<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Maria</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Maria"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/Special:Contributions/Maria"/>
	<updated>2026-05-16T20:50:51Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10435</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10435"/>
		<updated>2013-05-14T16:53:11Z</updated>

		<summary type="html">&lt;p&gt;Maria: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;The course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.example.com link title]== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Submissions ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Becca Luberoff&lt;br /&gt;
*Title: Creating and Maintaining a Safe and Supportive Environment in Online Mental Health Communities: A Comparative Study of the National Alliance on Mental Illness and HealthyPlace.com&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Final.docx&lt;br /&gt;
--[[User:BeccaLuberoff|BeccaLuberoff]] 01:34, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: interestingcomments (Student ID#10789842)&lt;br /&gt;
&lt;br /&gt;
*Title:Does The SEC Need To Control &amp;amp; Censor The Message Board Community? &lt;br /&gt;
A comparative observational study of two publically traded company message board communities&lt;br /&gt;
&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Interesting_comments_5.10.13TAG_LSTU_Assignment_.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 17:02, 10 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Pseudonym: Raven&lt;br /&gt;
*Title: A Conversation That Can Change the World&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Raven_Final_Paper.docx&lt;br /&gt;
[[User:Raven|Raven]] 12:39, 14 May 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: sridder&lt;br /&gt;
*Title:  Social Disorganization Theory Proves that Social Commerce Reduces Internet Fraud&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Sridder_Final.docx&lt;br /&gt;
[[User:Saridder|Saridder]] 13:25, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: DearAlice&lt;br /&gt;
&lt;br /&gt;
Title: One Company, Different Social Media Platforms, Different Conversations&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/sites/is2013/images/2013-05-12_DearAlice_Assignment_Final.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 20:55, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Rich&lt;br /&gt;
*Title: Is Wikipedia an Open Collaborative Effort or a Despotic Hierarchy&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Internet_Control_Final_Project_May_12_2013-Modified.docx&lt;br /&gt;
[[User:Rich|Rich]] 14:16, 13 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Milena Grado&lt;br /&gt;
*Title: How Does &amp;quot;Reclame Aqui&amp;quot; Avoid Bias?&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Finalproject_milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 18:14, 13 May 2013 (EDT)&lt;br /&gt;
***&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: MichaeleKeane&lt;br /&gt;
*Title:A Single Site Case Study of the Effect of Censorship on a Web Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Assignment_5_Final_ver9_keane.docx&lt;br /&gt;
*[[User:Michaelekeane|Michaelekeane]] 22:08, 13 May 2013 (EDT)&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: AaronEttl&lt;br /&gt;
*Title: The Successful Balance Achieved By Kickstarter &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Final.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 08:59, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Joshywonder&lt;br /&gt;
*Title: Lawbuzz: The Effects of a SLAPP Law Suit on Anonymous Forum Participation&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Joshywonder_Final_Project.docx [[User:Joshywonder|Joshywonder]] 11:37, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: DanielReissHarris&lt;br /&gt;
*Title: Piracy; the Source, the Cost and the Solution&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/DanielReissHarris_Final.docx&lt;br /&gt;
*[[User:DanielReissHarris|DanielReissHarris]] 11:47, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Maria Jurado&lt;br /&gt;
*Title: Internet Regulation in Argentina, the case of Taringa!&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Maria_Final.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 12:53, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10434</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=10434"/>
		<updated>2013-05-14T16:50:38Z</updated>

		<summary type="html">&lt;p&gt;Maria: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;The course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[http://www.example.com link title]== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Submissions ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Becca Luberoff&lt;br /&gt;
*Title: Creating and Maintaining a Safe and Supportive Environment in Online Mental Health Communities: A Comparative Study of the National Alliance on Mental Illness and HealthyPlace.com&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Final.docx&lt;br /&gt;
--[[User:BeccaLuberoff|BeccaLuberoff]] 01:34, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: interestingcomments (Student ID#10789842)&lt;br /&gt;
&lt;br /&gt;
*Title:Does The SEC Need To Control &amp;amp; Censor The Message Board Community? &lt;br /&gt;
A comparative observational study of two publically traded company message board communities&lt;br /&gt;
&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Interesting_comments_5.10.13TAG_LSTU_Assignment_.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 17:02, 10 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Pseudonym: Raven&lt;br /&gt;
*Title: A Conversation That Can Change the World&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Raven_Final_Paper.docx&lt;br /&gt;
[[User:Raven|Raven]] 12:39, 14 May 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: sridder&lt;br /&gt;
*Title:  Social Disorganization Theory Proves that Social Commerce Reduces Internet Fraud&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Sridder_Final.docx&lt;br /&gt;
[[User:Saridder|Saridder]] 13:25, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: DearAlice&lt;br /&gt;
&lt;br /&gt;
Title: One Company, Different Social Media Platforms, Different Conversations&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2013/sites/is2013/images/2013-05-12_DearAlice_Assignment_Final.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 20:55, 12 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Rich&lt;br /&gt;
*Title: Is Wikipedia an Open Collaborative Effort or a Despotic Hierarchy&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Internet_Control_Final_Project_May_12_2013-Modified.docx&lt;br /&gt;
[[User:Rich|Rich]] 14:16, 13 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*Name: Milena Grado&lt;br /&gt;
*Title: How Does &amp;quot;Reclame Aqui&amp;quot; Avoid Bias?&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2013/File:Finalproject_milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 18:14, 13 May 2013 (EDT)&lt;br /&gt;
***&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: MichaeleKeane&lt;br /&gt;
*Title:A Single Site Case Study of the Effect of Censorship on a Web Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Assignment_5_Final_ver9_keane.docx&lt;br /&gt;
*[[User:Michaelekeane|Michaelekeane]] 22:08, 13 May 2013 (EDT)&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: AaronEttl&lt;br /&gt;
*Title: The Successful Balance Achieved By Kickstarter &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Final.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 08:59, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or Pseudonym: Joshywonder&lt;br /&gt;
*Title: Lawbuzz: The Effects of a SLAPP Law Suit on Anonymous Forum Participation&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Joshywonder_Final_Project.docx [[User:Joshywonder|Joshywonder]] 11:37, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
*Name or Pseudonym: DanielReissHarris&lt;br /&gt;
*Title: Piracy; the Source, the Cost and the Solution&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/sites/is2013/images/DanielReissHarris_Final.docx&lt;br /&gt;
*[[User:DanielReissHarris|DanielReissHarris]] 11:47, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: Maria Jurado&lt;br /&gt;
*Title: Internet Regulation in Argentina, the case of Taringa!&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2013/File:Maria_Final.pdf--[[User:Maria|Maria]] 12:50, 14 May 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=10283</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=10283"/>
		<updated>2013-04-30T19:28:17Z</updated>

		<summary type="html">&lt;p&gt;Maria: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The deadline for this assignment has been extended to April 30th before class.&#039;&#039;&#039;  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment4,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment4.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Project title: &lt;br /&gt;
*Link to rough draft: (add your link here)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: sridder&lt;br /&gt;
*Project title: Does Social Commerce Reduce Internet Commerce Fraud?&lt;br /&gt;
*Link to rough draft:   http://cyber.law.harvard.edu/is2013/sites/is2013/images/Steve_Ridder_Assignment_4.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 20:25, 21 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Project title: One Company, Different Social Media Platforms, Different Conversations&lt;br /&gt;
 Link to Draft: http://cyber.law.harvard.edu/is2013/sites/is2013/images/DearAlice_Assignment4.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:08, 23 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Zak Paster&lt;br /&gt;
*Project title: Online Giving: A New Fundraising Era&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_4_-_Final_Project_Draft_Online_Giving-A_New_Fundraising_Era_4-25-13.pdf&lt;br /&gt;
[[User:Zak Paster|Zak Paster]] 22:41, 24 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name: Milena Grado&lt;br /&gt;
*Project title: How Does Reclame Aqui Avoid Bias?&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Assignment4milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 17:28, 26 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
*Name or pseudonym: CyberRalph&lt;br /&gt;
*Project title: Anonymous and Their Use of Twitter to Leverage Lessig&#039;s Regulators as a Means for Attacking CISPA&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Martins_Assignment4.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:46, 28 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: joshywonder&lt;br /&gt;
*Project title: Lawbuzz.ca - Anonymous Forum Participation&lt;br /&gt;
*Link to rough draft:  http://cyber.law.harvard.edu/is2013/File:Joshywonder_Assignment_4.docx&lt;br /&gt;
[[User:Joshywonder|Joshywonder]] 12:05, 29 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: interesting comments&lt;br /&gt;
*Project title:Does The SEC Need To Control &amp;amp; Censor The Message Board Community? A comparative observational study of two publically traded company message board communities&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Z_TAG_LSTU_Assignment_4_(1)_.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:45, 29 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Asmith|A Few Bad Apples: Grappling with Troublesome Users on Diaspora|File:http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment4.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
* Name or pseudonym:Michael Keane&lt;br /&gt;
* Project title:A Single Site Case Study of the Effect of Censorship on a Web Community&lt;br /&gt;
* Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Assignment_4_Draft_ver5_keane.docx&lt;br /&gt;
*[[User:Michaelekeane|Michaelekeane]] 12:03, 30 April 2013 (EDT)&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: AaronEttl&lt;br /&gt;
Project title: The Successful Balance Achieved By Kickstarter &lt;br /&gt;
Link to rough draft: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment4.docx [[User:AaronEttl|AaronEttl]] 14:56, 30 April 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Name or pseudonym: Maria&lt;br /&gt;
