<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RebekahHeacock</id>
	<title>Technologies of Politics and Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2013/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RebekahHeacock"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/Special:Contributions/RebekahHeacock"/>
	<updated>2026-05-16T09:55:56Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6932</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6932"/>
		<updated>2011-10-28T15:18:59Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
* Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
* Title: Deceptions in Online Dating Site Aarchitecture&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/LTSU_E-120_Final_Davies-Solomon.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Acrowe|Anthony Crowe]]&lt;br /&gt;
* Title: Tagging: The Grassroots Tool That Has Restructured Our Internet&lt;br /&gt;
* Link: (Paper) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4_Final.doc&lt;br /&gt;
* Link: (Appendix) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE-120_Final_Append.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Alex|Alex]] Bryan&lt;br /&gt;
* Title: Creating Monetary Value From Free Distribution&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Research_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Yaerin Kim&lt;br /&gt;
* Title:  Culture of Sharing: A Case Study of MIT OCW&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Final_Project_Kim_.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Saam Batmanghelidj&lt;br /&gt;
* Title:  Digital Intellectual Property of Synthetic Worlds&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Corey MacDonald&lt;br /&gt;
* Title:  Communication for the Fringe&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Communication_for_the_Fringe.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Rick Kundiger&lt;br /&gt;
* Title: A Study on Free Riding in the Bitorrent Peer-to-peer Swarm.pdf‎&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Final_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Swarm.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Mary Van Gils&lt;br /&gt;
* Title: Yelp Reviews: Freedom of Speech v. Reputational Injuries&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Yelp_Reviews_Freedom_of_Speech_v_Reputational_Injuries.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Faye Ryding&lt;br /&gt;
* Title: Trolls and Vandals on Epinions and Yelp&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle C Forelle - [[User:Mcforelle|Mcforelle]] 19:18, 10 May 2011 (UTC)&lt;br /&gt;
* Title: Viva La Vimeo!: How Vimeo&#039;s Unique Architecture Fostered a Unique Videomaking Community&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:VimeoMCForelle_final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Adriana Faria Torii &amp;amp; Anna Christiana Marinho Cavalcanti Machado [[[User:Anna|Anna]] 21:21, 10 May 2011 (UTC)]&lt;br /&gt;
* Title: Analysis of E-Government Practices in Brazil: The Case of The E-Voting System&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jillian York [[user:jyork|jyork]] [[User:Jyork|Jyork]] 01:32, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Final_Draft_JillianCYork.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo [[User:Jsanfilippo|Jsanfilippo]] 03:49, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Crowd Funding and Cultural Production&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Final_Project_V2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Karishma Goenka [[User:Karishma goenka|Karishma goenka]] 04:04, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Wikileaks and the Anti-corruption Campaign in India&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_paper_Karishma_Goenka.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Elisha Surillo&lt;br /&gt;
*Title: Homophily, the Tea Party, and the Internet&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Homophily%2C_the_Tea_Party%2C_and_the_Internet-Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Joshua Surillo [[User:Joshuasurillo|Joshuasurillo]] 03:59, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Opinions of Citizens on WikiLeaks&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Paper-_Opinions_of_Citizens_on_Wikileaks-_Joshua_Surillo.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Steven Raga[[User:Stevenraga| Stevenraga]] 04:08, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Online Political Activism in the Philippines&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/Image:Steven_Raga.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Onyema Ajuogu&lt;br /&gt;
* Title: Internet infiltration to Nigeria: burden of cyber-crime to e-commerce&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Onyema_A_Internet_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
*Name: Alokika Singh&lt;br /&gt;
*Title: Feminism and the Internet in India&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/FINAL_DRAFT.pdf&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6898</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6898"/>
		<updated>2011-05-11T16:47:42Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
* Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
* Title: Deceptions in Online Dating Site Aarchitecture&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/LTSU_E-120_Final_Davies-Solomon.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Acrowe|Anthony Crowe]]&lt;br /&gt;
* Title: Tagging: The Grassroots Tool That Has Restructured Our Internet&lt;br /&gt;
* Link: (Paper) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4_Final.doc&lt;br /&gt;
* Link: (Appendix) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE-120_Final_Append.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Alex|Alex]]&lt;br /&gt;
* Title: Creating Monetary Value From Free Distribution&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Research_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Yaerin Kim&lt;br /&gt;
* Title:  Culture of Sharing: A Case Study of MIT OCW&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Final_Project_Kim_.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Saam Batmanghelidj&lt;br /&gt;
* Title:  Digital Intellectual Property of Synthetic Worlds&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Corey MacDonald&lt;br /&gt;
* Title:  Communication for the Fringe&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Communication_for_the_Fringe.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Rick Kundiger&lt;br /&gt;
* Title: A Study on Free Riding in the Bitorrent Peer-to-peer Swarm.pdf‎&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Final_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Swarm.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Mary Van Gils&lt;br /&gt;
* Title: Yelp Reviews: Freedom of Speech v. Reputational Injuries&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Yelp_Reviews_Freedom_of_Speech_v_Reputational_Injuries.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Faye Ryding&lt;br /&gt;
* Title: Trolls and Vandals on Epinions and Yelp&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle C Forelle - [[User:Mcforelle|Mcforelle]] 19:18, 10 May 2011 (UTC)&lt;br /&gt;
* Title: Viva La Vimeo!: How Vimeo&#039;s Unique Architecture Fostered a Unique Videomaking Community&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:VimeoMCForelle_final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Adriana Faria Torii &amp;amp; Anna Christiana Marinho Cavalcanti Machado [[[User:Anna|Anna]] 21:21, 10 May 2011 (UTC)]&lt;br /&gt;
* Title: Analysis of E-Government Practices in Brazil: The Case of The E-Voting System&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tymoteusz Lewtak [[User:Lewtak|Lewtak]] 01:27, 11 May 2011 (UTC)&lt;br /&gt;
* Title: Site Super-User Science&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4_Final.pdf&lt;br /&gt;
&lt;br /&gt;
* Name: Jillian York [[user:jyork|jyork]] [[User:Jyork|Jyork]] 01:32, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Final_Draft_JillianCYork.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo [[User:Jsanfilippo|Jsanfilippo]] 03:49, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Crowd Funding and Cultural Production&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Final_Project_V2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Karishma Goenka [[User:Karishma goenka|Karishma goenka]] 04:04, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Wikileaks and the Anti-corruption Campaign in India&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_paper_Karishma_Goenka.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Elisha Surillo&lt;br /&gt;
*Title: Homophily, the Tea Party, and the Internet&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Homophily%2C_the_Tea_Party%2C_and_the_Internet-Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Joshua Surillo [[User:Joshuasurillo|Joshuasurillo]] 03:59, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Opinions of Citizens on WikiLeaks&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Paper-_Opinions_of_Citizens_on_Wikileaks-_Joshua_Surillo.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Steven Raga[[User:Stevenraga| Stevenraga]] 04:08, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Online Political Activism in the Philippines&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/Image:Steven_Raga.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Onyema Ajuogu&lt;br /&gt;
* Title: Internet infiltration to Nigeria: burden of cyber-crime to e-commerce&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Onyema_A_Internet_Society_Final_Project.pdf&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6897</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Projects&amp;diff=6897"/>
		<updated>2011-05-11T16:47:30Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
* Name: Alan Davies-Gavin &amp;amp; Alex Solomon&lt;br /&gt;
* Title: Deceptions in Online Dating Site Aarchitecture&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/LTSU_E-120_Final_Davies-Solomon.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Acrowe|Anthony Crowe]]&lt;br /&gt;
* Title: Tagging: The Grassroots Tool That Has Restructured Our Internet&lt;br /&gt;
* Link: (Paper) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4_Final.doc&lt;br /&gt;
* Link: (Appendix) http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE-120_Final_Append.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: [[User:Alex|Alex]]&lt;br /&gt;
* Title: Creating Monetary Value From Free Distribution&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Research_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Yaerin Kim&lt;br /&gt;
* Title:  Culture of Sharing: A Case Study of MIT OCW&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Final_Project_Kim_.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Saam Batmanghelidj&lt;br /&gt;
* Title:  Digital Intellectual Property of Synthetic Worlds&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Corey MacDonald&lt;br /&gt;
* Title:  Communication for the Fringe&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Communication_for_the_Fringe.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Rick Kundiger&lt;br /&gt;
* Title: A Study on Free Riding in the Bitorrent Peer-to-peer Swarm.pdf‎&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Final_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Swarm.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Mary Van Gils&lt;br /&gt;
* Title: Yelp Reviews: Freedom of Speech v. Reputational Injuries&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Yelp_Reviews_Freedom_of_Speech_v_Reputational_Injuries.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Faye Ryding&lt;br /&gt;
* Title: Trolls and Vandals on Epinions and Yelp&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brian Smith&lt;br /&gt;
* Title:  An Investigation into Foursquare and Location Privacy&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:Final_Project_Brian_Smith_LSTU-E120_Spring_2011_v3.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Kristina Meshkova&lt;br /&gt;
* Title:  A music sharing site - Grooveshark, Soundcloud, MySpace&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:FINAL_PROJECT_%28Kristina_Meshkova_A_music_sharing_site_-_Grooveshark%2C_Soundcloud%2C_MySpace%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Vladimir Trojak&lt;br /&gt;
*Title: Are Slovak and English language communities consistent in what topics are&lt;br /&gt;
permitted and what is removed?&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_project_vladimir_trojak.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Susan Jennings&lt;br /&gt;
*Title: Annuity Companies&#039; Social Media Communities&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Guy Clinch&lt;br /&gt;
*Title: The Transition to Next Generation 9-1-1 in North America: &#039;&#039;The impact of the institutional ecology on shaping the future of America’s First Line of Defense&#039;&#039;&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/sites/is2011/images/The_Transition_to_Next_Generation_9-1-1_in_North_America_%28final%29.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Syed Yasir Shirazi&lt;br /&gt;
*Title: Monitoring Pledgebank&#039;s Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Research_Paper-Monitoring_PledgeBank-Syed_Shirazi.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ed Arboleda;     [[User:Earboleda|Earboleda]] 03:15, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Hyperlocal Websites and Community Activism&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Christopher Sura [[User:ChrisSura|-Chris Sura]] 03:44, 10 May 2011 (UTC)&lt;br /&gt;
*Title: How Intellectual Property Rights Influence Governance of the Java Community Process&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Myra Garza [[User:Myra|Myra]] 14:31, 10 May 2011 (UTC)&lt;br /&gt;
*Title: Putting Their Best Faces Forward: The Motivations and Generativity of Contributors on Acne.org&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Garza.M.-5.FINAL.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 16:56, 10 May 2011 (UTC)&lt;br /&gt;
* Title:  A Comparative Study of Open Source Licenses (Abridged)&lt;br /&gt;
* Link:  http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_%28Abridged%29.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Michelle C Forelle - [[User:Mcforelle|Mcforelle]] 19:18, 10 May 2011 (UTC)&lt;br /&gt;
* Title: Viva La Vimeo!: How Vimeo&#039;s Unique Architecture Fostered a Unique Videomaking Community&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:VimeoMCForelle_final.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Adriana Faria Torii &amp;amp; Anna Christiana Marinho Cavalcanti Machado [[[User:Anna|Anna]] 21:21, 10 May 2011 (UTC)]&lt;br /&gt;
* Title: Analysis of E-Government Practices in Brazil: The Case of The E-Voting System&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Final_Paper.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Tymoteusz Lewtak [[User:Lewtak|Lewtak]] 01:27, 11 May 2011 (UTC)&lt;br /&gt;
* Title: Site Super-User Science&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4_Final.pdf&lt;br /&gt;
&lt;br /&gt;
* Name: Jillian York [[user:jyork|jyork]] [[User:Jyork|Jyork]] 01:32, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Final_Draft_JillianCYork.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Name: Jessica Sanfilippo [[User:Jsanfilippo|Jsanfilippo]] 03:49, 11 May 2011 (UTC)&lt;br /&gt;
* Title: &amp;quot;Crowd Funding and Cultural Production&amp;quot;&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Final_Project_V2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Karishma Goenka [[User:Karishma goenka|Karishma goenka]] 04:04, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Wikileaks and the Anti-corruption Campaign in India&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_paper_Karishma_Goenka.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Elisha Surillo&lt;br /&gt;
*Title: Homophily, the Tea Party, and the Internet&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Homophily%2C_the_Tea_Party%2C_and_the_Internet-Final_Paper.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Joshua Surillo [[User:Joshuasurillo|Joshuasurillo]] 03:59, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Opinions of Citizens on WikiLeaks&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2011/Image:Final_Paper-_Opinions_of_Citizens_on_Wikileaks-_Joshua_Surillo.doc&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Steven Raga[[User:Stevenraga| Stevenraga]] 04:08, 11 May 2011 (UTC)&lt;br /&gt;
*Title: Online Political Activism in the Philippines&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2011/Image:Steven_Raga.pdf&lt;br /&gt;
&lt;br /&gt;
* Name: Onyema Ajuogu&lt;br /&gt;
* Title: Internet infiltration to Nigeria: burden of cyber-crime to e-commerce&lt;br /&gt;
* Link: http://cyber.law.harvard.edu/is2011/Image:Onyema_A_Internet_Society_Final_Project.pdf&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6720</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6720"/>
		<updated>2011-05-03T21:29:47Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
March 29 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
April 5 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-4.5.11-Copyright.pdf Slides: Copyright in Cyberspace]&lt;br /&gt;
&lt;br /&gt;
April 12 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril12.pdf Slides: Control and Code: Privacy Online]&lt;br /&gt;
&lt;br /&gt;
April 19 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril19.pdf Slides: Internet and Democracy]&lt;br /&gt;
&lt;br /&gt;
April 25 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetDemocracyApril26.pdf Slides: Internet and Democracy II]&lt;br /&gt;
