuntu, Debian, SUSE, CentOS, etc...)&lt;br /&gt;
&lt;br /&gt;
I think it will also be interesting to compare the values of the community as it exists today compared to the values to the community as it grows and changes. For example, I&#039;d guess that the community that is taking interest in Diaspora today is largely between the ages of approximately mid teens and late 20&#039;s/early 30&#039;s. I&#039;d also venture a guess that they are fairly tech saavy. If the community continues to grow and appeal to the general population and in three to five years from now enjoys more mainstream popularity, it&#039;s probably safe to say that different decisions about what direction to take the project will emerge. &lt;br /&gt;
&lt;br /&gt;
In any case, this is a great topic choice. I&#039;m sure it will be interesting to observe and write about.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 08:32, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Rich Cacioppo&lt;br /&gt;
*Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:HI RICH: Is an interesting topic, i think that you can make an introduction, about what is the meaning of &amp;quot;free speech&amp;quot;, because, at the end, this is a relative concept, that depends, precisely, of the cultural context.  Natalia. &#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Hello Rich: I think as Natalia suggested defining your definition of free speech is critical to gain a greater understanding of the argument you will make within the parameters of the paper. Within different cultures this can be defined in many different ways and once you establish this it will be an easier journey to state and prove your case.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: AaronEttl&lt;br /&gt;
*Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Aaron,&amp;lt;br /&amp;gt;&lt;br /&gt;
:I think focusing on the consequence these search engines have on the users, rather than the websites in the search results, is unique and will be really fascinating to look at. Although you did narrow down the specific community you would look at -- the SEO community -- I think you will need to narrow it down further, perhaps to a specific website or set of websites serving a larger online community.&amp;lt;br /&amp;gt;&lt;br /&gt;
:One thing you didn&#039;t mention in your prospectus was how you would go about researching the SEO community. I think finding a specific community would be beneficial here as well -- it would give you a better idea as to what specific research methods you could employ. Once you have a more specific community I think everything else will fall into place.&amp;lt;br /&amp;gt;&lt;br /&gt;
:[[User:BeccaLuberoff|BeccaLuberoff]] 17:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aaron: I think you pose many questions in your prospectus that would each individually be enough for a ten page paper.  To narrow your feild of research i think it might be interesting to observe and stdy what goes into a successful kickstarter fund and derive from that observation conclusions about what the operations guide of kickstarter influences the kinds of funs that do well. &amp;quot;For Kickstarter, how does the level of regulation affect the integrity of those projects and is there any bias in the type of projects seen? &amp;quot; I think if you flip this around and look at the question from the bottom-up rather than the top-down you may have a more successful research question.  All my best. [[User:Alybarbour|Alybarbour]] 04:36, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication” &amp;lt;br /&amp;gt;&lt;br /&gt;
:An In-depth analysis of government’s role in the Global Collaborative Data Network. &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/? title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
*&lt;br /&gt;
:Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hunter, your idea is magnificent. I enjoy your paradox. The thing I notice best about your proposal is that you are using your own ideas, when you could always plagiarize unintentionally. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Hunter, &lt;br /&gt;
:The idea of &amp;quot;digging&amp;quot; in to find out the real and factual government approach on this matter is great. I think you have alot of great material to work with and you are moving in the right direction. I would just advise you to order your ideas in a clearer way so that your reader doesn&#039;t get lost. Great idea! [[User:GregB23|GregB23]] 15:29, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Hunter, i think that this theme is a little too wide, so, in order to be more specific, you can take one of the liberties than can be affect by governments control, and analyze that.  Natalia. ´´´´&lt;br /&gt;
&lt;br /&gt;
Hello Hunter: The broad scope of you paper may make it difficult to cover all the avenues in 8-10 pages. I think you should consider making this a thesis topic. There is a lot of areas and directions you can really go which would make it very thorough. It sounds very interesting and I am looking forward to seeing your paper progress. Good Luck.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Dear Alice&lt;br /&gt;
*Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Alice: I think this is a great starting point for a research paper, and I love the idea of looking at Starbucks, since it is such a huge corporation. However, I think your hypotheses are too easily proved. I think you could go much further with your topic if you think about questions after answering your initial questions...for instance, say posts/comments are regulated differently. Some questions to consider could be, shy would Starbucks spend more/less time managing comments on one site than another? Is there a pattern to how Starbucks regulates comments/posts on their different social media websites? What are the consequences of managing comments differently between websites? Does the user body have anything to do with how Starbucks regulates comments?…etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:36, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Michael Keane  &lt;br /&gt;
*&amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; &amp;lt;br /&amp;gt;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Michael,&lt;br /&gt;
:I believe that your idea for this assignment fulfills the essence of it. I think you should define for this prospectus what type of content control you will focus your analysis on. You might also include what reactions the members have to the various forms of censorship.[[User:GregB23|GregB23]] 15:34, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:You’ve chosen a very interesting topic that most of us have probably considered at some point. It’s often difficult to know where to draw the line when making policy decisions of this sort – to create a system that handles edge cases judiciously – and some people clearly aren’t even trying to create a fair system. I wonder what you can generalize from a case study like this. In short, how much variance do you think there is in the forms that censorship takes in web communities? It seems that there are powerful conventions and practical limitations with regards to how content control is done, such that many of the same features keep reappearing again and again.&lt;br /&gt;
&lt;br /&gt;
:At the end of your final paragraph, you say that removing entire discussions is a highly effective approach to content control. Would you mind elaborating on this? What standard of effectiveness are you using? Is something that merely keeps the community silent effective, or something that keeps it happy? What makes banning members sometimes less effective in comparison?&lt;br /&gt;
:[[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Natalia&lt;br /&gt;
*Prospectus title: “INTELLECTUAL PROPERTY RIGHTS, RIGHTS TO INFORMATION AND FREEDOM OF SPEECH ON INTERNET: CONFLICTING RIGHTS?”&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2013/File:Natalia_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris comments: Natalia, Your topic is very interesting, like mine (please comment!) quite broad and could as a suggestion focus completely on one case study that you think most illustrates and answers your hypothesis. I saw that you gave three, just curious as to is there one that is the overarching example for national and internatinal jurisprudence, or does this fall more into the realm of international governing bodies... or decided by national standards? Ultimately are you asking, is freedom of speech or protection of ideas more important on the internet? I like how you tie in that curbing freedom of expression starts to curb human rights, but that some regulation is necessary in civilization. A suggestion is to offer a framework that can be used interactively, involving a way for future bodies looking at legislation on intellectual property and freedom of speech and benchmarks for them to judge whether a law or regulation is infringes on human rights, or is necessary for to preserve civilization. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 20:33, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Kaley Sweeney comments: Hi Natalia, I agree with Daniel that your paper can use more focus. The topic of intellectual property is exceptionally broad and can encompass an enormous number of cases, law, international interpretation, etc. It might be helpful to narrow down on one or two case studies that particularly peak your interest that you feel make a major statement for the future of IP and confirm your hypotheses. Perhaps you can also focus on one of your three questions, as there are many discussion points buried within each, within the context of one particular country. Intellectual property is interesting to explore, particularly as the changing nature of social sharing is entirely shifting the concept. If you can hone in on one refined idea, I think you can find yourself developing some fascinating ideas and predictions.  &lt;br /&gt;
:Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Rebekahjudson&lt;br /&gt;
*Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rabekah- Your proposal sounds like an interesting subject. Is this group something that you have taken part in, or is your statement “Critique from Within” to be interpreted that Weird Twitter is critiquing Twitter or the Twitter community from within? It looks like you have a good outline and a method that will lead you to interesting material. I am wondering how this relates to censorship or control. Does the tweeting of Weird Twitter have any sort of influence on the broader Twitter community? Do members of a group in Twitter influence one another in a way that has some sort of an influence on the group as a whole?[[User:Tessa May|Tessa May]] 20:07, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekah, this is an interesting online community - one I hadn&#039;t previously been familiar with, but fascinating to learn about. My main thought while reading this is the longevity of this community. Google Analytics has shown the search rate for &amp;quot;Weird Twitter&amp;quot; drop dramatically in the past month. I wonder if the loose group of individuals may be fluid in their terminology, and therefore be a bit difficult to track down. On that note, well done selecting several twitter users from the start to monitor. I imagine if they are consistent in their &amp;quot;Weird Twitter&amp;quot; tweets, you will also find yourself becoming familiar with the online community that extends beyond these users. My second thought would be the impact this community - fluid as it may be - has on the wider twitter community. If they are not operating under a single hashtag, how do new users find them?  How do they distinguish themselves?&lt;br /&gt;
:Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekah, I love this topic! I&#039;ve been a fan of horse_ebooks and Riff Raff, but was unaware of any umbrella term under which they belonged. &lt;br /&gt;
:Though both personalities tweet in this poetical anarchist fashion, disregarding traditional language conventions,  I would never associate them together because of their vastly motivations. Riff Raff wants fame and fortune. Horse_ebooks wants to be invisible. However, according to the Chicago Reader&#039;s Weird Twitter map, Riff Raff and Horse_ebooks hold similarly prominent positons in spite of their real life differences. The concept of &amp;quot;Weird Twitter&amp;quot; is completely reader-defined, and I think requires exploration of the population who appreciates these aliases and associates them with one another, perhaps in contrast to Weird Twitter author&#039;s real motivations. One last thing is to explore is how Twitter&#039;s architecture (i.e. the 150 character confines) have altered how we think to use language  and enable/prevent &amp;quot;weird Twitter.&amp;quot; Here are some relevant articles about Horse_ebooks and Riff Raff: http://gawker.com/5887697/    http://gawker.com/5912835/riff-raffs-got-a-record-deal-making-sense-of-the-most-viral-human-being-in-music  &lt;br /&gt;
:[[User:Jax|Jax]] 21:07, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Joshywonder&lt;br /&gt;
*Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: I think you have a fabulous idea and have sources that have interested you on this topic. I wonder if you are interested in discussing the difference between Canadian English versus either the United States English or &amp;quot;Official English&amp;quot; as it may be. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:13, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: This is a very interesting case that you site. Was there a public response to this incident? Did the individual who brought the suit suffer in reputation either from the content of the site or from the attention given to the lawsuit? Is the site something that you personally took part in? Do you think that anonymous posters or posters using pseudonyms make a valuable contribution to discussion in public internet forums? It looks like you have developed your method and you have plenty of interesting information to choose from. I think that an important factor in your write-up will be to narrow your presentation to the details you think will best inform your audience of the issues at stake and best illuminate the specific case as a study subject. [[User:Tessa May|Tessa May]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Matthew D. Haney&lt;br /&gt;
*&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
*&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Matthew, your writing is very scientific; and I applaud you for this. The reader can be left skeptical and that is a matter of definition. Keep up the good work. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Matthew: Wonderful topic, I think you’ll have a lot of fun with this research topic. Although you have wonderful sources, I was wondering to know how you will gather the data, and do you think that Yelp will be able to provide you with clarification of removed posts? Censorship plays an important role within this topic; will you use any interesting cases to defend your paper? [[User:User777|user777]] 18:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Milenagrado&lt;br /&gt;
*&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Milena, what an interesting topic. Duolingo reminds me of a wikipedia of sorts in the ways it relates to copyrighted information. As crowdsourced information has grown in the past few years, I imagine you may also find similar information on how copyright is addressed in recent case studies. Another question to ask would be how users can ensure the translation is accurate? If you delve into the terms &amp;amp; conditions, you may also wish to see how Duolingo holds users accountable and verify the information is indeed an accurate representation of the initial intent. There are many concepts to delve into here, but I think you have done a very nice job of boiling it down to the main concerns the site may encounter moving forward.Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Milena Grado, I found your paper proposal quite interesting. I haven’t heard about Duolingo, however I have few questions: What about the translation [if] being out of context? What about sentence structure? Culture/ How precise is the translation? If so, what kind of copy rights will this serve gather, in order to protect the translation services? I noted that you will be gathering information through “Twitter, Facebook and Duolingo&#039;s blog- very interesting! Do you have specific way of analyzing this data? Use/volume based? Good luck with the paper, I think it’s quite an interesting topic to write a paper on. &lt;br /&gt;
:[[User:User777|user777]] 17:42, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Tessa,&amp;lt;br/&amp;gt;&lt;br /&gt;
:This looks really, really fascinating! I&#039;m curious - are you considering comparing multiple groups in differing categories? I ask because it may be interesting to see if two groups in similar categories have similar patterns in deleting posts. &amp;lt;br /&amp;gt;&lt;br /&gt;
:Another thing that came to mind: it may be interesting to look at the profiles of the group members to see if there is any pattern between those whose posts are deleted, those who tend to align with group moderators, etc….since LinkedIn profiles generally provide members&#039; current, and often prior, employment and education, you may be able to identify a pattern based on members&#039; socioeconomic status.&amp;lt;br /&amp;gt;&lt;br /&gt;
:[[User:BeccaLuberoff|BeccaLuberoff]] 18:15, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Tessa,&lt;br /&gt;
:This looks very interesting and you seem to have your ideas extremely clear. I love the idea of having a survey sent to group owners at the end of your investigation period. I would also suggest, if I may, to contact Linkedin directly and see if they have a comment in regard. [[User:GregB23|GregB23]] 15:22, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Tessa: I think you’ve picked out a great topic for your research paper. I am an active user of Linkedin, and participate in quite a few groups, and you are correct, that posts are being deleted without notice, which sometimes makes it hard to fallow the group/topic itself. I see that you have a perfect strategy for your paper, which I think will definitely help you generate a great paper. How many groups will you audit? How often will you review a group? Good luck on your paper, and I look forward to read your final work (if class permits). &lt;br /&gt;
:[[User:User777|user777]] 18:21, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris comments: Tessa, exploring the idea of censorship on LinkedIn groups sounds good. My suggestion is perhaps attempting to see why some might censor or remove content, for example, if the poster is attempting to get them to go to another group on the same topic. Perhaps content subtractions occur when the owner(s) of the group want simply to exert more control over the group as opposed to encouraging as many comments as possible. Other times, comments might be deleted due to not fitting into the general standards of professionalism that is expected on LinkedIn. Mabye you can come up with your own categories for deleted comments to expand on this, and determine if the deletions are leaning more toward censorship or content control. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 19:52, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Greetings Daniel: Moderation or Censorship in Linkden Groups really caught my, in regards to the fact that this is a very provocative title. In your prospectus it is interesting to note how you plan on gathering data with regards to specific groups within the site. Being that LinkedIn has captured the social media market for the professional, how will you be able to identify would would need to be cencsorn in a group that is by membership only? Secondly I am very much looking forward to see how Moderation is pulled in to groups. I like the idea of individuals within groups being limited in comments and mailing so that a, &amp;quot;only bully&amp;quot; in a specific network will not hog all of the conversation and in turn add to a more healthy convention of conversation- Hunter [[User:HunterGaylor|HunterGaylor]] 15:57, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
Tessa May: &lt;br /&gt;
&lt;br /&gt;
I suspect LinkedIn will be a good platform from which to derive your observations as it is obviously intended to be for professional/career/business purposes and therefore just about everyone with an account will ultimately be driven by the motivation to enhance their career goals. While I haven&#039;t observed too much conflict on LinkedIn (as opposed to say, Facebook, for example where disagreements can be sharp and common) I suppose egos can quickly flare up and agendas can easily clash as individuals attempt to push their company, career and professional point of view on to others. &lt;br /&gt;
&lt;br /&gt;
I noticed that you are using the deletion of a post as the metric for censorship. You may also want to consider a slightly less rigid although probably no less effective metric for censorship - bullying and pig-piling. I&#039;ve noticed, based on my personal use of social networks, that there is a tendency for a community to post overly large quantities of aggressive and oppositional rhetoric in response to something they disagree with, even if similar (and seemingly redundant in message) responses have already been posted. In other words, there is more than one way to censor and you may want to consider people applying the herd mentality to discussions when adding little to no additional minimal value as another form of censorship to your list of observable behavior. Granted it may be difficult to define and therefore measure this behavior, but it may prove valuable just the same.&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 09:09, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Alicia Phan | APhan&lt;br /&gt;
*&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris User Comments: Alicia, Your examination of privacy rights on social networking sites such as Facebook is fascinating. I would ask, &#039;Are our intellectual property rights waived automatically when we use a limited privacy social network site?&#039; The topic seems really hot right now, and going into the various privacy settings on Facebook and arguments pro and con in light of legal decisions in the United States and other nations, even international bodies, will be enlightening to fellow Facebook fans. A suggestion could be analysis of each privacy setting, with pro and con arguments for personal privacy being intellectual property that must be waived to share with others. Pretty sure that is what already happens, but really without the examination my comments are just speculation. I await your comments on my proposal as well. Thanks!&lt;br /&gt;
:[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 22:07, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 _USER777 . &lt;br /&gt;
*Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Muromi&lt;br /&gt;
*Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my Chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
:[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak: Great Topic. The notion that online fundraising has been getting in recent months is overwhelming. The effective fundraising idea comes with the clear revelation that the internet is very powerful tool. With tools like Kick starter, and rocket hub are able to cast a wider net that will allow more individuals to participate in supporting a cause. However, with regards to control one must ask themselves with a wider net and more individuals having the ability to contribute, how will one be able to control how that money is being accounted for and that it is coming from individuals that are proper for that organization. This is a new eara of Fundraising, both in the public and private sector. On must not loose focus on how effective is new era will be providing an easier access to funds. I am very much looking forward to your final project. Best of Luck and great Topic choice! I am very encouraged that someone is shedding light on potential positive effect this can have for the NGO world. Hunter [[User:HunterGaylor|HunterGaylor]] 16:06, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*RobMcLain&lt;br /&gt;
*Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
*&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
RobMcLain: Fantastic topic. I&#039;ve personally experienced some of yelp&#039;s connivery. When I was running a popular downtown restaurant in Texas we held the top Yelp ranking until we decided not to pay for advertising on Yelp. After that decision  our 5-star ratings began to disappear into thin air.  I am curious how you plan to track and observe so many actions on such a large site where moderation isn&#039;t necessarily noted. I&#039;d be very interested to see how you narrow your research. All my best. [[User:Alybarbour|Alybarbour]] 03:58, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Caroline&lt;br /&gt;
*The Right to be Forgotten &lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*Caroline: I love your ideas but you have so many i don&#039;t know where your focus is. I think your primary topic, &amp;quot;research how this regulation [ the right to forget] and potential similar regulations in North America would impact the Internet.  &amp;quot;  will be difficult to approach as that&#039;s all theoretical. What would be something you could actively observe? Perhaps looking at a community and following the recency of topics posted? Cheers. [[User:Alybarbour|Alybarbour]] 04:46, 5 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alan Ginsberg: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Johnathan Merkwan: Johnathan, it seems like you have a lot of ideas and are attempting to address several broad areas, including international, sociological, and architectural perspectives through field world. Reading this prospectus, I was confused at a few points, such as &amp;quot;According to each face as an old friend, I have been studying the relativity of facial recognition.. &amp;quot; This sounds interesting, but I&#039;m not entirely certain what it means. Does this mean you are comparing the new friends you are adding to the old friends you deleted? You say, &amp;quot;Now  Facebook has deemed my friendships “real,”&amp;quot; but do not specify how Facebook has promoted this realness. I think something valuable in your prospectus so far is your investigation of  &amp;quot;the spellcheck, autocorrect, and various prompted questions Facebook has alerted me to, and in doing so shall see how each action makes a difference, contextually.&amp;quot; I think you should continue with this line of questioning, investing how facebook&#039;s suggestions influence our behavior on the site. Here is a tool to analyze your personal facebook behavior: http://www.wolframalpha.com/facebook/ and another useful facebook statistic link http://blog.hubspot.com/blog/tabid/6307/bid/6128/The-Ultimate-List-100-Facebook-Statistics-Infographics.aspx .&lt;br /&gt;
:[[User:Jax|Jax]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you, Jax, for your comment. I will try to elucidate some of these issues that are inherent in my document. I admit it may be difficult for people to accurately spell my name. That addressed, how about a brief understanding of my perspective. With the War on Terror as it were, why is it necessary to altercate between various nations of power the mere definition of a word? Susan Goldstein, or Einstein, are not tangentially related; wherefore, the understanding of this situation is supposed to be confusing. I do dearly appreciate your response, yet it was and is not directed at me; much less johnathan Merkwan, or alan Ginsberg. If this has made things worse, I can only say things in person, not via computer. Thus, your links are a fabulous addition to my ideas, as intentionally, crude and misleading as they might be... (I call this, &amp;quot;intrigue&amp;quot;. So, as this idea develops, I will keep you updated with pop culture as I see it, in the light of the Lacanian disposition this proposal defined cohesively, yet, clearly has accepted your suggestions sic collaboration.[[User:Johnathan Merkwan|Johnathan Merkwan]] 22:24, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
::: I am very confused! Did I edit the wrong prospectus? [[User:Jax|Jax]] 10:22, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Free speech, &lt;br /&gt;
*Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx &lt;br /&gt;
([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
*&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. :[[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
::* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hey Phillip, I am very excited to see the direction that you take regarding the DLPA, specifically in regards to the potential subtractiveness of the organization. It is always interesting&lt;br /&gt;
to see the how the members of the community will add to the over all effectiveness of engagement with regards to organization. Because DLPA is stated that, “The hope is that broad access to scientific results will encourage faster progress on research and will let anyone apply the knowledge for technological advances. The ability to shed light on the effectiveness will be exciting to see. &amp;quot;-HunterGaylor&amp;quot; [[User:HunterGaylor|HunterGaylor]] 15:50, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:I thought the title was a bit odd. Since so few people are familiar with the DPLA, wouldn’t it be better to give more context? “Additive” and “subtractive” can be a little confusing when one doesn’t know what the noun means, since those words are used regularly in very different ways. I would suggest something along the lines of “Evaluating the Effectiveness of the DPLA.”&lt;br /&gt;
&lt;br /&gt;
:The argument about it contributing to social stratification was quite familiar for me; it seems to be used against many new technologies and developments.&lt;br /&gt;
&lt;br /&gt;
:Good luck with your project. It sounds quite interesting. I think it’s a good idea to implement it as a video, in terms of accessibility. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Goldstein&lt;br /&gt;
*Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
::JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
*&lt;br /&gt;
:Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
::Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan [[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Kaley Sweeney&lt;br /&gt;
*Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Kaley: I like your topic because it sheds light on democratic freedoms.  Will the expansion of Internet usage in North Korea bring new forms of democracy to a select group of citizens?  Will outside influences, that emerge via the Internet, begin to alter government relations?  At the end of your prospectus, you mention that you...&#039;&#039;”wish to examine the forces that have perpetuated the insulation of the country from the technological revolution and the changes that are beginning to unfold with the rise in mobile internet access in the country.”&#039;&#039;  To narrow your focus, you may want to consider highlighting a few primary forces, i.e., norms, market, etc., with descriptions surrounding each force.  To answer the latter part (changes that are beginning to unfold in North Korea), what types of changes are you referring to?  Do you plan to analyze technological changes, societal changes, or both?  To this end, defining a few categories may bring additional structure/clarity to your analysis. [[User:Zak Paster|Zak Paster]] 11:37, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
: Hi Kaley, you have a very interesting topic here. But for such a topic, are there enough data and info that&#039;s accessible? Because Kim JungUn&#039;s policy shifts are so recent, it might be too soon and more difficult to observe and analyze any social and cultural changes within North Korea as a result of mobile internet access. Are there any websites and/or organizations that track internet usage in North Korea? Their reports may be helpful resources.  --[[User:Muromi|Muromi]] 10:16, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Raven,  It will be interesting to see which site (anonymous vs. registered users) create more tolls, flame wars, and other aspects to the online world that does not seem to exist in the offline space.  The reverse is to see if the sites that require registration will create more fruitful conversations or of they’re equal in quality/quantity to the ones that allow anonymous commenters.  [[User:Saridder|Saridder]] 16:00, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
: Hi Raven, interesting topic you have there! I agree with Asmith that it&#039;s important that you define &amp;quot;quality of comments.&amp;quot; Relatedly, I think you should consider the demographics that frequent The NYTimes, The Economist, and Boing Boing - the type of demographics will affect the type of comments as well. Also to consider is that both The New York Times and The Economist require digital subscription after a limited number of free articles, so that again too may affect what kind of people are reading those two. --[[User:Muromi|Muromi]] 09:47, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*saridder: Steve Ridder&lt;br /&gt;
&lt;br /&gt;
*The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
*Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Saridder – First, I have to say that I think you are very ambitious! You have a lot going into your prospectus. I think 8-10 pages will only allow you to skim the surface of this broad subject area. I suggest that you select one of these companies or forums and use it as a model to explore your question. I would also suggest narrowing your question to one main question with a couple of sub-questions. This part of the exercise is often the hardest part, but it will allow you to dig a little deeper into one most interesting topic. I am looking forward to reading your perspective in this emerging subject. [[User:Tessa May|Tessa May]] 21:11, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*María Paz Jurado&lt;br /&gt;
*Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*John Floyd&lt;br /&gt;
*Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
:Hi John, it will be interesting to see if the behaviors found in these online communities will differ from the politics, alliances, and cabals of the real world.  I&#039;m most interested to see if the internet is a better coordination and orchestration mechanism for organizing, and can people online respond quicker, more effectively, and efficiently than offline groups to adapt to the changing political landscapes this game provides. [[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi John,&lt;br /&gt;
Great choice of subject, i find it fascinating how these communities of random people from around the globe come together and work together to a certain goal as a community. [[User:DanielReissHarris|DanielReissHarris]] 17:27, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: CyberRalph&lt;br /&gt;
*Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi CyberRalph: This is an interesting topic.  As I read your prospectus, the notion of responsibility and liability came to mind.  If this group advertises cyber-attacks, can they inevitably be held accountable?  For example, could law enforcement officials follow the leads to IP addresses, and ultimately discover the group(s) behind such attacks?  It may be interesting to compare the concepts of online crime with other forms of illicit activities (is online crime more isolated and easier to commit without paying the consequences?).  As an intro or conclusion, you may also want to consider highlighting current trends with cyber-attacks and security measures that governments/large companies take.  Furthermore, to strengthen your analysis, it would be interesting if you state your personal hypothesis upfront, followed by your question surrounding motivation for these types of attacks. [[User:Zak Paster|Zak Paster]] 11:34, 3 March 2013 (EST)  &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Julian&lt;br /&gt;
*Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
*Aly Barbour&lt;br /&gt;
*Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
*&lt;br /&gt;
:Hi Aly, it was shocking to read about these communities, very interesting subject to investigate. I think it’s a good idea to focus in comparing activities in pro anorexia communities and recovery support groups in reddit.com, leaving aside the other platforms to narrow your scope. I think you should also define what will you observe from these communities in order to reach a conclusion for your investigation: do you want to know how control is being implemented? Or maybe focus in one particular constraint and see how it plays a role in regulating the community?--[[User:Maria|Maria]] 11:40, 3 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Aly, this is a very interesting topic! I was not aware of the Pro-Ana movement at all - When I saw the title I thought Ana was a person. Because of country laws and the way companies like Facebook have been clamping down on these communities, will you be able to directly observe any specific  communities? Are they operating overtly? I browse Lookbook.nu now and then and once came upon the criticism that only super skinnies gather there (if you google it, there are communities against Lookbook because of this). Perhaps this might be helpful.  --[[User:Muromi|Muromi]] 09:30, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
*Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt&lt;br /&gt;
[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:I think that’s an interesting topic, which surprisingly we haven’t covered much in class yet. It raises many interesting questions. In what ways, and how does the legal system protect anonymity? And are those protections by design, or unintentional as Section 230 was by operating separately from the rest of the legislation with which it was supposed to be packaged? Should those laws be there, or were they mistakes? Often, normative questions reduce to tradeoffs. In this case, it’s the classic tradeoff between privacy and incentivizing socially advantageous behavior.&lt;br /&gt;
&lt;br /&gt;
:Also, have you decided which of Lessig’s four constraints you’ll be using? Are you sure you’ll only be using one? It seems that there are critical points to be made from more angles, and could probably be done without extending scope to beyond what is manageable with the time and length constraints. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
*Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Becca, Interesting topic and it will be interesting to see how the online components and ‘permanent record’ of comments (architecture) might prohibit and skew the conversation vs. offline, real-world conversations. Will questions asked be inhibited by the semi-public aspect of online forums, preventing people from receiving better care than the privacy the offline world affords?  Or will the open aspect of the community allow the best comments to bubble up and be connected to experts who would otherwise not have seen the question if it was asked in the offline world.&lt;br /&gt;
:[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Becca, nice work! This is a really important topic, and I like the focus you have in terms  comparing three different sites around one issue, bipolar disorder. You may want to evaluate the &amp;quot;explicitness and freedom&amp;quot; around specific criteria.  If posts contain unique identifying information such as location of medical care or personal qualities (birthdates, current location, physical features) , if posters are frequent posters, if posters refer directly to one another by (user)name are just a few factors that may indicate how intimate, free, and explicit the forums are. Though I have never been on any of these message boards, I could imagine that market forces may influence the community&#039;s behavior as well. For instance, are there advertisements on the site? Spam? Doctor&#039;s opinions? Donation links? &lt;br /&gt;
Another perspective to consider, though this could probably be another paper in and of itself, is how does the specific disorder affect the user&#039;s online experience and how well does the site cater to these differences? I know you will probably not get to explore this, but just something that I was considering while reading your prospectus. Thanks for this project, and I look forward to reading your work! [[User:Jax|Jax]] 10:22, 5 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: baughller&lt;br /&gt;
*Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
*Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
*&lt;br /&gt;
:I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  :[[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Laurence Girard&lt;br /&gt;
&lt;br /&gt;
*Laurence Girard Prospectus &lt;br /&gt;
&lt;br /&gt;
*Question: What effect does reading online health information have on the health of our society?&lt;br /&gt;
&lt;br /&gt;
Many people search for online health information on a daily basis, but most of this information is not reviewed by physicians. As a result, many people self-diagnose and as a result this can result in very dangerous health outcomes. I am interested in studying websites such as WebMD and seeing what type of impact this has on people’s health. &lt;br /&gt;
&lt;br /&gt;
I am particularly interested in seeing how online health  content relates to online health products. For example, perhaps someone reads an article on WebMD about how Vitamin D affects their health and then as a result they buy it on Amazon.com. What types of supplements are people buying and what affect is this having on their health?I am also interested in websites such as Teladoc.com where users can consult with physicians. In other words, I am interested in studying how people access health information, products, and consultations online.  I have read one statistic that says 80% of people in our country search for online health information. For this reason, I think this will be a particularly interesting project to complete and is relevant to the healthcare debate in our country. We need to focus more on prevention and less on treatment and the Internet can certainly be one modality for doing this. I am interested to hear about what my fellow classmates have to say about my chosen assignment.&lt;br /&gt;
*&lt;br /&gt;
:Laurence: This sounds like a very interesting topic, but would be a huge project to undertake.  Can you find one community where people are talking about health issues?  I imagine every major disease or condition has some kind of community such as the American Cancer Societies’ Online Communities and Support [[http://www.cancer.org/treatment/supportprogramsservices/onlinecommunities/index]]  and choose one or two subgroups to study.  Then I think you would be able to look at issues similar to those that Becca will be looking at for her project about Issues of Privacy in Online Mental Health Communities.  [[User:Susan Goldstein|Susan Goldstein]] 14:48, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Laurence – Your subject is interesting. Is there a data source containing the information that you are interested in? How would it be known if someone looked up a disease on WebMD, then went to Amazon and purchased a supplement that might be suggested for treating it? Google or other companies that send out tacking cookies might collected this type of information. Access to this data is an important factor for your study. Also, does your subject relate to control or censorship? If the data cannot be collected easily, the subject might need to be narrowed or focused on an area where you can collect data. [[User:Tessa May|Tessa May]] 21:32, 4 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9910</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9910"/>
		<updated>2013-03-05T15:19:21Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: interestingcomments&lt;br /&gt;
*Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
*Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi ASmith. i think that your work it´s a perfect oportunity in order to expose a new theory, or an alternative of the concept of Intellectual Property in the network. because if the community make their own rules, maybe, can construct new limits, exceptions etc, in this area. Natalia ´´´´&lt;br /&gt;
*&lt;br /&gt;
:Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User: Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Asmith – Your proposal is clear and the questions you&#039;ve set forth are important.  In reference to your final paragraph, it may also be interesting to evaluate pros and cons surrounding centralized content control versus the lack thereof.  For example, from one perspective, a collaborative online community is important because everyone is considered equal (there is a flat/circular management structure).  From another perspective, however, when a primary leader (site administrative team) who controls online content is absent, decision-making processes change, i.e., when controversies or disputes arise, who addresses them?  Comparing Diaspora with other collaborative communities, such as Wikipedia, is an interesting approach to analyze the pros and cons of online community management.  As a conclusion, based on your findings, you may be able to set forth some important content management recommendations that highlight best practices for the Diaspora user-base. [[User:Zak Paster|Zak Paster]] 11:44, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hello Asmith: This is a very interesting topic, I am intrigued to see what model you use to best compare the benefits and the limitations of introducing this new type of platform.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
ASmith:&lt;br /&gt;
&lt;br /&gt;
It will be interesting to note if there are any major points of contention that arise with regards to where the community wants to take Diaspora which causes a significant number of its members to break off and take a separate version in a different direction. I&#039;m not sure if the way its copyrighted will allow this but they could always start from scratch. Linux, for example, allows for the source code to be  modified and distributed for commercial or non-commercial purposes by anyone and this aspect of it has resulted in several very powerful flavors emerging (Red Hat, Ubuntu, Debian, SUSE, CentOS, etc...)&lt;br /&gt;
&lt;br /&gt;
I think it will also be interesting to compare the values of the community as it exists today compared to the values to the community as it grows and changes. For example, I&#039;d guess that the community that is taking interest in Diaspora today is largely between the ages of approximately mid teens and late 20&#039;s/early 30&#039;s. I&#039;d also venture a guess that they are fairly tech saavy. If the community continues to grow and appeal to the general population and in three to five years from now enjoys more mainstream popularity, it&#039;s probably safe to say that different decisions about what direction to take the project will emerge. &lt;br /&gt;
&lt;br /&gt;
In any case, this is a great topic choice. I&#039;m sure it will be interesting to observe and write about.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 08:32, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Rich Cacioppo&lt;br /&gt;
*Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:HI RICH: Is an interesting topic, i think that you can make an introduction, about what is the meaning of &amp;quot;free speech&amp;quot;, because, at the end, this is a relative concept, that depends, precisely, of the cultural context.  Natalia. &#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Hello Rich: I think as Natalia suggested defining your definition of free speech is critical to gain a greater understanding of the argument you will make within the parameters of the paper. Within different cultures this can be defined in many different ways and once you establish this it will be an easier journey to state and prove your case.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: AaronEttl&lt;br /&gt;
*Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Aaron,&amp;lt;br /&amp;gt;&lt;br /&gt;
:I think focusing on the consequence these search engines have on the users, rather than the websites in the search results, is unique and will be really fascinating to look at. Although you did narrow down the specific community you would look at -- the SEO community -- I think you will need to narrow it down further, perhaps to a specific website or set of websites serving a larger online community.&amp;lt;br /&amp;gt;&lt;br /&gt;
:One thing you didn&#039;t mention in your prospectus was how you would go about researching the SEO community. I think finding a specific community would be beneficial here as well -- it would give you a better idea as to what specific research methods you could employ. Once you have a more specific community I think everything else will fall into place.&amp;lt;br /&amp;gt;&lt;br /&gt;
:[[User:BeccaLuberoff|BeccaLuberoff]] 17:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aaron: I think you pose many questions in your prospectus that would each individually be enough for a ten page paper.  To narrow your feild of research i think it might be interesting to observe and stdy what goes into a successful kickstarter fund and derive from that observation conclusions about what the operations guide of kickstarter influences the kinds of funs that do well. &amp;quot;For Kickstarter, how does the level of regulation affect the integrity of those projects and is there any bias in the type of projects seen? &amp;quot; I think if you flip this around and look at the question from the bottom-up rather than the top-down you may have a more successful research question.  All my best. [[User:Alybarbour|Alybarbour]] 04:36, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication” &amp;lt;br /&amp;gt;&lt;br /&gt;
:An In-depth analysis of government’s role in the Global Collaborative Data Network. &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/? title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
*&lt;br /&gt;
:Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hunter, your idea is magnificent. I enjoy your paradox. The thing I notice best about your proposal is that you are using your own ideas, when you could always plagiarize unintentionally. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Hunter, &lt;br /&gt;
:The idea of &amp;quot;digging&amp;quot; in to find out the real and factual government approach on this matter is great. I think you have alot of great material to work with and you are moving in the right direction. I would just advise you to order your ideas in a clearer way so that your reader doesn&#039;t get lost. Great idea! [[User:GregB23|GregB23]] 15:29, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Hunter, i think that this theme is a little too wide, so, in order to be more specific, you can take one of the liberties than can be affect by governments control, and analyze that.  Natalia. ´´´´&lt;br /&gt;
&lt;br /&gt;
Hello Hunter: The broad scope of you paper may make it difficult to cover all the avenues in 8-10 pages. I think you should consider making this a thesis topic. There is a lot of areas and directions you can really go which would make it very thorough. It sounds very interesting and I am looking forward to seeing your paper progress. Good Luck.[[User:Interestingcomments|Interestingcomments]] 06:44, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Dear Alice&lt;br /&gt;
*Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Alice: I think this is a great starting point for a research paper, and I love the idea of looking at Starbucks, since it is such a huge corporation. However, I think your hypotheses are too easily proved. I think you could go much further with your topic if you think about questions after answering your initial questions...for instance, say posts/comments are regulated differently. Some questions to consider could be, shy would Starbucks spend more/less time managing comments on one site than another? Is there a pattern to how Starbucks regulates comments/posts on their different social media websites? What are the consequences of managing comments differently between websites? Does the user body have anything to do with how Starbucks regulates comments?…etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:36, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Michael Keane  &lt;br /&gt;
*&amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; &amp;lt;br /&amp;gt;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Michael,&lt;br /&gt;
:I believe that your idea for this assignment fulfills the essence of it. I think you should define for this prospectus what type of content control you will focus your analysis on. You might also include what reactions the members have to the various forms of censorship.[[User:GregB23|GregB23]] 15:34, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:You’ve chosen a very interesting topic that most of us have probably considered at some point. It’s often difficult to know where to draw the line when making policy decisions of this sort – to create a system that handles edge cases judiciously – and some people clearly aren’t even trying to create a fair system. I wonder what you can generalize from a case study like this. In short, how much variance do you think there is in the forms that censorship takes in web communities? It seems that there are powerful conventions and practical limitations with regards to how content control is done, such that many of the same features keep reappearing again and again.&lt;br /&gt;
&lt;br /&gt;
:At the end of your final paragraph, you say that removing entire discussions is a highly effective approach to content control. Would you mind elaborating on this? What standard of effectiveness are you using? Is something that merely keeps the community silent effective, or something that keeps it happy? What makes banning members sometimes less effective in comparison?&lt;br /&gt;
:[[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Natalia&lt;br /&gt;
*Prospectus title: “INTELLECTUAL PROPERTY RIGHTS, RIGHTS TO INFORMATION AND FREEDOM OF SPEECH ON INTERNET: CONFLICTING RIGHTS?”&lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2013/File:Natalia_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris comments: Natalia, Your topic is very interesting, like mine (please comment!) quite broad and could as a suggestion focus completely on one case study that you think most illustrates and answers your hypothesis. I saw that you gave three, just curious as to is there one that is the overarching example for national and internatinal jurisprudence, or does this fall more into the realm of international governing bodies... or decided by national standards? Ultimately are you asking, is freedom of speech or protection of ideas more important on the internet? I like how you tie in that curbing freedom of expression starts to curb human rights, but that some regulation is necessary in civilization. A suggestion is to offer a framework that can be used interactively, involving a way for future bodies looking at legislation on intellectual property and freedom of speech and benchmarks for them to judge whether a law or regulation is infringes on human rights, or is necessary for to preserve civilization. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 20:33, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Kaley Sweeney comments: Hi Natalia, I agree with Daniel that your paper can use more focus. The topic of intellectual property is exceptionally broad and can encompass an enormous number of cases, law, international interpretation, etc. It might be helpful to narrow down on one or two case studies that particularly peak your interest that you feel make a major statement for the future of IP and confirm your hypotheses. Perhaps you can also focus on one of your three questions, as there are many discussion points buried within each, within the context of one particular country. Intellectual property is interesting to explore, particularly as the changing nature of social sharing is entirely shifting the concept. If you can hone in on one refined idea, I think you can find yourself developing some fascinating ideas and predictions.  &lt;br /&gt;
:Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Rebekahjudson&lt;br /&gt;
*Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rabekah- Your proposal sounds like an interesting subject. Is this group something that you have taken part in, or is your statement “Critique from Within” to be interpreted that Weird Twitter is critiquing Twitter or the Twitter community from within? It looks like you have a good outline and a method that will lead you to interesting material. I am wondering how this relates to censorship or control. Does the tweeting of Weird Twitter have any sort of influence on the broader Twitter community? Do members of a group in Twitter influence one another in a way that has some sort of an influence on the group as a whole?[[User:Tessa May|Tessa May]] 20:07, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekah, this is an interesting online community - one I hadn&#039;t previously been familiar with, but fascinating to learn about. My main thought while reading this is the longevity of this community. Google Analytics has shown the search rate for &amp;quot;Weird Twitter&amp;quot; drop dramatically in the past month. I wonder if the loose group of individuals may be fluid in their terminology, and therefore be a bit difficult to track down. On that note, well done selecting several twitter users from the start to monitor. I imagine if they are consistent in their &amp;quot;Weird Twitter&amp;quot; tweets, you will also find yourself becoming familiar with the online community that extends beyond these users. My second thought would be the impact this community - fluid as it may be - has on the wider twitter community. If they are not operating under a single hashtag, how do new users find them?  How do they distinguish themselves?&lt;br /&gt;
:Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Rebekah, I love this topic! I&#039;ve been a fan of horse_ebooks and Riff Raff, but was unaware of any umbrella term under which they belonged. &lt;br /&gt;
:Though both personalities tweet in this poetical anarchist fashion, disregarding traditional language conventions,  I would never associate them together because of their vastly motivations. Riff Raff wants fame and fortune. Horse_ebooks wants to be invisible. However, according to the Chicago Reader&#039;s Weird Twitter map, Riff Raff and Horse_ebooks hold similarly prominent positons in spite of their real life differences. The concept of &amp;quot;Weird Twitter&amp;quot; is completely reader-defined, and I think requires exploration of the population who appreciates these aliases and associates them with one another, perhaps in contrast to Weird Twitter author&#039;s real motivations. One last thing is to explore is how Twitter&#039;s architecture (i.e. the 150 character confines) have altered how we think to use language  and enable/prevent &amp;quot;weird Twitter.&amp;quot; Here are some relevant articles about Horse_ebooks and Riff Raff: http://gawker.com/5887697/    http://gawker.com/5912835/riff-raffs-got-a-record-deal-making-sense-of-the-most-viral-human-being-in-music  &lt;br /&gt;
:[[User:Jax|Jax]] 21:07, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Joshywonder&lt;br /&gt;
*Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: I think you have a fabulous idea and have sources that have interested you on this topic. I wonder if you are interested in discussing the difference between Canadian English versus either the United States English or &amp;quot;Official English&amp;quot; as it may be. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:13, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Joshywonder: This is a very interesting case that you site. Was there a public response to this incident? Did the individual who brought the suit suffer in reputation either from the content of the site or from the attention given to the lawsuit? Is the site something that you personally took part in? Do you think that anonymous posters or posters using pseudonyms make a valuable contribution to discussion in public internet forums? It looks like you have developed your method and you have plenty of interesting information to choose from. I think that an important factor in your write-up will be to narrow your presentation to the details you think will best inform your audience of the issues at stake and best illuminate the specific case as a study subject. [[User:Tessa May|Tessa May]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Matthew D. Haney&lt;br /&gt;