*Project title: Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
*Link to rough draft: http://cyber.law.harvard.edu/is2013/File:Jurado_Assignment4-1.pdf --[[User:Maria|Maria]] 15:28, 30 April 2013 (EDT)&lt;br /&gt;
****&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10069</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10069"/>
		<updated>2013-03-26T13:16:19Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 26.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://yourlinkhere}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
 {{AssignmentInfo|Asmith|A Few Bad Apples: Grappling with Troublesome Users on Diaspora|http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Milenagrado|How does Reclame Aqui avoid bias?|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Milenagrado_assignment_3_.doc|File: Milenagrado_assignment_3_.doc}} [[User:Milenagrado|Milenagrado]] 21:10, 25 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment Info|RichCacioppo|Hypocritical or Sincere Users and Restrictions of Free Speech&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Hypocritical_or_Sincere_Users_and_Restrictions_of_Free_Speech.pdf&lt;br /&gt;
[[User:Rich|Rich]] 08:12, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Maria Jurado|Internet regulation in Argentina, the case of Taringa!|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Maria_Jurado_Assignment3.pdf}} --[[User:Maria|Maria]] 09:16, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10068</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10068"/>
		<updated>2013-03-26T13:14:36Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 26.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://yourlinkhere}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
 {{AssignmentInfo|Asmith|A Few Bad Apples: Grappling with Troublesome Users on Diaspora|http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Milenagrado|How does Reclame Aqui avoid bias?|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Milenagrado_assignment_3_.doc|File: Milenagrado_assignment_3_.doc}} [[User:Milenagrado|Milenagrado]] 21:10, 25 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment Info|RichCacioppo|Hypocritical or Sincere Users and Restrictions of Free Speech&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Hypocritical_or_Sincere_Users_and_Restrictions_of_Free_Speech.pdf&lt;br /&gt;
[[User:Rich|Rich]] 08:12, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
 {{Internet Regulation in Argentina, the case of Taringa!|Maria Paz Jurado|Analysis of content control in Taringa!&#039;s communities through the lenses of Lawrence Lessig&#039;s constraints |http://cyber.law.harvard.edu/is2013/File:Maria_Jurado_Assignment3.pdf}}&lt;br /&gt;
--[[User:Maria|Maria]] 09:10, 26 March 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10067</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10067"/>
		<updated>2013-03-26T13:10:29Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 26.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://yourlinkhere}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
 {{AssignmentInfo|Asmith|A Few Bad Apples: Grappling with Troublesome Users on Diaspora|http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Milenagrado|How does Reclame Aqui avoid bias?|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Milenagrado_assignment_3_.doc|File: Milenagrado_assignment_3_.doc}} [[User:Milenagrado|Milenagrado]] 21:10, 25 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment Info|RichCacioppo|Hypocritical or Sincere Users and Restrictions of Free Speech&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Hypocritical_or_Sincere_Users_and_Restrictions_of_Free_Speech.pdf&lt;br /&gt;
[[User:Rich|Rich]] 08:12, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
 {{AssignmentInfo|Maria Paz Jurado|Internet regulation in Argentina, the case of Taringa!|http://cyber.law.harvard.edu/is2013/File:Maria_Jurado_Assignment3.pdf}}&lt;br /&gt;
--[[User:Maria|Maria]] 09:10, 26 March 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10066</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=10066"/>
		<updated>2013-03-26T13:07:52Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 26.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://yourlinkhere}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
 {{AssignmentInfo|Asmith|A Few Bad Apples: Grappling with Troublesome Users on Diaspora|http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Milenagrado|How does Reclame Aqui avoid bias?|&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Milenagrado_assignment_3_.doc|File: Milenagrado_assignment_3_.doc}} [[User:Milenagrado|Milenagrado]] 21:10, 25 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment Info|RichCacioppo|Hypocritical or Sincere Users and Restrictions of Free Speech&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Hypocritical_or_Sincere_Users_and_Restrictions_of_Free_Speech.pdf&lt;br /&gt;
[[User:Rich|Rich]] 08:12, 26 March 2013 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment Info|Maria Pas Jurado|Internet Regulation in Argentina, the case of Taringa!|http://cyber.law.harvard.edu/is2013/File:Maria_Jurado_Assignment3.pdf}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
--[[User:Maria|Maria]] 09:07, 26 March 2013 (EDT)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9842</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9842"/>
		<updated>2013-03-03T16:40:03Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User:Dear Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
:User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Muromi&lt;br /&gt;
Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
:Jonathan Merkwan: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. [[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST)   &lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Kaley: I like your topic because it sheds light on democratic freedoms.  Will the expansion of Internet usage in North Korea bring new forms of democracy to a select group of citizens?  Will outside influences, that emerge via the Internet, begin to alter government relations?  At the end of your prospect, you mention that you...&#039;&#039;”wish to examine the forces that have perpetuated the insulation of the country from the technological revolution and the changes that are beginning to unfold with the rise in mobile internet access in the country.”&#039;&#039;  To narrow your focus, you may want to consider highlighting a few primary forces, i.e., norms, market, etc., with descriptions surrounding each force.  To answer the latter part (changes that are beginning to unfold in North Korea), what types of changes are you referring to?  Do you plan to analyze technological changes, societal changes, or both?  To this end, defining a few categories may bring additional structure/clarity to your analysis. [[User:Zak Paster|Zak Paster]] 11:37, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi CyberRalph: This is an interesting topic.  As I read your prospectus, the notion of responsibility and liability came to mind.  If this group advertises cyber-attacks, can they inevitably be held accountable?  For example, could law enforcement officials follow the leads to IP addresses, and ultimately discover the group(s) behind such attacks?  It may be interesting to compare the concepts of online crime with other forms of illicit activities (is online crime more isolated and easier to commit without paying the consequences?).  As an intro or conclusion, you may also want to consider highlighting current trends with cyber-attacks and security measures that governments/large companies take.  Furthermore, to strengthen your analysis, it would be interesting if you state your personal hypothesis upfront, followed by your question surrounding motivation for these types of attacks. [[User:Zak Paster|Zak Paster]] 11:34, 3 March 2013 (EST)  &lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
&lt;br /&gt;
Hi Aly, it was shocking to read about these communities, very interesting subject to investigate. I think it’s a good idea to focus in comparing activities in pro anorexia communities and recovery support groups in reddit.com, leaving aside the other platforms to narrow your scope. I think you should also define what will you observe from these communities in order to reach a conclusion for your investigation: do you want to know how control is being implemented? Or maybe focus in one particular constraint and see how it plays a role in regulating the community?--[[User:Maria|Maria]] 11:40, 3 March 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Pseudonym: baughller&lt;br /&gt;
Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  [[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9839</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9839"/>
		<updated>2013-03-03T16:08:00Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User:Dear Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
:User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Muromi&lt;br /&gt;
Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
:Jonathan Merkwan: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. [[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST)   &lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Julian, I find tools to promote public engagement very interesting and useful, great topic to investigate about. It might be useful for you to see also moveon.org and signon.org, the latter is actually a website to create petitions and promote them through online communities. It might be interesting to compare how both government and NGOs use different approaches to deal with the same kind of issues. --[[User:Maria|Maria]] 11:08, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Pseudonym: baughller&lt;br /&gt;
Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  [[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9838</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9838"/>
		<updated>2013-03-03T15:45:02Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interstingcomments: I am curious if you would be able to observe blogs or online community discussions on this topic from the respective countries of study.  The local citizen perspective might offer additional insight.   --[[User:Dear Alice|Dear Alice]] 13:54, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Interestingcomments: You might be able to find some communities talking about this subject on globalvoicesonline.org. I think it can be a good idea to compare communities from each country to find out if they have the same opinion. [[User:Milenagrado|Milenagrado]] 16:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Asmith: Sounds like a perfect community to observe for this project. I would be interested to see if the diaspora community comes up with a governance model that mirrors other social networking models or if they come up with a truly unique model of their own. --[[User:Dear Alice|Dear Alice]] 13:58, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
:Rich: Of the three case studies that you&#039;re considering, the FreeSpeechDebate at the University of Oxford seems to be the most appropriate because it specifically addresses the thrust of your research. Examining judicial opinions weighing all arguments and The Open Net Initiative at the Berkman Center both seem to be too ambitious in scope.[[User:JW|JW]] 20:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