&lt;br /&gt;
May 3 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-5.3.11-Cybersecurity_and_Cyberwarfare.pdf Slides: Cybersecurity and Cyberwarfare]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6719</id>
		<title>Cybersecurity and Cyberwarfare</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Cybersecurity_and_Cyberwarfare&amp;diff=6719"/>
		<updated>2011-05-03T21:29:10Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;May 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Cybersecurity has been identified as one of the greatest challenges facing the United States today, but it is ill-defined and almost impossible to address. How can we frame this problem to better inspire solutions? How should government, military, businesses, and technologists approach the problem from different angles and do these different approaches work together?  &lt;br /&gt;
&lt;br /&gt;
Slides: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-5.3.11-Cybersecurity_and_Cyberwarfare.pdf Cybersecurity and Cyberwarfare]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.lawfareblog.com/2010/12/senator-cardin%E2%80%99s-bill-to-explore-isp-enforcement-of-digital-security/ Jack Goldsmith: Senator Cardin’s Bill to Explore ISP Enforcement of Digital Security]&lt;br /&gt;
* [http://yupnet.org/zittrain/ Zittrain, The Future of the Internet: And How to Stop It; Chapter 3]&lt;br /&gt;
* [http://www.chathamhouse.org.uk/files/17827_r1110_cyberwarfare_es.pdf Chatham House Report On Cyberwarfare - Executive Summary]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Stuxnet Wikipedia entry on Stuxnet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
* Whitehouse.gov, [http://www.whitehouse.gov/cybersecurity Comprehensive National Cybersecurity Initiative, Cyberspace Policy Review]&lt;br /&gt;
* Jack Goldsmith, [http://www.brookings.edu/papers/2010/1208_4th_amendment_goldsmith.aspx The Cyberthreat, Government Network Operations, and the Fourth Amendment]&lt;br /&gt;
* Jane Holl Lute and Bruce McConnell, [http://www.wired.com/threatlevel/2011/02/dhs-op-ed/ Op-Ed: A Civil Perspective on Cybersecurity]&lt;br /&gt;
* Zittrain, [http://www.scientificamerican.com/article.cfm?id=freedom-and-anonymity Freedom and Anonymity]&lt;br /&gt;
* Infoweek, [http://informationweek.com/news/security/attacks/229401866 Leaked Cables Indicate Chinese Military Hackers Attacked U.S.]&lt;br /&gt;
* CNET, [http://news.cnet.com/8301-27080_3-20055091-245.html Cyber attacks rise at critical infrastructure firms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.chathamhouse.org.uk/publications/papers/view/-/id/967/ On Cyber Warfare]&lt;br /&gt;
A little early for this, but I would like to share this nice paper written by analysts and researchers at Chatham House. It&#039;s pretty fundamental, I would recommend it to anyone who encounters this subject for the very first time. --[[User:Jastifdonty|Jastify]] 22:55, 31 January 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Great recommendation.  I&#039;ve added the executive summary to the required readings list. --[[User:Dardia|Dardia]] 23:50, 10 February 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wanted to submit this article to add to the discussion. I found it to be interesting. Cybersecurity is probably the most vital issue to our country&#039;s infrastructure today. The recent military operation to take out  Osama bin Ladin would have failed miserably if knowledge of the raid was disclosed. To keep our intelligence reports under wraps should be among our highest priorities. While the government wages wars on three fronts at once, it is difficult but nessessary to ensure our reports stay out of our enemies hands. By blocking IP addresses and using more sophisticated encryption, we will be well on our way to protecting our great country. The world runs through the Internet, and so does our future.   [http://delivery.acm.org/10.1145/1840000/1839688/p33-brenner.pdf?key1=1839688&amp;amp;key2=5956834031&amp;amp;coll=DL&amp;amp;dl=ACM&amp;amp;ip=74.90.79.253&amp;amp;CFID=18979663&amp;amp;CFTOKEN=55280022] [[User:Joshuasurillo|Joshuasurillo]] 01:47, 3 May 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Cyberthreats are real and pervasive.  The people within IT infrastructure have been fighting the battle for years.  It makes no difference whether you work for a government, business or school – every domain (gov, com &amp;amp; edu) is under attack.  Private business and the military arm of the government are the most concerned about security, so they were the first to adopt network access control and identity management.  Security is enforced by verifying the identity of each user and device before allowing them to gain access to the network.  This, of course, runs counter to the idea of a free, open and anonymous Internet.  Yes, we can do a lot to protect the public by having the ISPs filter and block malware (search for SonicWALL and Blue Coat for examples) but it’s not enough to stop all breaches and wastes precious bandwidth.  Our government recognizes this and is actively promoting what would become a national electronic identity “ecosystem.” (Their euphemism; see http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf) Jack Goldsmith had some well reasoned arguments why we should expect more government controls.  Finally, a good taxonomy of Internet security practices can be found in the pages of Chief Security Officer Magazine at http://www.csoonline.com/. [[User:ChrisSura|-Chris Sura]]&lt;br /&gt;
&lt;br /&gt;
Even with additional security measures instituted, there will always be someone looking for a way around it.  Jack Goldsmith&#039;s suggestion (suggested earlier by Zittrain), that additional measures be placed at the ISP level brings in significant risk to the ISPs.  What if the measures are put in place and something (inevitably) gets through?  Are the ISPs then liable for this?  Hacking and break-ins will continue to occur even at some of the most &amp;quot;secure&amp;quot; sites.  RSA, an industry security leader recently had their systems compromised, which led to information being extracted from their systems.  The fact that extremely sophisticated and targeted attacks can happen at secure Nuclear Power plants (Stuxnet worm), means that ISPs have would have their hands full with any targeted attack.&lt;br /&gt;
http://www.rsa.com/node.aspx?id=3872   [[User:Earboleda|Earboleda]]&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6696</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6696"/>
		<updated>2011-04-28T17:36:20Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.2:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.2.doc&lt;br /&gt;
Slightly more professional than the last draft... would appreciate any feedback! Theoretical framework and conclusions still to go - these will be in draft 3.0.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 16:18, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Brandon A. Ceranowicz&lt;br /&gt;
Draft 2.5:&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:A_Comparative_Study_of_Open_Source_Licenses_v2.5.doc&lt;br /&gt;
Conclusion is live! Take a look. Theoretical framework still to come.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:14, 27 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Onyema Ajuogu: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_infiltration_to_Nigeria_burden_of_cybercrime_to_ecommerce_assign-4.pdf   Internet infiltration to Nigeria:  burden of cyber-crime to e-commerce]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6684</id>
		<title>Internet and Democracy: The Sequel</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy:_The_Sequel&amp;diff=6684"/>
		<updated>2011-04-26T21:26:02Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 26&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A decade ago, the Internet was widely seen as a means to diminish the power of countries to regulate the flow of ideas and information.  However, we have witnessed the resurgence of national sovereignty in cyberspace, with many countries now resorting to a combination of technology, law and intimidation to reign in the spread of free speech via the Net.  Often aided by the technological support of the private sector in the United States, for this class, we will debate the ethics, practicality and implications of Internet censorship. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetDemocracyApril26.pdf Slides: Internet and Democracy II]&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings == &lt;br /&gt;
&lt;br /&gt;
* Read John Palfrey and Jonathan Zittrain: [http://opennet.net/sites/opennet.net/files/Deibert_06_Ch05_103-122.pdf Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet]&lt;br /&gt;
* Take a look at the [http://opennet.net/blog ONI blog]&lt;br /&gt;
* And the [http://opennet.net/map ONI global filtering map]&lt;br /&gt;
* Explore the Global Network Initiative website [http://www.globalnetworkinitiative.org/ GNI], with particular attention to the [http://www.globalnetworkinitiative.org/principles/index.php Principles], [http://www.globalnetworkinitiative.org/implementationguidelines/index.php Implementation Guidelines], and [http://www.globalnetworkinitiative.org/governanceframework/index.php Governance Framework]&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
According to the United Nations Universal Declaration of Human Rights, all policy makers must cultivate a culture that promotes the fulfillment of human rights. However numerous policy markers grossly violate their duties to fulfill the declaration, and many governments, especially in the developing world- brutally exploit and corrupt their citizens. So, how are ICT companies suppose to fulfill online rights in volatile environments?&lt;br /&gt;
I think it’s interesting how GNI believes ICT companies will abide by their guidelines and try to strategically execute the human rights framework on a global scale within in environments, where violating human rights is considered part of societal norms.&lt;br /&gt;
Thus, I’m surprised GNI’s Implementation Guidelines entail, “Participating companies will encourage governments to be specific, transparent and consistent in the demands, laws and regulations (“government restrictions”) that are issued to restrict freedom of expression online.   Participants will also encourage government demands that are consistent with international laws and standards on freedom of expression. This includes engaging proactively with governments to reach a shared understanding of how government restrictions can be applied in a manner consistent with the Principles.”&lt;br /&gt;
Freedom of expression and privacy are severely neglected worldwide the recent events in Egypt to overthrow Mubarak in Egypt and ongoing Civil War in Libya exemplify severe abuse of freedom of expression and human rights. I doubt companies can convince autocratic governments to abide by GNI’s guidelines especially in corrupt environments.&lt;br /&gt;
Though “ICT companies have the responsibility to respect and protect the freedom of expression and privacy rights of their users”. It doesn’t mean the governments will necessarily facilitate such efforts. by Alex&lt;br /&gt;
&lt;br /&gt;
Zittrain and Palfrey suggest a viable model for defining filtering parameters may be to allow the voluntary industry consensus to evolve into established law over time. I liken this to a policy version of the type of production model we saw in our von Hippel readings. If some of the most successful products can be borne out of manufacturer improvements on initial user innovations, I think it is arguable that the same can be said of policy. Proof in practice. [[User:Jsanfilippo|Jsanfilippo]] 16:40, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The goals of protecting individual privacy and minimizing the regulation of speech are indeed worthy of attention.  Unfortunately, Zittrain and Palfrey’s solution falls short of the mark.  They do concede that any industry consensus does not carry the force of law, and instead hope that the solution proposed by industry will be workable enough so that it is eventually adopted as law.  They assert, however, that industry self-regulation is the “most likely – and most desirable – means of resolving this problem in the near term.”  They are correct to a point in that a great deal of the technical expertise resides in the ranks of industry, but industry “cooperation” is notoriously complex.  First, there is more than one industry type: content providers will favor a different solution than search engines, with each industry biased to its advantage.  Second, there are legal barriers to industry collusion.  An industry consortium can easily set operating standards or principles that favor the business model of its members while putting non-member competitors at a disadvantage.  Third, members are free to abandon the standards at will.  Note how GNI membership includes representation from search engine providers (Google &amp;amp; Yahoo) but there are no member network providers or telecommunication companies like Cisco or AT&amp;amp;T at the table, even though the group purports to represent “information and communications technologies.”  The members associate voluntarily, and may choose to disassociate ust as easily.  In fact, they may choose to not share all information with third party compliance assessors, as business contracts and corporate law departments may supersede any and all principles.  Ultimately it will come down to a question of international law.  Perhaps the UN or WTO is not such a long shot after all.[[User:ChrisSura|-Chris Sura]] 19:04, 26 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Here is a link to the link to the extensive Freedom House &amp;quot;Freedom on the Net 2011&amp;quot; report. (Honestly, at 410 pages I haven&#039;t really had time to read and evaulate this, but I thought I would throw it up on the wiki for those who might be interested.)&lt;br /&gt;
http://www.freedomhouse.org/images/File/FotN/FOTN2011.pdf &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 17:12, 20 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
On the Today show this morning, one of the lead headlines was about your location can be followed thru your IPhone and IPad which is something we have been chatting about for the last two classes in the chat room.  Also, there was an interesting article for corporate counsel on law.com regarding the idea that the government is watching corporations on the internet:&lt;br /&gt;
http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202484184534&lt;br /&gt;
[[[[User:Sjennings|sjennings]] 18:22, 21 April 2011 (UTC)}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6683</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6683"/>
		<updated>2011-04-26T21:25:44Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
March 29 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
April 5 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-4.5.11-Copyright.pdf Slides: Copyright in Cyberspace]&lt;br /&gt;
&lt;br /&gt;
April 12 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril12.pdf Slides: Control and Code: Privacy Online]&lt;br /&gt;
&lt;br /&gt;
April 19 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril19.pdf Slides: Internet and Democracy]&lt;br /&gt;
&lt;br /&gt;
April 25 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetDemocracyApril26.pdf Slides: Internet and Democracy II]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6670</id>
		<title>Assignment 4 Peer Review</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Peer_Review&amp;diff=6670"/>
		<updated>2011-04-25T13:32:10Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: New page: If you&amp;#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you&#039;d like to receive or give feedback from/to other students on your rough drafts, please submit them here.&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6669</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6669"/>
		<updated>2011-04-25T13:28:30Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Robert Cunningham|Draft|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Cunningham_draft.doc||}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brian Smith|Foursquare Privacy: Policies, Data Exposure, and Guidelines|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4_Brian_Smith_Final.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Saam Batmanghelidj|Digital Intellectual Property of Synthetic Worlds:  A New Age for the Regulation of Property|http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Paper_Rough.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Jillian York|Understanding “Lesbanon”: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/First_Draft_JillianCYork.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Anthony Crowe ([[Acrowe]])|Tagging (Working Title)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4.doc|&amp;quot;Tag!&amp;quot; The Internet Is It...|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_PPT.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alex Bryan|Grooveshark: An effort to monetize free|http://cyber.law.harvard.edu/is2011/Image:Research_Project.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yu Ri Jeong|Study on Collective Intelligence within Naver Knowledge iN &lt;br /&gt;