*&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
*&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Matthew, your writing is very scientific; and I applaud you for this. The reader can be left skeptical and that is a matter of definition. Keep up the good work. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Matthew: Wonderful topic, I think you’ll have a lot of fun with this research topic. Although you have wonderful sources, I was wondering to know how you will gather the data, and do you think that Yelp will be able to provide you with clarification of removed posts? Censorship plays an important role within this topic; will you use any interesting cases to defend your paper? [[User:User777|user777]] 18:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Milenagrado&lt;br /&gt;
*&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Milena, what an interesting topic. Duolingo reminds me of a wikipedia of sorts in the ways it relates to copyrighted information. As crowdsourced information has grown in the past few years, I imagine you may also find similar information on how copyright is addressed in recent case studies. Another question to ask would be how users can ensure the translation is accurate? If you delve into the terms &amp;amp; conditions, you may also wish to see how Duolingo holds users accountable and verify the information is indeed an accurate representation of the initial intent. There are many concepts to delve into here, but I think you have done a very nice job of boiling it down to the main concerns the site may encounter moving forward.Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Dear Milena Grado, I found your paper proposal quite interesting. I haven’t heard about Duolingo, however I have few questions: What about the translation [if] being out of context? What about sentence structure? Culture/ How precise is the translation? If so, what kind of copy rights will this serve gather, in order to protect the translation services? I noted that you will be gathering information through “Twitter, Facebook and Duolingo&#039;s blog- very interesting! Do you have specific way of analyzing this data? Use/volume based? Good luck with the paper, I think it’s quite an interesting topic to write a paper on. &lt;br /&gt;
:[[User:User777|user777]] 17:42, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Tessa,&amp;lt;br/&amp;gt;&lt;br /&gt;
:This looks really, really fascinating! I&#039;m curious - are you considering comparing multiple groups in differing categories? I ask because it may be interesting to see if two groups in similar categories have similar patterns in deleting posts. &amp;lt;br /&amp;gt;&lt;br /&gt;
:Another thing that came to mind: it may be interesting to look at the profiles of the group members to see if there is any pattern between those whose posts are deleted, those who tend to align with group moderators, etc….since LinkedIn profiles generally provide members&#039; current, and often prior, employment and education, you may be able to identify a pattern based on members&#039; socioeconomic status.&amp;lt;br /&amp;gt;&lt;br /&gt;
:[[User:BeccaLuberoff|BeccaLuberoff]] 18:15, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Tessa,&lt;br /&gt;
:This looks very interesting and you seem to have your ideas extremely clear. I love the idea of having a survey sent to group owners at the end of your investigation period. I would also suggest, if I may, to contact Linkedin directly and see if they have a comment in regard. [[User:GregB23|GregB23]] 15:22, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Tessa: I think you’ve picked out a great topic for your research paper. I am an active user of Linkedin, and participate in quite a few groups, and you are correct, that posts are being deleted without notice, which sometimes makes it hard to fallow the group/topic itself. I see that you have a perfect strategy for your paper, which I think will definitely help you generate a great paper. How many groups will you audit? How often will you review a group? Good luck on your paper, and I look forward to read your final work (if class permits). &lt;br /&gt;
:[[User:User777|user777]] 18:21, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris comments: Tessa, exploring the idea of censorship on LinkedIn groups sounds good. My suggestion is perhaps attempting to see why some might censor or remove content, for example, if the poster is attempting to get them to go to another group on the same topic. Perhaps content subtractions occur when the owner(s) of the group want simply to exert more control over the group as opposed to encouraging as many comments as possible. Other times, comments might be deleted due to not fitting into the general standards of professionalism that is expected on LinkedIn. Mabye you can come up with your own categories for deleted comments to expand on this, and determine if the deletions are leaning more toward censorship or content control. [[User:Daniel Cameron Morris|Daniel Cameron Morris]] 19:52, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Greetings Daniel: Moderation or Censorship in Linkden Groups really caught my, in regards to the fact that this is a very provocative title. In your prospectus it is interesting to note how you plan on gathering data with regards to specific groups within the site. Being that LinkedIn has captured the social media market for the professional, how will you be able to identify would would need to be cencsorn in a group that is by membership only? Secondly I am very much looking forward to see how Moderation is pulled in to groups. I like the idea of individuals within groups being limited in comments and mailing so that a, &amp;quot;only bully&amp;quot; in a specific network will not hog all of the conversation and in turn add to a more healthy convention of conversation- Hunter [[User:HunterGaylor|HunterGaylor]] 15:57, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
Tessa May: &lt;br /&gt;
&lt;br /&gt;
I suspect LinkedIn will be a good platform from which to derive your observations as it is obviously intended to be for professional/career/business purposes and therefore just about everyone with an account will ultimately be driven by the motivation to enhance their career goals. While I haven&#039;t observed too much conflict on LinkedIn (as opposed to say, Facebook, for example where disagreements can be sharp and common) I suppose egos can quickly flare up and agendas can easily clash as individuals attempt to push their company, career and professional point of view on to others. &lt;br /&gt;
&lt;br /&gt;
I noticed that you are using the deletion of a post as the metric for censorship. You may also want to consider a slightly less rigid although probably no less effective metric for censorship - bullying and pig-piling. I&#039;ve noticed, based on my personal use of social networks, that there is a tendency for a community to post overly large quantities of aggressive and oppositional rhetoric in response to something they disagree with, even if similar (and seemingly redundant in message) responses have already been posted. In other words, there is more than one way to censor and you may want to consider people applying the herd mentality to discussions when adding little to no additional minimal value as another form of censorship to your list of observable behavior. Granted it may be difficult to define and therefore measure this behavior, but it may prove valuable just the same.&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 09:09, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Alicia Phan | APhan&lt;br /&gt;
*&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
:Daniel Cameron Morris User Comments: Alicia, Your examination of privacy rights on social networking sites such as Facebook is fascinating. I would ask, &#039;Are our intellectual property rights waived automatically when we use a limited privacy social network site?&#039; The topic seems really hot right now, and going into the various privacy settings on Facebook and arguments pro and con in light of legal decisions in the United States and other nations, even international bodies, will be enlightening to fellow Facebook fans. A suggestion could be analysis of each privacy setting, with pro and con arguments for personal privacy being intellectual property that must be waived to share with others. Pretty sure that is what already happens, but really without the examination my comments are just speculation. I await your comments on my proposal as well. Thanks!&lt;br /&gt;
:[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 22:07, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 _USER777 . &lt;br /&gt;
*Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Muromi&lt;br /&gt;
*Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my Chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
:[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Zak: Great Topic. The notion that online fundraising has been getting in recent months is overwhelming. The effective fundraising idea comes with the clear revelation that the internet is very powerful tool. With tools like Kick starter, and rocket hub are able to cast a wider net that will allow more individuals to participate in supporting a cause. However, with regards to control one must ask themselves with a wider net and more individuals having the ability to contribute, how will one be able to control how that money is being accounted for and that it is coming from individuals that are proper for that organization. This is a new eara of Fundraising, both in the public and private sector. On must not loose focus on how effective is new era will be providing an easier access to funds. I am very much looking forward to your final project. Best of Luck and great Topic choice! I am very encouraged that someone is shedding light on potential positive effect this can have for the NGO world. Hunter [[User:HunterGaylor|HunterGaylor]] 16:06, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*RobMcLain&lt;br /&gt;
*Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
*&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
RobMcLain: Fantastic topic. I&#039;ve personally experienced some of yelp&#039;s connivery. When I was running a popular downtown restaurant in Texas we held the top Yelp ranking until we decided not to pay for advertising on Yelp. After that decision  our 5-star ratings began to disappear into thin air.  I am curious how you plan to track and observe so many actions on such a large site where moderation isn&#039;t necessarily noted. I&#039;d be very interested to see how you narrow your research. All my best. [[User:Alybarbour|Alybarbour]] 03:58, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Caroline&lt;br /&gt;
*The Right to be Forgotten &lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*Caroline: I love your ideas but you have so many i don&#039;t know where your focus is. I think your primary topic, &amp;quot;research how this regulation [ the right to forget] and potential similar regulations in North America would impact the Internet.  &amp;quot;  will be difficult to approach as that&#039;s all theoretical. What would be something you could actively observe? Perhaps looking at a community and following the recency of topics posted? Cheers. [[User:Alybarbour|Alybarbour]] 04:46, 5 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Alan Ginsberg: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Johnathan Merkwan: Johnathan, it seems like you have a lot of ideas and are attempting to address several broad areas, including international, sociological, and architectural perspectives through field world. Reading this prospectus, I was confused at a few points, such as &amp;quot;According to each face as an old friend, I have been studying the relativity of facial recognition.. &amp;quot; This sounds interesting, but I&#039;m not entirely certain what it means. Does this mean you are comparing the new friends you are adding to the old friends you deleted? You say, &amp;quot;Now  Facebook has deemed my friendships “real,”&amp;quot; but do not specify how Facebook has promoted this realness. I think something valuable in your prospectus so far is your investigation of  &amp;quot;the spellcheck, autocorrect, and various prompted questions Facebook has alerted me to, and in doing so shall see how each action makes a difference, contextually.&amp;quot; I think you should continue with this line of questioning, investing how facebook&#039;s suggestions influence our behavior on the site. Here is a tool to analyze your personal facebook behavior: http://www.wolframalpha.com/facebook/ and another useful facebook statistic link http://blog.hubspot.com/blog/tabid/6307/bid/6128/The-Ultimate-List-100-Facebook-Statistics-Infographics.aspx .&lt;br /&gt;
:[[User:Jax|Jax]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you, Jax, for your comment. I will try to elucidate some of these issues that are inherent in my document. I admit it may be difficult for people to accurately spell my name. That addressed, how about a brief understanding of my perspective. With the War on Terror as it were, why is it necessary to altercate between various nations of power the mere definition of a word? Susan Goldstein, or Einstein, are not tangentially related; wherefore, the understanding of this situation is supposed to be confusing. I do dearly appreciate your response, yet it was and is not directed at me; much less johnathan Merkwan, or alan Ginsberg. If this has made things worse, I can only say things in person, not via computer. Thus, your links are a fabulous addition to my ideas, as intentionally, crude and misleading as they might be... (I call this, &amp;quot;intrigue&amp;quot;. So, as this idea develops, I will keep you updated with pop culture as I see it, in the light of the Lacanian disposition this proposal defined cohesively, yet, clearly has accepted your suggestions sic collaboration.[[User:Johnathan Merkwan|Johnathan Merkwan]] 22:24, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Free speech, &lt;br /&gt;
*Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx &lt;br /&gt;
([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
*&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. :[[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
::* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hey Phillip, I am very excited to see the direction that you take regarding the DLPA, specifically in regards to the potential subtractiveness of the organization. It is always interesting&lt;br /&gt;
to see the how the members of the community will add to the over all effectiveness of engagement with regards to organization. Because DLPA is stated that, “The hope is that broad access to scientific results will encourage faster progress on research and will let anyone apply the knowledge for technological advances. The ability to shed light on the effectiveness will be exciting to see. &amp;quot;-HunterGaylor&amp;quot; [[User:HunterGaylor|HunterGaylor]] 15:50, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:I thought the title was a bit odd. Since so few people are familiar with the DPLA, wouldn’t it be better to give more context? “Additive” and “subtractive” can be a little confusing when one doesn’t know what the noun means, since those words are used regularly in very different ways. I would suggest something along the lines of “Evaluating the Effectiveness of the DPLA.”&lt;br /&gt;
&lt;br /&gt;
:The argument about it contributing to social stratification was quite familiar for me; it seems to be used against many new technologies and developments.&lt;br /&gt;
&lt;br /&gt;
:Good luck with your project. It sounds quite interesting. I think it’s a good idea to implement it as a video, in terms of accessibility. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Goldstein&lt;br /&gt;
*Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
::JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
*&lt;br /&gt;
:Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
::Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan [[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Kaley Sweeney&lt;br /&gt;
*Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Kaley: I like your topic because it sheds light on democratic freedoms.  Will the expansion of Internet usage in North Korea bring new forms of democracy to a select group of citizens?  Will outside influences, that emerge via the Internet, begin to alter government relations?  At the end of your prospectus, you mention that you...&#039;&#039;”wish to examine the forces that have perpetuated the insulation of the country from the technological revolution and the changes that are beginning to unfold with the rise in mobile internet access in the country.”&#039;&#039;  To narrow your focus, you may want to consider highlighting a few primary forces, i.e., norms, market, etc., with descriptions surrounding each force.  To answer the latter part (changes that are beginning to unfold in North Korea), what types of changes are you referring to?  Do you plan to analyze technological changes, societal changes, or both?  To this end, defining a few categories may bring additional structure/clarity to your analysis. [[User:Zak Paster|Zak Paster]] 11:37, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
: Hi Kaley, you have a very interesting topic here. But for such a topic, are there enough data and info that&#039;s accessible? Because Kim JungUn&#039;s policy shifts are so recent, it might be too soon and more difficult to observe and analyze any social and cultural changes within North Korea as a result of mobile internet access. Are there any websites and/or organizations that track internet usage in North Korea? Their reports may be helpful resources.  --[[User:Muromi|Muromi]] 10:16, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Raven,  It will be interesting to see which site (anonymous vs. registered users) create more tolls, flame wars, and other aspects to the online world that does not seem to exist in the offline space.  The reverse is to see if the sites that require registration will create more fruitful conversations or of they’re equal in quality/quantity to the ones that allow anonymous commenters.  [[User:Saridder|Saridder]] 16:00, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*&lt;br /&gt;
: Hi Raven, interesting topic you have there! I agree with Asmith that it&#039;s important that you define &amp;quot;quality of comments.&amp;quot; Relatedly, I think you should consider the demographics that frequent The NYTimes, The Economist, and Boing Boing - the type of demographics will affect the type of comments as well. Also to consider is that both The New York Times and The Economist require digital subscription after a limited number of free articles, so that again too may affect what kind of people are reading those two. --[[User:Muromi|Muromi]] 09:47, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*saridder: Steve Ridder&lt;br /&gt;
&lt;br /&gt;
*The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
*Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Saridder – First, I have to say that I think you are very ambitious! You have a lot going into your prospectus. I think 8-10 pages will only allow you to skim the surface of this broad subject area. I suggest that you select one of these companies or forums and use it as a model to explore your question. I would also suggest narrowing your question to one main question with a couple of sub-questions. This part of the exercise is often the hardest part, but it will allow you to dig a little deeper into one most interesting topic. I am looking forward to reading your perspective in this emerging subject. [[User:Tessa May|Tessa May]] 21:11, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*María Paz Jurado&lt;br /&gt;
*Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*John Floyd&lt;br /&gt;
*Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
:Hi John, it will be interesting to see if the behaviors found in these online communities will differ from the politics, alliances, and cabals of the real world.  I&#039;m most interested to see if the internet is a better coordination and orchestration mechanism for organizing, and can people online respond quicker, more effectively, and efficiently than offline groups to adapt to the changing political landscapes this game provides. [[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi John,&lt;br /&gt;
Great choice of subject, i find it fascinating how these communities of random people from around the globe come together and work together to a certain goal as a community. [[User:DanielReissHarris|DanielReissHarris]] 17:27, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: CyberRalph&lt;br /&gt;
*Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi CyberRalph: This is an interesting topic.  As I read your prospectus, the notion of responsibility and liability came to mind.  If this group advertises cyber-attacks, can they inevitably be held accountable?  For example, could law enforcement officials follow the leads to IP addresses, and ultimately discover the group(s) behind such attacks?  It may be interesting to compare the concepts of online crime with other forms of illicit activities (is online crime more isolated and easier to commit without paying the consequences?).  As an intro or conclusion, you may also want to consider highlighting current trends with cyber-attacks and security measures that governments/large companies take.  Furthermore, to strengthen your analysis, it would be interesting if you state your personal hypothesis upfront, followed by your question surrounding motivation for these types of attacks. [[User:Zak Paster|Zak Paster]] 11:34, 3 March 2013 (EST)  &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Julian&lt;br /&gt;
*Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
*Aly Barbour&lt;br /&gt;
*Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
*&lt;br /&gt;
:Hi Aly, it was shocking to read about these communities, very interesting subject to investigate. I think it’s a good idea to focus in comparing activities in pro anorexia communities and recovery support groups in reddit.com, leaving aside the other platforms to narrow your scope. I think you should also define what will you observe from these communities in order to reach a conclusion for your investigation: do you want to know how control is being implemented? Or maybe focus in one particular constraint and see how it plays a role in regulating the community?--[[User:Maria|Maria]] 11:40, 3 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Aly, this is a very interesting topic! I was not aware of the Pro-Ana movement at all - When I saw the title I thought Ana was a person. Because of country laws and the way companies like Facebook have been clamping down on these communities, will you be able to directly observe any specific  communities? Are they operating overtly? I browse Lookbook.nu now and then and once came upon the criticism that only super skinnies gather there (if you google it, there are communities against Lookbook because of this). Perhaps this might be helpful.  --[[User:Muromi|Muromi]] 09:30, 5 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
*Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt&lt;br /&gt;
[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:I think that’s an interesting topic, which surprisingly we haven’t covered much in class yet. It raises many interesting questions. In what ways, and how does the legal system protect anonymity? And are those protections by design, or unintentional as Section 230 was by operating separately from the rest of the legislation with which it was supposed to be packaged? Should those laws be there, or were they mistakes? Often, normative questions reduce to tradeoffs. In this case, it’s the classic tradeoff between privacy and incentivizing socially advantageous behavior.&lt;br /&gt;
&lt;br /&gt;
:Also, have you decided which of Lessig’s four constraints you’ll be using? Are you sure you’ll only be using one? It seems that there are critical points to be made from more angles, and could probably be done without extending scope to beyond what is manageable with the time and length constraints. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
*Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
*Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
*&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Becca, Interesting topic and it will be interesting to see how the online components and ‘permanent record’ of comments (architecture) might prohibit and skew the conversation vs. offline, real-world conversations. Will questions asked be inhibited by the semi-public aspect of online forums, preventing people from receiving better care than the privacy the offline world affords?  Or will the open aspect of the community allow the best comments to bubble up and be connected to experts who would otherwise not have seen the question if it was asked in the offline world.&lt;br /&gt;
:[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Becca, nice work! This is a really important topic, and I like the focus you have in terms  comparing three different sites around one issue, bipolar disorder. You may want to evaluate the &amp;quot;explicitness and freedom&amp;quot; around specific criteria.  If posts contain unique identifying information such as location of medical care or personal qualities (birthdates, current location, physical features) , if posters are frequent posters, if posters refer directly to one another by (user)name are just a few factors that may indicate how intimate, free, and explicit the forums are. Though I have never been on any of these message boards, I could imagine that market forces may influence the community&#039;s behavior as well. For instance, are there advertisements on the site? Spam? Doctor&#039;s opinions? Donation links? &lt;br /&gt;
Another perspective to consider, though this could probably be another paper in and of itself, is how does the specific disorder affect the user&#039;s online experience and how well does the site cater to these differences? I know you will probably not get to explore this, but just something that I was considering while reading your prospectus. Thanks for this project, and I look forward to reading your work! &lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: baughller&lt;br /&gt;
*Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
*Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
*&lt;br /&gt;
:I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  :[[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
*Laurence Girard&lt;br /&gt;
&lt;br /&gt;
*Laurence Girard Prospectus &lt;br /&gt;
&lt;br /&gt;
*Question: What effect does reading online health information have on the health of our society?&lt;br /&gt;
&lt;br /&gt;
Many people search for online health information on a daily basis, but most of this information is not reviewed by physicians. As a result, many people self-diagnose and as a result this can result in very dangerous health outcomes. I am interested in studying websites such as WebMD and seeing what type of impact this has on people’s health. &lt;br /&gt;
&lt;br /&gt;
I am particularly interested in seeing how online health  content relates to online health products. For example, perhaps someone reads an article on WebMD about how Vitamin D affects their health and then as a result they buy it on Amazon.com. What types of supplements are people buying and what affect is this having on their health?I am also interested in websites such as Teladoc.com where users can consult with physicians. In other words, I am interested in studying how people access health information, products, and consultations online.  I have read one statistic that says 80% of people in our country search for online health information. For this reason, I think this will be a particularly interesting project to complete and is relevant to the healthcare debate in our country. We need to focus more on prevention and less on treatment and the Internet can certainly be one modality for doing this. I am interested to hear about what my fellow classmates have to say about my chosen assignment.&lt;br /&gt;
*&lt;br /&gt;
:Laurence: This sounds like a very interesting topic, but would be a huge project to undertake.  Can you find one community where people are talking about health issues?  I imagine every major disease or condition has some kind of community such as the American Cancer Societies’ Online Communities and Support [[http://www.cancer.org/treatment/supportprogramsservices/onlinecommunities/index]]  and choose one or two subgroups to study.  Then I think you would be able to look at issues similar to those that Becca will be looking at for her project about Issues of Privacy in Online Mental Health Communities.  [[User:Susan Goldstein|Susan Goldstein]] 14:48, 4 March 2013 (EST)&lt;br /&gt;
*&lt;br /&gt;
:Laurence – Your subject is interesting. Is there a data source containing the information that you are interested in? How would it be known if someone looked up a disease on WebMD, then went to Amazon and purchased a supplement that might be suggested for treating it? Google or other companies that send out tacking cookies might collected this type of information. Access to this data is an important factor for your study. Also, does your subject relate to control or censorship? If the data cannot be collected easily, the subject might need to be narrowed or focused on an area where you can collect data. [[User:Tessa May|Tessa May]] 21:32, 4 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9885</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9885"/>