Hunter: I like the idea of investigating the government’s role in controlling access. However, I found the explanation of your research paper’s quarry regarding the investigation of the ability to shut the system down in states of emergencies a bit confusing. All in all, I look forward to seeing how you develop your prospectus even further. [[User:AaronEttl|AaronEttl]] 14:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Alice: I like the commercial aspect of your project. You don&#039;t mention this in your prospectus, so I&#039;m wondering how is Starbucks driving traffic to the internal site? How are they driving it to their Facebook page? Are there rewards for the consumer if they post on either one? Do the rewards differ? How? Is there a dedicated group or person watching traffic on the internal page? What about the Facebook page? If yes, are they the same group? Will you be able to say something about the resources Starbucks allocates and if/how that has an impact on the response on either? Will you be monitoring for deleted posts? Finally, you aren&#039;t including Twitter in your project. Is there a reason?[[User:Raven|Raven]] 17:48, 1 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Keane, interesting assignment. I think it would be easier if you define the kind of content control you want to study by looking at how it is implemented (by law, for example) instead of looking at the purpose that explains it’s put into effect. I think it might be hard to find out certainly what intention does the subject has to exercise some kind of control, but you could for sure see how these controls are being implemented. --[[User:Maria|Maria]] 10:45, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Rebekahjudson: Fascinating, I had not heard of this. Do users of Weird Twitter self-identify using that label? How do participants signal they are contributing to Weird Twitter rather than just making a joke or nonsensical post on Twitter? To the untrained eye, it doesn&#039;t seem like there&#039;s much community going on here - but maybe that&#039;s the point. I very curious to know how, without a centralized &amp;quot;Weird Twitter&amp;quot; aggregate or some other means to look for Weird Twitter posts (save the map you mentioned), a community of &amp;quot;Weird Twitters&amp;quot; can exist and interact with one another.  Look forward to hearing more about this. [[User:Asmith|Asmith]] 15:52, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
:Joshywonder: It might be difficult to study the now archived site as many of the posts/pages are not good links.  In your research question you proposed to measure the anonymous users&#039; &amp;quot;reactions when this privacy was stripped away&amp;quot; - will this be entirely interpreted/extrapolated from posts made on the site? [[User:Mattyh|Mattyh]] 15:57, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
:Matthew: You and RobMcLain have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Milena: I think the idea of contacting the users through Twitter, Facebook, and Duolingo’s blog is a good resource to provide some context as to the structure of the site. I also feel that it would be helpful if you could find out how the policies have changed in the past as a result of previous laws. [[User:AaronEttl|AaronEttl]] 14:36, 2 March 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Tessa - this looks well-thought out and do-able within the parameters of the class. Reading through your prospectus, the following questions occurred to me: Do the deleted users have something in common? Are the moderators of the groups you are observing similar in some way? (For example, do they have manager or above in their title?)Is there a higher authority or forum for protesting deletions? And finally, in a professional forum such as LinkedIn, how would you distinguish keeping the conversation professional or productive or on-topic vs. censorship?[[User:Raven|Raven]] 12:03, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Reposted following deletion/edit conflict&#039;&#039; [[User:Raven|Raven]] 13:31, 27 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: If you feel that it&#039;s relevant to your paper, I would be interested in reading your analysis of the pending class action [http://www.fraleyfacebooksettlement.com Fraley v. Facebook].[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
:Alicia: While I agree with this statement, I think it needs to be substantiated: &amp;quot;More than ever people are learning about our laws through the mass media, and believing in the media’s representation of the legal realm&amp;quot;.  I think your methodology is a little too vague as I&#039;m unclear on precisely what parts of Facebook you will be observing: globally public comments?  Posts made by businesses?  Comments made by others on subscribed updates? [[User:Mattyh|Mattyh]] 16:01, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
:User777: I am left wondering precisely what the research questions are and/or the methodology you will use to prove your hypotheses.  Something like &amp;quot;I will also look at the “display ad” effectiveness that drives a significant demand for both online and in-store purchases&amp;quot; is a massive research project in and of itself and would realistically require access to private information controlled by businesses. [[User:Mattyh|Mattyh]] 16:06, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Muromi&lt;br /&gt;
Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
:Muromi: Instead of using Lessig&#039;s four factors, I thihttp://www.charitywatch.org/nk it would be interesting to use Zittrain&#039;s generativity lens to examine how China manages to innovate in spite of all the existing controls. I&#039;d be curious to find out in what respects China&#039;s cyberspace is (or could) be unlimited.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
Hi Muromi, I think that is an extremely interesting final project, and I am looking forward to reading it once you are done. A few years ago I was a visiting professor of law at the Southwest University of Political Science and Law in Chongqing, and I ran smack into the firewall many times. I think facebook was still allowed at that time, but many of the other sites weren&#039;t, so I had to use programs like anonymouse.org to get around the firewall. I also used QQ with my chinese girlfriend and she was always scared that our conversations were being monitored for content. The only critique I have is that you may be studying too many different aspects of the firewall. You only have 10 pages to write, you might consider focusing on a few specific aspects of the firewall and the reasons they are in place. i.e. Google is currently banned in China, but is that because the government doesn&#039;t like what Google turns up or because they want to protect the competitive advantage of Baidu? etc.. [[User:Joshywonder|Joshywonder]] 09:49, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
:Zak Paster: How will you estimate &amp;quot;effective fundraising&amp;quot; for Research Question A?  Question C seems large enough to be the entire project as &amp;quot;conduct external research about online giving and associated industry trends&amp;quot; is a large undertaking. [[User:Mattyh|Mattyh]] 14:54, 2 March 2013 (EST)&lt;br /&gt;
:Zak Your NGO sounds great.  Good luck with it.  My question, which I don&#039;t know if you&#039;ll be able to tackle in this project relates to control.  How much tension is there between having an outside entity give you a &amp;quot;pre-formed&amp;quot; website, social media strategy, etc. that may be quite good, and the fund-raising organization&#039;s ability to create their own content.  Also, just as you want to be sure that the fundraising websites ensure funds go to the advertised cause, donors want to know how their money is being spent.  Can organizations have links to places like charitywatch.org or charitynavigator.org?&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 09:12, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
:RobMcLain: You and Matthew D. Haney have proposed the same research questions about Yelp. Maybe you can collaborate?[[User:JW|JW]] 22:04, 26 February 2013 (EST)&lt;br /&gt;
:RobMcLain: It would appear we indeed have nearly identical projects - let&#039;s team up :) [[User:Mattyh|Mattyh]] 14:50, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
:Caroline: You may want to discuss the statue of repose and the statute of limitations in your paper, if you feel that these statutes are relevant.[[User:JW|JW]] 23:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Caroline: Fascinating issue, but you may need to pick a community to observe in order to test the framework. I&#039;m thinking of an app like SnapChat, for example. SnapChat lets users send photos and videos to one another and then deletes that content after a certain time limit. Here, the ability to be forgotten is built into the technology of the platform. How does the community use SnapChat? Is it for &amp;quot;sexting&amp;quot; as many people fear, or are there other practices involved? This might help you explore the role of architecture in the right to be forgotten, not just law. What if Facebook and Google gave you the option to publish something temporarily? [[User:Asmith|Asmith]] 15:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
:Jonathan Merkwan: Unfortunately your file is no longer on the server - I also tried searching for it on the &amp;quot;uploaded files&amp;quot; page but to no avail [[User:Mattyh|Mattyh]] 16:10, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
:Free_speech: It is a very interesting point of view. It is important to see how people can face constraints all over the Internet.[[User:Milenagrado|Milenagrado]] 17:00, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi, this could be an interesting topic. I assume you have some connection to the forum beforehand, because it seems like somewhat of a random choice of community. I like how you will analyze both site specific rules of participation and countrywide laws that are applicable. As a Canadian, if I were to join the forum and participate I would be bound by the laws of Canada and the rules of forum. In contrast, and American would be bound by the laws of the US and forum as well. So perhaps the site acheives greater uniformity in participation through their own regulations than the laws of the countries. [[User:Joshywonder|Joshywonder]] 09:59, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
:Phil: I wonder how you will [http://cyber.law.harvard.edu/is2013/Final_Project#Research_questions &amp;quot;avoid direct engagement with members of the community&amp;quot;] when you&#039;ve stated that you will interact with and interview DPLA players and opponents. Perhaps I&#039;m misunderstanding something, such as the teaching staff approving your methodology?[[User:JW|JW]] 23:20, 26 February 2013 (EST)&lt;br /&gt;
* @JW - that is a good question, my thought is that I will be interviewing people who are &amp;quot;Pro DPLA&amp;quot; or &amp;quot;Against DPLA&amp;quot; so there is not much I could do to &amp;quot;influence their behavior to inherently change what I am trying to observe.&amp;quot; - but I have not discussed with teaching staff, so I could be a little off. [[User:Phildade|Phildade]] 23:17, 1 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
:Susan: I&#039;m curious why you chose those three particular courses to observe. Would it be possible to observe the same (or very similar) course(s) across two to three platforms? (e.g., edX, Coursera, and Udacity)[[User:JW|JW]] 22:28, 26 February 2013 (EST)&lt;br /&gt;
JW: I edited out why I chose these courses from the prospectus to get it down to 397 words :)  I wanted to stick with Coursera and edX because they are the most well known and I&#039;m particularly interested in Harvard&#039;s (edX) participation. My decision was more practical than scientific.  I chose courses that were beginning at the end of Feb to mid-March in subjects I thought I&#039;d understand enough to be able to follow conversations about the course.  I like your idea of studying similar courses across the different platforms, but am limited by our time frame for this assignment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Susan: I have never heard of a MOOC. I wondered if  an &amp;quot;expert&amp;quot; or credentialed person in the field of study would be allowed to register for the class.   If so, how would they be treated?  --[[User:Dear Alice|Dear Alice]] 14:42, 1 March 2013 (EST)  &lt;br /&gt;
Dear Alice: Anyone can register for a MOOC.  An expert in the field of study could register, but would only do so if they wanted to see how someone else was teaching the subject or if they wanted to learn about an aspect of the subject they wanted to learn more about. Since a MOOC is not the same as taking a course for credit to meet the academic requirements of a school, an expert couldn&#039;t &amp;quot;cheat&amp;quot; by taking a MOOC to get an easy A.  One of the reasons people enroll in MOOCS is to prepare themselves to take a course for credit. &lt;br /&gt;