of South Korea|http://cyber.law.harvard.edu/is2011/Image:Yu_Ri_Jeong_Internet_and_Society_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Culture of Sharing: MIT OpenCourseWare|http://cyber.law.harvard.edu/is2011/Image:Kim_Draft.pdf|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Davies_Solomon_Assignment_4.pdf|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf| Multimedia Overview of The Transition to Next Generation 9-1-1 in North America Proposal | http://mysite.verizon.net/res14awy9/School/School_main.html}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AudioVideo.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Online Platforms-Which one works for you?|http://cyber.law.harvard.edu/is2011/Image:Bonus_Assignment-Pledgebank_Tragedy-Syed_Yasir_Shirazi.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Laura Connell|US Copyright Group - Saving Cinema or Mass Litigation Used as Profit-Center?|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_roughdraft_Assignment4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brandon A. Ceranowicz|A Comparison of Open Source Licenses|http://cyber.law.harvard.edu/is2011/sites/is2011/images/A_Comparative_Study_of_Open_Source_Licenses_v1.0.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Jessica Sanfilippo|Crowd Funding and Cultural Production|http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Assignment_4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Tymoteusz Lewtak|Site Super-User Science|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Tymoteusz_Lewtak_Assignment_4.pdf|Extra Credit Presentation|http://www.2shared.com/file/aYxdOv-z/Extra_Credit_Presentation.html}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Michelle C Forelle| Video Sharing the Vimeo Way: How a Focus on Community and Being Considerate Created a YouTube Competitor|http://cyber.law.harvard.edu/is2011/Image:Assgn4_Vimeo.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Myra Garza|Putting Their Best Faces Forward: The Motivations of Contributors to Acne.org|http://cyber.law.harvard.edu/is2011/Image:Assignment4.Garza.M.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Christopher Sura|Governance of the Java Community Process|&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_4.pdf&lt;br /&gt;
|Bonus Title|Bonus Link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6668</id>
		<title>Assignment 4 Details and Links</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6668"/>
		<updated>2011-04-25T13:28:16Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Due April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Group_Work|You may work in groups]]&#039;&#039;&#039;, provided you have submitted a short paragraph to the instructors by March 1 explaining why a group approach to your proposed topic for the final project makes sense.&lt;br /&gt;
&lt;br /&gt;
This assignment will be to turn in a rough draft of your final, 8-10 page final project paper. It will be a chance for us to give you some comments, and suggest some places to push your research project forward in the next few weeks. &lt;br /&gt;
&lt;br /&gt;
It&#039;s also an opportunity to get some extra credit. If you are interested, you may create an audiovisual work discussing and presenting your research to date. The work could be an audio file (such as a podcast), a video (such as a remix or animation), or an in-class presentation. You should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). These may be presented in class.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Submit your rough draft (and your extra credit, if applicable) here: [[Assignment 4 Submissions]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Format==&lt;br /&gt;
Your paper should be 8-10 pages long, double spaced, and use a [http://en.wikipedia.org/wiki/Serif serif] font (Times New Roman, Cambria, etc.).  Please upload your paper as a .doc, a .odt, or a .pdf.&lt;br /&gt;
&lt;br /&gt;
You may use any commonly accepted style to cite your sources (Chicago, MLA, etc.), but please be consistent.&lt;br /&gt;
&lt;br /&gt;
==Assignment 4 Office Hours==&lt;br /&gt;
Rebekah and Alex will be available for 15-minute calls or text chats in preparation for Assignment #4 (paper drafts). &lt;br /&gt;
* Rebekah&lt;br /&gt;
** Thursday March 31, 3:30pm - 5:00pm EDT (also available in person at 23 Everett)&lt;br /&gt;
** Tuesday, April 5, 7:30-8:30pm EDT (immediately after class; available via phone/Skype/in person at 23 Everett)&lt;br /&gt;
* Alex&lt;br /&gt;
** Monday April 4, 5:00pm - 6:30pm EDT&lt;br /&gt;
** Thursday, April 7, 5-6pm EDT&lt;br /&gt;
Email internetsociety@gmail.com to schedule a meeting.&lt;br /&gt;
&lt;br /&gt;
== Bonus Credit ==&lt;br /&gt;
&lt;br /&gt;
This bonus credit consists of an audiovisual work of your creation, and should be based on your draft. The work could be an audio file (such as a podcast or song), a video (such as a remix or animation), or a compelling image (such as a mindmap or photo montage). If an audio or video work, you should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). &lt;br /&gt;
&lt;br /&gt;
Possible ideas include:&lt;br /&gt;
&lt;br /&gt;
*An audio podcast or video interview with someone doing influential work related to your project&lt;br /&gt;
*A video medley and/or remix&lt;br /&gt;
*A podcast show in which participants debate the topic&lt;br /&gt;
*A [http://en.wikipedia.org/wiki/Mind_Map mindmap] image that charts out a policy debate or domain&lt;br /&gt;
*A photo montage&lt;br /&gt;
*A short film&lt;br /&gt;
*A song or musical work drawing from various samples such as those on [http://freesound.iua.upf.edu Freesound]&lt;br /&gt;
*A song with lyrics&lt;br /&gt;
*A visualization, perhaps using [http://services.alphaworks.ibm.com/manyeyes/home Many Eyes]&lt;br /&gt;
&lt;br /&gt;
== Uploading Your Bonus Work==&lt;br /&gt;
&lt;br /&gt;
Examples of online services you may use to post your bonus work include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Video:&#039;&#039;&#039;&lt;br /&gt;
*[http://youtube.com Youtube]&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
*[http://video.google.com Google Video]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Audio:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.ccmixter.com ccMixter] (for music; note: music must be licensed under a [http://www.creativecommons.org Creative Commons] license&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Image:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
&lt;br /&gt;
== Tools and Tutorials ==&lt;br /&gt;
* Audio&lt;br /&gt;
** [http://audacity.sourceforge.net/ Audacity] ([http://www.edhsonline.org/other/audacity/ introduction tutorial], [http://audacity.sourceforge.net/help/documentation more FAQs and Tutorials])&lt;br /&gt;
* Video&lt;br /&gt;
** Mac OS X: iMovie ([http://www.apple.com/ilife/tutorials/#imovie]) or Final Cut&lt;br /&gt;
** Windows: [http://www.avid.com/freedv/ Avid FreeDV] ([http://www.avid.com/freedv/tutorials/index.asp tutorial])&lt;br /&gt;
*Screencast (Screencasting is taking a video of your computer desktop, while you manipulate it) &lt;br /&gt;
**[http://en.wikipedia.org/wiki/Screencast Screencast]&lt;br /&gt;
**[http://en.wikipedia.org/wiki/List_of_screen_recording_software List of screen recording software]&lt;br /&gt;
&lt;br /&gt;
* Video Game / Animation&lt;br /&gt;
** [http://scratch.mit.edu/home/index Scratch]&lt;br /&gt;
* Other&lt;br /&gt;
** [http://en.wikipedia.org/wiki/List_of_Mind_Mapping_software Mind Mapping Software]&lt;br /&gt;
&lt;br /&gt;
== Examples of Finished Products==&lt;br /&gt;
&#039;&#039;(some of these are more highly produced or effort-intensive than your projects need be, but they should give you a sense for what finished pieces look like)&#039;&#039;&lt;br /&gt;
* [http://www.flickr.com/photos/further/404587997/ Mind Map of Democracy and the Internet] by John Palfrey (partial snapshot)&lt;br /&gt;
* [http://thoughtcast.org/casts/beyond-broadcast-2007 Interviews from Beyond Broadcast] on Thoughtcast&lt;br /&gt;
&lt;br /&gt;
== Assignment Four Submissions ==&lt;br /&gt;
&lt;br /&gt;
Post your submissions here: [[Assignment 4 Submissions]]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6654</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6654"/>
		<updated>2011-04-19T21:31:06Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 19&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril19.pdf Slides: Internet and Democracy]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.nytimes.com/2011/02/14/world/middleeast/14egypt-tunisia-protests.html?_r=2&amp;amp;hp A Tunisian-Egyptian Link That Shook Arab History]&lt;br /&gt;
&lt;br /&gt;
* [http://ejournalism.co.uk/?p=739 Clay Shirky on social media in the Middle East and North Africa]&lt;br /&gt;
&lt;br /&gt;
* [http://nms.sagepub.com/content/12/8/1225.full.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
**Problems with the Etling, Kelly, Faris and Palfrey PDF? If you&#039;re off campus and presented with a website saying you need to sign up to access this article . . . you do not. Sign into Harvard&#039;s VPN solution and you&#039;ll then have access or access it while on the Harvard network (on campus). Or ask nicely and I&#039;m sure it can be emailed to you. :-)  --[[User:Adavies01|Adavies01]] 01:29, 14 April 2011 (UTC)&lt;br /&gt;
** Updated link to the Etling, et al. piece: [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Mapping the Arabic Blogosphere]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Bruce Etling and John Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2010/Public_Discourse_Russian_Blogosphere Etling, Alexanyan, Kelly, Faris, Palfrey, and Gasser, Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Digitally_Networked_Technology_Kenyas_Post-Election_Crisis Josh Goldstein and Juliana Rotich, Digitally Networked Technology in Kenya&#039;s 2007-2008 Post-Election Crisis].&lt;br /&gt;
&lt;br /&gt;
* [http://fletcher.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
I&#039;m inclined to be skeptical of the idea that the internet and social media are making interpersonal connections &amp;quot;shallower&amp;quot;, whether we are talking about &amp;quot;Facebook friends&amp;quot; or social and political activism. Setting aside the question of whether online relationships count as &amp;quot;real&amp;quot; relationships (that is, are qualitatively inferior to real-life relationships), in order for this theory to be correct, online relationships would have to be replacing real-life relationships. While I don&#039;t have any hard data to back this up, I simply don&#039;t see this happening in most cases. The imagined concept is one of young people avoiding traditional social contact in favor of hours spent online. However, I would postulate that the people most inclined to shut themselves off from the &amp;quot;real world&amp;quot; in favor of computers are the same people who would have shut themselves off in favor of books or various solo hobbies in previous decades. Under this model, the quantity and quality of social interaction for persons thus inclined is &#039;&#039;increasing&#039;&#039;, rather than decreasing. What we are talking about is both an increase in reach and a lowering of thresholds. For the average user, social media, first and foremost, provides a vehicle for interaction with people they &#039;&#039;already know&#039;&#039; in real life (friends from school, family, etc... so your kid spending time on the computer rather than playing with friends outside is likely to be interacting with those same friends electronically) and then adds to this a new layer of online friendships and acquaintances which arise as social media provides previously unavailable opportunities to build relationships over distance. (There is, as well, traffic between these two layers, as real-life friends separated by distance use social media to keep in touch, and friends - and potential romantic partners - met online arrange to meet in person). Similarly, when it comes to activism, the increasing availability of &amp;quot;intermediate&amp;quot; levels of support (such as donation or petition signing – hardly new developments) is not likely, to my mind, to decrease the number of active real-world advocates. Verily, the opposite: those inclined to get off the couch and &amp;quot;make a difference&amp;quot; are still likely (or even more likely) to do so, only now with the support of countless others who would not have been reached by the activist&#039;s message otherwise.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 17 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think it&#039;s worth raising the point that there have been a lot of serious questions raised as to the accuracy of the NYTimes piece read in class this week; for example, Global Voices shows Egyptian Twitterers mocking the idea that they needed Western help (http://globalvoicesonline.org/2011/04/15/egypt-gene-sharp-taught-us-how-to-revolt/).  I think that, ultimately, this controversy is more important than the content of the article itself, in that it illustrates how social media can be vital to media accuracy--you have numerous direct accounts from known activists contradicting the commentary in the NYTimes, while the NYTimes meanwhile often has difficulty getting good sources in the Arab world because of its somewhat negative reputation (two words: Thomas Friedman).  Another issue in the piece is the emphasis on a very tiny collaborative movement aided by the US, while numerous genuine, grassroots movements exist and have been ignored by media (case in point: The Arab Bloggers workshops and Arab Techies group). &lt;br /&gt;
&lt;br /&gt;
In terms of the broader picture, one aspect of all of this that has been desperately overlooked is the use and importance of backchannels like private groups, IRC, and email.  While social media is certainly important, the organizing that happens in private online spaces (as well as via SMS) is undoubtedly even more vital. [[User:Jyork|Jyork]] 20:06, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another argument in favor of the role social media is playing in providing accurate information for journalists about things that are happening elsewhere: if you have Twitter, check out the work that @andycarvin has beeen doing.  He&#039;s NPR&#039;s senior product manager for online communities, and has been connecting with people on the ground in countries like Egypt and Libya for a while, using them and their networks to verify or challenge information that the mainstream media has been getting.  It&#039;s been neat stuff.  [[User:Mcforelle|Mcforelle]] 01:11, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
In addition to the lack of accuracy in the NY Times article, I don&#039;t think the internet is necessarily the mean of online hate speech and irrational behavior. Many of the least developed and heavily indebted poor countries are grossly corrupt, which lack adequate financial means or political and economic conditions to cultivate human rights. In addition, poor countries are also notoriously more vulnerable to economic volatility, conflict and humanitarian crisis; good governance matters to development and how citizens behave online.[[User:Alexsolomon|Alexsolomon]]&lt;br /&gt;
&lt;br /&gt;
I find Mr. Shirky&#039;s interview to be especially important today.  He highlights the use of social media, SMS, mobile email, and internet-based freedom of speech (i.e. blogs) to organize people in the absence of other more traditional, government controlled, methods (i.e. print media).  I believe it is obvious that the governments are aware of the people&#039;s ability to organize over this uncontrolled medium which is why many governments are trying to stop further penetration of technologies such as email encryption and blogging/tweeting (e.g. India, Saudi Arabia, China).  If they can control, stop, or accurately monitor these communication mediums they can further disrupt grassroots uprisings.  [[User:Rakundig|Rakundig]] 19:15, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The fundamental notion of democracy is the active participation of the governed in the government, either directly or through representatives.  This week’s readings take aim at an outer fringe of that notion: the active participation of the governed in the overthrow of government.  There can be no doubt that the Internet provides the world’s best electronic soapbox.  It is a better mouthpiece, a better broadcast medium, a better tool.   Etling et al. wisely note that “[t]he Internet lays a good foundation for a battle of ideas, but does not necessarily favor a winner” while Shirky states more bluntly that the Internet is “a better way to take down autocracies but not a better way to replace them.”  We can marvel at the effectiveness of social media in toppling the Egyptian government, but it could not have happened without a military that was sympathetic to the public.  Libya and Iran demonstrate the counterpoint.&lt;br /&gt;
While the Internet has shown great promise facilitating political freedom, I fear those days are numbered.  Last week’s readings exposed the blatant large scale surveillance which the Internet also facilitates.  The video from the cell phone uploaded to youtube probably contains the serial number of the phone traceable to the owner via his GPS coordinates.  This is not just a problem with the Internet – it is prevalent in all technology.  You can no longer print an “anonymous” political flyer when it contains the serial number of the color printer that rendered it.  Technology is a powerful tool that can do wonderful and terrible things.  It needs thoughtful regulation.&lt;br /&gt;
[[User:ChrisSura|-Chris Sura]] 21:20, 19 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://nakedsecurity.sophos.com/2011/04/12/state-of-texas-leaks-data-on-3-5-million-people/ State of Texas exposes data of 3.5 million people] I mentioned this story in the chat room during last class, seemed to be a good point considered the private vs state accumulation of personal info discussion that we were having.  It&#039;s a quick read, and it&#039;ll make you squirm. [[User:Mcforelle|Mcforelle]] 18:20, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Here is a link to Fareed Zakaria&#039;s 1997 &amp;quot;The Rise of Illiberal Democracy&amp;quot; essay, referenced in the Faris/Etling article, which contrasts &amp;quot;Democracy&amp;quot; with &amp;quot;Constitiutional Liberalism&amp;quot;.  &lt;br /&gt;