		<updated>2013-03-05T02:07:58Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi ASmith. i think that your work it´s a perfect oportunity in order to expose a new theory, or an alternative of the concept of Intellectual Property in the network. because if the community make their own rules, maybe, can construct new limits, exceptions etc, in this area.&lt;br /&gt;
Natalia ´´´´&lt;br /&gt;
&lt;br /&gt;
Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User:&lt;br /&gt;
Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Asmith – Your proposal is clear and the questions you&#039;ve set forth are important.  In reference to your final paragraph, it may also be interesting to evaluate pros and cons surrounding centralized content control versus the lack thereof.  For example, from one perspective, a collaborative online community is important because everyone is considered equal (there is a flat/circular management structure).  From another perspective, however, when a primary leader (site administrative team) who controls online content is absent, decision-making processes change, i.e., when controversies or disputes arise, who addresses them?  Comparing Diaspora with other collaborative communities, such as Wikipedia, is an interesting approach to analyze the pros and cons of online community management.  As a conclusion, based on your findings, you may be able to set forth some important content management recommendations that highlight best practices for the Diaspora user-base. [[User:Zak Paster|Zak Paster]] 11:44, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
hI RICH: Is an interesting topic, i think that you can make an introduction, about what is the meaning of &amp;quot;free speech&amp;quot;, because, at the end, this is a relative concept, that depends, precisely, of the cultural context. &lt;br /&gt;
Natalia. &#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aaron,&amp;lt;br /&amp;gt;&lt;br /&gt;
I think focusing on the consequence these search engines have on the users, rather than the websites in the search results, is unique and will be really fascinating to look at. Although you did narrow down the specific community you would look at -- the SEO community -- I think you will need to narrow it down further, perhaps to a specific website or set of websites serving a larger online community.&amp;lt;br /&amp;gt;&lt;br /&gt;
One thing you didn&#039;t mention in your prospectus was how you would go about researching the SEO community. I think finding a specific community would be beneficial here as well -- it would give you a better idea as to what specific research methods you could employ. Once you have a more specific community I think everything else will fall into place.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 17:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hunter, your idea is magnificent. I enjoy your paradox. The thing I notice best about your proposal is that you are using your own ideas, when you could always plagiarize unintentionally. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Hunter, &lt;br /&gt;
The idea of &amp;quot;digging&amp;quot; in to find out the real and factual government approach on this matter is great. I think you have alot of great material to work with and you are moving in the right direction. I would just advise you to order your ideas in a clearer way so that your reader doesn&#039;t get lost. Great idea! [[User:GregB23|GregB23]] 15:29, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Hunter, i think that this theme is a little too wide, so, in order to be more specific, you can take one of the liberties than can be affect by governments control, and analyze that.&lt;br /&gt;
Natalia. ´´´´&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I think this is a great starting point for a research paper, and I love the idea of looking at Starbucks, since it is such a huge corporation. However, I think your hypotheses are too easily proved. I think you could go much further with your topic if you think about questions after answering your initial questions...for instance, say posts/comments are regulated differently. Some questions to consider could be, shy would Starbucks spend more/less time managing comments on one site than another? Is there a pattern to how Starbucks regulates comments/posts on their different social media websites? What are the consequences of managing comments differently between websites? Does the user body have anything to do with how Starbucks regulates comments?…etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:36, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Michael,&lt;br /&gt;
I believe that your idea for this assignment fulfills the essence of it. I think you should define for this prospectus what type of content control you will focus your analysis on. You might also include what reactions the members have to the various forms of censorship.[[User:GregB23|GregB23]] 15:34, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
You’ve chosen a very interesting topic that most of us have probably considered at some point. It’s often difficult to know where to draw the line when making policy decisions of this sort – to create a system that handles edge cases judiciously – and some people clearly aren’t even trying to create a fair system. I wonder what you can generalize from a case study like this. In short, how much variance do you think there is in the forms that censorship takes in web communities? It seems that there are powerful conventions and practical limitations with regards to how content control is done, such that many of the same features keep reappearing again and again.&lt;br /&gt;
&lt;br /&gt;
At the end of your final paragraph, you say that removing entire discussions is a highly effective approach to content control. Would you mind elaborating on this? What standard of effectiveness are you using? Is something that merely keeps the community silent effective, or something that keeps it happy? What makes banning members sometimes less effective in comparison?&lt;br /&gt;
[[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “INTELLECTUAL PROPERTY RIGHTS, RIGHTS TO INFORMATION AND FREEDOM OF SPEECH ON INTERNET: CONFLICTING RIGHTS?”&lt;br /&gt;
Link to prospectus:http://cyber.law.harvard.edu/is2013/File:Natalia_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris comments: Natalia, Your topic is very interesting, like mine (please comment!) quite broad and could as a suggestion focus completely on one case study that you think most illustrates and answers your hypothesis. I saw that you gave three, just curious as to is there one that is the overarching example for national and internatinal jurisprudence, or does this fall more into the realm of international governing bodies... or decided by national standards? Ultimately are you asking, is freedom of speech or protection of ideas more important on the internet? I like how you tie in that curbing freedom of expression starts to curb human rights, but that some regulation is necessary in civilization. A suggestion is to offer a framework that can be used interactively, involving a way for future bodies looking at legislation on intellectual property and freedom of speech and benchmarks for them to judge whether a law or regulation is infringes on human rights, or is necessary for to preserve civilization. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 20:33, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney comments: Hi Natalia, I agree with Daniel that your paper can use more focus. The topic of intellectual property is exceptionally broad and can encompass an enormous number of cases, law, international interpretation, etc. It might be helpful to narrow down on one or two case studies that particularly peak your interest that you feel make a major statement for the future of IP and confirm your hypotheses. Perhaps you can also focus on one of your three questions, as there are many discussion points buried within each, within the context of one particular country. Intellectual property is interesting to explore, particularly as the changing nature of social sharing is entirely shifting the concept. If you can hone in on one refined idea, I think you can find yourself developing some fascinating ideas and predictions.  &lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
:Rabekah- Your proposal sounds like an interesting subject. Is this group something that you have taken part in, or is your statement “Critique from Within” to be interpreted that Weird Twitter is critiquing Twitter or the Twitter community from within? It looks like you have a good outline and a method that will lead you to interesting material. I am wondering how this relates to censorship or control. Does the tweeting of Weird Twitter have any sort of influence on the broader Twitter community? Do members of a group in Twitter influence one another in a way that has some sort of an influence on the group as a whole?[[User:Tessa May|Tessa May]] 20:07, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Rebekah, this is an interesting online community - one I hadn&#039;t previously been familiar with, but fascinating to learn about. My main thought while reading this is the longevity of this community. Google Analytics has shown the search rate for &amp;quot;Weird Twitter&amp;quot; drop dramatically in the past month. I wonder if the loose group of individuals may be fluid in their terminology, and therefore be a bit difficult to track down. On that note, well done selecting several twitter users from the start to monitor. I imagine if they are consistent in their &amp;quot;Weird Twitter&amp;quot; tweets, you will also find yourself becoming familiar with the online community that extends beyond these users. My second thought would be the impact this community - fluid as it may be - has on the wider twitter community. If they are not operating under a single hashtag, how do new users find them?  How do they distinguish themselves?&lt;br /&gt;
Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Rebekah, I love this topic! I&#039;ve been a fan of horse_ebooks and Riff Raff, but was unaware of any umbrella term under which they belonged. &lt;br /&gt;
Though both personalities tweet in this poetical anarchist fashion, disregarding traditional language conventions,  I would never associate them together because of their vastly motivations. Riff Raff wants fame and fortune. Horse_ebooks wants to be invisible. However, according to the Chicago Reader&#039;s Weird Twitter map, Riff Raff and Horse_ebooks hold similarly prominent positons in spite of their real life differences. The concept of &amp;quot;Weird Twitter&amp;quot; is completely reader-defined, and I think requires exploration of the population who appreciates these aliases and associates them with one another, perhaps in contrast to Weird Twitter author&#039;s real motivations. One last thing is to explore is how Twitter&#039;s architecture (i.e. the 150 character confines) have altered how we think to use language  and enable/prevent &amp;quot;weird Twitter.&amp;quot; Here are some relevant articles about Horse_ebooks and Riff Raff: http://gawker.com/5887697/    http://gawker.com/5912835/riff-raffs-got-a-record-deal-making-sense-of-the-most-viral-human-being-in-music  &lt;br /&gt;
[[User:Jax|Jax]] 21:07, 4 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
**&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
:Joshywonder: I think you have a fabulous idea and have sources that have interested you on this topic. I wonder if you are interested in discussing the difference between Canadian English versus either the United States English or &amp;quot;Official English&amp;quot; as it may be. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:13, 3 March 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
:Joshywonder: This is a very interesting case that you site. Was there a public response to this incident? Did the individual who brought the suit suffer in reputation either from the content of the site or from the attention given to the lawsuit? Is the site something that you personally took part in? Do you think that anonymous posters or posters using pseudonyms make a valuable contribution to discussion in public internet forums? It looks like you have developed your method and you have plenty of interesting information to choose from. I think that an important factor in your write-up will be to narrow your presentation to the details you think will best inform your audience of the issues at stake and best illuminate the specific case as a study subject. [[User:Tessa May|Tessa May]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
**&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
Matthew, your writing is very scientific; and I applaud you for this. The reader can be left skeptical and that is a matter of definition. Keep up the good work. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
Matthew: Wonderful topic, I think you’ll have a lot of fun with this research topic. Although you have wonderful sources, I was wondering to know how you will gather the data, and do you think that Yelp will be able to provide you with clarification of removed posts? Censorship plays an important role within this topic; will you use any interesting cases to defend your paper? [[User:User777|user777]] 18:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
**&lt;br /&gt;
&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Milena, what an interesting topic. Duolingo reminds me of a wikipedia of sorts in the ways it relates to copyrighted information. As crowdsourced information has grown in the past few years, I imagine you may also find similar information on how copyright is addressed in recent case studies. Another question to ask would be how users can ensure the translation is accurate? If you delve into the terms &amp;amp; conditions, you may also wish to see how Duolingo holds users accountable and verify the information is indeed an accurate representation of the initial intent. There are many concepts to delve into here, but I think you have done a very nice job of boiling it down to the main concerns the site may encounter moving forward.Kaley Sweeney 20:41, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
Dear Milena Grado, I found your paper proposal quite interesting. I haven’t heard about Duolingo, however I have few questions: What about the translation [if] being out of context? What about sentence structure? Culture/ How precise is the translation? If so, what kind of copy rights will this serve gather, in order to protect the translation services? I noted that you will be gathering information through “Twitter, Facebook and Duolingo&#039;s blog- very interesting! Do you have specific way of analyzing this data? Use/volume based? Good luck with the paper, I think it’s quite an interesting topic to write a paper on. &lt;br /&gt;
[[User:User777|user777]] 17:42, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa,&amp;lt;br/&amp;gt;&lt;br /&gt;
This looks really, really fascinating! I&#039;m curious - are you considering comparing multiple groups in differing categories? I ask because it may be interesting to see if two groups in similar categories have similar patterns in deleting posts. &amp;lt;br /&amp;gt;&lt;br /&gt;
Another thing that came to mind: it may be interesting to look at the profiles of the group members to see if there is any pattern between those whose posts are deleted, those who tend to align with group moderators, etc….since LinkedIn profiles generally provide members&#039; current, and often prior, employment and education, you may be able to identify a pattern based on members&#039; socioeconomic status.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:15, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Tessa,&lt;br /&gt;
This looks very interesting and you seem to have your ideas extremely clear. I love the idea of having a survey sent to group owners at the end of your investigation period. I would also suggest, if I may, to contact Linkedin directly and see if they have a comment in regard. [[User:GregB23|GregB23]] 15:22, 4 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
Tessa: I think you’ve picked out a great topic for your research paper. I am an active user of Linkedin, and participate in quite a few groups, and you are correct, that posts are being deleted without notice, which sometimes makes it hard to fallow the group/topic itself. I see that you have a perfect strategy for your paper, which I think will definitely help you generate a great paper. How many groups will you audit? How often will you review a group? Good luck on your paper, and I look forward to read your final work (if class permits). &lt;br /&gt;
[[User:User777|user777]] 18:21, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “Moderation or Censorship in LinkedIn Groups?.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Tessa_May_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris: Tessa, exploring the idea of censorship on LinkedIn groups sounds good. My suggestion is perhaps attempting to see why some might censor or remove content, for example, if the poster is attempting to get them to go to another group on the same topic. Perhaps content subtractions occur when the owner(s) of the group want simply to exert more control over the group as opposed to encouraging as many comments as possible. Other times, comments might be deleted due to not fitting into the general standards of professionalism that is expected on LinkedIn. Mabye you can come up with your own categories for deleted comments to expand on this, and determine if the deletions are leaning more toward censorship or content control. &lt;br /&gt;
****&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 19:52, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Greetings Daniel: Moderation or Censorship in Linkden Groups really caught my, in regards to the fact that this is a very provocative title. In your prospectus it is interesting to note how you plan on gathering data with regards to specific groups within the site. Being that LinkedIn has captured the social media market for the professional, how will you be able to identify would would need to be cencsorn in a group that is by membership only? Secondly I am very much looking forward to see how Moderation is pulled in to groups. I like the idea of individuals within groups being limited in comments and mailing so that a, &amp;quot;only bully&amp;quot; in a specific network will not hog all of the conversation and in turn add to a more healthy convention of conversation- Hunter [[User:HunterGaylor|HunterGaylor]] 15:57, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “Popular culture can interestingly be compared to James White’s article on “Imagining the Law” ”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:AliciaPhan_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris User Comments: Alicia, Your examination of privacy rights on social networking sites such as Facebook is facinating. I would ask, &#039;Are our intellectual property rights waived automatically when we use a limited privacy social network site?&#039; The topic seems really hot right now, and going into the various privacy settings on Facebook and arguements pro and con in light of legal decisions in the United States and other nations, even international bodies, will be enlightening to fellow Facebook fans. A suggestion could be analysis of each privacy setting, with pro and con arguements for personal privacy being intellectual property that must be waived to share with others. Pretty sure that is what already happens, but really without the examination my comments are just speculation. I await your comments on my proposal as well. Thanks!&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 22:07, 3 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Muromi&lt;br /&gt;
Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Zak: Great Topic. The notion that online fundraising has been getting in recent months is overwhelming. The effective fundraising idea comes with the clear revelation that the internet is very powerful tool. With tools like Kick starter, and rocket hub are able to cast a wider net that will allow more individuals to participate in supporting a cause. However, with regards to control one must ask themselves with a wider net and more individuals having the ability to contribute, how will one be able to control how that money is being accounted for and that it is coming from individuals that are proper for that organization. This is a new eara of Fundraising, both in the public and private sector. On must not loose focus on how effective is new era will be providing an easier access to funds. I am very much looking forward to your final project. Best of Luck and great Topic choice! I am very encouraged that someone is shedding light on potential positive effect this can have for the NGO world. Hunter [[User:HunterGaylor|HunterGaylor]] 16:06, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
:Jonathan Merkwan: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Jonathan Merkwan: Jonathan, it seems like you have a lot of ideas and are attempting to address several broad areas, including international, sociological, and architectural perspectives through field world. Reading this prospectus, I was confused at a few points, such as &amp;quot;According to each face as an old friend, I have been studying the relativity of facial recognition.. &amp;quot; This sounds interesting, but I&#039;m not entirely certain what it means. Does this mean you are comparing the new friends you are adding to the old friends you deleted? You say, &amp;quot;Now  Facebook has deemed my friendships “real,”&amp;quot; but do not specify how Facebook has promoted this realness. I think something valuable in your prospectus so far is your investigation of  &amp;quot;the spellcheck, autocorrect, and various prompted questions Facebook has alerted me to, and in doing so shall see how each action makes a difference, contextually.&amp;quot; I think you should continue with this line of questioning, investing how facebook&#039;s suggestions influence our behavior on the site. Here is a tool to analyze your personal facebook behavior: http://www.wolframalpha.com/facebook/ and another useful facebook statistic link http://blog.hubspot.com/blog/tabid/6307/bid/6128/The-Ultimate-List-100-Facebook-Statistics-Infographics.aspx .&lt;br /&gt;
[[User:Jax|Jax]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. [[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Phillip, I am very excited to see the direction that you take regarding the DLPA, specifically in regards to the potential subtractiveness of the organization. It is always interesting&lt;br /&gt;
to see the how the members of the community will add to the over all effectiveness of engagement with regards to organization. Because DLPA is stated that, “The hope is that broad access to scientific results will encourage faster progress on research and will let anyone apply the knowledge for technological advances. The ability to shed light on the effectiveness will be exciting to see. &amp;quot;-HunterGaylor&amp;quot; [[User:HunterGaylor|HunterGaylor]] 15:50, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
I thought the title was a bit odd. Since so few people are familiar with the DPLA, wouldn’t it be better to give more context? “Additive” and “subtractive” can be a little confusing when one doesn’t know what the noun means, since those words are used regularly in very different ways. I would suggest something along the lines of “Evaluating the Effectiveness of the DPLA.”&lt;br /&gt;
&lt;br /&gt;
The argument about it contributing to social stratification was quite familiar for me; it seems to be used against many new technologies and developments.&lt;br /&gt;
&lt;br /&gt;
Good luck with your project. It sounds quite interesting. I think it’s a good idea to implement it as a video, in terms of accessibility. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST)   &lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Kaley: I like your topic because it sheds light on democratic freedoms.  Will the expansion of Internet usage in North Korea bring new forms of democracy to a select group of citizens?  Will outside influences, that emerge via the Internet, begin to alter government relations?  At the end of your prospectus, you mention that you...&#039;&#039;”wish to examine the forces that have perpetuated the insulation of the country from the technological revolution and the changes that are beginning to unfold with the rise in mobile internet access in the country.”&#039;&#039;  To narrow your focus, you may want to consider highlighting a few primary forces, i.e., norms, market, etc., with descriptions surrounding each force.  To answer the latter part (changes that are beginning to unfold in North Korea), what types of changes are you referring to?  Do you plan to analyze technological changes, societal changes, or both?  To this end, defining a few categories may bring additional structure/clarity to your analysis. [[User:Zak Paster|Zak Paster]] 11:37, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Raven,  It will be interesting to see which site (anonymous vs. registered users) create more tolls, flame wars, and other aspects to the online world that does not seem to exist in the offline space.  The reverse is to see if the sites that require registration will create more fruitful conversations or of they’re equal in quality/quantity to the ones that allow anonymous commenters.  &lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:00, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi John, it will be interesting to see if the behaviors found in these online communities will differ from the politics, alliances, and cabals of the real world.  I&#039;m most interested to see if the internet is a better coordination and orchestration mechanism for organizing, and can people online respond quicker, more effectively, and efficiently than offline groups to adapt to the changing political landscapes this game provides.&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi John,&lt;br /&gt;
&lt;br /&gt;
Great choice of subject, i find it fascinating how these communities of random people from around the globe come together and work together to a certain goal as a community. [[User:DanielReissHarris|DanielReissHarris]] 17:27, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi CyberRalph: This is an interesting topic.  As I read your prospectus, the notion of responsibility and liability came to mind.  If this group advertises cyber-attacks, can they inevitably be held accountable?  For example, could law enforcement officials follow the leads to IP addresses, and ultimately discover the group(s) behind such attacks?  It may be interesting to compare the concepts of online crime with other forms of illicit activities (is online crime more isolated and easier to commit without paying the consequences?).  As an intro or conclusion, you may also want to consider highlighting current trends with cyber-attacks and security measures that governments/large companies take.  Furthermore, to strengthen your analysis, it would be interesting if you state your personal hypothesis upfront, followed by your question surrounding motivation for these types of attacks. [[User:Zak Paster|Zak Paster]] 11:34, 3 March 2013 (EST)  &lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
&lt;br /&gt;
Hi Aly, it was shocking to read about these communities, very interesting subject to investigate. I think it’s a good idea to focus in comparing activities in pro anorexia communities and recovery support groups in reddit.com, leaving aside the other platforms to narrow your scope. I think you should also define what will you observe from these communities in order to reach a conclusion for your investigation: do you want to know how control is being implemented? Or maybe focus in one particular constraint and see how it plays a role in regulating the community?--[[User:Maria|Maria]] 11:40, 3 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
I think that’s an interesting topic, which surprisingly we haven’t covered much in class yet. It raises many interesting questions. In what ways, and how does the legal system protect anonymity? And are those protections by design, or unintentional as Section 230 was by operating separately from the rest of the legislation with which it was supposed to be packaged? Should those laws be there, or were they mistakes? Often, normative questions reduce to tradeoffs. In this case, it’s the classic tradeoff between privacy and incentivizing socially advantageous behavior.&lt;br /&gt;
&lt;br /&gt;
Also, have you decided which of Lessig’s four constraints you’ll be using? Are you sure you’ll only be using one? It seems that there are critical points to be made from more angles, and could probably be done without extending scope to beyond what is manageable with the time and length constraints. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Becca, Interesting topic and it will be interesting to see how the online components and ‘permanent record’ of comments (architecture) might prohibit and skew the conversation vs. offline, real-world conversations. Will questions asked be inhibited by the semi-public aspect of online forums, preventing people from receiving better care than the privacy the offline world affords?  Or will the open aspect of the community allow the best comments to bubble up and be connected to experts who would otherwise not have seen the question if it was asked in the offline world.&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Pseudonym: baughller&lt;br /&gt;
Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  [[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Laurence Girard&lt;br /&gt;
&lt;br /&gt;
Laurence Girard Prospectus &lt;br /&gt;
&lt;br /&gt;
Question: What effect does reading online health information have on the health of our society?&lt;br /&gt;
&lt;br /&gt;
Many people search for online health information on a daily basis, but most of this information is not reviewed by physicians. As a result, many people self-diagnose and as a result this can result in very dangerous health outcomes. I am interested in studying websites such as WebMD and seeing what type of impact this has on people’s health. &lt;br /&gt;