Susan&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 20:27, 2 March 2013 (EST)   &lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
:Kaley: The part of your prospectus that most caught my attention is the very end: &amp;quot;the changes that are beginning to unfold with the rise in mobile internet access in the country.&amp;quot; I would read a 10-page paper entirely focusing on mobile Internet access in North Korea![[User:JW|JW]] 21:33, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Raven: Cool topic. When you talk about the &amp;quot;quality of comments&amp;quot; it will be important to address the question, &amp;quot;according to whom?&amp;quot; Is it according to the managers of the site, the community of the site, or to society at large?  You might also explore how comments are moderated. It seems like the NY Times screens submissions from commenters whereas The Economist and Boing Boing are more lenient. Is that true? It looks like you can flag or report inappropriate comments on Economist and Boing Boing - does user-generated moderation have an effect on the quality of the comments? I&#039;m also interested to know whether you get higher quality comments with pseudonyms (people are perhaps more willing to be open and express one&#039;s view anonymously) or with real names (people are perhaps more willing to be articulate and tolerant). How much identity should be revealed to facilitate the most productive comments? Lastly, with regard to &amp;quot;comment quality categories,&amp;quot; here are some other categories you might consider in addition to the ones you mention: Openness (willingness to share private information), Conversation potential (the extent there is discussion among commenters), Healthy debate (whether opposing viewpoints are respected), Spam ( whether comments are just a plug for blog or site), Barrier to entry to comment (easy to do or hard?), and flexibility of comment system (ability to see recommended comments or unfiltered). You may want to narrow these down for the scope of the paper but just something to think about. [[User:Asmith|Asmith]] 14:47, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:Saridder: Your proposal made me think of another topic I was considering for this project. This may be a bit of a tangent from what you&#039;re looking to do, but when you talk about the shift towards a knowledge economy, peer production, and the future of work, I immediately thought about Yammer, often called &amp;quot;Facebook for companies.&amp;quot; Yammer is a social network for employees at a company to use. Last year it got bought by Microsoft for $1+ billion. Users can only connect with other Yammer users at that company. But they can post status updates, photos, documents and it has pretty much all the same features as Facebook. Yammer is touted as a way to &amp;quot;flatten hierarchy&amp;quot; and empower employees by giving everyone a voice. It provides a collaboration tool for people from all over the world. But I wonder, how does this affect the balance of power in companies? Yes, users can sign up for the service for free without their company&#039;s permission. But the company can also pay for a premium Yammer account, which gives them greater control over their Yammer community. What elements of control are at work here (i.e. does the architecture of the site encourage some acceptable work practices, but not others) ? How much control do administrators of a Yammer network have over the contents of the network? Does this shift the balance of power in the workplace because employees can interact in a peer network, rather than through a top down hierarchy? Just an idea as you narrow down your topic. [[User:Asmith|Asmith]] 13:01, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
:María: I suggest focusing your analysis on only one part of Taringa: posts, communities, music, or games. Also, it might be interesting to compare and contrast that part of Taringa to another country&#039;s equivalent, e.g. Reddit, Craigslist, [http://store.steampowered.com/about/ Steam], etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
:Maria: I agree with JW that trying to follow Taringa! Musica and Taringa! Juegos in addition to the main site would be too large a scope for such a small study. [[User:Mattyh|Mattyh]] 14:48, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Maria:  I think using the four “areas to analyze the Internet” (market, architecture, norms, and laws) is an excellent idea and provides structure to your final paper.  To make your focus more narrow, you may want to select an example under each domain, supported by an explanation.  When analyzing Taringa!’s architecture, you could highlight a few pros and cons surrounding user interactions; when examining the norms within each community, you could outline examples and draw comparisons; when analyzing the market, you could primarily focus on the exchange of music, with specific examples.  Overall, I think your explanation is clear and the approach you&#039;ve outlined will allow you to collect useful data to answer your primary questions.[[User:Zak Paster|Zak Paster]] 17:13, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
John Floyd&lt;br /&gt;
Emergent Institutions: Technical Innovation in the Absence of Governance&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Floydprospectus.txt&lt;br /&gt;
[[User:Johnfloyd6675|Johnfloyd6675]] 16:53, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
John - You haven&#039;t clearly outlined your process or your specific questions, or what specific tools you&#039;ll use to come to your conclusions. That said, the overall topic is a fascinating one. To help you narrow your focus, here are some questions: What access do I have? What overall question most appeals to me? How can I relate it to the course goals? How can I answer that question given the access I have? What is it I am hoping to conclude? Does this conclusion relate directly to the course goals? What evidence will support or disprove this conclusion? How can I gather it efficiently? Will this be sufficient to meet the terms of the final assignment? Can I do this in the time provided? Am I willing to do this?&lt;br /&gt;
Good luck. I look forward to your final result. [[User:Raven|Raven]] 16:46, 28 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: CyberRalph&lt;br /&gt;
Prospectus: Anonymous and Their Aggressiveness in the Twittersphere&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Martins_Assignment2.docx&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 16:55, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Ralph, I think that sounds like an interesting project. I know it may be difficult, but I&#039;d also be interested in discovering how those ananymous twitter accounts interact with real life. Are multpiple people using the same account? Are those people actually the ones doing any hacking? Almost certainly those accounts would be monitored by the authorities if they were claiming responsibility and the users identities would be discoverable.[[User:Joshywonder|Joshywonder]] 09:39, 3 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Julian&lt;br /&gt;
Prospectus title: We the People: On the Effectiveness of Public Outreach&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Julian_Assignment2.txt&lt;br /&gt;
[[User:Julian|Julian]] 17:10, 26 February 2013 (EST)&lt;br /&gt;
:Julian:You&#039;ve presented some intriguing research questions. In part, it sounds like you plan to measure effectiveness numerically. If so, I look forward to the statistical analyses in your paper, possibly accompanied by figures/graphs/charts/etc.[[User:JW|JW]] 21:22, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Aly Barbour&lt;br /&gt;
Prospectus:  The prevalence and moderation of  the ‘Pro-Ana’ movement&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Abarbour_prospectus.docx&lt;br /&gt;
[[User:Alybarbour|Alybarbour]] 17:17, 26 February 2013 (EST)&lt;br /&gt;
:Aly Barbour: In order to narrow your field research, it will be interesting if you focus on one or two specific communities. It will be better wether they have an intense activity. &lt;br /&gt;
&lt;br /&gt;
Pseudonym: JW&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit&#039;s Dox Paradox: Proper or Not?&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:JW_Assignment2.txt[[User:JW|JW]] 17:36, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
:JW: One of the most interesting constrains here relates to social norms - doxxing is used as a way to regulate and control speech. If you post truly terrible things, the article on the Violentacrez seems to suggest, you ought to be outed to the public. On the one hand, this policy may reduce offensive material - people may be scared to post things like child pornography for fear of being publicly shamed. But &amp;quot;justifiable doxxing&amp;quot; also leads to a kind of vigilantism which has all kinds of moral implications. Who decides who deserves to be outed? It would be interesting to observe doxxing behavior on Preddit and Reddit to see if there is any recognition of where moral boundaries are drawn, if any. Is there any discussion of when doxxing is justifiable (i.e. journalism) and when it is not (i.e. trolling) ? Reddit&#039;s stance was clearly: doxxing is bad, period. But do community members feel differently? [[User:Asmith|Asmith]] 12:30, 27 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Jax, formerly known as Jaclyn Horowitz&lt;br /&gt;
Prospectus Title: Ignorance and the Colonization of Rap Genius&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Jax_Assignment2.docx&lt;br /&gt;
[[User:Jax|Jax]] 17:57, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Jax:  This is an interesting topic and one that will allow you to make many connections between the artists and those who critique the artists.  You mention that you’re...&#039;&#039;“interested in examining the characteristics of popular contributions and contributors in relation to broader reader and contributor demographics, exploring whether objectivity can emerge in this venue.”&#039;&#039;  What preliminary hypotheses do you have?  Does this website cater to the Ivy League crowd or does it attract rap enthusiasts from all walks of life?  Examining demographics and objectivity is a valid approach, but stating your hypotheses upfront may provide an interesting twist.  Do you think people are generally objective or subjective, and what demographics do you think most reviewers represent?  If you follow this method, the data you collect will either confirm or negate your upfront interpretations.  All in all, this is a very current topic and I look forward to learning about your findings. [[User:Zak Paster|Zak Paster]] 17:21, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&#039;&#039;&#039;Becca Luberoff&#039;&#039;&#039;&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Prospectus title:&#039;&#039;&#039; Issues of Privacy and Security in Online Mental Health Communities &amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2013/File:BeccaLuberoff_Assignment2.docx &amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:BeccaLuberoff|BeccaLuberoff]] 19:41, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I&#039;ve noticed that Google caches content from purportedly private forums. If content from your three closed communities is publicly searchable, how does that affect privacy issues?[[User:JW|JW]] 22:42, 26 February 2013 (EST)&lt;br /&gt;
:Becca: I followed the link to the &amp;quot;Living with Bipolar Disorder&amp;quot; category on bphope.com and it appeared that the most recent post was 3 months ago with many being from years ago.  Will not being able to observe activity (particularly censoring) in real-time have an impact on the research? [[User:Mattyh|Mattyh]] 14:42, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Pseudonym: baughller&lt;br /&gt;
Prospectus title:  Ethical Implications of Personalized Search&lt;br /&gt;
Link to Prospectus:http://cyber.law.harvard.edu/is2013/File:Assignment_2_-_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