http://www.fringer.org/wp-content/writings/fareed.pdf&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:29, 16 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If we&#039;re looking to Tunisia and Egypt, I really think we ought to be looking at Tunisian and Egyptian sources, particularly in light of the fact that we&#039;re reading what is largely considered an inaccurate portrayal by the NYTimes.  Here are two great pieces from an Egyptian blogger (they&#039;re not necessarily representative, but they&#039;re the best English sources I&#039;ve found so far): http://www.hanimorsi.com/blog/index.php/archives/2011/02/22/from-clicktivism-to-activism/; http://www.hanimorsi.com/blog/index.php/archives/2011/02/17/the-virtualization-of-dissent-social-media-as-a-catalyst-for-social-change-part-two/.  I also think that these two 2008 pieces from Egyptian journalist Hossam El-Hamalawy are vital reading, incredibly prescient: http://www.arabawy.org/2008/05/08/the-revolution-will-be-flickrized/; http://www.arabawy.org/2008/02/26/a-call-to-blogo-arms/. [[User:Jyork|Jyork]] 20:09, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
This article too: http://www.guardian.co.uk/commentisfree/2011/mar/02/egypt-revolution-mubarak-wall-of-fear [[User:Jyork|Jyork]] 20:11, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Interesting Question: [http://www.govtech.com/e-government/Government-Twitter-Tsar.html Do Government Agencies Need a Twitter Tsar?] --[[User:Gclinch|Gclinch]] 15:31, 19 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6653</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6653"/>
		<updated>2011-04-19T21:30:45Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
March 29 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
April 5 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-4.5.11-Copyright.pdf Slides: Copyright in Cyberspace]&lt;br /&gt;
&lt;br /&gt;
April 12 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril12.pdf Slides: Control and Code: Privacy Online]&lt;br /&gt;
&lt;br /&gt;
April 19 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril19.pdf Slides: Internet and Democracy]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=File:Internet_%26_Society_April_19.pdf&amp;diff=6651</id>
		<title>File:Internet &amp; Society April 19.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=File:Internet_%26_Society_April_19.pdf&amp;diff=6651"/>
		<updated>2011-04-19T21:29:09Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6637</id>
		<title>Internet and Democracy</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_and_Democracy&amp;diff=6637"/>
		<updated>2011-04-18T20:08:00Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 19&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital tools are seen as playing a major part in political activities and revolutions around the world from the Green Revolution in Iran to the recent events in the Middle East and North Africa.  In this class, we&#039;ll explore the role of the Internet  in political organizing, social movements and popular protests, and the potential impact of digital tools on governance.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://www.nytimes.com/2011/02/14/world/middleeast/14egypt-tunisia-protests.html?_r=2&amp;amp;hp A Tunisian-Egyptian Link That Shook Arab History]&lt;br /&gt;
&lt;br /&gt;
* [http://ejournalism.co.uk/?p=739 Clay Shirky on social media in the Middle East and North Africa]&lt;br /&gt;
&lt;br /&gt;
* [http://nms.sagepub.com/content/12/8/1225.full.pdf Etling, Kelly, Faris and Palfrey,  Mapping the Arabic Blogosphere: Politics, Culture and Dissent]&lt;br /&gt;
**Problems with the Etling, Kelly, Faris and Palfrey PDF? If you&#039;re off campus and presented with a website saying you need to sign up to access this article . . . you do not. Sign into Harvard&#039;s VPN solution and you&#039;ll then have access or access it while on the Harvard network (on campus). Or ask nicely and I&#039;m sure it can be emailed to you. :-)  --[[User:Adavies01|Adavies01]] 01:29, 14 April 2011 (UTC)&lt;br /&gt;
** Updated link to the Etling, et al. piece: [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Mapping the Arabic Blogosphere]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Additional Resources ==&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Mapping_Irans_Online_Public Bruce Etling and John Kelly, Mapping Iran&#039;s Online Public]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2010/Public_Discourse_Russian_Blogosphere Etling, Alexanyan, Kelly, Faris, Palfrey, and Gasser, Public Discourse in the Russian Blogosphere: Mapping RuNet Politics and Mobilization]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/publications/2008/Digitally_Networked_Technology_Kenyas_Post-Election_Crisis Josh Goldstein and Juliana Rotich, Digitally Networked Technology in Kenya&#039;s 2007-2008 Post-Election Crisis].&lt;br /&gt;
&lt;br /&gt;
* [http://fletcher.tufts.edu/forum/archives/pdfs/32-2pdfs/Faris-Etling_32-2.pdf Faris, Etling, Madison and the Smart Mob: The Promise and Limitations of the Internet for Democracy]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
I&#039;m inclined to be skeptical of the idea that the internet and social media are making interpersonal connections &amp;quot;shallower&amp;quot;, whether we are talking about &amp;quot;Facebook friends&amp;quot; or social and political activism. Setting aside the question of whether online relationships count as &amp;quot;real&amp;quot; relationships (that is, are qualitatively inferior to real-life relationships), in order for this theory to be correct, online relationships would have to be replacing real-life relationships. While I don&#039;t have any hard data to back this up, I simply don&#039;t see this happening in most cases. The imagined concept is one of young people avoiding traditional social contact in favor of hours spent online. However, I would postulate that the people most inclined to shut themselves off from the &amp;quot;real world&amp;quot; in favor of computers are the same people who would have shut themselves off in favor of books or various solo hobbies in previous decades. Under this model, the quantity and quality of social interaction for persons thus inclined is &#039;&#039;increasing&#039;&#039;, rather than decreasing. What we are talking about is both an increase in reach and a lowering of thresholds. For the average user, social media, first and foremost, provides a vehicle for interaction with people they &#039;&#039;already know&#039;&#039; in real life (friends from school, family, etc... so your kid spending time on the computer rather than playing with friends outside is likely to be interacting with those same friends electronically) and then adds to this a new layer of online friendships and acquaintances which arise as social media provides previously unavailable opportunities to build relationships over distance. (There is, as well, traffic between these two layers, as real-life friends separated by distance use social media to keep in touch, and friends - and potential romantic partners - met online arrange to meet in person). Similarly, when it comes to activism, the increasing availability of &amp;quot;intermediate&amp;quot; levels of support (such as donation or petition signing – hardly new developments) is not likely, to my mind, to decrease the number of active real-world advocates. Verily, the opposite: those inclined to get off the couch and &amp;quot;make a difference&amp;quot; are still likely (or even more likely) to do so, only now with the support of countless others who would not have been reached by the activist&#039;s message otherwise.&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 00:04, 17 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I think it&#039;s worth raising the point that there have been a lot of serious questions raised as to the accuracy of the NYTimes piece read in class this week; for example, Global Voices shows Egyptian Twitterers mocking the idea that they needed Western help (http://globalvoicesonline.org/2011/04/15/egypt-gene-sharp-taught-us-how-to-revolt/).  I think that, ultimately, this controversy is more important than the content of the article itself, in that it illustrates how social media can be vital to media accuracy--you have numerous direct accounts from known activists contradicting the commentary in the NYTimes, while the NYTimes meanwhile often has difficulty getting good sources in the Arab world because of its somewhat negative reputation (two words: Thomas Friedman).  Another issue in the piece is the emphasis on a very tiny collaborative movement aided by the US, while numerous genuine, grassroots movements exist and have been ignored by media (case in point: The Arab Bloggers workshops and Arab Techies group). &lt;br /&gt;
&lt;br /&gt;
In terms of the broader picture, one aspect of all of this that has been desperately overlooked is the use and importance of backchannels like private groups, IRC, and email.  While social media is certainly important, the organizing that happens in private online spaces (as well as via SMS) is undoubtedly even more vital. [[User:Jyork|Jyork]] 20:06, 18 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://nakedsecurity.sophos.com/2011/04/12/state-of-texas-leaks-data-on-3-5-million-people/ State of Texas exposes data of 3.5 million people] I mentioned this story in the chat room during last class, seemed to be a good point considered the private vs state accumulation of personal info discussion that we were having.  It&#039;s a quick read, and it&#039;ll make you squirm. [[User:Mcforelle|Mcforelle]] 18:20, 14 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Here is a link to Fareed Zakaria&#039;s 1997 &amp;quot;The Rise of Illiberal Democracy&amp;quot; essay, referenced in the Faris/Etling article, which contrasts &amp;quot;Democracy&amp;quot; with &amp;quot;Constitiutional Liberalism&amp;quot;.  &lt;br /&gt;
http://www.fringer.org/wp-content/writings/fareed.pdf&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 23:29, 16 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6635</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6635"/>
		<updated>2011-04-18T19:45:59Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Assignment 4 Office Hours */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Internet and Society: Technologies and Politics of Control=&lt;br /&gt;
&#039;&#039;&#039;LSTU E–120 - Harvard Extension School - Spring 2011 - Tuesdays 5:30-7:30 pm EST&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/home/contact Berkman Center for Internet and Society] - 23 Everett Street - Conference room, 2nd floor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This course examines current legal, political, social, and technical struggles for control of the global Internet—and the content and relationships it conveys. The course focuses on the interaction of new technologies and services with emerging models of production, innovation, communication, learning, and civic engagement—looking at both the US and international contexts. Prerequisites: willingness to experiment with new technologies and to participate in class discussions, whether virtually or in person. (4 credits)  &#039;&#039;&#039;[[course overview|continued...]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Syllabus at a glance&#039;&#039;&#039;==&lt;br /&gt;
{| style=&amp;quot;background-color:#CCCCCC;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Jan 25&lt;br /&gt;
| [[Politics and Technology of Control: Introduction]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 1&lt;br /&gt;
| [[Paradigms for Studying the Internet]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 8&lt;br /&gt;
| [[New Economic Models]]&lt;br /&gt;
| &#039;&#039;(Assignment 1 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Feb 15&lt;br /&gt;
| [[Peer Production and Collaboration]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 22&lt;br /&gt;
| [[Collective Action and Decision-making]]&lt;br /&gt;
| &#039;&#039;(Assignment 2 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 1&lt;br /&gt;
| [[New and Old Media, Participation, and Information]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 8&lt;br /&gt;
| [[Law&#039;s Role in Regulating Online Conduct and Speech]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 15&lt;br /&gt;
| &#039;&#039;No class - Spring Break&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 22&lt;br /&gt;
| [[Regulating Speech Online]]&lt;br /&gt;
| &#039;&#039;(Assignment 3 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 29&lt;br /&gt;
| [[Internet Infrastructure and Regulation]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 5&lt;br /&gt;
| [[Copyright in Cyberspace]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 12&lt;br /&gt;
 |[[Control and Code: Privacy Online]] &lt;br /&gt;
| &#039;&#039;(Assignment 4 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Apr 19&lt;br /&gt;
| [[Internet and Democracy]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 26&lt;br /&gt;
| [[Internet and Democracy: The Sequel]]&lt;br /&gt;
|-&lt;br /&gt;
| May 3&lt;br /&gt;
| [[Cybersecurity and Cyberwarfare]]&lt;br /&gt;
|-&lt;br /&gt;
| May 10&lt;br /&gt;
|&#039;&#039;&#039;[[Final Project]] due&#039;&#039;&#039; (no class)&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Course Information:&#039;&#039;&#039;&lt;br /&gt;
* [[Class Participation]]&lt;br /&gt;
* [[Grading]]&lt;br /&gt;
* [[Statement on Plagiarism]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Assignments &amp;amp; Projects:&#039;&#039;&#039;&lt;br /&gt;
* [[Assignments]]&lt;br /&gt;
* [[Assigned Readings|Complete List of Assigned Readings]]&lt;br /&gt;
* [[Final Project]]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Resources:&#039;&#039;&#039;&lt;br /&gt;
* [[Recorded class videos]]&lt;br /&gt;
* [[Powerpoint Slides from Class]]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page How to edit a wiki]&lt;br /&gt;
* [http://www.extension.harvard.edu/resources/writing.jsp Extension School Writing Center]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;External:&#039;&#039;&#039;&lt;br /&gt;
* [[Upcoming Events]]&lt;br /&gt;
* [[In the news]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;People:&#039;&#039;&#039;&lt;br /&gt;
* [[Staff Contact Info]]&lt;br /&gt;
* [[List of User Profiles]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating During Class (Tuesdays 5:30-7:30 pm EST)&#039;&#039;&#039;==&lt;br /&gt;
* Attend in person at the Berkman Center for Internet &amp;amp; Society, 23 Everett St., Second Floor, Cambridge, MA 02138 ([http://cyber.law.harvard.edu/home/contact directions])&lt;br /&gt;
* Live audio/video stream available during class through [http://www.elluminate.com/ Elluminate.com]:&amp;lt;br&amp;gt;&lt;br /&gt;
** Our virtual classroom is located here: [https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE]&amp;lt;br&amp;gt;&lt;br /&gt;
** If you have trouble with Elluminate, please visit the Elluminate [http://www.elluminate.com/Support/?id=62 support website] or contact one of the class TAs&lt;br /&gt;
** If your are participating remotely we ask that you change your audio preferences in Elluminate to enable &#039;&#039;Mute the speaker when &amp;quot;talk&amp;quot; is pressed to prevent feedback.&#039;&#039;  You can find this option by going to &#039;&#039;&#039;Tools -&amp;gt; Preferences&#039;&#039;&#039;, and finding &#039;&#039;&#039;Speaker Settings&#039;&#039;&#039; under &#039;&#039;&#039;Audio&#039;&#039;&#039; in the left hand options tree.  Please have this box checked off. (More on how to do this [[Class Participation | here]].)&lt;br /&gt;
** &#039;&#039;&#039;For remote participants:&#039;&#039;&#039; to talk to the class in Cambridge during our regularly scheduled class time, please make sure to:&lt;br /&gt;
*** Set up and test your audio according to the instructions above&lt;br /&gt;
*** Raise your hand in Elluminate by clicking on the hand icon&lt;br /&gt;
*** Make sure that the Gain Volume next to your Talk button is at least at 60%. (You should adjust this manually if we can&#039;t hear you.)&lt;br /&gt;
*** When given the go ahead to talk, click the Talk button.&lt;br /&gt;
&lt;br /&gt;
* You may also IM to Rob or David directly via gtalk (or jabber): lstu.e120@gmail.com&lt;br /&gt;
* You may also IM the TAs directly via gtalk (or jabber): internetsociety2011@gmail.com&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating Asynchronously&#039;&#039;&#039;==&lt;br /&gt;
* The Elluminate sessions will be archived and accessible at [https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226 https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226]&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Contact Information&#039;&#039;&#039;==&lt;br /&gt;
* All questions, comments, etc. should be sent to: internetsociety2011@gmail.com&lt;br /&gt;
** There are no set office hours; feel free to send an email, and the TAs will respond to it as soon as they can.&lt;br /&gt;
* If you need to contact an instructor or TA individually, please use their personal contact info located on the [[Staff Contact Info]] page.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Office Hours&#039;&#039;&#039;==&lt;br /&gt;
Rebekah and Alex will be available for 15-minute calls or text chats in preparation for Assignment #4 (paper drafts). &lt;br /&gt;
* Rebekah&lt;br /&gt;
** Thursday March 31, 3:30pm - 5:00pm EDT (also available in person at 23 Everett)&lt;br /&gt;
** Tuesday, April 5, 7:30-8:30pm EDT (immediately after class; available via phone/Skype/in person at 23 Everett)&lt;br /&gt;
** Saturday, April 23, 2:30-4:00pm EDT (available via phone/Skype/chat)&lt;br /&gt;
** Tuesday, April 26, 7:30-8:30pm EDT (immediately after class; available via phone/Skype/in person at 23 Everett)&lt;br /&gt;
* Alex&lt;br /&gt;