&lt;br /&gt;
I am particularly interested in seeing how online health  content relates to online health products. For example, perhaps someone reads an article on WebMD about how Vitamin D affects their health and then as a result they buy it on Amazon.com. What types of supplements are people buying and what affect is this having on their health?I am also interested in websites such as Teladoc.com where users can consult with physicians. In other words, I am interested in studying how people access health information, products, and consultations online.  I have read one statistic that says 80% of people in our country search for online health information. For this reason, I think this will be a particularly interesting project to complete and is relevant to the healthcare debate in our country. We need to focus more on prevention and less on treatment and the Internet can certainly be one modality for doing this. I am interested to hear about what my fellow classmates have to say about my chosen assignment.&lt;br /&gt;
&lt;br /&gt;
Laurence: This sounds like a very interesting topic, but would be a huge project to undertake.  Can you find one community where people are talking about health issues?  I imagine every major disease or condition has some kind of community such as the American Cancer Societies’ Online Communities and Support [[http://www.cancer.org/treatment/supportprogramsservices/onlinecommunities/index]]  and choose one or two subgroups to study.  Then I think you would be able to look at issues similar to those that Becca will be looking at for her project about Issues of Privacy in Online Mental Health Communities.  [[User:Susan Goldstein|Susan Goldstein]] 14:48, 4 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9883</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9883"/>
		<updated>2013-03-05T01:39:15Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi ASmith. i think that your work it´s a perfect oportunity in order to expose a new theory, or an alternative of the concept of Intellectual Property in the network. because if the community make their own rules, maybe, can construct new limits, exceptions etc, in this area.&lt;br /&gt;
Natalia ´´´´&lt;br /&gt;
&lt;br /&gt;
Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User:&lt;br /&gt;
Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Asmith – Your proposal is clear and the questions you&#039;ve set forth are important.  In reference to your final paragraph, it may also be interesting to evaluate pros and cons surrounding centralized content control versus the lack thereof.  For example, from one perspective, a collaborative online community is important because everyone is considered equal (there is a flat/circular management structure).  From another perspective, however, when a primary leader (site administrative team) who controls online content is absent, decision-making processes change, i.e., when controversies or disputes arise, who addresses them?  Comparing Diaspora with other collaborative communities, such as Wikipedia, is an interesting approach to analyze the pros and cons of online community management.  As a conclusion, based on your findings, you may be able to set forth some important content management recommendations that highlight best practices for the Diaspora user-base. [[User:Zak Paster|Zak Paster]] 11:44, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
hI RICH: Is an interesting topic, i think that you can make an introduction, about what is the meaning of &amp;quot;free speech&amp;quot;, because, at the end, this is a relative concept, that depends, precisely, of the cultural context. &lt;br /&gt;
Natalia. &#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aaron,&amp;lt;br /&amp;gt;&lt;br /&gt;
I think focusing on the consequence these search engines have on the users, rather than the websites in the search results, is unique and will be really fascinating to look at. Although you did narrow down the specific community you would look at -- the SEO community -- I think you will need to narrow it down further, perhaps to a specific website or set of websites serving a larger online community.&amp;lt;br /&amp;gt;&lt;br /&gt;
One thing you didn&#039;t mention in your prospectus was how you would go about researching the SEO community. I think finding a specific community would be beneficial here as well -- it would give you a better idea as to what specific research methods you could employ. Once you have a more specific community I think everything else will fall into place.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 17:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hunter, your idea is magnificent. I enjoy your paradox. The thing I notice best about your proposal is that you are using your own ideas, when you could always plagiarize unintentionally. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Hunter, &lt;br /&gt;
The idea of &amp;quot;digging&amp;quot; in to find out the real and factual government approach on this matter is great. I think you have alot of great material to work with and you are moving in the right direction. I would just advise you to order your ideas in a clearer way so that your reader doesn&#039;t get lost. Great idea! [[User:GregB23|GregB23]] 15:29, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Hunter, i think that this theme is a little too wide, so, in order to be more specific, you can take one of the liberties than can be affect by governments control, and analyze that.&lt;br /&gt;
Natalia. ´´´´&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I think this is a great starting point for a research paper, and I love the idea of looking at Starbucks, since it is such a huge corporation. However, I think your hypotheses are too easily proved. I think you could go much further with your topic if you think about questions after answering your initial questions...for instance, say posts/comments are regulated differently. Some questions to consider could be, shy would Starbucks spend more/less time managing comments on one site than another? Is there a pattern to how Starbucks regulates comments/posts on their different social media websites? What are the consequences of managing comments differently between websites? Does the user body have anything to do with how Starbucks regulates comments?…etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:36, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Michael,&lt;br /&gt;
I believe that your idea for this assignment fulfills the essence of it. I think you should define for this prospectus what type of content control you will focus your analysis on. You might also include what reactions the members have to the various forms of censorship.[[User:GregB23|GregB23]] 15:34, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
You’ve chosen a very interesting topic that most of us have probably considered at some point. It’s often difficult to know where to draw the line when making policy decisions of this sort – to create a system that handles edge cases judiciously – and some people clearly aren’t even trying to create a fair system. I wonder what you can generalize from a case study like this. In short, how much variance do you think there is in the forms that censorship takes in web communities? It seems that there are powerful conventions and practical limitations with regards to how content control is done, such that many of the same features keep reappearing again and again.&lt;br /&gt;
&lt;br /&gt;
At the end of your final paragraph, you say that removing entire discussions is a highly effective approach to content control. Would you mind elaborating on this? What standard of effectiveness are you using? Is something that merely keeps the community silent effective, or something that keeps it happy? What makes banning members sometimes less effective in comparison?&lt;br /&gt;
[[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “INTELLECTUAL PROPERTY RIGHTS, RIGHTS TO INFORMATION AND FREEDOM OF SPEECH ON INTERNET: CONFLICTING RIGHTS?”&lt;br /&gt;
Link to prospectus:http://cyber.law.harvard.edu/is2013/File:Natalia_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris comments: Natalia, Your topic is very interesting, like mine (please comment!) quite broad and could as a suggestion focus completely on one case study that you think most illustrates and answers your hypothesis. I saw that you gave three, just curious as to is there one that is the overarching example for national and internatinal jurisprudence, or does this fall more into the realm of international governing bodies... or decided by national standards? Ultimately are you asking, is freedom of speech or protection of ideas more important on the internet? I like how you tie in that curbing freedom of expression starts to curb human rights, but that some regulation is necessary in civilization. A suggestion is to offer a framework that can be used interactively, involving a way for future bodies looking at legislation on intellectual property and freedom of speech and benchmarks for them to judge whether a law or regulation is infringes on human rights, or is necessary for to preserve civilization. &lt;br /&gt;
&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 20:33, 3 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
:Rabekah- Your proposal sounds like an interesting subject. Is this group something that you have taken part in, or is your statement “Critique from Within” to be interpreted that Weird Twitter is critiquing Twitter or the Twitter community from within? It looks like you have a good outline and a method that will lead you to interesting material. I am wondering how this relates to censorship or control. Does the tweeting of Weird Twitter have any sort of influence on the broader Twitter community? Do members of a group in Twitter influence one another in a way that has some sort of an influence on the group as a whole?[[User:Tessa May|Tessa May]] 20:07, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
**&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
:Joshywonder: I think you have a fabulous idea and have sources that have interested you on this topic. I wonder if you are interested in discussing the difference between Canadian English versus either the United States English or &amp;quot;Official English&amp;quot; as it may be. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:13, 3 March 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
:Joshywonder: This is a very interesting case that you site. Was there a public response to this incident? Did the individual who brought the suit suffer in reputation either from the content of the site or from the attention given to the lawsuit? Is the site something that you personally took part in? Do you think that anonymous posters or posters using pseudonyms make a valuable contribution to discussion in public internet forums? It looks like you have developed your method and you have plenty of interesting information to choose from. I think that an important factor in your write-up will be to narrow your presentation to the details you think will best inform your audience of the issues at stake and best illuminate the specific case as a study subject. [[User:Tessa May|Tessa May]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
**&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
Matthew, your writing is very scientific; and I applaud you for this. The reader can be left skeptical and that is a matter of definition. Keep up the good work. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
Matthew: Wonderful topic, I think you’ll have a lot of fun with this research topic. Although you have wonderful sources, I was wondering to know how you will gather the data, and do you think that Yelp will be able to provide you with clarification of removed posts? Censorship plays an important role within this topic; will you use any interesting cases to defend your paper? [[User:User777|user777]] 18:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
**&lt;br /&gt;
&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
Dear Milena Grado, I found your paper proposal quite interesting. I haven’t heard about Duolingo, however I have few questions: What about the translation [if] being out of context? What about sentence structure? Culture/ How precise is the translation? If so, what kind of copy rights will this serve gather, in order to protect the translation services? I noted that you will be gathering information through “Twitter, Facebook and Duolingo&#039;s blog- very interesting! Do you have specific way of analyzing this data? Use/volume based? Good luck with the paper, I think it’s quite an interesting topic to write a paper on. &lt;br /&gt;
[[User:User777|user777]] 17:42, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa,&amp;lt;br/&amp;gt;&lt;br /&gt;
This looks really, really fascinating! I&#039;m curious - are you considering comparing multiple groups in differing categories? I ask because it may be interesting to see if two groups in similar categories have similar patterns in deleting posts. &amp;lt;br /&amp;gt;&lt;br /&gt;
Another thing that came to mind: it may be interesting to look at the profiles of the group members to see if there is any pattern between those whose posts are deleted, those who tend to align with group moderators, etc….since LinkedIn profiles generally provide members&#039; current, and often prior, employment and education, you may be able to identify a pattern based on members&#039; socioeconomic status.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:15, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Tessa,&lt;br /&gt;
This looks very interesting and you seem to have your ideas extremely clear. I love the idea of having a survey sent to group owners at the end of your investigation period. I would also suggest, if I may, to contact Linkedin directly and see if they have a comment in regard. [[User:GregB23|GregB23]] 15:22, 4 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
Tessa: I think you’ve picked out a great topic for your research paper. I am an active user of Linkedin, and participate in quite a few groups, and you are correct, that posts are being deleted without notice, which sometimes makes it hard to fallow the group/topic itself. I see that you have a perfect strategy for your paper, which I think will definitely help you generate a great paper. How many groups will you audit? How often will you review a group? Good luck on your paper, and I look forward to read your final work (if class permits). &lt;br /&gt;
[[User:User777|user777]] 18:21, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “Moderation or Censorship in LinkedIn Groups?.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Tessa_May_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris: Tessa, exploring the idea of censorship on LinkedIn groups sounds good. My suggestion is perhaps attempting to see why some might censor or remove content, for example, if the poster is attempting to get them to go to another group on the same topic. Perhaps content subtractions occur when the owner(s) of the group want simply to exert more control over the group as opposed to encouraging as many comments as possible. Other times, comments might be deleted due to not fitting into the general standards of professionalism that is expected on LinkedIn. Mabye you can come up with your own categories for deleted comments to expand on this, and determine if the deletions are leaning more toward censorship or content control. &lt;br /&gt;
****&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 19:52, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Greetings Daniel: Moderation or Censorship in Linkden Groups really caught my, in regards to the fact that this is a very provocative title. In your prospectus it is interesting to note how you plan on gathering data with regards to specific groups within the site. Being that LinkedIn has captured the social media market for the professional, how will you be able to identify would would need to be cencsorn in a group that is by membership only? Secondly I am very much looking forward to see how Moderation is pulled in to groups. I like the idea of individuals within groups being limited in comments and mailing so that a, &amp;quot;only bully&amp;quot; in a specific network will not hog all of the conversation and in turn add to a more healthy convention of conversation- Hunter [[User:HunterGaylor|HunterGaylor]] 15:57, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “Popular culture can interestingly be compared to James White’s article on “Imagining the Law” ”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:AliciaPhan_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris User Comments: Alicia, Your examination of privacy rights on social networking sites such as Facebook is facinating. I would ask, &#039;Are our intellectual property rights waived automatically when we use a limited privacy social network site?&#039; The topic seems really hot right now, and going into the various privacy settings on Facebook and arguements pro and con in light of legal decisions in the United States and other nations, even international bodies, will be enlightening to fellow Facebook fans. A suggestion could be analysis of each privacy setting, with pro and con arguements for personal privacy being intellectual property that must be waived to share with others. Pretty sure that is what already happens, but really without the examination my comments are just speculation. I await your comments on my proposal as well. Thanks!&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 22:07, 3 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Muromi&lt;br /&gt;
Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Zak: Great Topic. The notion that online fundraising has been getting in recent months is overwhelming. The effective fundraising idea comes with the clear revelation that the internet is very powerful tool. With tools like Kick starter, and rocket hub are able to cast a wider net that will allow more individuals to participate in supporting a cause. However, with regards to control one must ask themselves with a wider net and more individuals having the ability to contribute, how will one be able to control how that money is being accounted for and that it is coming from individuals that are proper for that organization. This is a new eara of Fundraising, both in the public and private sector. On must not loose focus on how effective is new era will be providing an easier access to funds. I am very much looking forward to your final project. Best of Luck and great Topic choice! I am very encouraged that someone is shedding light on potential positive effect this can have for the NGO world. Hunter [[User:HunterGaylor|HunterGaylor]] 16:06, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
:Jonathan Merkwan: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Jonathan Merkwan: Jonathan, it seems like you have a lot of ideas and are attempting to address several broad areas, including international, sociological, and architectural perspectives through field world. Reading this prospectus, I was confused at a few points, such as &amp;quot;According to each face as an old friend, I have been studying the relativity of facial recognition.. &amp;quot; This sounds interesting, but I&#039;m not entirely certain what it means. Does this mean you are comparing the new friends you are adding to the old friends you deleted? You say, &amp;quot;Now  Facebook has deemed my friendships “real,”&amp;quot; but do not specify how Facebook has promoted this realness. I think something valuable in your prospectus so far is your investigation of  &amp;quot;the spellcheck, autocorrect, and various prompted questions Facebook has alerted me to, and in doing so shall see how each action makes a difference, contextually.&amp;quot; I think you should continue with this line of questioning, investing how facebook&#039;s suggestions influence our behavior on the site. Here is a tool to analyze your personal facebook behavior: http://www.wolframalpha.com/facebook/ and another useful facebook statistic link http://blog.hubspot.com/blog/tabid/6307/bid/6128/The-Ultimate-List-100-Facebook-Statistics-Infographics.aspx .&lt;br /&gt;
[[User:Jax|Jax]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. [[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Phillip, I am very excited to see the direction that you take regarding the DLPA, specifically in regards to the potential subtractiveness of the organization. It is always interesting&lt;br /&gt;
to see the how the members of the community will add to the over all effectiveness of engagement with regards to organization. Because DLPA is stated that, “The hope is that broad access to scientific results will encourage faster progress on research and will let anyone apply the knowledge for technological advances. The ability to shed light on the effectiveness will be exciting to see. &amp;quot;-HunterGaylor&amp;quot; [[User:HunterGaylor|HunterGaylor]] 15:50, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
I thought the title was a bit odd. Since so few people are familiar with the DPLA, wouldn’t it be better to give more context? “Additive” and “subtractive” can be a little confusing when one doesn’t know what the noun means, since those words are used regularly in very different ways. I would suggest something along the lines of “Evaluating the Effectiveness of the DPLA.”&lt;br /&gt;
&lt;br /&gt;
The argument about it contributing to social stratification was quite familiar for me; it seems to be used against many new technologies and developments.&lt;br /&gt;
&lt;br /&gt;
Good luck with your project. It sounds quite interesting. I think it’s a good idea to implement it as a video, in terms of accessibility. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST)   &lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Kaley: I like your topic because it sheds light on democratic freedoms.  Will the expansion of Internet usage in North Korea bring new forms of democracy to a select group of citizens?  Will outside influences, that emerge via the Internet, begin to alter government relations?  At the end of your prospectus, you mention that you...&#039;&#039;”wish to examine the forces that have perpetuated the insulation of the country from the technological revolution and the changes that are beginning to unfold with the rise in mobile internet access in the country.”&#039;&#039;  To narrow your focus, you may want to consider highlighting a few primary forces, i.e., norms, market, etc., with descriptions surrounding each force.  To answer the latter part (changes that are beginning to unfold in North Korea), what types of changes are you referring to?  Do you plan to analyze technological changes, societal changes, or both?  To this end, defining a few categories may bring additional structure/clarity to your analysis. [[User:Zak Paster|Zak Paster]] 11:37, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Raven,  It will be interesting to see which site (anonymous vs. registered users) create more tolls, flame wars, and other aspects to the online world that does not seem to exist in the offline space.  The reverse is to see if the sites that require registration will create more fruitful conversations or of they’re equal in quality/quantity to the ones that allow anonymous commenters.  &lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:00, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi John, it will be interesting to see if the behaviors found in these online communities will differ from the politics, alliances, and cabals of the real world.  I&#039;m most interested to see if the internet is a better coordination and orchestration mechanism for organizing, and can people online respond quicker, more effectively, and efficiently than offline groups to adapt to the changing political landscapes this game provides.&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi John,&lt;br /&gt;
&lt;br /&gt;
Great choice of subject, i find it fascinating how these communities of random people from around the globe come together and work together to a certain goal as a community. [[User:DanielReissHarris|DanielReissHarris]] 17:27, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi CyberRalph: This is an interesting topic.  As I read your prospectus, the notion of responsibility and liability came to mind.  If this group advertises cyber-attacks, can they inevitably be held accountable?  For example, could law enforcement officials follow the leads to IP addresses, and ultimately discover the group(s) behind such attacks?  It may be interesting to compare the concepts of online crime with other forms of illicit activities (is online crime more isolated and easier to commit without paying the consequences?).  As an intro or conclusion, you may also want to consider highlighting current trends with cyber-attacks and security measures that governments/large companies take.  Furthermore, to strengthen your analysis, it would be interesting if you state your personal hypothesis upfront, followed by your question surrounding motivation for these types of attacks. [[User:Zak Paster|Zak Paster]] 11:34, 3 March 2013 (EST)  &lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
&lt;br /&gt;
Hi Aly, it was shocking to read about these communities, very interesting subject to investigate. I think it’s a good idea to focus in comparing activities in pro anorexia communities and recovery support groups in reddit.com, leaving aside the other platforms to narrow your scope. I think you should also define what will you observe from these communities in order to reach a conclusion for your investigation: do you want to know how control is being implemented? Or maybe focus in one particular constraint and see how it plays a role in regulating the community?--[[User:Maria|Maria]] 11:40, 3 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
I think that’s an interesting topic, which surprisingly we haven’t covered much in class yet. It raises many interesting questions. In what ways, and how does the legal system protect anonymity? And are those protections by design, or unintentional as Section 230 was by operating separately from the rest of the legislation with which it was supposed to be packaged? Should those laws be there, or were they mistakes? Often, normative questions reduce to tradeoffs. In this case, it’s the classic tradeoff between privacy and incentivizing socially advantageous behavior.&lt;br /&gt;
&lt;br /&gt;
Also, have you decided which of Lessig’s four constraints you’ll be using? Are you sure you’ll only be using one? It seems that there are critical points to be made from more angles, and could probably be done without extending scope to beyond what is manageable with the time and length constraints. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Becca, Interesting topic and it will be interesting to see how the online components and ‘permanent record’ of comments (architecture) might prohibit and skew the conversation vs. offline, real-world conversations. Will questions asked be inhibited by the semi-public aspect of online forums, preventing people from receiving better care than the privacy the offline world affords?  Or will the open aspect of the community allow the best comments to bubble up and be connected to experts who would otherwise not have seen the question if it was asked in the offline world.&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Pseudonym: baughller&lt;br /&gt;
Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  [[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Laurence Girard&lt;br /&gt;
&lt;br /&gt;
Laurence Girard Prospectus &lt;br /&gt;
&lt;br /&gt;
Question: What effect does reading online health information have on the health of our society?&lt;br /&gt;
&lt;br /&gt;
Many people search for online health information on a daily basis, but most of this information is not reviewed by physicians. As a result, many people self-diagnose and as a result this can result in very dangerous health outcomes. I am interested in studying websites such as WebMD and seeing what type of impact this has on people’s health. &lt;br /&gt;
&lt;br /&gt;
I am particularly interested in seeing how online health  content relates to online health products. For example, perhaps someone reads an article on WebMD about how Vitamin D affects their health and then as a result they buy it on Amazon.com. What types of supplements are people buying and what affect is this having on their health?I am also interested in websites such as Teladoc.com where users can consult with physicians. In other words, I am interested in studying how people access health information, products, and consultations online.  I have read one statistic that says 80% of people in our country search for online health information. For this reason, I think this will be a particularly interesting project to complete and is relevant to the healthcare debate in our country. We need to focus more on prevention and less on treatment and the Internet can certainly be one modality for doing this. I am interested to hear about what my fellow classmates have to say about my chosen assignment.&lt;br /&gt;
&lt;br /&gt;
Laurence: This sounds like a very interesting topic, but would be a huge project to undertake.  Can you find one community where people are talking about health issues?  I imagine every major disease or condition has some kind of community such as the American Cancer Societies’ Online Communities and Support [[http://www.cancer.org/treatment/supportprogramsservices/onlinecommunities/index]]  and choose one or two subgroups to study.  Then I think you would be able to look at issues similar to those that Becca will be looking at for her project about Issues of Privacy in Online Mental Health Communities.  [[User:Susan Goldstein|Susan Goldstein]] 14:48, 4 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9881</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9881"/>