I really like the comparison you drew between online libraries and physical libraries such as the library of congress. I think this can serve as a good comparison point for most of your research and provide valuable information. The idea of DuckDuckGo and being given similar information could be a big theme/discourse for your project as well.  [[User:AaronEttl|AaronEttl]] 14:39, 2 March 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Baughller: This is an interesting topic.  Given your research focus area, it may be interesting to forecast the future in relation to identity-type searches (from your perspective).  For example, if search results continue to show information based on people’s background / historical searches, what will the long-term outcomes be?  Is this a positive search trend or a negative trend, and why?  I think it may also be interesting to look at this scenario from a marketing viewpoint.  Today, advertisements frequently appear as we surf the web, based on our preferences; this wasn&#039;t the case years ago.  To that end, how is this new trend changing certain products and/or services?  Are some industries profiting more than others, or can all types of marketing reap the benefits?  Overall, your topic is very relevant in the current Internet environment, and this search-reality may only be in its infancy. [[User:Zak Paster|Zak Paster]] 17:27, 2 March 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9726</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9726"/>
		<updated>2013-02-26T21:22:32Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Muromi&lt;br /&gt;
*Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Name: Susan Goldstein&lt;br /&gt;
Prospectus title: “What is the Definition of “Open” in a Massively Open Online Course (MOOC)?”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Susan_Goldstein_Assignment2.docx&lt;br /&gt;
[[User:Susan Goldstein|Susan Goldstein]] 15:44, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Kaley Sweeney 15:47, 26 February 2013 (EST)&lt;br /&gt;
Kaley Sweeney&lt;br /&gt;
Internet in North Korea: The Changing Scene of Totalitarian Control Under Kim Jung-Un&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/KaleySweeney_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
*Raven&lt;br /&gt;
*Prospectus Title: Creating Valuable Content: Commenters and Your Commenting Community&lt;br /&gt;
*Link to Prospectust: http://cyber.law.harvard.edu/is2013/?title=File:Raven_Assignment_2_Due_February_26_2013.docx&amp;amp;oldid=9718&lt;br /&gt;
[[User:Raven|Raven]] 15:59, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
saridder&lt;br /&gt;
Steve Ridder&lt;br /&gt;
The Digital Marketplace&lt;br /&gt;
Link:  http://cyber.law.harvard.edu/is2013/File:Steve_Ridder_Assignment_2.docx&lt;br /&gt;
[[User:Saridder|Saridder]] 16:18, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Internet regulation in Argentina, the case of Taringa!&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 16:22, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9715</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9715"/>
		<updated>2013-02-26T20:32:50Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Muromi&lt;br /&gt;
*Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9714</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_2_Submissions&amp;diff=9714"/>
		<updated>2013-02-26T20:28:33Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
This assignment is due on February 21.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
In the [[#Submissions|submissions]] section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
===Comments===&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: interestingcomments&lt;br /&gt;
Prospectus title: “Does US Trade Treaties Advance Internet Freedom in South America.”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:LSTUAssignment2.docx&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 18:47, 24 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Pseudonym: &amp;quot;Asmith&amp;quot; &lt;br /&gt;
Prospectus title: “Diaspora* A Social Network for the People by the People”&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment2.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Pseudonym: Rich Cacioppo&lt;br /&gt;
Prospectus title: &amp;quot;The Limits of Fee Speech In Light of Cultural Senility and Pragmatism&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/sites/is2013/images/Internet_Control_proposal_February_24_2013.pdf&lt;br /&gt;
[[User:Rich|Rich]] 00:45, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Pseudonym: AaronEttl&lt;br /&gt;
Prospectus Title: &amp;quot;The Market&#039;s Impact on Operational Policies&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment2.docx&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 13:11, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&#039;&#039;&#039;Pseudonym&#039;&#039;&#039;: Hgaylor&lt;br /&gt;
&#039;&#039;&#039;Prospectus&#039;&#039;&#039;:“Access for Open and Secure Communication”&lt;br /&gt;
An In-depth analysis of government’s role in the Global Collaborative Data Network. &lt;br /&gt;
&#039;&#039;&#039;Link to Prospectus&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2013/?title=File:Hunter_Gaylor_Prospectus(_Internet_Society).docx&amp;amp;oldid=9645&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Pseudonym: Dear Alice&lt;br /&gt;
Prospectus Title: &amp;quot;One Company, Multiple Social Media Platforms, Numerous Conversations&amp;quot;&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_Two_Prospectus.docx&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 17:50, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Michael Keane  &amp;quot;A Single Site Case Study of the Effect of Censorship on a Web Community&amp;quot; http://cyber.law.harvard.edu/is2013/File:MichaelKeane_assignment2_prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Michaelekeane|Michaelekeane]] 18:20, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
Rebekahjudson&lt;br /&gt;
Title: &amp;quot;&#039;Weird Twitter&#039;: Critique from Within?&amp;quot; &lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2013/File:Judsonprospectus.rtf&lt;br /&gt;
&lt;br /&gt;
[[User:Rebekahjudson|Rebekahjudson]] 21:09, 25 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Name or pseudonym: Joshywonder&lt;br /&gt;
Prospectus title: Lawbuzz_Prospectus&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Lawbuzz_Prospectus_-_Joshywonder.Feb25.13.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Matthew D. Haney&lt;br /&gt;
&amp;quot;Online Review Platform Yelp – filtering for hire?&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matthew_D_Haney_-_Assignment_2_Prospectus%2C_02262013.docx&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
Milenagrado&lt;br /&gt;
&amp;quot;Duolingo and Copyright Issues&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Assignment2milenagrado.doc&lt;br /&gt;
[[User:Milenagrado|Milenagrado]] 21:34, 25 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
* Pseudonym: Tessa May&lt;br /&gt;
* Prospectus title: Moderation or Censorship in LinkedIn Groups?&lt;br /&gt;
* Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Tessa_May_Assignment_2.pdf&lt;br /&gt;
[[User:Tessa May|Tessa May]] 02:52, 26 February 2013 (EST)&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Alicia Phan | APhan&lt;br /&gt;
&amp;quot;Assignment#2 - Law As Culture; Facebook &amp;amp; Privacy Rights&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/AliciaPhan_Assignment2.docx&lt;br /&gt;
[[User:APhan|APhan]] 08:24, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
&lt;br /&gt;
Assignment 2 _USER777 . Facebook-Marketing-Power of &amp;quot;Like&amp;quot;&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:USER777_Assignment_2.docx&lt;br /&gt;
[[User:User777|user777]] 11:35, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Muromi&lt;br /&gt;
*Prospectus Title: Maintaining Stability in China&#039;s Cyberspace&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/sites/is2013/images/Muromi_assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
--[[User:Muromi|Muromi]] 12:02, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
* Zak Paster&lt;br /&gt;
* Online Giving: A New Fundraising Era&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Zak_Paster_Assignment_2_Online_Fundraising_Communities_2-26-13.docx&lt;br /&gt;
* [[User:Zak Paster|Zak Paster]] 12:49, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
RobMcLain&lt;br /&gt;
&lt;br /&gt;
Under the Watchful Eye: Community, Connivery, and Censorship on Yelp&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/RobMcLain_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Right to be Forgotten &lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Righttobeforgotten.doc&lt;br /&gt;
[[User:Caroline|Caroline]] 13:28, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Prospectus;_Johnathan_Merkwan.docx is my Prospectus; please read and enjoy. I look forward to constructive comments. [[User:Johnathan Merkwan|Johnathan Merkwan]] 13:46, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Name or pseudonym: Free speech, Prospectus title: “The study of Internet control on online travel community.” &lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2013/File:Free_speech_-_Assignment_2.docx ([[User:Free speech|Free speech]] 14:13, 26 February 2013 (EST))&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
*Phillip Dade&lt;br /&gt;
*The DPLA, is it Additive? Subtractive? Redundant? (DPLA = Digital Public Library of America)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2013/File:DADE_-_2nd_Assignment_-_DPLA.doc&lt;br /&gt;
*[[User:Phildade|Phildade]] 15:01, 26 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
María Paz Jurado&lt;br /&gt;
Freedom of speech in Argentina, a study of the Taringa! case&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:MariaPazJurado-Assignment2.pdf&lt;br /&gt;
--[[User:Maria|Maria]] 15:28, 26 February 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=9486</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_1_Submissions&amp;diff=9486"/>
		<updated>2013-02-11T22:19:29Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment. Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 12, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2013/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Alternatively, for this assignment, you can e-mail your file to the instructors at is2013+homework@cyber.law.harvard.edu. We are offering this option for Assignment 1 only, as a backup as you become familiar with uploading; future assignments will need to be uploaded per the procedure above.&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
Please post your link to your report below, in the following format:&lt;br /&gt;
&lt;br /&gt;
* (Name or Pseudonym)&lt;br /&gt;
&lt;br /&gt;
* (Link to rule)&lt;br /&gt;
&lt;br /&gt;
* (Link to article)&lt;br /&gt;
&lt;br /&gt;
* (Link to your submitted report)&lt;br /&gt;
&lt;br /&gt;
[[User:Jeff Hermes|Jeff Hermes]] 09:44, 7 February 2013 (EST)&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Mattyh (Matthew Haney)&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Drug_policy_of_the_Third_Reich&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/sites/is2013/images/Matt_Haney_-_Assignment_1%2C_02102013.docx&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Asmith&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Googlization&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Asmith_Assignment1.doc&lt;br /&gt;
&lt;br /&gt;
[[User:Asmith|Asmith]] 00:10, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*****&lt;br /&gt;
&lt;br /&gt;
Dear Alice&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Harvard_Extension_School&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:Internet_Assignment_1_(Dear_Alice).docx&lt;br /&gt;
&lt;br /&gt;
--[[User:Dear Alice|Dear Alice]] 15:42, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
TAG Student ID#10789842&lt;br /&gt;