** Monday April 4, 5:00pm - 6:30pm EDT&lt;br /&gt;
** Thursday, April 7, 5-6pm EDT&lt;br /&gt;
** Monday, April 25, 5:00-6:30pm EDT&lt;br /&gt;
Email internetsociety@gmail.com to schedule a meeting.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Student Feedback Poll&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/viewform?formkey=dFlTb2VPZkxlSjZfSjN5RXNzem94QUE6MQ&amp;amp;ifq Enter the poll!] (You have the opportunity to submit anonymous feedback.)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6631</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6631"/>
		<updated>2011-04-16T15:18:09Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Robert Cunningham|Draft|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Cunningham_draft.doc||}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brian Smith|Foursquare Privacy: Policies, Data Exposure, and Guidelines|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4_Brian_Smith_Final.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Saam Batmanghelidj|Digital Intellectual Property of Synthetic Worlds:  A New Age for the Regulation of Property|http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Paper_Rough.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Jillian York|Understanding “Lesbanon”: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/First_Draft_JillianCYork.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Anthony Crowe ([[Acrowe]])|Tagging (Working Title)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4.doc|&amp;quot;Tag!&amp;quot; The Internet Is It...|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_PPT.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alex Bryan|Grooveshark: An effort to monetize free|http://cyber.law.harvard.edu/is2011/Image:Research_Project.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yu Ri Jeong|Study on Collective Intelligence within Naver Knowledge iN &lt;br /&gt;
of South Korea|http://cyber.law.harvard.edu/is2011/Image:Yu_Ri_Jeong_Internet_and_Society_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Culture of Sharing: MIT OpenCourseWare|http://cyber.law.harvard.edu/is2011/Image:Kim_Draft.pdf|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Davies_Solomon_Assignment_4.pdf|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AudioVideo.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Online Platforms-Which one works for you?|http://cyber.law.harvard.edu/is2011/Image:Bonus_Assignment-Pledgebank_Tragedy-Syed_Yasir_Shirazi.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Laura Connell|US Copyright Group - Saving Cinema or Mass Litigation Used as Profit-Center?|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_roughdraft_Assignment4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brandon A. Ceranowicz|A Comparison of Open Source Licenses|http://cyber.law.harvard.edu/is2011/sites/is2011/images/A_Comparative_Study_of_Open_Source_Licenses_v1.0.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Jessica Sanfilippo|Crowd Funding and Cultural Production|http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Assignment_4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Tymoteusz Lewtak|Site Super-User Science|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Tymoteusz_Lewtak_Assignment_4.pdf|Extra Credit Presentation|http://www.2shared.com/file/aYxdOv-z/Extra_Credit_Presentation.html}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Michelle C Forelle| Video Sharing the Vimeo Way: How a Focus on Community and Being Considerate Created a YouTube Competitor|http://cyber.law.harvard.edu/is2011/Image:Assgn4_Vimeo.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Myra Garza|Putting Their Best Faces Forward: The Motivations of Contributors to Acne.org|http://cyber.law.harvard.edu/is2011/Image:Assignment4.Garza.M.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Christopher Sura|Governance of the Java Community Process|&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_4.pdf&lt;br /&gt;
|Bonus Title|Bonus Link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6595</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6595"/>
		<updated>2011-04-13T13:48:05Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Jillian York|Understanding “Lesbanon”: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/First_Draft_JillianCYork.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Anthony Crowe ([[Acrowe]])|Tagging (Working Title)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_4.doc|&amp;quot;Tag!&amp;quot; The Internet Is It...|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_PPT.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alex Bryan|Grooveshark: An effort to monetize free|http://cyber.law.harvard.edu/is2011/Image:Research_Project.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yu Ri Jeong|Study on Collective Intelligence within Naver Knowledge iN &lt;br /&gt;
of South Korea|http://cyber.law.harvard.edu/is2011/Image:Yu_Ri_Jeong_Internet_and_Society_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Culture of Sharing: MIT OpenCourseWare|http://cyber.law.harvard.edu/is2011/Image:Kim_Draft.pdf|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Davies_Solomon_Assignment_4.pdf|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AudioVideo.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens from their Respected Countries on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Online Platforms-Which one works for you?|http://cyber.law.harvard.edu/is2011/Image:Bonus_Assignment-Pledgebank_Tragedy-Syed_Yasir_Shirazi.pdf}}&lt;br /&gt;
&lt;br /&gt;
 {{Assignment4|Laura Connell|US Copyright Group - Saving Cinema or Mass Litigation Used as Profit-Center?|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_roughdraft_Assignment4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Brandon A. Ceranowicz|A Comparison of Open Source Licenses|http://cyber.law.harvard.edu/is2011/sites/is2011/images/A_Comparative_Study_of_Open_Source_Licenses_v1.0.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Jessica Sanfilippo|Crowd Funding and Cultural Production|http://cyber.law.harvard.edu/is2011/Image:Jsanfilippo_Assignment_4.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Tymoteusz Lewtak|Site Super-User Science|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Tymoteusz_Lewtak_Assignment_4.pdf|Extra Credit Presentation|http://www.2shared.com/file/aYxdOv-z/Extra_Credit_Presentation.html}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Michelle C Forelle| Video Sharing the Vimeo Way: How a Focus on Community and Being Considerate Created a YouTube Competitor|http://cyber.law.harvard.edu/is2011/Image:Assgn4_Vimeo.pdf|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6556</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6556"/>
		<updated>2011-04-12T22:39:44Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Mary Van Gils|Yelp and Defamation|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Mary_Van_Gils_Assignment_Yelp_and_Defamation.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|[[User:Rakundig|Rakundig]] 21:22, 12 April 2011 (UTC)|Free Riding in the BitTorrent Peer-to-Peer Network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_DRAFT_paper_-_A_Study_on_Free_Riding_in_the_Bitorrent_Peer-to-peer_Network.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|Community Activism and Hyperlocal Websites|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_LSTU_E%E2%80%93120_AV.ppt}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed? Compared Communities: Slovak v English&lt;br /&gt;
|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Vladimir_Trojak.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alokika Singh|Feminism and the Internet in India|http://cyber.law.harvard.edu/is2011/sites/is2011/images/ROUGH_DRAFT.pdf|Bonus title|http://bit.ly/eIlAw8 (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Joshua Surillo|Opinions of Citizens from their Respected Countries on Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Assignment_4_Draft.doc|On the street interviews|http://bit.ly/e2STbr (YouTube link)}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Faye Ryding|Trolls and Vandals on epionions.com|http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_4.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|http://cyber.law.harvard.edu/is2011/Image:Research_Project-Monitoring_PledgeBank-SYAS-Draft_4.pdf|Mind Map|to be uploaded}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6549</id>
		<title>Control and Code: Privacy Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Control_and_Code:_Privacy_Online&amp;diff=6549"/>
		<updated>2011-04-12T21:31:11Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Code is law; the architecture of the Internet and the software that runs on it will determine to a large extent how the Net is regulated in a way that goes far deeper than legal means could ever achieve (or at least ever achieve alone). Technological advances have also produced many tempting options for regulation and surveillance that may severely alter the balance of privacy, access to information and sharing of intellectual property. By regulating behavior, technological architectures or codes embed different values and political choices. Yet code is often treated as a technocratic affair, or something best left to private economic actors pursuing their own interests.  If code is law, then control of code is power. If important questions of social ordering are at stake, shouldn&#039;t the design and development of code be brought within the political process? In this class we delve into the technological alternatives that will shape interactions over the Internet, as well as the implications of each on personal freedom, privacy and combating cyber-crime. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril12.pdf Slides: Control and Code: Privacy Online]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings== &lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/download Jonathan Zittrain, Future of the Internet, Chapter 9: Privacy 2.0]&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned]&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship (CATO)]&lt;br /&gt;
* [http://www.nytimes.com/2011/03/26/business/media/26privacy.html Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know (NYTimes, March 26, 2011)]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/episodes/2010/04/02/segments/152890 NPR On the Media Story &amp;quot;Anonymous Justice&amp;quot;]&lt;br /&gt;
* [http://www.danah.org/papers/talks/2010/SXSW2010.html &amp;quot;Making Sense of Privacy and Publicity.&amp;quot; Transcript of talk given by Danah Boyd at SXSW. Austin, Texas, March 13, 2010]&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, Code 2.0: Privacy]&lt;br /&gt;
* http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&lt;br /&gt;
* http://en.wikipedia.org/wiki/Human_flesh_search_engine&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Regarding Cato Institute Policy Analysis No. 295&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
So, I&#039;m struggling with this analysis piece from the Cato Institute. I used to consider myself to be a libertarian; unfortunately, I&#039;m not sure that term means what I want it to mean anymore. Suffice it to say that some of the core ideas in the Cato Institute piece have resonance for me; namely, the idea that one does not own information, that there is no right &#039;&#039;not&#039;&#039; be annoyed or offended, and that there is (significant) societal and economic value in businesses being able to access information concerning their customers (the Slate article I posted below goes into this). That said, the Cato Institute seems to be taking the (rather undesirable) position that there *is* no &amp;quot;right to privacy&amp;quot;, and the piece itself seems (to my mind) to be riddled with a number of false equivalencies, leaps in reasoning, and glaring oversights. It seems to unduly privilege one portion of the citizenry (those engaged in business) against another (those engaged in consumption). Now, there is nothing wrong with running a business, or turning a profit (verily, the opposite - such activity is key to both individual and national well-being), but I am skeptical at the idea that direct marketing counts as &amp;quot;free speech&amp;quot; and should therefore be immune to government regulation (indeed, there are numerous precedents for limiting marketing speech), that industry self-regulation has proven adequate, or that concerns about privacy, fraud, and identity theft should be so casually dismissed.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the ownership of information:&#039;&#039;&#039; clearly we do not “own” information about ourselves; information is not property in the traditional sense, but that does not mean we cannot control the release of certain information under certain circumstances. The article mentions confidentiality for medical records, for instance – but then seems to act as if this is the only sort of information that can or should receive protection. Yet there are other categories of information which we can and do privilege – court proceedings and criminal records, for instance, can be sealed in some cases. While it may be lawful to obtain and publish such information by other means, this is not the sort of free access to information that the article seems to envision. The paper compares gathering (and then selling) statistical information on clients with – of all things – gossip, which (to my mind) is nothing like gathering statistical information. Gossip is a natural social occurrence based on casual observation and the relation of second or third hand accounts. It is nothing like using instruments (in this case computer programs) to take detailed recordings of a person’s circumstances and shopping habits and then processing them mathematically to yield commercially valuable statistics. Gossip is an inevitability that cannot be prevented, or even regulated, beyond the use of social norms (legal means for extreme cases, such as libel, have been shown to be remarkably ineffective). Regulation of business practices, either by law or by voluntary codes of business ethics, is, on the other hand, not merely feasible, but common. Furthermore, no contract (save perhaps the &#039;&#039;social contract&#039;&#039;) exists between the causal observer and those observed. In contrast, a contractual relationship exists between the consumer of a good or service and the provider thereof – contracts which are subject to regulation by law. I reject the false equivalency drawn between gossip and the gathering of marketing data, and with it a large portion of the Cato Institute’s argument, which attempts to convince the reader that such data collection is not only similar too, but in light of its greater accuracy, more beneficial to the subject being observed. We can make this rejection, however, without disputing that such marketing information may be of critical value to the business operator, or bring other, legitimate benefits to the consumer.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the validity of privacy concerns:&#039;&#039;&#039; Furthermore, I find the paper in question entirely too dismissive of consumers’ privacy concerns – as if large corporate marketing databases posed little to no increased risk for those who’s information they contain. Just today, I heard news of a large corporate email database being hacked into (http://losangeles.cbslocal.com/2011/04/04/banks-retailers-warn-customers-after-email-database-hacked/), exposing the customers of several major firms to the potential of spam and fraudulent email. This is not the first such occurrence; indeed, we have seen much more sensitive bank account and credit card data stolen from financial institutions. The Cato institute seems to think that the abuse of cooperate databases can be adequately prevented by industry standards, existing legal penalties, and that the only real danger is that posed by the government. To further its case, it argues that many instances of criminal abuse are essentially inevitable – making the spectacular leap of logic that since certain abuses are not 100% preventable, that there is little value in attempting to increase legal protection against them. This is fallacious at best, disingenuous at worst. It is often said that there is very little one can do to prevent a determined assassin from assassinating a public figure; yet we do not throw up our hands and, say, allow the President to travel unescorted. On the contrary, the Secret Service and other government agencies spend an enormous amount of time, energy, and money attempting to safeguard key public officials by preventing or otherwise making such assassination attempts as difficult as possible. Likewise – to take a considerably more mundane example – even the best bike-lock will not prevent the most determined and organized of bike thieves from stealing or stripping a parked bike. That does not mean we encourage cyclists to leave their bikes unlocked and unattended on the street. I am willing to accept the argument that there is a price to be paid for greater privacy rights and safeguards, and that no such measures provide perfect protection, but I am not willing to entertain the notion that such safeguards are doomed to failure and therefore are of no value to the consumer, and to society as a whole. I am also troubled by the piece’s treatment of direct marketing; namely the glaring omission of any mention of spam email. While direct marketing is no doubt crucial to many businesses, and more tailored marketing would no doubt be a blessing to many consumers, when it comes to email, “junk mail” or “spam” can be crippling to the very businesses who’s interests the Cato Institute seems to have in mind; sorting though hundreds of spam messages a day can have serious impact on productivity for employees who make heavy use of electronic communications as part of their work duties – increasingly efficient spam filters help, but they are not solely responsible for reductions of spam mail; rather governmental regulation and prosecution of spammers has played a vital role in this. I doubt that many recipients of spam mail would be favorably predisposed to the argument that such mail constituted a category direct marketing constitutionally protected as “free speech”. We are not a talking about mere “annoyance” here, as the Cato Institute suggests, but rather a phenomenon that new technology has allowed to grow to such proportion that it has a serious impact on people’s lives, let alone its role as a conduit for illegal and unethical predatory activity. The government is commonly held to have a responsibility to protect citizens from unwanted and intrusive harassment by other private citizens. While the “Lands End” catalogue may not fall into this category, spam mail, as well as persistent telemarketing calls at inappropriate times, increasingly are seen to do so. As a consumer I am inclined to think that the rights of business to conduct their business need to be balanced against the rights of consumers to conduct their lives without undo interference.