		<updated>2013-03-05T01:38:01Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi ASmith. i think that your work it´s a perfect oportunity in order to expose a new theory, or an alternative of the concept of Intellectual Property in the network. because if the community make their own rules, maybe, can construct new limits, exceptions etc, in this area.&lt;br /&gt;
Natalia ´´´´&lt;br /&gt;
&lt;br /&gt;
Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User:&lt;br /&gt;
Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Asmith – Your proposal is clear and the questions you&#039;ve set forth are important.  In reference to your final paragraph, it may also be interesting to evaluate pros and cons surrounding centralized content control versus the lack thereof.  For example, from one perspective, a collaborative online community is important because everyone is considered equal (there is a flat/circular management structure).  From another perspective, however, when a primary leader (site administrative team) who controls online content is absent, decision-making processes change, i.e., when controversies or disputes arise, who addresses them?  Comparing Diaspora with other collaborative communities, such as Wikipedia, is an interesting approach to analyze the pros and cons of online community management.  As a conclusion, based on your findings, you may be able to set forth some important content management recommendations that highlight best practices for the Diaspora user-base. [[User:Zak Paster|Zak Paster]] 11:44, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
hI RICH: Is an interesting topic, i think that you can make an introduction, about what is the meaning of &amp;quot;free speech&amp;quot;, because, at the end, this is a relative concept, that depends, precisely, of the cultural context. &lt;br /&gt;
Natalia. &#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aaron,&amp;lt;br /&amp;gt;&lt;br /&gt;
I think focusing on the consequence these search engines have on the users, rather than the websites in the search results, is unique and will be really fascinating to look at. Although you did narrow down the specific community you would look at -- the SEO community -- I think you will need to narrow it down further, perhaps to a specific website or set of websites serving a larger online community.&amp;lt;br /&amp;gt;&lt;br /&gt;
One thing you didn&#039;t mention in your prospectus was how you would go about researching the SEO community. I think finding a specific community would be beneficial here as well -- it would give you a better idea as to what specific research methods you could employ. Once you have a more specific community I think everything else will fall into place.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 17:51, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hunter, your idea is magnificent. I enjoy your paradox. The thing I notice best about your proposal is that you are using your own ideas, when you could always plagiarize unintentionally. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Hunter, &lt;br /&gt;
The idea of &amp;quot;digging&amp;quot; in to find out the real and factual government approach on this matter is great. I think you have alot of great material to work with and you are moving in the right direction. I would just advise you to order your ideas in a clearer way so that your reader doesn&#039;t get lost. Great idea! [[User:GregB23|GregB23]] 15:29, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Hunter, i think that this theme is a little too wide, so, in order to be more specific, you can take one of the liberties than can be affect by governments control, and analyze that.&lt;br /&gt;
Natalia. ´´´´&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I think this is a great starting point for a research paper, and I love the idea of looking at Starbucks, since it is such a huge corporation. However, I think your hypotheses are too easily proved. I think you could go much further with your topic if you think about questions after answering your initial questions...for instance, say posts/comments are regulated differently. Some questions to consider could be, shy would Starbucks spend more/less time managing comments on one site than another? Is there a pattern to how Starbucks regulates comments/posts on their different social media websites? What are the consequences of managing comments differently between websites? Does the user body have anything to do with how Starbucks regulates comments?…etc.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:36, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Michael,&lt;br /&gt;
I believe that your idea for this assignment fulfills the essence of it. I think you should define for this prospectus what type of content control you will focus your analysis on. You might also include what reactions the members have to the various forms of censorship.[[User:GregB23|GregB23]] 15:34, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
You’ve chosen a very interesting topic that most of us have probably considered at some point. It’s often difficult to know where to draw the line when making policy decisions of this sort – to create a system that handles edge cases judiciously – and some people clearly aren’t even trying to create a fair system. I wonder what you can generalize from a case study like this. In short, how much variance do you think there is in the forms that censorship takes in web communities? It seems that there are powerful conventions and practical limitations with regards to how content control is done, such that many of the same features keep reappearing again and again.&lt;br /&gt;
&lt;br /&gt;
At the end of your final paragraph, you say that removing entire discussions is a highly effective approach to content control. Would you mind elaborating on this? What standard of effectiveness are you using? Is something that merely keeps the community silent effective, or something that keeps it happy? What makes banning members sometimes less effective in comparison?&lt;br /&gt;
[[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “INTELLECTUAL PROPERTY RIGHTS, RIGHTS TO INFORMATION AND FREEDOM OF SPEECH ON INTERNET: CONFLICTING RIGHTS?”&lt;br /&gt;
Link to prospectus:http://cyber.law.harvard.edu/is2013/File:Natalia_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris comments: Natalia, Your topic is very interesting, like mine (please comment!) quite broad and could as a suggestion focus completely on one case study that you think most illustrates and answers your hypothesis. I saw that you gave three, just curious as to is there one that is the overarching example for national and internatinal jurisprudence, or does this fall more into the realm of international governing bodies... or decided by national standards? Ultimately are you asking, is freedom of speech or protection of ideas more important on the internet? I like how you tie in that curbing freedom of expression starts to curb human rights, but that some regulation is necessary in civilization. A suggestion is to offer a framework that can be used interactively, involving a way for future bodies looking at legislation on intellectual property and freedom of speech and benchmarks for them to judge whether a law or regulation is infringes on human rights, or is necessary for to preserve civilization. &lt;br /&gt;
&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 20:33, 3 March 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
:Rabekah- Your proposal sounds like an interesting subject. Is this group something that you have taken part in, or is your statement “Critique from Within” to be interpreted that Weird Twitter is critiquing Twitter or the Twitter community from within? It looks like you have a good outline and a method that will lead you to interesting material. I am wondering how this relates to censorship or control. Does the tweeting of Weird Twitter have any sort of influence on the broader Twitter community? Do members of a group in Twitter influence one another in a way that has some sort of an influence on the group as a whole?[[User:Tessa May|Tessa May]] 20:07, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Joshywonder: I think you have a fabulous idea and have sources that have interested you on this topic. I wonder if you are interested in discussing the difference between Canadian English versus either the United States English or &amp;quot;Official English&amp;quot; as it may be. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:13, 3 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
**&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Matthew, your writing is very scientific; and I applaud you for this. The reader can be left skeptical and that is a matter of definition. Keep up the good work. [[User:Johnathan Merkwan|Johnathan Merkwan]] 19:27, 3 March 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
Matthew: Wonderful topic, I think you’ll have a lot of fun with this research topic. Although you have wonderful sources, I was wondering to know how you will gather the data, and do you think that Yelp will be able to provide you with clarification of removed posts? Censorship plays an important role within this topic; will you use any interesting cases to defend your paper? [[User:User777|user777]] 18:38, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
**&lt;br /&gt;
&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
Dear Milena Grado, I found your paper proposal quite interesting. I haven’t heard about Duolingo, however I have few questions: What about the translation [if] being out of context? What about sentence structure? Culture/ How precise is the translation? If so, what kind of copy rights will this serve gather, in order to protect the translation services? I noted that you will be gathering information through “Twitter, Facebook and Duolingo&#039;s blog- very interesting! Do you have specific way of analyzing this data? Use/volume based? Good luck with the paper, I think it’s quite an interesting topic to write a paper on. &lt;br /&gt;
[[User:User777|user777]] 17:42, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa,&amp;lt;br/&amp;gt;&lt;br /&gt;
This looks really, really fascinating! I&#039;m curious - are you considering comparing multiple groups in differing categories? I ask because it may be interesting to see if two groups in similar categories have similar patterns in deleting posts. &amp;lt;br /&amp;gt;&lt;br /&gt;
Another thing that came to mind: it may be interesting to look at the profiles of the group members to see if there is any pattern between those whose posts are deleted, those who tend to align with group moderators, etc….since LinkedIn profiles generally provide members&#039; current, and often prior, employment and education, you may be able to identify a pattern based on members&#039; socioeconomic status.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 18:15, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Tessa,&lt;br /&gt;
This looks very interesting and you seem to have your ideas extremely clear. I love the idea of having a survey sent to group owners at the end of your investigation period. I would also suggest, if I may, to contact Linkedin directly and see if they have a comment in regard. [[User:GregB23|GregB23]] 15:22, 4 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
Tessa: I think you’ve picked out a great topic for your research paper. I am an active user of Linkedin, and participate in quite a few groups, and you are correct, that posts are being deleted without notice, which sometimes makes it hard to fallow the group/topic itself. I see that you have a perfect strategy for your paper, which I think will definitely help you generate a great paper. How many groups will you audit? How often will you review a group? Good luck on your paper, and I look forward to read your final work (if class permits). &lt;br /&gt;
[[User:User777|user777]] 18:21, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “Moderation or Censorship in LinkedIn Groups?.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Tessa_May_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris: Tessa, exploring the idea of censorship on LinkedIn groups sounds good. My suggestion is perhaps attempting to see why some might censor or remove content, for example, if the poster is attempting to get them to go to another group on the same topic. Perhaps content subtractions occur when the owner(s) of the group want simply to exert more control over the group as opposed to encouraging as many comments as possible. Other times, comments might be deleted due to not fitting into the general standards of professionalism that is expected on LinkedIn. Mabye you can come up with your own categories for deleted comments to expand on this, and determine if the deletions are leaning more toward censorship or content control. &lt;br /&gt;
****&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 19:52, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Greetings Daniel: Moderation or Censorship in Linkden Groups really caught my, in regards to the fact that this is a very provocative title. In your prospectus it is interesting to note how you plan on gathering data with regards to specific groups within the site. Being that LinkedIn has captured the social media market for the professional, how will you be able to identify would would need to be cencsorn in a group that is by membership only? Secondly I am very much looking forward to see how Moderation is pulled in to groups. I like the idea of individuals within groups being limited in comments and mailing so that a, &amp;quot;only bully&amp;quot; in a specific network will not hog all of the conversation and in turn add to a more healthy convention of conversation- Hunter [[User:HunterGaylor|HunterGaylor]] 15:57, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Daniel Cameron Morris&lt;br /&gt;
Prospectus title: “Popular culture can interestingly be compared to James White’s article on “Imagining the Law” ”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:AliciaPhan_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
Daniel Cameron Morris User Comments: Alicia, Your examination of privacy rights on social networking sites such as Facebook is facinating. I would ask, &#039;Are our intellectual property rights waived automatically when we use a limited privacy social network site?&#039; The topic seems really hot right now, and going into the various privacy settings on Facebook and arguements pro and con in light of legal decisions in the United States and other nations, even international bodies, will be enlightening to fellow Facebook fans. A suggestion could be analysis of each privacy setting, with pro and con arguements for personal privacy being intellectual property that must be waived to share with others. Pretty sure that is what already happens, but really without the examination my comments are just speculation. I await your comments on my proposal as well. Thanks!&lt;br /&gt;
[[User:Daniel Cameron Morris|Daniel Cameron Morris]] 22:07, 3 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
**&lt;br /&gt;
User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Muromi&lt;br /&gt;
Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Zak: Great Topic. The notion that online fundraising has been getting in recent months is overwhelming. The effective fundraising idea comes with the clear revelation that the internet is very powerful tool. With tools like Kick starter, and rocket hub are able to cast a wider net that will allow more individuals to participate in supporting a cause. However, with regards to control one must ask themselves with a wider net and more individuals having the ability to contribute, how will one be able to control how that money is being accounted for and that it is coming from individuals that are proper for that organization. This is a new eara of Fundraising, both in the public and private sector. On must not loose focus on how effective is new era will be providing an easier access to funds. I am very much looking forward to your final project. Best of Luck and great Topic choice! I am very encouraged that someone is shedding light on potential positive effect this can have for the NGO world. Hunter [[User:HunterGaylor|HunterGaylor]] 16:06, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
:Jonathan Merkwan: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
:Jonathan Merkwan: Jonathan, it seems like you have a lot of ideas and are attempting to address several broad areas, including international, sociological, and architectural perspectives through field world. Reading this prospectus, I was confused at a few points, such as &amp;quot;According to each face as an old friend, I have been studying the relativity of facial recognition.. &amp;quot; This sounds interesting, but I&#039;m not entirely certain what it means. Does this mean you are comparing the new friends you are adding to the old friends you deleted? You say, &amp;quot;Now  Facebook has deemed my friendships “real,”&amp;quot; but do not specify how Facebook has promoted this realness. I think something valuable in your prospectus so far is your investigation of  &amp;quot;the spellcheck, autocorrect, and various prompted questions Facebook has alerted me to, and in doing so shall see how each action makes a difference, contextually.&amp;quot; I think you should continue with this line of questioning, investing how facebook&#039;s suggestions influence our behavior on the site. Here is a tool to analyze your personal facebook behavior: http://www.wolframalpha.com/facebook/ and another useful facebook statistic link http://blog.hubspot.com/blog/tabid/6307/bid/6128/The-Ultimate-List-100-Facebook-Statistics-Infographics.aspx .&lt;br /&gt;
[[User:Jax|Jax]] 20:38, 4 March 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. [[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Phillip, I am very excited to see the direction that you take regarding the DLPA, specifically in regards to the potential subtractiveness of the organization. It is always interesting&lt;br /&gt;
to see the how the members of the community will add to the over all effectiveness of engagement with regards to organization. Because DLPA is stated that, “The hope is that broad access to scientific results will encourage faster progress on research and will let anyone apply the knowledge for technological advances. The ability to shed light on the effectiveness will be exciting to see. &amp;quot;-HunterGaylor&amp;quot; [[User:HunterGaylor|HunterGaylor]] 15:50, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
I thought the title was a bit odd. Since so few people are familiar with the DPLA, wouldn’t it be better to give more context? “Additive” and “subtractive” can be a little confusing when one doesn’t know what the noun means, since those words are used regularly in very different ways. I would suggest something along the lines of “Evaluating the Effectiveness of the DPLA.”&lt;br /&gt;
&lt;br /&gt;
The argument about it contributing to social stratification was quite familiar for me; it seems to be used against many new technologies and developments.&lt;br /&gt;
&lt;br /&gt;
Good luck with your project. It sounds quite interesting. I think it’s a good idea to implement it as a video, in terms of accessibility. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST)   &lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Kaley: I like your topic because it sheds light on democratic freedoms.  Will the expansion of Internet usage in North Korea bring new forms of democracy to a select group of citizens?  Will outside influences, that emerge via the Internet, begin to alter government relations?  At the end of your prospectus, you mention that you...&#039;&#039;”wish to examine the forces that have perpetuated the insulation of the country from the technological revolution and the changes that are beginning to unfold with the rise in mobile internet access in the country.”&#039;&#039;  To narrow your focus, you may want to consider highlighting a few primary forces, i.e., norms, market, etc., with descriptions surrounding each force.  To answer the latter part (changes that are beginning to unfold in North Korea), what types of changes are you referring to?  Do you plan to analyze technological changes, societal changes, or both?  To this end, defining a few categories may bring additional structure/clarity to your analysis. [[User:Zak Paster|Zak Paster]] 11:37, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Raven,  It will be interesting to see which site (anonymous vs. registered users) create more tolls, flame wars, and other aspects to the online world that does not seem to exist in the offline space.  The reverse is to see if the sites that require registration will create more fruitful conversations or of they’re equal in quality/quantity to the ones that allow anonymous commenters.  &lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:00, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi John, it will be interesting to see if the behaviors found in these online communities will differ from the politics, alliances, and cabals of the real world.  I&#039;m most interested to see if the internet is a better coordination and orchestration mechanism for organizing, and can people online respond quicker, more effectively, and efficiently than offline groups to adapt to the changing political landscapes this game provides.&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi John,&lt;br /&gt;
&lt;br /&gt;
Great choice of subject, i find it fascinating how these communities of random people from around the globe come together and work together to a certain goal as a community. [[User:DanielReissHarris|DanielReissHarris]] 17:27, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi CyberRalph: This is an interesting topic.  As I read your prospectus, the notion of responsibility and liability came to mind.  If this group advertises cyber-attacks, can they inevitably be held accountable?  For example, could law enforcement officials follow the leads to IP addresses, and ultimately discover the group(s) behind such attacks?  It may be interesting to compare the concepts of online crime with other forms of illicit activities (is online crime more isolated and easier to commit without paying the consequences?).  As an intro or conclusion, you may also want to consider highlighting current trends with cyber-attacks and security measures that governments/large companies take.  Furthermore, to strengthen your analysis, it would be interesting if you state your personal hypothesis upfront, followed by your question surrounding motivation for these types of attacks. [[User:Zak Paster|Zak Paster]] 11:34, 3 March 2013 (EST)  &lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
&lt;br /&gt;
Hi Aly, it was shocking to read about these communities, very interesting subject to investigate. I think it’s a good idea to focus in comparing activities in pro anorexia communities and recovery support groups in reddit.com, leaving aside the other platforms to narrow your scope. I think you should also define what will you observe from these communities in order to reach a conclusion for your investigation: do you want to know how control is being implemented? Or maybe focus in one particular constraint and see how it plays a role in regulating the community?--[[User:Maria|Maria]] 11:40, 3 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
I think that’s an interesting topic, which surprisingly we haven’t covered much in class yet. It raises many interesting questions. In what ways, and how does the legal system protect anonymity? And are those protections by design, or unintentional as Section 230 was by operating separately from the rest of the legislation with which it was supposed to be packaged? Should those laws be there, or were they mistakes? Often, normative questions reduce to tradeoffs. In this case, it’s the classic tradeoff between privacy and incentivizing socially advantageous behavior.&lt;br /&gt;
&lt;br /&gt;
Also, have you decided which of Lessig’s four constraints you’ll be using? Are you sure you’ll only be using one? It seems that there are critical points to be made from more angles, and could probably be done without extending scope to beyond what is manageable with the time and length constraints. [[User:Julian|Julian]] 19:39, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Becca, Interesting topic and it will be interesting to see how the online components and ‘permanent record’ of comments (architecture) might prohibit and skew the conversation vs. offline, real-world conversations. Will questions asked be inhibited by the semi-public aspect of online forums, preventing people from receiving better care than the privacy the offline world affords?  Or will the open aspect of the community allow the best comments to bubble up and be connected to experts who would otherwise not have seen the question if it was asked in the offline world.&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 15:59, 4 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Pseudonym: baughller&lt;br /&gt;
Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  [[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Laurence Girard&lt;br /&gt;
&lt;br /&gt;
Laurence Girard Prospectus &lt;br /&gt;
&lt;br /&gt;
Question: What effect does reading online health information have on the health of our society?&lt;br /&gt;
&lt;br /&gt;
Many people search for online health information on a daily basis, but most of this information is not reviewed by physicians. As a result, many people self-diagnose and as a result this can result in very dangerous health outcomes. I am interested in studying websites such as WebMD and seeing what type of impact this has on people’s health. &lt;br /&gt;
&lt;br /&gt;
I am particularly interested in seeing how online health  content relates to online health products. For example, perhaps someone reads an article on WebMD about how Vitamin D affects their health and then as a result they buy it on Amazon.com. What types of supplements are people buying and what affect is this having on their health?I am also interested in websites such as Teladoc.com where users can consult with physicians. In other words, I am interested in studying how people access health information, products, and consultations online.  I have read one statistic that says 80% of people in our country search for online health information. For this reason, I think this will be a particularly interesting project to complete and is relevant to the healthcare debate in our country. We need to focus more on prevention and less on treatment and the Internet can certainly be one modality for doing this. I am interested to hear about what my fellow classmates have to say about my chosen assignment.&lt;br /&gt;
&lt;br /&gt;
Laurence: This sounds like a very interesting topic, but would be a huge project to undertake.  Can you find one community where people are talking about health issues?  I imagine every major disease or condition has some kind of community such as the American Cancer Societies’ Online Communities and Support [[http://www.cancer.org/treatment/supportprogramsservices/onlinecommunities/index]]  and choose one or two subgroups to study.  Then I think you would be able to look at issues similar to those that Becca will be looking at for her project about Issues of Privacy in Online Mental Health Communities.  [[User:Susan Goldstein|Susan Goldstein]] 14:48, 4 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9767</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9767"/>
		<updated>2013-02-27T04:18:22Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Muromi&lt;br /&gt;
Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I think it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)?[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
****&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
Prospectus title: Reddit on Dox: Proper or Pox?&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Pseudonym: baughller&lt;br /&gt;
Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9750</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9750"/>
		<updated>2013-02-26T22:57:42Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Muromi&lt;br /&gt;
*Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
****&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
Prospectus title: Reddit on Dox: Proper or Pox?&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as the human Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=9565</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=9565"/>
		<updated>2013-02-12T22:39:14Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment. Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 12, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Alternatively, for this assignment, you can e-mail your file to the instructors at is2013+homework@cyber.law.harvard.edu. We are offering this option for Assignment 1 only, as a backup as you become familiar with uploading; future assignments will need to be uploaded per the procedure above.&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
Please post your link to your report below, in the following format:&lt;br /&gt;
&lt;br /&gt;
* (Name or Pseudonym)&lt;br /&gt;
&lt;br /&gt;
* (Link to rule)&lt;br /&gt;
&lt;br /&gt;
* (Link to article)&lt;br /&gt;
&lt;br /&gt;
* (Link to your submitted report)&lt;br /&gt;
&lt;br /&gt;
[[User:Jeff Hermes|Jeff Hermes]] 09:44, 7 February 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Mattyh (Matthew Haney)&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Drug_policy_of_the_Third_Reich&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matt_Haney_-_Assignment_1%2C_02102013.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Admits&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Googlization&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Dear Alice&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_1_(Dear_Alice).docx&lt;br /&gt;