Assignment #1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What the rule is?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Neutral Point of View (NPOV), means representing fairly without bias the information that is published, which is supported by reliable sources. This deals with creating and maintaining a neutral point of view on internet.  Disputes or any sort of controversial subjects, such as religious believes or abortion, aim to be described as opposed to take a biased stand on the subject.  The explanation of the subject should be neutrally informative and factual and not stray towards an opinion.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why this matters?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View matters because this rule established by Wikipedia, establishes a check and balance to provide the parameters of control to protect the integrity of the platform. With these protections and controls in place it not only protects the integrity of the platform and its participants, but it also protects the rights and freedoms of the owners of the content referenced. It is vital to discover a blend of technical and economic modernization  The challenge that face Neutral Point of View is the Wikipedia is written by open and transparent consensus   It can take a substantial amount of time before a correct &amp;quot;neutral approach  can be established for all parties to agree on (Poe 2006).  The purpose of this will be for implementing representation fairly, proportionately and and as much as possible, unbiased for all articles published by reliable sources (Poe 2006). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How it relates to other rules, and comments on the details/subsections of the rule.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View has several related issues.  Two examples of this are:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Verifiability&#039;&#039;&amp;quot; This individuals who are reading and editing the encyclopedia can check that the information comes from a reliable source that has been published such as books or newspaper.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;No Original Research:&#039;&#039;&#039; The term is a prohibition against original research and means that all material added to articles must be attributable to a reliable published source, even if not actually attributed (No Original Research! 2013). This rule is the third rule in content policies and determines the type and quality of material acceptable in articles. Because these policies work in harmony, they should not be interpreted in isolation from one another, and editors should familiarize themselves with all three.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is the article you chose?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Disruptive_innovation&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why you chose it?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
In 1997 the term “Disruptive Innovation” was created by a Harvard Professor Clayton M. Christensen and published a book on the topic. Throughout my professional career I have strived to bring to market paradigm shifts in technologies, some would classify as disruptive innovations. Three classic examples of disruptive innovations that sacrificed quality for the ability to have mobility are:&lt;br /&gt;
-	The Transistor Radio&lt;br /&gt;
-	Pocket Calculators&lt;br /&gt;
-	Mobile Phones&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What edits you made?&#039;&#039;&#039; &lt;br /&gt;
The edit I made was by adding the example of the pocket calculator, which was a form of disruptive innovation.&lt;br /&gt;
 &lt;br /&gt;
[[File:LSTUEdit]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Did users made edits in response?&#039;&#039;&#039;&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Rule for the article: How the rule played out in practice (if it did)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Neutral Point of View  did not play a significant role in this particular article, but it has the possibility of future violations. As new technology enters into the market there could be a cause for the technology being replaced to attempt to promote the inadequacies of this new technology in an attempt to keep market share. An example of this is how Rockefeller spent millions in an attempt to promote the inadequacies of electricity when it challenged his oil lanterns as the primary source of power.&lt;br /&gt;
Rule for the community: How you think the rule plays a role in maintaining Wikipedia. &lt;br /&gt;
 &lt;br /&gt;
In reporting or educating being neutral and unbiased is critical in forming free minds that can shape the world through their own interpretations and innovations. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How does it benefit/harm the Wikipedia community in any way?&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
The Neutral Point of View allows for the advancement of society, technology, and innovations.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why is it important for Wikipedia?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This is important for Wikipedia so it sets the environmental parameters to establish them as a reliable informational resource, instead of a platform to promote individual’s political motives.  It also encourages cooperation among encyclopedia&#039;s contributors (Poe 2006).&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Bibliography&#039;&#039;&#039;&lt;br /&gt;
	&lt;br /&gt;
	Kempf, J. March 2004.  The Rise of the Middle and the Future of End-to-End:&lt;br /&gt;
 Reflections on the Evolution of the Internet Architecture. ftp://ftp.rfc-editor.org/in-notes/rfc3724.txt&lt;br /&gt;
             &lt;br /&gt;
            No Original Research! 2013. http://beforeitsnews.com/opinion-liberal/2013/01/no-original-research-2454120.html&lt;br /&gt;
 &lt;br /&gt;
         Poe, Marshall.  September 2006.  A Closer Look as Neutral Point of View (NPOV).  http://www.theatlantic.com/magazine/archive/2006/09/a-closer-look-at-the-neutral-point-of-view-npov/305120/&lt;br /&gt;
&lt;br /&gt;
	Robertson, Jordan. November 11, 2008.  Software Aims To Uncover ‘Data Discrimination’.http://www.nbcnews.com/id/22013943/ns/technology_and_science-internet/t/software-aims-uncover-data-discrimination/#.URVFKaVX3MA [[User:Interestingcomments|Interestingcomments]] 14:34, 8 February 2013 (EST)&lt;br /&gt;
[[User:Interestingcomments|Interestingcomments]] 16:14, 10 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
User777&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:Verifiability,_not_truth&lt;br /&gt;
&lt;br /&gt;
Assignment #1 – Neutral Point of View &lt;br /&gt;
Class user: user777&lt;br /&gt;
Wiki user: user55462*&lt;br /&gt;
February 12th, 2013&lt;br /&gt;
Internet and Society: Technologies and Politics of Control&lt;br /&gt;
&lt;br /&gt;
For this first assignment, I chose to edit Wikipedia’s “Neutral Point of View” (NPOV) rule. NPOV stands that users of Wikipedia that edit an article should “fairly represent all sides of a story, and not make an article state, imply, or insinuate that any one side is correct”. Therefore, the cause of Wikipedia’s social and political bias, establish a quantitative benchmark for examining the presence of that bias. NPOV mainly defines the terms of objectiveness, bias and neutrality that provide a framework for considering neutrality within the Internet arena. In my view, however, the main questions would arise are: what is meant by neutrality? Is it fairness or perhaps positive opinion? What are the definitions of fairness and/or neutral? &lt;br /&gt;
&lt;br /&gt;
The article that I chose was “Wikipedia and the meaning of truth” which was published by MIT technology review. I found this article by searching different entries in wiki, and this article was linked via Wiki tools. &lt;br /&gt;
Here is the link to this article: http://www.technologyreview.com/review/411041/wikipedia-and-the-meaning-of-truth/page/2/, however it is mainly a support to the main article, which is: http://en.wikipedia.org/wiki/Wikipedia:Verifiability,_not_truth&lt;br /&gt;
&lt;br /&gt;
I chose this article because it greatly illustrated the clarifications of truth and fairness that was perfectly aliened for this assignment that supported the idea of NPOV. What is fairness? How to be fair?  Moreover, what is considered to be truth? According to Wikipedia’s entry on the subject, “the term has no single definition about which the majority of professional philosophers and scholars agree.” But in practice, however in “Wikipedia’s standard for inclusion has become its de facto standard for truth, and since Wikipedia is the most widely read online reference on the planet, it’s the standard of truth that most people are implicitly using when they type a search term into Google or Yahoo. On Wikipedia, truth is received as the consensus view of a subject” (article chosen). Within this rule, I edited the idea of fairness and opinion. I stated that fairness’s tone should be presented within competing views with a consistently fair and sensitive tone. Even when a topic is presented in terms of facts rather than opinion, an article can still radiate an implied stance through either selection of which facts to present, or more subtly their organization, for instance, refuting opposing views as one goes along makes them look a lot worse than collecting them in an opinions-of-opponents section. Moreover, I have added few edits about the manner of option: http://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Furthermore, after my edits, I have placed it on “watch-list”, however I have not received any comments and/or edits. In my view, this rule is neutral in maintaining Wikipedia’s community. Due to cultural and social diversification of options and thoughts, this rule could play a neutral role within its community. Also, I read few other articles, and it’s interesting to note what Princeton’s reviews are about this rule: “NPOV is especially important for the encyclopedia&#039;s treatment of controversial issues, where there is often an abundance of viewpoints and criticisms of the subject. In a neutral representation, the differing points of view are presented as such, not as facts”. [[User:User777|user777]] 12:36, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
AaronEttl&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
http://en.wikipedia.org/wiki/Cloud_computing&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2013/File:AaronEttl_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AaronEttl|AaronEttl]] 16:38, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;br /&gt;
&lt;br /&gt;
Maria Paz Jurado&lt;br /&gt;
* http://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
* http://es.wikipedia.org/wiki/Gobierno_abierto&lt;br /&gt;
* http://cyber.law.harvard.edu/is2013/File:Maria_Paz_Jurado_-_Assignment_1.docx&lt;br /&gt;
--[[User:Maria|Maria]] 17:19, 11 February 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
***&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Talk:Assignment_1_Details_and_Reporting&amp;diff=9442</id>
		<title>Talk:Assignment 1 Details and Reporting</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Talk:Assignment_1_Details_and_Reporting&amp;diff=9442"/>
		<updated>2013-02-07T18:02:29Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Questions about assignment 1 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Media:Example.ogg]]&lt;br /&gt;
&lt;br /&gt;
==Questions about assignment 1==&lt;br /&gt;
&lt;br /&gt;
Hello. I started this topic in case anybody had questions about the first assignment. In fact, I have a couple questions myself!&lt;br /&gt;
&lt;br /&gt;
# How does one determine what a &#039;substantial&#039; edit is to a wikipedia entry? Say for instance I add a link to a news article about a topic. Is that considered &#039;substantial&#039;?&lt;br /&gt;
#*On the [[Assignment_1_Details_and_Reporting|Assignment 1 Details and Reporting page]], substantial is described the following way: &#039;&#039;&#039;&#039;&#039;edits should be more than cosmetic and should actually enhance the substance of the article&#039;&#039;&#039;.&#039;&#039;  &lt;br /&gt;
# How many edits should we make in order to complete the assignment successfully?&lt;br /&gt;
# Do we need to send the instructors the final report via email or do we just do just file everything under the &#039;Assignment 1 Reporting&#039; section? &lt;br /&gt;
#* I think the best case scenario is to get feedback from wikipedia and be edited yourself, then end up in a collaborative process. [[User:Dpanzar|Dpanzar]] 18:28, 3 February 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Thanks for your help!&lt;br /&gt;
&lt;br /&gt;
--[[User:Paulglester|Paulglester]]&lt;br /&gt;