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;On the government and business ethics:&#039;&#039;&#039; The Cato Institute is quite correct to point out the special danger presented by the government and government information gathering, with the unique powers of enforcement it holds over the citizenry. I applaud this healthy skepticism; however, I think the institute’s libertarian biases have blinded it to potential for abuse posed by corporate databases, both by corporations themselves and – in the most glaring omission of the piece – abuse of said databases by the government with the acquiescence (if not outright support) of their private administrators. We have already seen such (mis)use of corporate marketing databases in our current reading: eloquently detailed by Christopher Soghoian on his weblog (http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html). Keep in mind that these databases were never intended to be used for surveillance purposes, but rather intended for just the sort of marketing uses which the Cato Institute is advocating in favor of. The purity of purpose the institute ascribes to business – that is, the pursuit of profit – did not prevent these companies from secretly divulging customer information for (what the institute itself would surely see as) abuse by government agencies. And why should it have? If businesses are conceived for the sole purpose of making profit, then why should we expect them to do anything but what they have done? – namely seize the opportunity to turn the sale of consumer information to the government into a profitable revenue source. The only potential curb on this sort of behavior would be the ire these corporations’ customer base, but since the widespread sale of geo-location and other private information is largely hidden from the public no outcry is possible. Furthermore, while I am sure that the Cato Institute would be quick to demand new restrictions on the government concerning the acquisition of such information (judicial oversight through a system of warrants, and laws requiring transparency in reporting), I am equally sure that the Institute would casually dismiss any need for tighter regulation on the business end. This is troubling to me. Industry self-regulation is only valuable as far as it achieves the desired results; it is only too easy for self-regulation to be corrupted into a self-serving obfuscation. And, as much as we should respect business’ (entirely necessary) role as an engine of societal growth and prosperity, we can still demand that said businesses conform to certain codes of business ethics. Requiring that businesses respect the privacy of their customers by providing clear explanations of how and to what extent customer information will be used, requesting permission for certain uses, and abiding by terms of service agreements which govern these uses is entirely is, to me, entirely reasonable. Telling customers that they can just “opt out” of internet or cell phone use if they are concerned about privacy seems to me to be about as sensible as relying on abstinence-only education to prevent the spread of STDs and unwanted teen pregnancy.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Conclusion:&#039;&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
To synthesize the thoughts presented here:&lt;br /&gt;
1)	A certain degree of personal privacy is desirable and should be protected.&lt;br /&gt;
2)	Businesses have a legitimate need for marketing information gathered from consumers who use their services.&lt;br /&gt;
3)	Therefore, efforts must be made to balance these two nontrivial concerns.&lt;br /&gt;
4)	Self-regulation is insufficient to guarantee freedom from abuse of corporate consumer information databases.&lt;br /&gt;
5)	Both the government and private corporations should be restricted in this regard.&lt;br /&gt;
&lt;br /&gt;
Highly tailored direct marketing is the wave of the future. This development cannot be stopped; neither should we attempt to stop it, as it promises significant benefits to both business and consumer. This sort of analysis (http://www.theatlantic.com/business/archive/2011/04/how-the-american-man-spends-money/236888/) is not only critical to business, but can tell us important things about society as a whole. However, this does not mean we need to, or should, sacrifice the entirety of our personal privacy rights on the altar of innovation. Privacy is an important issue, and it behooves us to define with a degree of clarity to what extent a citizen’s personal privacy is to be protected. It is naïve to believe that such protection is of little benefit to society, or that the natural (unregulated) course of evolution will adequately provide for its existence. This is not a call for heavy handed regulation; rather it is a call for serious, objective thought on the subject. I am not sure that the Cato Institute’s advocacy piece (as valuable as it its insights might be) qualifies in this regard. &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:36, 10 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;RE: Privacy as Censorship &#039;&#039;&#039; (typing this on my Blackberry, sorry for any typos)&lt;br /&gt;
Singleton says that, &amp;quot;...value does not somehow inhere in a person&#039;s name.&lt;br /&gt;
Rather, the activities of marketers and list compilers create the value of the name.&amp;quot; Really? If the name wasn&#039;t worth anything, why collect it? The miner doesn&#039;t create the value of the gold, he is mearly the conduit. My name is valuable to marketers because of who I am and what I have accomplished in life. The sum total of what we each accomplish and the labor we expend to produce the income that the marketers seak to extract from each of us among other things is what creates the value of a name.[[User:Gclinch|Gclinch]] 04:33, 12 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
[http://www.networkworld.com/community/blog/get-ring-us-europe-vow-bash-out-internet-pers Get in the ring: US, Europe vow to bash out Internet personal privacy protection] --[[User:Gclinch|Gclinch]] 21:51, 30 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
New York Times op-ed on new privacy legislation being considered by Sen. Kerry:  http://www.nytimes.com/2011/03/19/opinion/19sat2.html?_r=1&amp;amp;scp=1&amp;amp;sq=privacy%20on%20the%20internet&amp;amp;st=cse  --[[[[User:Sjennings|sjennings]] 20:03, 6 April 2011 (UTC)]]&lt;br /&gt;
&lt;br /&gt;
Slate&#039;s (skeptical) take on online privacy:&lt;br /&gt;
http://www.slate.com/id/2290719&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:25, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Also, a link to the FTC filing mentioned in the above article (regarding Google Buzz): http://www.ftc.gov/opa/2011/03/google.shtm&lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 03:42, 9 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The internet in action: &amp;quot;My Dad is Li Gang!&amp;quot;, courtesy of Know Your Meme. http://knowyourmeme.com/memes/my-dad-is-li-gang-%E6%88%91%E7%88%B8%E6%98%AF%E6%9D%8E%E5%88%9A &lt;br /&gt;
[[User:BrandonAndrzej|BrandonAndrzej]] 06:05, 11 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
iPhone or iSpy? Feds, Lawyers Tackle Mobile Privacy:&lt;br /&gt;
&amp;quot;A proposed class-action lawsuit filed last week alleges that Apple and a handful of app makers are invading user privacy by accessing personal data from customers’ smartphones without permission and sharing it with third-party advertisers.&amp;quot; -- http://www.wired.com/gadgetlab/2011/04/iphone-ispy/&lt;br /&gt;
[[User:Alex|Alex]] 5:21, 12 April 2011&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6548</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6548"/>
		<updated>2011-04-12T21:30:55Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
March 29 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
April 5 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-4.5.11-Copyright.pdf Slides: Copyright in Cyberspace]&lt;br /&gt;
&lt;br /&gt;
April 12 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyApril12.pdf Slides: Control and Code: Privacy Online]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6523</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6523"/>
		<updated>2011-04-12T17:53:43Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Corey MacDonald|Communication for the Fringe: A look at www.Nationalblacklist.com|http://cyber.law.harvard.edu/is2011/Image:National_Blacklist_Draft_MacDonald.doc|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded|Link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Homophily, the Tea Party, and the Internet|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Interview on Homophily, the Tea Party, and the Internet|http://www.archive.org/details/ElishaSurillosInterviewWithRaymondHamilton-TheInternetHomphilyAnd}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6519</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6519"/>
		<updated>2011-04-12T13:18:06Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|http://bit.ly/hLDo9Z}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded|Link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Title|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6518</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6518"/>
		<updated>2011-04-12T12:59:05Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|sent to Rebekah}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded|Link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Title|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6517</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6517"/>
		<updated>2011-04-12T12:58:56Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|sent to Rebekah}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded|Link}}&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Elisha Surillo|Title|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_4-1_Elisha_Word.doc|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6515</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6515"/>
		<updated>2011-04-12T12:57:30Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Yaerin Kim|Title|Link|A Short Introduction to MIT OCW| http://bit.ly/fAzmdo }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Jennings|Annuity Companies&#039; Social Media Communities|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Annnuity_Companies&#039;_s_Social_Media_paper.doc|Can We Talk|sent to Rebekah}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Susan Lemont|The Cancer Bioinformatics Grid: Vision and Adoption|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_assignment4.pdf|Project Mind Map|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Lemont_Map.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Ed Arboleda|Technology based hyperlocal websites lead to additional community involvement and activism|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment4.pdf|To be uploaded|Link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6496</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6496"/>
		<updated>2011-04-11T18:01:23Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Alan Davies and Alex Solomon|Deceptions in online dating site architecture|Link|Online Dating: Some People Do Lie| http://www.youtube.com/user/harvardcyberlaw}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Guy Clinch|The Transition to Next Generation 9-1-1 in North America|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_4_gclinch.pdf|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6471</id>
		<title>Assignment 4 Details and Links</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6471"/>
		<updated>2011-04-05T22:43:07Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Assignment 4 Office Hours */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Due April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Group_Work|You may work in groups]]&#039;&#039;&#039;, provided you have submitted a short paragraph to the instructors by March 1 explaining why a group approach to your proposed topic for the final project makes sense.&lt;br /&gt;
&lt;br /&gt;
This assignment will be to turn in a rough draft of your final, 8-10 page final project paper. It will be a chance for us to give you some comments, and suggest some places to push your research project forward in the next few weeks. &lt;br /&gt;
&lt;br /&gt;
It&#039;s also an opportunity to get some extra credit. If you are interested, you may create an audiovisual work discussing and presenting your research to date. The work could be an audio file (such as a podcast), a video (such as a remix or animation), or an in-class presentation. You should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). These may be presented in class.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Submit your rough draft (and your extra credit, if applicable) here: [[Assignment 4 Submissions]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Format==&lt;br /&gt;
Your paper should be 8-10 pages long, double spaced, and use a [http://en.wikipedia.org/wiki/Serif serif] font (Times New Roman, Cambria, etc.).  Please upload your paper as a .doc, a .odt, or a .pdf.&lt;br /&gt;
&lt;br /&gt;
You may use any commonly accepted style to cite your sources (Chicago, MLA, etc.), but please be consistent.&lt;br /&gt;
&lt;br /&gt;
==Assignment 4 Office Hours==&lt;br /&gt;
Rebekah and Alex will be available for 15-minute calls or text chats in preparation for Assignment #4 (paper drafts). &lt;br /&gt;
* Rebekah&lt;br /&gt;
** Thursday March 31, 3:30pm - 5:00pm EDT (also available in person at 23 Everett)&lt;br /&gt;
** Tuesday, April 5, 7:30-8:30pm EDT (immediately after class; available via phone/Skype/in person at 23 Everett)&lt;br /&gt;
* Alex&lt;br /&gt;
** Monday April 4, 5:00pm - 6:30pm EDT&lt;br /&gt;
** Thursday, April 7, 5-6pm EDT&lt;br /&gt;
Email internetsociety@gmail.com to schedule a meeting.&lt;br /&gt;
&lt;br /&gt;
== Bonus Credit ==&lt;br /&gt;
&lt;br /&gt;
This bonus credit consists of an audiovisual work of your creation, and should be based on your draft. The work could be an audio file (such as a podcast or song), a video (such as a remix or animation), or a compelling image (such as a mindmap or photo montage). If an audio or video work, you should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). &lt;br /&gt;
&lt;br /&gt;
Possible ideas include:&lt;br /&gt;
&lt;br /&gt;
*An audio podcast or video interview with someone doing influential work related to your project&lt;br /&gt;
*A video medley and/or remix&lt;br /&gt;
*A podcast show in which participants debate the topic&lt;br /&gt;
*A [http://en.wikipedia.org/wiki/Mind_Map mindmap] image that charts out a policy debate or domain&lt;br /&gt;
*A photo montage&lt;br /&gt;
*A short film&lt;br /&gt;
*A song or musical work drawing from various samples such as those on [http://freesound.iua.upf.edu Freesound]&lt;br /&gt;
*A song with lyrics&lt;br /&gt;
*A visualization, perhaps using [http://services.alphaworks.ibm.com/manyeyes/home Many Eyes]&lt;br /&gt;
&lt;br /&gt;
== Uploading Your Bonus Work==&lt;br /&gt;
&lt;br /&gt;
Examples of online services you may use to post your bonus work include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Video:&#039;&#039;&#039;&lt;br /&gt;
*[http://youtube.com Youtube]&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
*[http://video.google.com Google Video]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Audio:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.ccmixter.com ccMixter] (for music; note: music must be licensed under a [http://www.creativecommons.org Creative Commons] license&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Image:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
&lt;br /&gt;
== Tools and Tutorials ==&lt;br /&gt;
* Audio&lt;br /&gt;
** [http://audacity.sourceforge.net/ Audacity] ([http://www.edhsonline.org/other/audacity/ introduction tutorial], [http://audacity.sourceforge.net/help/documentation more FAQs and Tutorials])&lt;br /&gt;
* Video&lt;br /&gt;
** Mac OS X: iMovie ([http://www.apple.com/ilife/tutorials/#imovie]) or Final Cut&lt;br /&gt;
** Windows: [http://www.avid.com/freedv/ Avid FreeDV] ([http://www.avid.com/freedv/tutorials/index.asp tutorial])&lt;br /&gt;
*Screencast (Screencasting is taking a video of your computer desktop, while you manipulate it) &lt;br /&gt;
**[http://en.wikipedia.org/wiki/Screencast Screencast]&lt;br /&gt;
**[http://en.wikipedia.org/wiki/List_of_screen_recording_software List of screen recording software]&lt;br /&gt;
&lt;br /&gt;