&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 15:42, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Initials In Name:&#039;&#039;&#039; TAG Student ID#10789842&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Pseudonym:&#039;&#039;&#039; interesting comments&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to rule:&#039;&#039;&#039; http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to article:&#039;&#039;&#039; http://en.wikipedia.org/wiki/Disruptive_innovation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What the rule is?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Neutral Point of View (NPOV), means representing fairly without bias the information that is published, which is supported by reliable sources. This deals with creating and maintaining a neutral point of view on internet.  Disputes or any sort of controversial subjects, such as religious believes or abortion, aim to be described as opposed to take a biased stand on the subject.  The explanation of the subject should be neutrally informative and factual and not stray towards an opinion.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why this matters?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View matters because this rule established by Wikipedia, establishes a check and balance to provide the parameters of control to protect the integrity of the platform. With these protections and controls in place it not only protects the integrity of the platform and its participants, but it also protects the rights and freedoms of the owners of the content referenced. It is vital to discover a blend of technical and economic modernization  The challenge that face Neutral Point of View is the Wikipedia is written by open and transparent consensus   It can take a substantial amount of time before a correct &amp;quot;neutral approach  can be established for all parties to agree on (Poe 2006).  The purpose of this will be for implementing representation fairly, proportionately and and as much as possible, unbiased for all articles published by reliable sources (Poe 2006). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How it relates to other rules, and comments on the details/subsections of the rule.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View has several related issues.  Two examples of this are:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Verifiability&#039;&#039;&amp;quot; This individuals who are reading and editing the encyclopedia can check that the information comes from a reliable source that has been published such as books or newspaper.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;No Original Research:&#039;&#039;&#039; The term is a prohibition against original research and means that all material added to articles must be attributable to a reliable published source, even if not actually attributed (No Original Research! 2013). This rule is the third rule in content policies and determines the type and quality of material acceptable in articles. Because these policies work in harmony, they should not be interpreted in isolation from one another, and editors should familiarize themselves with all three.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is the article you chose?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Disruptive_innovation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why you chose it?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
In 1997 the term “Disruptive Innovation” was created by a Harvard Professor Clayton M. Christensen and published a book on the topic. Throughout my professional career I have strived to bring to market paradigm shifts in technologies, some would classify as disruptive innovations. Three classic examples of disruptive innovations that sacrificed quality for the ability to have mobility are:&lt;br /&gt;
-	The Transistor Radio&lt;br /&gt;
-	Pocket Calculators&lt;br /&gt;
-	Mobile Phones&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What edits you made?&#039;&#039;&#039; &lt;br /&gt;
The edit I made was by adding the example of the pocket calculator, which was a form of disruptive innovation.&lt;br /&gt;
 &lt;br /&gt;
[[File:LSTUEdit]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Did users made edits in response?&#039;&#039;&#039;&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rule for the article: How the rule played out in practice (if it did)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View  did not play a significant role in this particular article, but it has the possibility of future violations. As new technology enters into the market there could be a cause for the technology being replaced to attempt to promote the inadequacies of this new technology in an attempt to keep market share. An example of this is how Rockefeller spent millions in an attempt to promote the inadequacies of electricity when it challenged his oil lanterns as the primary source of power.&lt;br /&gt;
Rule for the community: How you think the rule plays a role in maintaining Wikipedia. &lt;br /&gt;
 &lt;br /&gt;
In reporting or educating being neutral and unbiased is critical in forming free minds that can shape the world through their own interpretations and innovations. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How does it benefit/harm the Wikipedia community in any way?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
The Neutral Point of View allows for the advancement of society, technology, and innovations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why is it important for Wikipedia?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is important for Wikipedia so it sets the environmental parameters to establish them as a reliable informational resource, instead of a platform to promote individual’s political motives.  It also encourages cooperation among encyclopedia&#039;s contributors (Poe 2006).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Bibliography&#039;&#039;&#039;&lt;br /&gt;
	&lt;br /&gt;
	Kempf, J. March 2004.  The Rise of the Middle and the Future of End-to-End:&lt;br /&gt;
 Reflections on the Evolution of the Internet Architecture. ftp://ftp.rfc-editor.org/in-notes/rfc3724.txt&lt;br /&gt;
             &lt;br /&gt;
            No Original Research! 2013. http://beforeitsnews.com/opinion-liberal/2013/01/no-original-research-2454120.html&lt;br /&gt;
 &lt;br /&gt;
         Poe, Marshall.  September 2006.  A Closer Look as Neutral Point of View (NPOV).  http://www.theatlantic.com/magazine/archive/2006/09/a-closer-look-at-the-neutral-point-of-view-npov/305120/&lt;br /&gt;
&lt;br /&gt;
	Robertson, Jordan. November 11, 2008.  Software Aims To Uncover ‘Data Discrimination’.http://www.nbcnews.com/id/22013943/ns/technology_and_science-internet/t/software-aims-uncover-data-discrimination/#.URVFKaVX3MA [[User:Interestingcomments|Interestingcomments]] 14:34, 8 February 2013 (EST)&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 16:14, 10 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
User777&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Verifiability,_not_truth&lt;br /&gt;
&lt;br /&gt;
Assignment #1 – Neutral Point of View &lt;br /&gt;
Class user: user777&lt;br /&gt;
Wiki user: user55462*&lt;br /&gt;
February 12th, 2013&lt;br /&gt;
Internet and Society: Technologies and Politics of Control&lt;br /&gt;
&lt;br /&gt;
For this first assignment, I chose to edit Wikipedia’s “Neutral Point of View” (NPOV) rule. NPOV stands that users of Wikipedia that edit an article should “fairly represent all sides of a story, and not make an article state, imply, or insinuate that any one side is correct”. Therefore, the cause of Wikipedia’s social and political bias, establish a quantitative benchmark for examining the presence of that bias. NPOV mainly defines the terms of objectiveness, bias and neutrality that provide a framework for considering neutrality within the Internet arena. In my view, however, the main questions would arise are: what is meant by neutrality? Is it fairness or perhaps positive opinion? What are the definitions of fairness and/or neutral? &lt;br /&gt;
&lt;br /&gt;
The article that I chose was “Wikipedia and the meaning of truth” which was published by MIT technology review. I found this article by searching different entries in wiki, and this article was linked via Wiki tools. &lt;br /&gt;
Here is the link to this article: http://www.technologyreview.com/review/411041/wikipedia-and-the-meaning-of-truth/page/2/, however it is mainly a support to the main article, which is: http://en.wikipedia.org/wiki/Wikipedia:Verifiability,_not_truth&lt;br /&gt;
&lt;br /&gt;
I chose this article because it greatly illustrated the clarifications of truth and fairness that was perfectly aliened for this assignment that supported the idea of NPOV. What is fairness? How to be fair?  Moreover, what is considered to be truth? According to Wikipedia’s entry on the subject, “the term has no single definition about which the majority of professional philosophers and scholars agree.” But in practice, however in “Wikipedia’s standard for inclusion has become its de facto standard for truth, and since Wikipedia is the most widely read online reference on the planet, it’s the standard of truth that most people are implicitly using when they type a search term into Google or Yahoo. On Wikipedia, truth is received as the consensus view of a subject” (article chosen). Within this rule, I edited the idea of fairness and opinion. I stated that fairness’s tone should be presented within competing views with a consistently fair and sensitive tone. Even when a topic is presented in terms of facts rather than opinion, an article can still radiate an implied stance through either selection of which facts to present, or more subtly their organization, for instance, refuting opposing views as one goes along makes them look a lot worse than collecting them in an opinions-of-opponents section. Moreover, I have added few edits about the manner of option: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Furthermore, after my edits, I have placed it on “watch-list”, however I have not received any comments and/or edits. In my view, this rule is neutral in maintaining Wikipedia’s community. Due to cultural and social diversification of options and thoughts, this rule could play a neutral role within its community. Also, I read few other articles, and it’s interesting to note what Princeton’s reviews are about this rule: “NPOV is especially important for the encyclopedia&#039;s treatment of controversial issues, where there is often an abundance of viewpoints and criticisms of the subject. In a neutral representation, the differing points of view are presented as such, not as facts”. [[User:User777|user777]] 12:36, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
AaronEttl&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Cloud_computing&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 16:38, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Maria Paz Jurado&lt;br /&gt;
* http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
* http://es.wikipedia.org/wiki/Gobierno_abierto&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Maria_Paz_Jurado_-_Assignment_1.docx&lt;br /&gt;
--[[User:Maria|Maria]] 17:19, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
Milenagrado&lt;br /&gt;
*http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*http://en.wikipedia.org/wiki/Bras%C3%ADlia&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Assigment_1.doc&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
*http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*http://en.wikipedia.org/wiki/Vladimir_Putin&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Judsonassignment1.rtf&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Your Name or Chosen Pseudonym: Joshua Henderson, joshywonder&lt;br /&gt;
Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
Link to article: http://en.wikipedia.org/wiki/Hate_speech&lt;br /&gt;
Link to report: http://cyber.law.harvard.edu/is2013/File:Assignment_1_-_Joshua_Henderson_-_Joshywonder_-_Feb11.13.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
HGaylor:&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/One-sided_argument&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Hunter_Gaylor_Internet_Article_.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Name: Zak Paster &lt;br /&gt;
* Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
* Link to article: http://en.wikipedia.org/wiki/Universities_and_higher_education_in_Brazil&lt;br /&gt;
* Link to report:  http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_1_Universities_and_Higher_Education_in_Brazil_2-12-13.docx&lt;br /&gt;
[[User:Zak Paster|Zak Paster]] 10:02, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
J6428&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Seed_AI&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/A1_JULIAN_J6428.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Julian|Julian]] 10:53, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caroline|Caroline]] 11:02, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Four_Seasons_Hotels_and_Resorts#History&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:G%26M.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Rich Cacioppo&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Automated_pool_cleaner&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assingment_1_Wikipedia_article_Feburary_12_2013.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
GregB23&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Alfa_Romeo_8C_Competizione&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assingment_1_Wiki&lt;br /&gt;
&lt;br /&gt;
Michael Keane&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Instrument_flight_rules#Instrument_flight_rules&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Michael_Keane_Assignment_1.docx&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 12:38, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
http://en.wikipedia.org/wiki/Women_in_Uganda&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Assignment1.docx&lt;br /&gt;
Kaley Sweeney 12:44, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
Phildade (Phillip Dade)&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Norb_Vonnegut&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:DADE_-_LSTU-120_Assignment_1.doc&lt;br /&gt;
[[User:Phildade|Phildade]] 15:50, 12 February 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Raven&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Driven_to_Distraction_(Inspector_Morse_TV-episode)&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Raven_Assignment_1_Due_February_12_2013.docx&lt;br /&gt;
[[User:Raven|Raven]] 16:02, 12 February 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
Tessa May&lt;br /&gt;
* http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
* http://en.wikipedia.org/wiki/The_Academy_of_Information_Technology&lt;br /&gt;
* http://en.wikipedia.org/wiki/AIT,_Academy_of_Information_Technology&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_1.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 16:32, 12 February 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Johnfloyd6675&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Phonegap&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:IS2013FloydAssignment1.txt&lt;br /&gt;
&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:37, 12 February 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Susan Goldstein&lt;br /&gt;
Rule:  Ownership of Articles  http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
Article:  Synchronous learning   http://en.wikipedia.org/wiki/Synchronous_learning&lt;br /&gt;
Report:  http://cyber.law.harvard.edu/is2013/sites/is2013/images/Goldstein_Assgn_1_Wikipedia.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 16:56, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
CyberRalph&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Operation_Ababi&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Martins_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Muromi&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Hiragana&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
AliciaPhan&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Lucky_Charms&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:AliciaPhan_Assignment1.docx&lt;br /&gt;
--[[User:APhan|APhan]] 17:20, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
JW&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/Frozen_yogurt&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:JW_Assignment1.pdf[[User:JW|JW]] 17:29, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Jax&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Juggalo&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Wikipediafinal.docx&lt;br /&gt;
*****&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=9564</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=9564"/>
		<updated>2013-02-12T22:36:55Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment. Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 12, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Alternatively, for this assignment, you can e-mail your file to the instructors at is2013+homework@cyber.law.harvard.edu. We are offering this option for Assignment 1 only, as a backup as you become familiar with uploading; future assignments will need to be uploaded per the procedure above.&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
Please post your link to your report below, in the following format:&lt;br /&gt;
&lt;br /&gt;
* (Name or Pseudonym)&lt;br /&gt;
&lt;br /&gt;
* (Link to rule)&lt;br /&gt;
&lt;br /&gt;
* (Link to article)&lt;br /&gt;
&lt;br /&gt;
* (Link to your submitted report)&lt;br /&gt;
&lt;br /&gt;
[[User:Jeff Hermes|Jeff Hermes]] 09:44, 7 February 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Mattyh (Matthew Haney)&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Drug_policy_of_the_Third_Reich&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matt_Haney_-_Assignment_1%2C_02102013.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Admits&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Googlization&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Dear Alice&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_1_(Dear_Alice).docx&lt;br /&gt;
&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 15:42, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Initials In Name:&#039;&#039;&#039; TAG Student ID#10789842&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Pseudonym:&#039;&#039;&#039; interesting comments&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to rule:&#039;&#039;&#039; http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to article:&#039;&#039;&#039; http://en.wikipedia.org/wiki/Disruptive_innovation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What the rule is?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Neutral Point of View (NPOV), means representing fairly without bias the information that is published, which is supported by reliable sources. This deals with creating and maintaining a neutral point of view on internet.  Disputes or any sort of controversial subjects, such as religious believes or abortion, aim to be described as opposed to take a biased stand on the subject.  The explanation of the subject should be neutrally informative and factual and not stray towards an opinion.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why this matters?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View matters because this rule established by Wikipedia, establishes a check and balance to provide the parameters of control to protect the integrity of the platform. With these protections and controls in place it not only protects the integrity of the platform and its participants, but it also protects the rights and freedoms of the owners of the content referenced. It is vital to discover a blend of technical and economic modernization  The challenge that face Neutral Point of View is the Wikipedia is written by open and transparent consensus   It can take a substantial amount of time before a correct &amp;quot;neutral approach  can be established for all parties to agree on (Poe 2006).  The purpose of this will be for implementing representation fairly, proportionately and and as much as possible, unbiased for all articles published by reliable sources (Poe 2006). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How it relates to other rules, and comments on the details/subsections of the rule.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View has several related issues.  Two examples of this are:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Verifiability&#039;&#039;&amp;quot; This individuals who are reading and editing the encyclopedia can check that the information comes from a reliable source that has been published such as books or newspaper.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;No Original Research:&#039;&#039;&#039; The term is a prohibition against original research and means that all material added to articles must be attributable to a reliable published source, even if not actually attributed (No Original Research! 2013). This rule is the third rule in content policies and determines the type and quality of material acceptable in articles. Because these policies work in harmony, they should not be interpreted in isolation from one another, and editors should familiarize themselves with all three.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is the article you chose?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Disruptive_innovation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why you chose it?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
In 1997 the term “Disruptive Innovation” was created by a Harvard Professor Clayton M. Christensen and published a book on the topic. Throughout my professional career I have strived to bring to market paradigm shifts in technologies, some would classify as disruptive innovations. Three classic examples of disruptive innovations that sacrificed quality for the ability to have mobility are:&lt;br /&gt;
-	The Transistor Radio&lt;br /&gt;
-	Pocket Calculators&lt;br /&gt;
-	Mobile Phones&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What edits you made?&#039;&#039;&#039; &lt;br /&gt;
The edit I made was by adding the example of the pocket calculator, which was a form of disruptive innovation.&lt;br /&gt;
 &lt;br /&gt;
[[File:LSTUEdit]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Did users made edits in response?&#039;&#039;&#039;&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rule for the article: How the rule played out in practice (if it did)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View  did not play a significant role in this particular article, but it has the possibility of future violations. As new technology enters into the market there could be a cause for the technology being replaced to attempt to promote the inadequacies of this new technology in an attempt to keep market share. An example of this is how Rockefeller spent millions in an attempt to promote the inadequacies of electricity when it challenged his oil lanterns as the primary source of power.&lt;br /&gt;
Rule for the community: How you think the rule plays a role in maintaining Wikipedia. &lt;br /&gt;
 &lt;br /&gt;
In reporting or educating being neutral and unbiased is critical in forming free minds that can shape the world through their own interpretations and innovations. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How does it benefit/harm the Wikipedia community in any way?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
The Neutral Point of View allows for the advancement of society, technology, and innovations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why is it important for Wikipedia?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is important for Wikipedia so it sets the environmental parameters to establish them as a reliable informational resource, instead of a platform to promote individual’s political motives.  It also encourages cooperation among encyclopedia&#039;s contributors (Poe 2006).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Bibliography&#039;&#039;&#039;&lt;br /&gt;
	&lt;br /&gt;
	Kempf, J. March 2004.  The Rise of the Middle and the Future of End-to-End:&lt;br /&gt;
 Reflections on the Evolution of the Internet Architecture. ftp://ftp.rfc-editor.org/in-notes/rfc3724.txt&lt;br /&gt;
             &lt;br /&gt;
            No Original Research! 2013. http://beforeitsnews.com/opinion-liberal/2013/01/no-original-research-2454120.html&lt;br /&gt;
 &lt;br /&gt;
         Poe, Marshall.  September 2006.  A Closer Look as Neutral Point of View (NPOV).  http://www.theatlantic.com/magazine/archive/2006/09/a-closer-look-at-the-neutral-point-of-view-npov/305120/&lt;br /&gt;
&lt;br /&gt;
	Robertson, Jordan. November 11, 2008.  Software Aims To Uncover ‘Data Discrimination’.http://www.nbcnews.com/id/22013943/ns/technology_and_science-internet/t/software-aims-uncover-data-discrimination/#.URVFKaVX3MA [[User:Interestingcomments|Interestingcomments]] 14:34, 8 February 2013 (EST)&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 16:14, 10 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
User777&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Verifiability,_not_truth&lt;br /&gt;
&lt;br /&gt;
Assignment #1 – Neutral Point of View &lt;br /&gt;
Class user: user777&lt;br /&gt;
Wiki user: user55462*&lt;br /&gt;
February 12th, 2013&lt;br /&gt;
Internet and Society: Technologies and Politics of Control&lt;br /&gt;
&lt;br /&gt;
For this first assignment, I chose to edit Wikipedia’s “Neutral Point of View” (NPOV) rule. NPOV stands that users of Wikipedia that edit an article should “fairly represent all sides of a story, and not make an article state, imply, or insinuate that any one side is correct”. Therefore, the cause of Wikipedia’s social and political bias, establish a quantitative benchmark for examining the presence of that bias. NPOV mainly defines the terms of objectiveness, bias and neutrality that provide a framework for considering neutrality within the Internet arena. In my view, however, the main questions would arise are: what is meant by neutrality? Is it fairness or perhaps positive opinion? What are the definitions of fairness and/or neutral? &lt;br /&gt;
&lt;br /&gt;
The article that I chose was “Wikipedia and the meaning of truth” which was published by MIT technology review. I found this article by searching different entries in wiki, and this article was linked via Wiki tools. &lt;br /&gt;
Here is the link to this article: http://www.technologyreview.com/review/411041/wikipedia-and-the-meaning-of-truth/page/2/, however it is mainly a support to the main article, which is: http://en.wikipedia.org/wiki/Wikipedia:Verifiability,_not_truth&lt;br /&gt;
&lt;br /&gt;
I chose this article because it greatly illustrated the clarifications of truth and fairness that was perfectly aliened for this assignment that supported the idea of NPOV. What is fairness? How to be fair?  Moreover, what is considered to be truth? According to Wikipedia’s entry on the subject, “the term has no single definition about which the majority of professional philosophers and scholars agree.” But in practice, however in “Wikipedia’s standard for inclusion has become its de facto standard for truth, and since Wikipedia is the most widely read online reference on the planet, it’s the standard of truth that most people are implicitly using when they type a search term into Google or Yahoo. On Wikipedia, truth is received as the consensus view of a subject” (article chosen). Within this rule, I edited the idea of fairness and opinion. I stated that fairness’s tone should be presented within competing views with a consistently fair and sensitive tone. Even when a topic is presented in terms of facts rather than opinion, an article can still radiate an implied stance through either selection of which facts to present, or more subtly their organization, for instance, refuting opposing views as one goes along makes them look a lot worse than collecting them in an opinions-of-opponents section. Moreover, I have added few edits about the manner of option: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Furthermore, after my edits, I have placed it on “watch-list”, however I have not received any comments and/or edits. In my view, this rule is neutral in maintaining Wikipedia’s community. Due to cultural and social diversification of options and thoughts, this rule could play a neutral role within its community. Also, I read few other articles, and it’s interesting to note what Princeton’s reviews are about this rule: “NPOV is especially important for the encyclopedia&#039;s treatment of controversial issues, where there is often an abundance of viewpoints and criticisms of the subject. In a neutral representation, the differing points of view are presented as such, not as facts”. [[User:User777|user777]] 12:36, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
AaronEttl&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Cloud_computing&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 16:38, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Maria Paz Jurado&lt;br /&gt;
* http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
* http://es.wikipedia.org/wiki/Gobierno_abierto&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Maria_Paz_Jurado_-_Assignment_1.docx&lt;br /&gt;
--[[User:Maria|Maria]] 17:19, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
Milenagrado&lt;br /&gt;
*http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*http://en.wikipedia.org/wiki/Bras%C3%ADlia&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Assigment_1.doc&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
*http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
*http://en.wikipedia.org/wiki/Vladimir_Putin&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:Judsonassignment1.rtf&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Your Name or Chosen Pseudonym: Joshua Henderson, joshywonder&lt;br /&gt;
Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
Link to article: http://en.wikipedia.org/wiki/Hate_speech&lt;br /&gt;
Link to report: http://cyber.law.harvard.edu/is2013/File:Assignment_1_-_Joshua_Henderson_-_Joshywonder_-_Feb11.13.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
HGaylor:&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/One-sided_argument&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Hunter_Gaylor_Internet_Article_.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Name: Zak Paster &lt;br /&gt;