&lt;br /&gt;
QUESTION:  are the wiki pages that have no &#039;edit&#039; tab locked up?  Nobody is contesting my edits so I&#039;m looking for a high traffic site to mess with -but the big topics don&#039;t have the edit tab.  Any advice?  I am obviously the least tech savvy student in class.  Throw me a bone here.&lt;br /&gt;
&lt;br /&gt;
[[User:Dpanzar|Dpanzar]] 05:30, 5 February 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
* If you aren&#039;t signed into an account then a [http://en.wikipedia.org/wiki/Wikipedia:Protection_policy#semi semi-protected] page will not be editable.  If this isn&#039;t the case then what is it that you see when you go to a major unprotected page?  For example, today&#039;s Featured Article is [http://en.wikipedia.org/wiki/Tim_Duncan Tim Duncan] and it is completely unprotected.  Is there no edit option at the top of this page?  --[[User:Ari|Ari]] 05:53, 5 February 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:* I&#039;m a logged in user, but I also cannot edit semi-protected pages, such as Microsoft http://en.wikipedia.org/wiki/Microsoft.  Any idea why?  -- [[User:JoshK|JoshK]] 07:42, 5 February 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
::* To edit these pages you need to be [http://en.wikipedia.org/wiki/Wikipedia:User_access_levels#Autoconfirmed_users autoconfirmed]. &amp;quot;The precise requirements for autoconfirmed status vary according to circumstances: for most users on en.wiki, accounts which are more than 4 days old and have made at least 10 edits are considered autoconfirmed. However, users editing through a Tor network are subjected to much stricter autoconfirmed thresholds: currently 90 days and 100 edits.&amp;quot;   Are you using Tor? --[[User:Ari|Ari]] 17:38, 5 February 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
:::* Ahh, I have not been a user for 4 days, and have not yet made 10 edits.  That&#039;s why!  Thanks!  --~Josh  (Sorry if I hijacked the question).--[[User:JoshK|JoshK]] 08:09, 9 February 2009 (UTC)&lt;br /&gt;
&lt;br /&gt;
Hello, I started the assignment and have a question too. Is it possible to choose any policy or guideline from [http://en.wikipedia.org/wiki/Wikipedia:List_of_policies] or [http://en.wikipedia.org/wiki/Wikipedia:List_of_guidelines] or we have to choose between the 5 you have listed in the assignment´s description? Thanks! --[[User:Maria|Maria]] 13:02, 7 February 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=9342</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=9342"/>
		<updated>2013-01-29T19:41:58Z</updated>

		<summary type="html">&lt;p&gt;Maria: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;January 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet at its core is simply an expression of a technological protocol that allows for a particular way of sharing information. But from its humble beginnings the Internet has always felt like more than this. The Net has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal. So is this platform about fundamental social, political and economic change, or about access to solipsistic blogging, pornography, cheap pharmaceuticals, free music, and poker at home? This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber-terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (Assignment &amp;quot;Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
* Reflect on what you believe are the most significant social, cultural, political or economic changes associated with the spread of digital technologies.  In a few sentences, please offer 2-3 examples in the Class Discussion section below and be prepared to discuss them during class.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=V2QdEj8UjBc Ethan Zuckerman, History of the Internet] (approx. 6 minutes, watch all)&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=whmMNRHktX8 Jonathan Zittrain, How the Internet Works] (approx. 4 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cs.mu.oz.au/~zs/decl.html John Perry Barlow, A Declaration of the Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/printerfriendly.msp?id=961 Jack Goldsmith &amp;amp; Tim Wu, Digital Borders (Legal Affairs)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.webuse.org/pdf/Hargittai-DigitalDivideWhatToDo2007.pdf Eszter Hargittai, The Digital Divide and What to Do About It (New Economy Handbook)] (focus on Sections I-III)&lt;br /&gt;
&lt;br /&gt;
:* Hargittai’s data is from 2003. For more recent data, see [http://pewinternet.org/Reports/2012/Digital-differences/Overview/Digital-differences.aspx Pew Internet &amp;amp; American Life Project, Digital Differences 2012] (read intro, skim the sections).&lt;br /&gt;
&lt;br /&gt;
* [http://www.ted.com/talks/rebecca_mackinnon_let_s_take_back_the_internet.html Rebecca MacKinnon, Let’s Take Back the Internet! (TED.com)] (approx. 15 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto)&lt;br /&gt;
&lt;br /&gt;
* [http://blog.ericgoldman.org/archives/2009/03/the_third_wave.htm Eric Goldman, The Third Wave of Internet Exceptionalism]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1752415 Tim Wu, Is Internet Exceptionalism Dead?]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Welcome to Internet and Society: Technologies and Politics of Control! This is the section of the page where you should add your comments to complete &amp;quot;assignment zero.&amp;quot; Once you have registered an account, just click the &amp;quot;[edit]&amp;quot; button at the upper right hand corner of this section to add text! [[User:Jeff Hermes|Jeff Hermes]] 10:00, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
1. There has been several significant economic changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to information has impacted the way news is distributed, causing the world investment markets to move faster and become more volatile off of news.&lt;br /&gt;
&lt;br /&gt;
New Opportunity: A greater understanding of how the internet works with distribution can allow for algorithms to be developed through digital technologies to counter act the news as its distributed.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With greater technology being created at the speed of light, it has become difficult to study trends for the investment markets, which are in some respects locked into a web based portal that can control the fate of public companies, instead of fundamentals.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
2. There has been several significant political changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to information online about freedoms in the democracies around the world&lt;br /&gt;
&lt;br /&gt;
New Opportunity: In the Middle East this was a major contributing factor in the Arab Spring, to bring and implement change.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With this new access to freedoms, the challenge of countries restricting information or access is now more than ever present. As in the article about Yahoo, France was able to restrict information making the access less free for the citizens in that country, compared to other parts of the world.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
3. There has been several significant social changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to social media sites has fundamentally changed the way people interact with each other&lt;br /&gt;
&lt;br /&gt;
New Opportunity: By establishing specific structures in place, access to a significant amount more potential people to do business with is available using these social media sites.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With greater access to more people, the amount of noise is constant. So standing out with your message is critical to stand out amongst the crowd.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
4. There has been several significant cultural changes associated with internet and digital technologies which has created both new opportunities and new challenges.&lt;br /&gt;
&lt;br /&gt;
Change: Access to education online or education in general for both genders&lt;br /&gt;
&lt;br /&gt;
New Opportunity: More people are educated now than any part of the history of the world. In recent years with the Millenium Development Goals an emphasis of educating our youth and specifically woman as a priority has taken some real strives forward.&lt;br /&gt;
&lt;br /&gt;
New Challenge: With this material change in focussing in educating women, groups like the Taliban has fired back with scare tactics to keep them out of schools. [[User:Interestingcomments|Interestingcomments]] 13:21, 28 January 2013 (EST) &lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
One of the greatest economic changes to occur will be the ratification of the JOBS Act (Jumpstart Our Business Startups) which will allow private companies to solicit unaccredited investors to participate in their startups.  Opportunities will be created for entrepreneurs and investors, but the innovation will also account for great investor losses due to the erosion of necessary barriers to fundraising.  Additionally, it will create opportunities for fraud.&lt;br /&gt;
&lt;br /&gt;
Another huge change brought about is the access to online education and training.  At a time when unemployment is high, online education and training allows for additional specialization and creates opportunities for a large group of people who don&#039;t have the flexibility of schedule for traditional learning.  A challenge is that quality has not kept up with the technology, so you are seeing a proliferation of sub-par learning experiences offering students degrees that leave them in massive amounts of debt, but don&#039;t necessarily make them more attractive of a candidate when it comes time to find a job.  [[User:Phildade|Phildade]] 15:21, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
This whole section of Introduction I found very compelling. The language of the assignment was at first a bit unusual but now I am getting used to such communication. To duscuss the problems I have noticed with the internet, most noteably the discussion about Chinese, I found very compelling. Being different languages cave different means of speech production, the understanding that internet lauguage, like a fax machine, is actually the English I learned made me flip![[User:Johnathan Merkwan|Johnathan Merkwan]] 15:48, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
A cultural change associated with digital technologies is how we share things that we create, whether it is music, photographs, videos/movies, etc and how the &amp;quot;ownership&amp;quot; of these items is decided.  Between SOPA and PIPA and other copyright legislation, as well as the whole idea of open access, as much as we are able to share things with each other so much easier through technology, it opens a whole set of challenges as to how and if we monitor and control the sharing. &lt;br /&gt;
&lt;br /&gt;
Another change is the reliance we have on search engines like Yahoo and Google in how we find information.  While we use these gateways to comb the Internet for us and to make the process seemingly simpler, we also, at times, have a false sense of comfort that we are getting all of the information available through these search engines when that’s not always the case.  As we have fewer and fewer search engines available, the monopoly that a search engine has on our ability to find information and relevant information online grows.  And as this happens, we also tend to settle for the initial results rather than taking the time to dig deeper.  We put a lot of faith in our search engines.  &lt;br /&gt;
&lt;br /&gt;
The Internet has given us numerous new ways to interact and communicate with each other.  One way in particular that I think has really changed how we communicate is the anonymity that the Internet provides.   There are challenges and opportunities that arise from this.  While people often will say things online anonymously that they may not say to a person in real life there are often times where being able to be anonymous on the Internet, allows people a sense of comfort and place that may be lacking in their everyday life.  [[User:Nfonsh|Nfonsh]] 16:05, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