* Video Game / Animation&lt;br /&gt;
** [http://scratch.mit.edu/home/index Scratch]&lt;br /&gt;
* Other&lt;br /&gt;
** [http://en.wikipedia.org/wiki/List_of_Mind_Mapping_software Mind Mapping Software]&lt;br /&gt;
&lt;br /&gt;
== Examples of Finished Products==&lt;br /&gt;
&#039;&#039;(some of these are more highly produced or effort-intensive than your projects need be, but they should give you a sense for what finished pieces look like)&#039;&#039;&lt;br /&gt;
* [http://www.flickr.com/photos/further/404587997/ Mind Map of Democracy and the Internet] by John Palfrey (partial snapshot)&lt;br /&gt;
* [http://thoughtcast.org/casts/beyond-broadcast-2007 Interviews from Beyond Broadcast] on Thoughtcast&lt;br /&gt;
&lt;br /&gt;
== Assignment Four Submissions ==&lt;br /&gt;
&lt;br /&gt;
Post your submissions here: [[Assignment 4 Submissions]]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Copyright_in_Cyberspace&amp;diff=6470</id>
		<title>Copyright in Cyberspace</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Copyright_in_Cyberspace&amp;diff=6470"/>
		<updated>2011-04-05T21:29:31Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;April 5&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost.  The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to &amp;quot;recut, reframe, and recycle&amp;quot; previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. &lt;br /&gt;
&lt;br /&gt;
Digital and file-sharing technologies also spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies.  The &amp;quot;notice-and-takedown&amp;quot; provisions of the  Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;) allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The DMCA provides for counter-notice and &amp;quot;put-back&amp;quot; of removed material, but some argue that the statutory mechanism can chill innovative, constitutionally-protected speech.&lt;br /&gt;
&lt;br /&gt;
This class provides an overview of some major copyright law concepts and takes up some of the issues swirling around copyright in cyberspace.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-4.5.11-Copyright.pdf Slides: Copyright in Cyberspace]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
== Required Readings ==&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Copyright Basics]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap1.html#107 17 U.S.C. § 107 (&amp;quot;Limitations on Exclusive Rights:  Fair Use&amp;quot;)]&lt;br /&gt;
* [http://www.copyright.gov/title17/92chap5.html#512 17 U.S.C. § 512(c) (&amp;quot;Information Residing on Systems or Networks at Direction of Users&amp;quot;)]&lt;br /&gt;
* [http://www.free-culture.cc/freecontent/ Lawrence Lessig, Free Culture] (pp. 1-20)&lt;br /&gt;
* Viacom v. YouTube: [http://www.nytimes.com/2010/03/19/technology/19youtube.html?pagewanted=1&amp;amp;sq=viacom&amp;amp;st=cse&amp;amp;scp=2 &amp;quot;Viacom Says YouTube Ignored Copyrights&amp;quot; (M. Helft, NY Times, 3/18/2010)], [http://www.pbs.org/mediashift/2010/07/what-the-viacom-vs-youtube-verdict-means-for-copyright-law183.html What the Viacom vs. YouTube Verdict Means for Copyright Law]&lt;br /&gt;
* Righthaven Copyright Lawsuits: [http://www.lasvegassun.com/news/2011/mar/29/righthaven-wins-round-litigation-campaign/ Las Vegas Sun, Righthaven wins round in litigation campaign], [http://www.lasvegassun.com/blogs/business-notebook/2011/mar/19/righthaven-lawsuits-backfire-reduce-protections-ne/ Las Vegas Sun, Righthaven lawsuits backfire, reduce protections for newspapers], and skim [http://www.righthavenlawsuits.com/ this].&lt;br /&gt;
* [http://www.citmedialaw.org/sites/citmedialaw.org/files/news%20aggregation%20white%20paper.pdf The Rise of the News Aggregator: Legal Implications and Best Practices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings  ==&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
* [http://creativecommons.org/about/licenses/comics1 Creative Commons: A Spectrum of Rights (comic)]&lt;br /&gt;
* [http://www.centerforsocialmedia.org/resources/publications/recut_reframe_recycle/ Center for Social Media, Recut, Reframe, Recyle] (full report optional)&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=8647956476676426155&amp;amp;q=545+U.S.+913&amp;amp;hl=en&amp;amp;as_sdt=2002 MGM v. Grokster, 545 U.S. 913 (2005)] (Sec. II, pp. 928 - 937)&lt;br /&gt;
* [http://www.nytimes.com/2008/09/09/nyregion/09potter.html?_r=1 &amp;quot;Rowling Wins Lawsuit Against Potter Lexicon&amp;quot; (J. Eligon, NY Times, 9/8/08)]&lt;br /&gt;
* [http://bits.blogs.nytimes.com/2008/01/16/830/index.html New York Times Bits Blog: Mixing It Up Over Remixes and Fair Use]&lt;br /&gt;
* [http://www.eff.org/files/20030926_unsafe_harbors.pdf EFF, Unsafe Harbors: Abusive DMCA Subpoenas and Takedown Demands]&lt;br /&gt;
* [http://www.whitehouse.gov/blog/2011/03/15/concrete-steps-congress-can-take-protect-americas-intellectual-property The White House Blog: Concrete Steps Congress Can Take to Protect America&#039;s Intellectual Property]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
For the mind map software, I found [http://vue.tufts.edu/ VUE] easy to use. I was especially impressed by the rendering in PDF. Everything fit neatly on the page. This was a big surprise after being a Microsoft Office User ;-). Also, PC Users, if you need to print to PDF, [http://www.pdfforge.org/ PDF Creator] is wonderful. --[[User:SCL|SCL]] 22:17, 3 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
The story of Edwin Howard Armstrong in Lawrence Lessig&#039;s Free Culture, is especially disturbing due in part to his unfortunate demise. FM radio was systematically repressed by RCA and the government (FCC); for the benefit of RCA (to keep it&#039;s market share with AM radio).The fight between RCA and Edwin Armstrong ultimately broke him down, but this story has repeated itself in many forms throughout history.  RCA benefited from AM radio at the expense of millions of radio listeners who would have been able to enjoy clear FM transmissions.  In this particular case, it lead to the direct death of the inventor and the short changing of the radio listening public.  What happens in other cases where lives are at stake? Would a pharmaceutical company react the same way to protect their financial interests in the event of an important cure being developed?  What if the cure was developed using prior pharmaceutical patents? Would “common sense revolt at the idea?”1 [[User:Earboleda|Earboleda]] 23:44, 4 April 2011 (UTC)&lt;br /&gt;
1 Lawrence Lessig, ( New York: Penguin Press, 1994) Free Culture, 2&lt;br /&gt;
&lt;br /&gt;
The Righthaven case cites some factors working against the plaintiffs, one of which is the fact that they sought copyright protection with the specific intent to file suit. While I certainly don&#039;t think their actions are on the whole noble, it does seem a bit challenging that copyright protection does not require registration. If registration is mere legal formality, but is also required in order to file a suit, it seems unfair to subject Righthaven to scrutiny on that particular basis. If a judge is going to deem such actions as dubious, why not require registration at the outset? [[User:Jsanfilippo|Jsanfilippo]] 19:55, 5 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
It is difficult to discern the common sense in today’s copyright law.  It certainly makes sense that some expressions have value, and the author or assignee of copyright should have the ability to control the use of their valuable intellectual property.  There’s a difference, however, between the deliberate misappropriation of copyrighted material for commercial gain (or infliction of harm), and the casual innocent use of copyrighted material by an individual.  If I buy a newspaper and share it with several people on the train there’s no harm to the publisher.  If I read an article on their web site and email a copy to my friends, that action should be fine too.  While a blog has the potential for more viewers, it seems like a simple extension of social interaction.  I think it’s a travesty that Righthaven was able to prosecute these kinds of claims.  In contrast, the big commercial cases like Viacom v. YouTube, AFP v. Google, AP v. All Headline News and Gatehouse Media v. NYT all had a substantial monetary stake in the creation and dissemination of intellectual property.  Those seem to me to be the more suitable parties for questions of copyright infringement. [[User:ChrisSura|-Chris Sura]] 21:17, 5 April 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Interesting question: [http://paidcontent.org/article/419-have-media-companies-destroyed-their-copyrights-with-the-share-button/# Have Media Companies Destroyed Their Copyrights With The ‘Share’ Button?] --[[User:Gclinch|Gclinch]] 23:06, 3 April 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6469</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6469"/>
		<updated>2011-04-05T21:29:11Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
March 29 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
April 5 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-4.5.11-Copyright.pdf Slides: Copyright in Cyberspace]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6462</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6462"/>
		<updated>2011-04-04T19:24:04Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Assignment 4 Office Hours */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Internet and Society: Technologies and Politics of Control=&lt;br /&gt;
&#039;&#039;&#039;LSTU E–120 - Harvard Extension School - Spring 2011 - Tuesdays 5:30-7:30 pm EST&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/home/contact Berkman Center for Internet and Society] - 23 Everett Street - Conference room, 2nd floor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This course examines current legal, political, social, and technical struggles for control of the global Internet—and the content and relationships it conveys. The course focuses on the interaction of new technologies and services with emerging models of production, innovation, communication, learning, and civic engagement—looking at both the US and international contexts. Prerequisites: willingness to experiment with new technologies and to participate in class discussions, whether virtually or in person. (4 credits)  &#039;&#039;&#039;[[course overview|continued...]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Syllabus at a glance&#039;&#039;&#039;==&lt;br /&gt;
{| style=&amp;quot;background-color:#CCCCCC;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Jan 25&lt;br /&gt;
| [[Politics and Technology of Control: Introduction]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 1&lt;br /&gt;
| [[Paradigms for Studying the Internet]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 8&lt;br /&gt;
| [[New Economic Models]]&lt;br /&gt;
| &#039;&#039;(Assignment 1 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Feb 15&lt;br /&gt;
| [[Peer Production and Collaboration]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 22&lt;br /&gt;
| [[Collective Action and Decision-making]]&lt;br /&gt;
| &#039;&#039;(Assignment 2 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 1&lt;br /&gt;
| [[New and Old Media, Participation, and Information]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 8&lt;br /&gt;
| [[Law&#039;s Role in Regulating Online Conduct and Speech]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 15&lt;br /&gt;
| &#039;&#039;No class - Spring Break&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 22&lt;br /&gt;
| [[Regulating Speech Online]]&lt;br /&gt;
| &#039;&#039;(Assignment 3 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 29&lt;br /&gt;
| [[Internet Infrastructure and Regulation]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 5&lt;br /&gt;
| [[Copyright in Cyberspace]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 12&lt;br /&gt;
 |[[Control and Code: Privacy Online]] &lt;br /&gt;
| &#039;&#039;(Assignment 4 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Apr 19&lt;br /&gt;
| [[Internet and Democracy]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 26&lt;br /&gt;
| [[Internet and Democracy: The Sequel]]&lt;br /&gt;
|-&lt;br /&gt;
| May 3&lt;br /&gt;
| [[Cybersecurity and Cyberwarfare]]&lt;br /&gt;
|-&lt;br /&gt;
| May 10&lt;br /&gt;
|&#039;&#039;&#039;[[Final Project]] due&#039;&#039;&#039; (no class)&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Course Information:&#039;&#039;&#039;&lt;br /&gt;
* [[Class Participation]]&lt;br /&gt;
* [[Grading]]&lt;br /&gt;
* [[Statement on Plagiarism]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Assignments &amp;amp; Projects:&#039;&#039;&#039;&lt;br /&gt;
* [[Assignments]]&lt;br /&gt;
* [[Assigned Readings|Complete List of Assigned Readings]]&lt;br /&gt;
* [[Final Project]]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Resources:&#039;&#039;&#039;&lt;br /&gt;
* [[Recorded class videos]]&lt;br /&gt;
* [[Powerpoint Slides from Class]]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page How to edit a wiki]&lt;br /&gt;
* [http://www.extension.harvard.edu/resources/writing.jsp Extension School Writing Center]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;External:&#039;&#039;&#039;&lt;br /&gt;
* [[Upcoming Events]]&lt;br /&gt;
* [[In the news]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;People:&#039;&#039;&#039;&lt;br /&gt;
* [[Staff Contact Info]]&lt;br /&gt;
* [[List of User Profiles]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating During Class (Tuesdays 5:30-7:30 pm EST)&#039;&#039;&#039;==&lt;br /&gt;
* Attend in person at the Berkman Center for Internet &amp;amp; Society, 23 Everett St., Second Floor, Cambridge, MA 02138 ([http://cyber.law.harvard.edu/home/contact directions])&lt;br /&gt;
* Live audio/video stream available during class through [http://www.elluminate.com/ Elluminate.com]:&amp;lt;br&amp;gt;&lt;br /&gt;
** Our virtual classroom is located here: [https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE]&amp;lt;br&amp;gt;&lt;br /&gt;
** If you have trouble with Elluminate, please visit the Elluminate [http://www.elluminate.com/Support/?id=62 support website] or contact one of the class TAs&lt;br /&gt;
** If your are participating remotely we ask that you change your audio preferences in Elluminate to enable &#039;&#039;Mute the speaker when &amp;quot;talk&amp;quot; is pressed to prevent feedback.&#039;&#039;  You can find this option by going to &#039;&#039;&#039;Tools -&amp;gt; Preferences&#039;&#039;&#039;, and finding &#039;&#039;&#039;Speaker Settings&#039;&#039;&#039; under &#039;&#039;&#039;Audio&#039;&#039;&#039; in the left hand options tree.  Please have this box checked off. (More on how to do this [[Class Participation | here]].)&lt;br /&gt;
** &#039;&#039;&#039;For remote participants:&#039;&#039;&#039; to talk to the class in Cambridge during our regularly scheduled class time, please make sure to:&lt;br /&gt;
*** Set up and test your audio according to the instructions above&lt;br /&gt;
*** Raise your hand in Elluminate by clicking on the hand icon&lt;br /&gt;
*** Make sure that the Gain Volume next to your Talk button is at least at 60%. (You should adjust this manually if we can&#039;t hear you.)&lt;br /&gt;
*** When given the go ahead to talk, click the Talk button.&lt;br /&gt;
&lt;br /&gt;
* You may also IM to Rob or David directly via gtalk (or jabber): lstu.e120@gmail.com&lt;br /&gt;
* You may also IM the TAs directly via gtalk (or jabber): internetsociety2011@gmail.com&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating Asynchronously&#039;&#039;&#039;==&lt;br /&gt;
* The Elluminate sessions will be archived and accessible at [https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226 https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226]&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Contact Information&#039;&#039;&#039;==&lt;br /&gt;
* All questions, comments, etc. should be sent to: internetsociety2011@gmail.com&lt;br /&gt;
** There are no set office hours; feel free to send an email, and the TAs will respond to it as soon as they can.&lt;br /&gt;
* If you need to contact an instructor or TA individually, please use their personal contact info located on the [[Staff Contact Info]] page.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Assignment 4 Office Hours&#039;&#039;&#039;==&lt;br /&gt;
Rebekah and Alex will be available for 15-minute calls or text chats in preparation for Assignment #4 (paper drafts). &lt;br /&gt;
* Rebekah&lt;br /&gt;
** Thursday March 31, 3:30pm - 5:00pm EDT (also available in person at 23 Everett)&lt;br /&gt;
** Tuesday, April 5, 7:30-8:30pm EDT (immediately after class; available via phone/Skype/in person at 23 Everett)&lt;br /&gt;
* Alex&lt;br /&gt;
** Monday April 4, 5:00pm - 6:30pm EDT&lt;br /&gt;
** Thursday, April 7, 5-6pm EDT&lt;br /&gt;
Email internetsociety@gmail.com to schedule a meeting.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Student Feedback Poll&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/viewform?formkey=dFlTb2VPZkxlSjZfSjN5RXNzem94QUE6MQ&amp;amp;ifq Enter the poll!] (You have the opportunity to submit anonymous feedback.)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6451</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6451"/>
		<updated>2011-03-31T20:24:09Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Syllabus at a glance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Internet and Society: Technologies and Politics of Control=&lt;br /&gt;