* Link to rule: http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
* Link to article: http://en.wikipedia.org/wiki/Universities_and_higher_education_in_Brazil&lt;br /&gt;
* Link to report:  http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_1_Universities_and_Higher_Education_in_Brazil_2-12-13.docx&lt;br /&gt;
[[User:Zak Paster|Zak Paster]] 10:02, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
J6428&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Seed_AI&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/A1_JULIAN_J6428.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Julian|Julian]] 10:53, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caroline|Caroline]] 11:02, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Four_Seasons_Hotels_and_Resorts#History&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:G%26M.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Rich Cacioppo&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Automated_pool_cleaner&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assingment_1_Wikipedia_article_Feburary_12_2013.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
GregB23&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Alfa_Romeo_8C_Competizione&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assingment_1_Wiki&lt;br /&gt;
&lt;br /&gt;
Michael Keane&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Instrument_flight_rules#Instrument_flight_rules&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Michael_Keane_Assignment_1.docx&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 12:38, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
http://en.wikipedia.org/wiki/Women_in_Uganda&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Assignment1.docx&lt;br /&gt;
Kaley Sweeney 12:44, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
Phildade (Phillip Dade)&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Norb_Vonnegut&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:DADE_-_LSTU-120_Assignment_1.doc&lt;br /&gt;
[[User:Phildade|Phildade]] 15:50, 12 February 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Raven&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Driven_to_Distraction_(Inspector_Morse_TV-episode)&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Raven_Assignment_1_Due_February_12_2013.docx&lt;br /&gt;
[[User:Raven|Raven]] 16:02, 12 February 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
Tessa May&lt;br /&gt;
* http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
* http://en.wikipedia.org/wiki/The_Academy_of_Information_Technology&lt;br /&gt;
* http://en.wikipedia.org/wiki/AIT,_Academy_of_Information_Technology&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_1.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 16:32, 12 February 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Johnfloyd6675&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Phonegap&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:IS2013FloydAssignment1.txt&lt;br /&gt;
&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:37, 12 February 2013 (EST)&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Susan Goldstein&lt;br /&gt;
Rule:  Ownership of Articles  http://en.wikipedia.org/wiki/Wikipedia:Ownership_of_articles&lt;br /&gt;
Article:  Synchronous learning   http://en.wikipedia.org/wiki/Synchronous_learning&lt;br /&gt;
Report:  http://cyber.law.harvard.edu/is2013/sites/is2013/images/Goldstein_Assgn_1_Wikipedia.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 16:56, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
CyberRalph&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Operation_Ababi&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Martins_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Muromi&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Hiragana&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
AliciaPhan&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Lucky_Charms&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:AliciaPhan_Assignment1.docx&lt;br /&gt;
--[[User:APhan|APhan]] 17:20, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
JW&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/Frozen_yogurt&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:JW_Assignment1.pdf[[User:JW|JW]] 17:29, 12 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Jax&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/Juggalo&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Wikipediafinal.docx&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=9346</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=9346"/>
		<updated>2013-01-29T20:54:06Z</updated>

		<summary type="html">&lt;p&gt;Jax: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;January 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet at its core is simply an expression of a technological protocol that allows for a particular way of sharing information. But from its humble beginnings the Internet has always felt like more than this. The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal. So is this platform about fundamental social, political and economic change, or about access to solipsistic blogging, pornography, cheap pharmaceuticals, free music, and poker at home? This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
* Reflect on what you believe are the most significant social, cultural, political or economic changes associated with the spread of digital technologies.  In a few sentences, please offer 2-3 examples in the Class Discussion section below and be prepared to discuss them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=V2QdEj8UjBc Ethan Zuckerman, History of the Internet] (approx. 6 minutes, watch all)&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=whmMNRHktX8 Jonathan Zittrain, How the Internet Works] (approx. 4 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.mu.oz.au/~zs/decl.html John Perry Barlow, A Declaration of the Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/printerfriendly.msp?id=961 Jack Goldsmith &amp;amp; Tim Wu, Digital Borders (Legal Affairs)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.webuse.org/pdf/Hargittai-DigitalDivideWhatToDo2007.pdf Eszter Hargittai, The Digital Divide and What to Do About It (New Economy Handbook)] (focus on Sections I-III)&lt;br /&gt;
&lt;br /&gt;
:* Hargittai’s data is from 2003. For more recent data, see [http://pewinternet.org/Reports/2012/Digital-differences/Overview/Digital-differences.aspx Pew Internet &amp;amp; American Life Project, Digital Differences 2012] (read intro, skim the sections).&lt;br /&gt;
&lt;br /&gt;
* [http://www.ted.com/talks/rebecca_mackinnon_let_s_take_back_the_internet.html Rebecca MacKinnon, Let’s Take Back the Internet! (TED.com)] (approx. 15 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto)&lt;br /&gt;
&lt;br /&gt;
* [http://blog.ericgoldman.org/archives/2009/03/the_third_wave.htm Eric Goldman, The Third Wave of Internet Exceptionalism]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1752415 Tim Wu, Is Internet Exceptionalism Dead?]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Welcome to Internet and Society: Technologies and Politics of Control! This is the section of the page where you should add your comments to complete &amp;quot;assignment zero.&amp;quot; Once you have registered an account, just click the &amp;quot;[edit]&amp;quot; button at the upper right hand corner of this section to add text! [[User:Jeff Hermes|Jeff Hermes]] 10:00, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
1. There has been several significant economic changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to information has impacted the way news is distributed, causing the world investment markets to move faster and become more volatile off of news.&lt;br /&gt;
&lt;br /&gt;
New Opportunity: A greater understanding of how the internet works with distribution can allow for algorithms to be developed through digital technologies to counter act the news as its distributed.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With greater technology being created at the speed of light, it has become difficult to study trends for the investment markets, which are in some respects locked into a web based portal that can control the fate of public companies, instead of fundamentals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. There has been several significant political changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to information online about freedoms in the democracies around the world&lt;br /&gt;
&lt;br /&gt;
New Opportunity: In the Middle East this was a major contributing factor in the Arab Spring, to bring and implement change.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With this new access to freedoms, the challenge of countries restricting information or access is now more than ever present. As in the article about Yahoo, France was able to restrict information making the access less free for the citizens in that country, compared to other parts of the world.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. There has been several significant social changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to social media sites has fundamentally changed the way people interact with each other&lt;br /&gt;
&lt;br /&gt;
New Opportunity: By establishing specific structures in place, access to a significant amount more potential people to do business with is available using these social media sites.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With greater access to more people, the amount of noise is constant. So standing out with your message is critical to stand out amongst the crowd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4. There has been several significant cultural changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to education online or education in general for both genders&lt;br /&gt;
&lt;br /&gt;
New Opportunity: More people are educated now than any part of the history of the world. In recent years with the Millenium Development Goals an emphasis of educating our youth and specifically woman as a priority has taken some real strives forward.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With this material change in focussing in educating women, groups like the Taliban has fired back with scare tactics to keep them out of schools. [[User:Interestingcomments|Interestingcomments]] 13:21, 28 January 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
One of the greatest economic changes to occur will be the ratification of the JOBS Act (Jumpstart Our Business Startups) which will allow private companies to solicit unaccredited investors to participate in their startups.  Opportunities will be created for entrepreneurs and investors, but the innovation will also account for great investor losses due to the erosion of necessary barriers to fundraising.  Additionally, it will create opportunities for fraud.&lt;br /&gt;
&lt;br /&gt;
Another huge change brought about is the access to online education and training.  At a time when unemployment is high, online education and training allows for additional specialization and creates opportunities for a large group of people who don&#039;t have the flexibility of schedule for traditional learning.  A challenge is that quality has not kept up with the technology, so you are seeing a proliferation of sub-par learning experiences offering students degrees that leave them in massive amounts of debt, but don&#039;t necessarily make them more attractive of a candidate when it comes time to find a job.  [[User:Phildade|Phildade]] 15:21, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
This whole section of Introduction I found very compelling. The language of the assignment was at first a bit unusual but now I am getting used to such communication. To duscuss the problems I have noticed with the internet, most noteably the discussion about Chinese, I found very compelling. Being different languages cave different means of speech production, the understanding that internet lauguage, like a fax machine, is actually the English I learned made me flip![[User:Johnathan Merkwan|Johnathan Merkwan]] 15:48, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
A cultural change associated with digital technologies is how we share things that we create, whether it is music, photographs, videos/movies, etc and how the &amp;quot;ownership&amp;quot; of these items is decided.  Between SOPA and PIPA and other copyright legislation, as well as the whole idea of open access, as much as we are able to share things with each other so much easier through technology, it opens a whole set of challenges as to how and if we monitor and control the sharing. &lt;br /&gt;
&lt;br /&gt;
Another change is the reliance we have on search engines like Yahoo and Google in how we find information.  While we use these gateways to comb the Internet for us and to make the process seemingly simpler, we also, at times, have a false sense of comfort that we are getting all of the information available through these search engines when that’s not always the case.  As we have fewer and fewer search engines available, the monopoly that a search engine has on our ability to find information and relevant information online grows.  And as this happens, we also tend to settle for the initial results rather than taking the time to dig deeper.  We put a lot of faith in our search engines.  &lt;br /&gt;
&lt;br /&gt;
The Internet has given us numerous new ways to interact and communicate with each other.  One way in particular that I think has really changed how we communicate is the anonymity that the Internet provides.   There are challenges and opportunities that arise from this.  While people often will say things online anonymously that they may not say to a person in real life there are often times where being able to be anonymous on the Internet, allows people a sense of comfort and place that may be lacking in their everyday life.  [[User:Nfonsh|Nfonsh]] 16:05, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
I believe that the revolution in cloud computing offers the greatest potential to reshape the landscapes of various sectors and institutions. Take online media for example; In the past 15 years, we have seen the eradication of media giants like Blockbusters and Borders due to the increase in accessibility of online media. Hubs like Amazon, Netflix, Hulu, Vudu, and other online institutions offer a wider selection and more accessible means of acquiring movies, music, and books. Another positive benefit as a result of the growth in the cloud is greater ease of accessibility over a wider range of devices to digital content. Institutions like Harvard, MIT, and TED have made it possible to access educational information and series on devices like the iPad and iPhone. I believe that this kind of freedom of information will very shortly become the new standard for information access so that the entire world may consume digital media with the ease of accessing it through a personal smart device. While there is great upside with the revolution in speed and efficiency of online access and cloud computing, the greatest risk is security. Because a greater concentration of more valuable information will be stored on networks vulnerable to hackers, I believe that online security will be one of the most important focal points of the next 10 years. As sectors and institutions make the transition to the online world, they will necessitate a more reliable solution to safeguarding highly sensitive information like social security numbers, credit card information, and personal privacy. The Gizmodo story here highlights some of the potential personal privacy issues that will need to be addressed in the near future: http://gizmodo.com/5880593/the-apple-bug-that-let-us-spy-on-a-total-strangers-iphone [[User:AaronEttl|AaronEttl]] 17:34, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Historically,  humans innovate for the purpose of communication,  so the most significant change associated with digital technologies is how communication has become easier.  The possibility of faster communication influences in all aspects of people&#039;s life. Easy communication also implies more access to information, and that is exactly what runs the world today. Those who are able to take advantage of all this available information to make fair commercial relations without invading other&#039;s privacy will succeed.  However, the biggest challenge is related to privacy, too. Is it possible to regulate internet without censorship? Internet is currently the arena where a big conflict between freedom of expression and safety is playing out.[[User:Milenagrado|Milenagrado]] 20:13, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
There are two technologies, or classes of technologies, which I believe have had a significant social, cultural, political and economic effect on the world. The first are called web 2.0 technologies, which imply a new version of something but really is just an evolution of the way people used the world wide web. The web first came into existence in 1994 when web browsers and the language of the web - HTML - became prevalent. Static web pages were built by the millions and the three letters www and the phrase &amp;quot;dot com&amp;quot; became part of many people&#039;s lexicon. However, starting in the late 1990&#039;s and into the early 2000&#039;s, people were learning to use the same world wide web in different ways. Collaboration was becoming common with wikis (like this page) and content/document sharing application such as Microsoft Sharepoint. Social networking sites, most notably MySpace and Facebook, in addition to video sharing sites like YouTube allowed user-driven content to drive a good chunk of Internet activity. This mini-revolution allowed the Internet to go from being a place where your average person went to be a consumer of information to a place where the same average person would create and generate information as much as consume it. These technologies also made the Internet much more friendly to the young, old and people of all ages who were not overly tech savvy. &lt;br /&gt;
&lt;br /&gt;
The second class of technologies that have revolutionized the world to a large extent are wireless technologies. This includes satellite, cellular, WiFi (802.11) and Bluetooth which all have had a profound effect on connecting the average person up to the global network of digital information more easily and frequently. Fifteen years ago, only a small fragment of the population owned cellular phones. In 2013, a large majority of the population owns cellular phones, many of which are smart phones with touch screens, access to hundreds of thousands of applications and other features such as cameras and Internet access. Wireless technologies have also brought the ability to communicate with much of the world to places where wired infrastructure does not currently exist. Wireless communications have opened up the online world to people across the globe who wouldn&#039;t otherwise have access to such a place.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 23:44, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
I think what&#039;s striking is how digital technologies have empowered both decentralized grassroots movements as well as centralized corporate and political institutions. Using the Internet, businesses can profit from enormous amounts of consumer data, broaden markets, and globalize their workforce, while governments are afforded new platforms for engaging with citizens (We the People petitioning system) or censoring and monitoring them. At the same time, citizens gain amazing new tools for media production and self-expression, collective organization, and knowledge access.  Sometimes top-down centralization and bottom-up decentralization interact together to make everyone better off (New York City&#039;s 311 program for example) other times they fundamentally clash (BitTorrent and the recording industries). So to me, digital tech intensifies the struggle between bottom up and top down powers and increases the complexity in the relationship, as both forces struggle to understand what the Internet is, what it can do, and what it should be. &lt;br /&gt;
&lt;br /&gt;
Look forward to exploring this theme in class. [[User:Asmith|Asmith]] 00:40, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*******&lt;br /&gt;
&lt;br /&gt;
Assignment 0&lt;br /&gt;
&lt;br /&gt;
I think the top three challenges of the Internet are:&lt;br /&gt;
&lt;br /&gt;
1.  Network neutrality - telco&#039;s dictating to me what traffic is good / bad, and given that, what I&#039;d have to pay more for to use the &#039;bad&#039; apps&lt;br /&gt;
&lt;br /&gt;
2.  Governments tapping and spying on the internets users&lt;br /&gt;
&lt;br /&gt;
3.  Government&#039;s using the internet as a battlefield (cyberwar).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 21:51, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
The spread of digital technology has impacted and changed the way the global society communicates and operates.  It seems the increased speed, frequency, access, and reach of digital communicates has had the most significant impact economically, socially, culturally, and politically.  These positive impacts have come with many unintended consequences left to be managed or navigated.--[[User:Jspain|Jspain]] 10:14, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*********&lt;br /&gt;
&lt;br /&gt;
During my recent travels in Southeast Asia, I observed a great many people using internet accessible smart phones, including new iphones, in both the urban and rural areas of Thailand, Cambodia and Singapore.   How will this proliferating access to the world wide web affect those societies that reputedly limit free speech, especially in the area of political dissent? [[User:Nleblanc|Nleblanc]] 10:30, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*********&lt;br /&gt;
&lt;br /&gt;
Top three challenges of the internet are:&lt;br /&gt;
&lt;br /&gt;
1. Government seeking more control, through laws and taxes&lt;br /&gt;
2. Piracy and anti-piracy activities&lt;br /&gt;
3. The changing nature of privacy&lt;br /&gt;
&lt;br /&gt;
[[User:Jennga|Jennga]] 12:00, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Good afternoon, the must big changes in the society, since internet have been created are:&lt;br /&gt;
&lt;br /&gt;
1. There´s a new concept of the right of freedom expressión.&lt;br /&gt;
&lt;br /&gt;
2. Therés a new concept of what is the best way to protect intellectual property.&lt;br /&gt;
&lt;br /&gt;
3. Finally one of the must sensitive changes, is that we all can know what is happening around the world in just one second.&lt;br /&gt;
´´´´&lt;br /&gt;
natalia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
********&lt;br /&gt;
&lt;br /&gt;
A list of the most significant changes associated with the spread of digital technologies would certainly include: the complexity of financial instruments and the difficulty governments and central banks are having understanding and regulating them; the issues regarding government surveillance of not only its citizens, but of citizens of other countries both within and outside its borders, what governments are choosing to do with this information, and the relative slowness of the courts and laws to react; and the facilitation of communication among geographically disparate groups: for example the use of Facebook, Twitter and YouTube during the Arab Spring to create a sense of common cause, as well as to distribute images that built a large base of support globally for governments to respond, making it difficult, for example, for the U.S. to continue to support governments that were less than democratic, but perhaps, more than useful. It would be hard to ignore the changes digital technologies have had on our daily lives - who carries a map when traveling, when we can create and e-mail a url with the day’s locations to our phones and open this map to get directions from where we are to where we want to go next, how wonderful to carry not one, but many books and magazines in a device smaller than a deck of cards and be able to use that device to purchase more, anytime, anywhere, and finally, what bliss to be able skim a long list of voice mail rather than replaying each one over and over again to get to that all-important name and phone number.[[User:Raven|Raven]] 13:28, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
********&lt;br /&gt;
&lt;br /&gt;
Between the several changes that internet and digital technologies brought, I would like to mention:&lt;br /&gt;
&lt;br /&gt;
1) The widespread of information and knowledge. Nowadays you don&#039;t have to go to India to know how Indian&#039;s think, you can just get into a forum and speak with an Indian yourself; you can study and get a degree or do an investigation for a thesis from your own house and a service for a person in Europe can be given by someone in Asia, just to mention some examples. Knowledge is at the distance of a click, but still there are lots of people having difficulties to access it. Thus, one of the main challenges I think we are facing nowadays is to find the way to actually empower people for them to be able to make the most of what internet and digital technologies offer us. &lt;br /&gt;
&lt;br /&gt;
2) The possibility of everyone to have a voice in a discussion, and to build support towards that voice. It has been mentioned before the role 2.0 technologies had in unifying people during the arab spring, or the &amp;quot;Indignados&amp;quot; movement that started in Spain.&lt;br /&gt;
&lt;br /&gt;
3) The possibility to crowdsource and co create. Before social media, content was created by one person and read by another one but nowadays everyone has the opportunity to create content, and that content can easily be improved by lots of people willing to. The power of crowdsourcing and co creating is changing the way governments, business, universities or NGOs work in order to became more open and collaborative. Open Data is playing a key role in giving people the tool to create new products and services as well as improving the existing ones. [[User:Maria|Maria]] 14:41, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
While the Internet has been a boon in many areas, it is clear that society didn&#039;t have a chance to  really think through the long term consequences of this technology.   Like all major overlays to how a society functions, a newness offers the opportunity for change and growth.  As mentioned in the class material, while the original plan was to have a base line of equal access, the users of the technology became more powerful than the technology itself.  Governments forged beachheads in the form of firewalls and spyware and societies shook out into the clusters that were familiar and comforting.  Even with the access, the multitudes of messaging slow most of us down from engaging the other side in the argument mostly out of sheer exhaustion.   &amp;quot;The world at our finger tips&amp;quot; has us using the Internet in all hardware forms for everything from the world events to what is happening on your street.   Has our reliance on Internet cloud based services made us complacent or curious to know more about things that would have taken weeks - perhaps months - to be aware of in prior times (those times not being that long ago)  With all this digital nakedness, the pendulum has started to swing in the other direction.  As the EU presented the legal argument for the &amp;quot;right to be forgotten&amp;quot; in the digital world,  it will be interesting to see if global access will further compartmentalize.   A ruling of that nature of the next couple of years in and of itself would have massive ramifications on social, economic and political frameworks.[[User:Caroline|Caroline]] 14:55, 29 January 2013 (EST) Caroline&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
I&#039;m not too great at naming superlatives, but here are some interesting social phenomena I believe have emerged from cyber-social culture.&lt;br /&gt;
Online communities and social media have created an opportunity to construct an online identity, to carefully curate one&#039;s own portrayal.  People suffering offline from prejudice or persecution may seek shelter in their cyber personas and communities, as they offer a safe space for them to form real relationships and be their truest selves.  However, on the other hand, the process of picking and choosing certain parts of a persona to reveal and others to hide may have psychological and social consequences. For instance, &amp;quot;liking&amp;quot; items on Facebook or writing an &amp;quot;About Me&amp;quot; on OkCupid facilitates a segmented rather fluid sense of self. While Internet communities have offered shelter to many lost, confused stragglers, it also makes us prone to labeling, categorizing, and sub-sub-sub categorizing ourselves in order to &amp;quot;belong.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Social media has also made comparison to others unavoidable, but also against much more unrealistic standards. Nobody uploads pictures while alone, watching Forrest Gump, tears splattering into their tub of Phish Food ice cream. Unless you do, and then you&#039;re keeping it real. Nobody posts what they don&#039;t want others to see or know. Basically, social media exposes us to a very choppy, glossy image of how people live. Based on my own personal experience, nothing makes me more depressed then going on Facebook when I&#039;m depressed. &lt;br /&gt;
&lt;br /&gt;
Lastly, open-source cyber environments such as Wikipedia and Ebay have granted more faith in direct democracy. The success of an EBay store, for instance, relies almost entirely on the experiences of each previous customer. There are no representatives or filtration systems, every user&#039;s experience counts fully and equally. However, it is not just the use of the direct democracy that makes these online environments remarkable, but how such systems have proven themselves reliable and prosperous.  &lt;br /&gt;
&lt;br /&gt;
[[User:Jax|Jax]] 15:54, 29 January 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Jax</name></author>
	</entry>
</feed>