I believe that the revolution in cloud computing offers the greatest potential to reshape the landscapes of various sectors and institutions. Take online media for example; In the past 15 years, we have seen the eradication of media giants like Blockbusters and Borders due to the increase in accessibility of online media. Hubs like Amazon, Netflix, Hulu, Vudu, and other online institutions offer a wider selection and more accessible means of acquiring movies, music, and books. Another positive benefit as a result of the growth in the cloud is greater ease of accessibility over a wider range of devices to digital content. Institutions like Harvard, MIT, and TED have made it possible to access educational information and series on devices like the iPad and iPhone. I believe that this kind of freedom of information will very shortly become the new standard for information access so that the entire world may consume digital media with the ease of accessing it through a personal smart device. While there is great upside with the revolution in speed and efficiency of online access and cloud computing, the greatest risk is security. Because a greater concentration of more valuable information will be stored on networks vulnerable to hackers, I believe that online security will be one of the most important focal points of the next 10 years. As sectors and institutions make the transition to the online world, they will necessitate a more reliable solution to safeguarding highly sensitive information like social security numbers, credit card information, and personal privacy. The Gizmodo story here highlights some of the potential personal privacy issues that will need to be addressed in the near future: http://gizmodo.com/5880593/the-apple-bug-that-let-us-spy-on-a-total-strangers-iphone [[User:AaronEttl|AaronEttl]] 17:34, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
Historically,  humans innovate for the purpose of communication,  so the most significant change associated with digital technologies is how communication has become easier.  The possibility of faster communication influences in all aspects of people&#039;s life. Easy communication also implies more access to information, and that is exactly what runs the world today. Those who are able to take advantage of all this available information to make fair commercial relations without invading other&#039;s privacy will succeed.  However, the biggest challenge is related to privacy, too. Is it possible to regulate internet without censorship? Internet is currently the arena where a big conflict between freedom of expression and safety is playing out.[[User:Milenagrado|Milenagrado]] 20:13, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
There are two technologies, or classes of technologies, which I believe have had a significant social, cultural, political and economic effect on the world. The first are called web 2.0 technologies, which imply a new version of something but really is just an evolution of the way people used the world wide web. The web first came into existence in 1994 when web browsers and the language of the web - HTML - became prevalent. Static web pages were built by the millions and the three letters www and the phrase &amp;quot;dot com&amp;quot; became part of many people&#039;s lexicon. However, starting in the late 1990&#039;s and into the early 2000&#039;s, people were learning to use the same world wide web in different ways. Collaboration was becoming common with wikis (like this page) and content/document sharing application such as Microsoft Sharepoint. Social networking sites, most notably MySpace and Facebook, in addition to video sharing sites like YouTube allowed user-driven content to drive a good chunk of Internet activity. This mini-revolution allowed the Internet to go from being a place where your average person went to be a consumer of information to a place where the same average person would create and generate information as much as consume it. These technologies also made the Internet much more friendly to the young, old and people of all ages who were not overly tech savvy. &lt;br /&gt;
&lt;br /&gt;
The second class of technologies that have revolutionized the world to a large extent are wireless technologies. This includes satellite, cellular, WiFi (802.11) and Bluetooth which all have had a profound effect on connecting the average person up to the global network of digital information more easily and frequently. Fifteen years ago, only a small fragment of the population owned cellular phones. In 2013, a large majority of the population owns cellular phones, many of which are smart phones with touch screens, access to hundreds of thousands of applications and other features such as cameras and Internet access. Wireless technologies have also brought the ability to communicate with much of the world to places where wired infrastructure does not currently exist. Wireless communications have opened up the online world to people across the globe who wouldn&#039;t otherwise have access to such a place.&lt;br /&gt;
&lt;br /&gt;
[[User:CyberRalph|CyberRalph]] 23:44, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
I think what&#039;s striking is how digital technologies have empowered both decentralized grassroots movements as well as centralized corporate and political institutions. Using the Internet, businesses can profit from enormous amounts of consumer data, broaden markets, and globalize their workforce, while governments are afforded new platforms for engaging with citizens (We the People petitioning system) or censoring and monitoring them. At the same time, citizens gain amazing new tools for media production and self-expression, collective organization, and knowledge access.  Sometimes top-down centralization and bottom-up decentralization interact together to make everyone better off (New York City&#039;s 311 program for example) other times they fundamentally clash (BitTorrent and the recording industries). So to me, digital tech intensifies the struggle between bottom up and top down powers and increases the complexity in the relationship, as both forces struggle to understand what the Internet is, what it can do, and what it should be. &lt;br /&gt;
&lt;br /&gt;
Look forward to exploring this theme in class. [[User:Asmith|Asmith]] 00:40, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*******&lt;br /&gt;
&lt;br /&gt;
Assignment 0&lt;br /&gt;
&lt;br /&gt;
I think the top three challenges of the Internet are:&lt;br /&gt;
&lt;br /&gt;
1.  Network neutrality - telco&#039;s dictating to me what traffic is good / bad, and given that, what I&#039;d have to pay more for to use the &#039;bad&#039; apps&lt;br /&gt;
&lt;br /&gt;
2.  Governments tapping and spying on the internets users&lt;br /&gt;
&lt;br /&gt;
3.  Government&#039;s using the internet as a battlefield (cyberwar).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Saridder|Saridder]] 21:51, 28 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
The spread of digital technology has impacted and changed the way the global society communicates and operates.  It seems the increased speed, frequency, access, and reach of digital communicates has had the most significant impact economically, socially, culturally, and politically.  These positive impacts have come with many unintended consequences left to be managed or navigated.--[[User:Jspain|Jspain]] 10:14, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
*********&lt;br /&gt;
&lt;br /&gt;
During my recent travels in Southeast Asia, I observed a great many people using internet accessible smart phones, including new iphones, in both the urban and rural areas of Thailand, Cambodia and Singapore.   How will this proliferating access to the world wide web affect those societies that reputedly limit free speech, especially in the area of political dissent? [[User:Nleblanc|Nleblanc]] 10:30, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*********&lt;br /&gt;
&lt;br /&gt;
Top three challenges of the internet are:&lt;br /&gt;
&lt;br /&gt;
1. Government seeking more control, through laws and taxes&lt;br /&gt;
2. Piracy and anti-piracy activities&lt;br /&gt;
3. The changing nature of privacy&lt;br /&gt;
&lt;br /&gt;
[[User:Jennga|Jennga]] 12:00, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
******&lt;br /&gt;
&lt;br /&gt;
Good afternoon, the must big changes in the society, since internet have been created are:&lt;br /&gt;
&lt;br /&gt;
1. There´s a new concept of the right of freedom expressión.&lt;br /&gt;
&lt;br /&gt;
2. Therés a new concept of what is the best way to protect intellectual property.&lt;br /&gt;
&lt;br /&gt;
3. Finally one of the must sensitive changes, is that we all can know what is happening around the world in just one second.&lt;br /&gt;
´´´´&lt;br /&gt;
natalia.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
********&lt;br /&gt;
&lt;br /&gt;
A list of the most significant changes associated with the spread of digital technologies would certainly include: the complexity of financial instruments and the difficulty governments and central banks are having understanding and regulating them; the issues regarding government surveillance of not only its citizens, but of citizens of other countries both within and outside its borders, what governments are choosing to do with this information, and the relative slowness of the courts and laws to react; and the facilitation of communication among geographically disparate groups: for example the use of Facebook, Twitter and YouTube during the Arab Spring to create a sense of common cause, as well as to distribute images that built a large base of support globally for governments to respond, making it difficult, for example, for the U.S. to continue to support governments that were less than democratic, but perhaps, more than useful. It would be hard to ignore the changes digital technologies have had on our daily lives - who carries a map when traveling, when we can create and e-mail a url with the day’s locations to our phones and open this map to get directions from where we are to where we want to go next, how wonderful to carry not one, but many books and magazines in a device smaller than a deck of cards and be able to use that device to purchase more, anytime, anywhere, and finally, what bliss to be able skim a long list of voice mail rather than replaying each one over and over again to get to that all-important name and phone number.[[User:Raven|Raven]] 13:28, 29 January 2013 (EST)&lt;br /&gt;
&lt;br /&gt;
********&lt;br /&gt;
&lt;br /&gt;
Between the several changes that internet and digital technologies brought, I would like to mention:&lt;br /&gt;
&lt;br /&gt;
1) The widespread of information and knowledge. Nowadays you don&#039;t have to go to India to know how Indian&#039;s think, you can just get into a forum and speak with an Indian yourself; you can study and get a degree or do an investigation for a thesis from your own house and a service for a person in Europe can be given by someone in Asia, just to mention some examples. Knowledge is at the distance of a click, but still there are lots of people having difficulties to access it. Thus, one of the main challenges I think we are facing nowadays is to find the way to actually empower people for them to be able to make the most of what internet and digital technologies offer us. &lt;br /&gt;
&lt;br /&gt;
2) The possibility of everyone to have a voice in a discussion, and to build support towards that voice. It has been mentioned before the role 2.0 technologies had in unifying people during the arab spring, or the &amp;quot;Indignados&amp;quot; movement that started in Spain.&lt;br /&gt;
&lt;br /&gt;
3) The possibility to crowdsource and co create. Before social media, content was created by one person and read by another one but nowadays everyone has the opportunity to create content, and that content can easily be improved by lots of people willing to. The power of crowdsourcing and co creating is changing the way governments, business, universities or NGOs work in order to became more open and collaborative. Open Data is playing a key role in giving people the tool to create new products and services as well as improving the existing ones. [[User:Maria|Maria]] 14:41, 29 January 2013 (EST)&lt;/div&gt;</summary>
		<author><name>Maria</name></author>
	</entry>
</feed>