&#039;&#039;&#039;LSTU E–120 - Harvard Extension School - Spring 2011 - Tuesdays 5:30-7:30 pm EST&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/home/contact Berkman Center for Internet and Society] - 23 Everett Street - Conference room, 2nd floor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This course examines current legal, political, social, and technical struggles for control of the global Internet—and the content and relationships it conveys. The course focuses on the interaction of new technologies and services with emerging models of production, innovation, communication, learning, and civic engagement—looking at both the US and international contexts. Prerequisites: willingness to experiment with new technologies and to participate in class discussions, whether virtually or in person. (4 credits)  &#039;&#039;&#039;[[course overview|continued...]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Syllabus at a glance&#039;&#039;&#039;==&lt;br /&gt;
{| style=&amp;quot;background-color:#CCCCCC;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Jan 25&lt;br /&gt;
| [[Politics and Technology of Control: Introduction]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 1&lt;br /&gt;
| [[Paradigms for Studying the Internet]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 8&lt;br /&gt;
| [[New Economic Models]]&lt;br /&gt;
| &#039;&#039;(Assignment 1 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Feb 15&lt;br /&gt;
| [[Peer Production and Collaboration]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 22&lt;br /&gt;
| [[Collective Action and Decision-making]]&lt;br /&gt;
| &#039;&#039;(Assignment 2 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 1&lt;br /&gt;
| [[New and Old Media, Participation, and Information]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 8&lt;br /&gt;
| [[Law&#039;s Role in Regulating Online Conduct and Speech]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 15&lt;br /&gt;
| &#039;&#039;No class - Spring Break&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 22&lt;br /&gt;
| [[Regulating Speech Online]]&lt;br /&gt;
| &#039;&#039;(Assignment 3 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 29&lt;br /&gt;
| [[Internet Infrastructure and Regulation]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 5&lt;br /&gt;
| [[Copyright in Cyberspace]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 12&lt;br /&gt;
 |[[Control and Code: Privacy Online]] &lt;br /&gt;
| &#039;&#039;(Assignment 4 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Apr 19&lt;br /&gt;
| [[Internet and Democracy]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 26&lt;br /&gt;
| [[Internet and Democracy: The Sequel]]&lt;br /&gt;
|-&lt;br /&gt;
| May 3&lt;br /&gt;
| [[Cybersecurity and Cyberwarfare]]&lt;br /&gt;
|-&lt;br /&gt;
| May 10&lt;br /&gt;
|&#039;&#039;&#039;[[Final Project]] due&#039;&#039;&#039; (no class)&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Course Information:&#039;&#039;&#039;&lt;br /&gt;
* [[Class Participation]]&lt;br /&gt;
* [[Grading]]&lt;br /&gt;
* [[Statement on Plagiarism]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Assignments &amp;amp; Projects:&#039;&#039;&#039;&lt;br /&gt;
* [[Assignments]]&lt;br /&gt;
* [[Assigned Readings|Complete List of Assigned Readings]]&lt;br /&gt;
* [[Final Project]]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Resources:&#039;&#039;&#039;&lt;br /&gt;
* [[Recorded class videos]]&lt;br /&gt;
* [[Powerpoint Slides from Class]]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page How to edit a wiki]&lt;br /&gt;
* [http://www.extension.harvard.edu/resources/writing.jsp Extension School Writing Center]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;External:&#039;&#039;&#039;&lt;br /&gt;
* [[Upcoming Events]]&lt;br /&gt;
* [[In the news]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;People:&#039;&#039;&#039;&lt;br /&gt;
* [[Staff Contact Info]]&lt;br /&gt;
* [[List of User Profiles]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating During Class (Tuesdays 5:30-7:30 pm EST)&#039;&#039;&#039;==&lt;br /&gt;
* Attend in person at the Berkman Center for Internet &amp;amp; Society, 23 Everett St., Second Floor, Cambridge, MA 02138 ([http://cyber.law.harvard.edu/home/contact directions])&lt;br /&gt;
* Live audio/video stream available during class through [http://www.elluminate.com/ Elluminate.com]:&amp;lt;br&amp;gt;&lt;br /&gt;
** Our virtual classroom is located here: [https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE]&amp;lt;br&amp;gt;&lt;br /&gt;
** If you have trouble with Elluminate, please visit the Elluminate [http://www.elluminate.com/Support/?id=62 support website] or contact one of the class TAs&lt;br /&gt;
** If your are participating remotely we ask that you change your audio preferences in Elluminate to enable &#039;&#039;Mute the speaker when &amp;quot;talk&amp;quot; is pressed to prevent feedback.&#039;&#039;  You can find this option by going to &#039;&#039;&#039;Tools -&amp;gt; Preferences&#039;&#039;&#039;, and finding &#039;&#039;&#039;Speaker Settings&#039;&#039;&#039; under &#039;&#039;&#039;Audio&#039;&#039;&#039; in the left hand options tree.  Please have this box checked off. (More on how to do this [[Class Participation | here]].)&lt;br /&gt;
** &#039;&#039;&#039;For remote participants:&#039;&#039;&#039; to talk to the class in Cambridge during our regularly scheduled class time, please make sure to:&lt;br /&gt;
*** Set up and test your audio according to the instructions above&lt;br /&gt;
*** Raise your hand in Elluminate by clicking on the hand icon&lt;br /&gt;
*** Make sure that the Gain Volume next to your Talk button is at least at 60%. (You should adjust this manually if we can&#039;t hear you.)&lt;br /&gt;
*** When given the go ahead to talk, click the Talk button.&lt;br /&gt;
&lt;br /&gt;
* You may also IM to Rob or David directly via gtalk (or jabber): lstu.e120@gmail.com&lt;br /&gt;
* You may also IM the TAs directly via gtalk (or jabber): internetsociety2011@gmail.com&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating Asynchronously&#039;&#039;&#039;==&lt;br /&gt;
* The Elluminate sessions will be archived and accessible at [https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226 https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226]&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Contact Information&#039;&#039;&#039;==&lt;br /&gt;
* All questions, comments, etc. should be sent to: internetsociety2011@gmail.com&lt;br /&gt;
** There are no set office hours; feel free to send an email, and the TAs will respond to it as soon as they can.&lt;br /&gt;
* If you need to contact an instructor or TA individually, please use their personal contact info located on the [[Staff Contact Info]] page.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Assignment 4 Office Hours&#039;&#039;&#039;==&lt;br /&gt;
Rebekah and Alex will be available for 15-minute calls or text chats in preparation for Assignment #4 (paper drafts). &lt;br /&gt;
* Rebekah&lt;br /&gt;
** Thursday March 31, 3:30pm - 5:00pm EST (also available in person at 23 Everett)&lt;br /&gt;
* Alex&lt;br /&gt;
** Monday April 4, 5:00pm - 6:30pm EST&lt;br /&gt;
Email internetsociety@gmail.com to schedule a meeting.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Student Feedback Poll&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/viewform?formkey=dFlTb2VPZkxlSjZfSjN5RXNzem94QUE6MQ&amp;amp;ifq Enter the poll!] (You have the opportunity to submit anonymous feedback.)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6447</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6447"/>
		<updated>2011-03-29T22:13:12Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6446</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6446"/>
		<updated>2011-03-29T22:13:02Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
&lt;br /&gt;
{{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6445</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6445"/>
		<updated>2011-03-29T22:12:22Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6444</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6444"/>
		<updated>2011-03-29T22:12:09Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6443</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Submissions&amp;diff=6443"/>
		<updated>2011-03-29T22:11:44Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
This assignment is due on April 12.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Link to both your rough draft and, if applicable, your extra credit below (either by [http://cyber.law.harvard.edu/is2011/Special:Upload uploading it to the wiki] or by linking to an external site) along with the explanatory paragraph on your extra credit assignment.  Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Please use the following template to submit your assignment.  In order to do this, copy and paste the code below, replacing the name, etc. with your information:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{Assignment4|Name|Title|Link|Bonus title|Bonus link}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{Assignment4|Name|Title of rough draft|http://foo.bar|Title of bonus credit|http://2.foo.bar}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Template:Assignment4&amp;diff=6442</id>
		<title>Template:Assignment4</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Template:Assignment4&amp;diff=6442"/>
		<updated>2011-03-29T22:11:19Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;text-align:left; background-color:#ffffcc;&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;Name:&#039;&#039;&#039;&lt;br /&gt;
|{{{1}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Title of Rough Draft:&#039;&#039;&#039; &lt;br /&gt;
|&amp;lt;span style=&amp;quot;color:#FF0080&amp;quot;&amp;gt;&#039;&#039;&#039;{{{2}}}&#039;&#039;&#039;&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Link to Rough Draft:&#039;&#039;&#039; &lt;br /&gt;
|{{{3}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Title of Bonus Assignment:&#039;&#039;&#039; &lt;br /&gt;
|{{{4}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Link to Bonus Assignment:&#039;&#039;&#039; &lt;br /&gt;
|{{{5}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Timestamp:&#039;&#039;&#039; &lt;br /&gt;
|{{LOCALTIME}}: {{LOCALDAY}} {{LOCALMONTHNAME}}, {{CURRENTYEAR}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Template:Assignment4&amp;diff=6441</id>
		<title>Template:Assignment4</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Template:Assignment4&amp;diff=6441"/>
		<updated>2011-03-29T22:07:23Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: New page: &amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;  {| border=&amp;quot;1&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;text-align:left; background-color:#ffffcc;&amp;quot; |&amp;#039;&amp;#039;&amp;#039;Name:&amp;#039;&amp;#039;&amp;#039; |{{{1}}} |- |&amp;#039;&amp;#039;&amp;#039;Title of Rough Draft:&amp;#039;&amp;#039;&amp;#039;  |&amp;lt;span style=&amp;quot;color:#FF0080&amp;quot;&amp;gt;&amp;#039;&amp;#039;&amp;#039;{{{2}}}&amp;#039;...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;text-align:left; background-color:#ffffcc;&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;Name:&#039;&#039;&#039;&lt;br /&gt;
|{{{1}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Title of Rough Draft:&#039;&#039;&#039; &lt;br /&gt;
|&amp;lt;span style=&amp;quot;color:#FF0080&amp;quot;&amp;gt;&#039;&#039;&#039;{{{2}}}&#039;&#039;&#039;&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Link to Rough Draft:&#039;&#039;&#039; &lt;br /&gt;
|{{{3}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Title of Bonus Assignment:&#039;&#039;&#039; &lt;br /&gt;
|{{{4}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Link to Bonus Assignment:&#039;&#039;&#039; &lt;br /&gt;
|{{{5}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Timestamp:&#039;&#039;&#039; &lt;br /&gt;
|{{LOCALTIME}}: {{LOCALDAY}} {{LOCALMONTHNAME}}, {{CURRENTYEAR}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6440</id>
		<title>Assignment 4 Details and Links</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6440"/>
		<updated>2011-03-29T22:03:48Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Due April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Group_Work|You may work in groups]]&#039;&#039;&#039;, provided you have submitted a short paragraph to the instructors by March 1 explaining why a group approach to your proposed topic for the final project makes sense.&lt;br /&gt;
&lt;br /&gt;
This assignment will be to turn in a rough draft of your final, 8-10 page final project paper. It will be a chance for us to give you some comments, and suggest some places to push your research project forward in the next few weeks. &lt;br /&gt;
&lt;br /&gt;
It&#039;s also an opportunity to get some extra credit. If you are interested, you may create an audiovisual work discussing and presenting your research to date. The work could be an audio file (such as a podcast), a video (such as a remix or animation), or an in-class presentation. You should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). These may be presented in class.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Submit your rough draft (and your extra credit, if applicable) here: [[Assignment 4 Submissions]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Format==&lt;br /&gt;
Your paper should be 8-10 pages long, double spaced, and use a [http://en.wikipedia.org/wiki/Serif serif] font (Times New Roman, Cambria, etc.).  Please upload your paper as a .doc, a .odt, or a .pdf.&lt;br /&gt;
&lt;br /&gt;
You may use any commonly accepted style to cite your sources (Chicago, MLA, etc.), but please be consistent.&lt;br /&gt;
&lt;br /&gt;
==Assignment 4 Office Hours==&lt;br /&gt;
Rebekah and Alex will be available for 15-minute calls or text chats in preparation for Assignment #4 (paper drafts). &lt;br /&gt;
* Rebekah&lt;br /&gt;
** Thursday March 31, 3:30pm - 5:00pm EST (also available in person at 23 Everett)&lt;br /&gt;
* Alex&lt;br /&gt;
** Monday April 4, 5:00pm - 6:30pm EST&lt;br /&gt;
Email internetsociety@gmail.com to schedule a meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Bonus Credit ==&lt;br /&gt;
&lt;br /&gt;
This bonus credit consists of an audiovisual work of your creation, and should be based on your draft. The work could be an audio file (such as a podcast or song), a video (such as a remix or animation), or a compelling image (such as a mindmap or photo montage). If an audio or video work, you should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). &lt;br /&gt;
&lt;br /&gt;
Possible ideas include:&lt;br /&gt;
&lt;br /&gt;
*An audio podcast or video interview with someone doing influential work related to your project&lt;br /&gt;
*A video medley and/or remix&lt;br /&gt;
*A podcast show in which participants debate the topic&lt;br /&gt;
*A [http://en.wikipedia.org/wiki/Mind_Map mindmap] image that charts out a policy debate or domain&lt;br /&gt;
*A photo montage&lt;br /&gt;
*A short film&lt;br /&gt;
*A song or musical work drawing from various samples such as those on [http://freesound.iua.upf.edu Freesound]&lt;br /&gt;
*A song with lyrics&lt;br /&gt;
*A visualization, perhaps using [http://services.alphaworks.ibm.com/manyeyes/home Many Eyes]&lt;br /&gt;
&lt;br /&gt;
== Uploading Your Bonus Work==&lt;br /&gt;
&lt;br /&gt;
Examples of online services you may use to post your bonus work include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Video:&#039;&#039;&#039;&lt;br /&gt;
*[http://youtube.com Youtube]&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
*[http://video.google.com Google Video]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Audio:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.ccmixter.com ccMixter] (for music; note: music must be licensed under a [http://www.creativecommons.org Creative Commons] license&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Image:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
&lt;br /&gt;
== Tools and Tutorials ==&lt;br /&gt;
* Audio&lt;br /&gt;
** [http://audacity.sourceforge.net/ Audacity] ([http://www.edhsonline.org/other/audacity/ introduction tutorial], [http://audacity.sourceforge.net/help/documentation more FAQs and Tutorials])&lt;br /&gt;
* Video&lt;br /&gt;
** Mac OS X: iMovie ([http://www.apple.com/ilife/tutorials/#imovie]) or Final Cut&lt;br /&gt;
** Windows: [http://www.avid.com/freedv/ Avid FreeDV] ([http://www.avid.com/freedv/tutorials/index.asp tutorial])&lt;br /&gt;
*Screencast (Screencasting is taking a video of your computer desktop, while you manipulate it) &lt;br /&gt;
**[http://en.wikipedia.org/wiki/Screencast Screencast]&lt;br /&gt;
**[http://en.wikipedia.org/wiki/List_of_screen_recording_software List of screen recording software]&lt;br /&gt;
&lt;br /&gt;
* Video Game / Animation&lt;br /&gt;
** [http://scratch.mit.edu/home/index Scratch]&lt;br /&gt;
* Other&lt;br /&gt;
** [http://en.wikipedia.org/wiki/List_of_Mind_Mapping_software Mind Mapping Software]&lt;br /&gt;
&lt;br /&gt;
== Examples of Finished Products==&lt;br /&gt;
&#039;&#039;(some of these are more highly produced or effort-intensive than your projects need be, but they should give you a sense for what finished pieces look like)&#039;&#039;&lt;br /&gt;
* [http://www.flickr.com/photos/further/404587997/ Mind Map of Democracy and the Internet] by John Palfrey (partial snapshot)&lt;br /&gt;
* [http://thoughtcast.org/casts/beyond-broadcast-2007 Interviews from Beyond Broadcast] on Thoughtcast&lt;br /&gt;
&lt;br /&gt;
== Assignment Four Submissions ==&lt;br /&gt;
&lt;br /&gt;
Post your submissions here: [[Assignment 4 Submissions]]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6439</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Main_Page&amp;diff=6439"/>
		<updated>2011-03-29T22:01:04Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Assignment 4 Office Hours */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Internet and Society: Technologies and Politics of Control=&lt;br /&gt;
&#039;&#039;&#039;LSTU E–120 - Harvard Extension School - Spring 2011 - Tuesdays 5:30-7:30 pm EST&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/home/contact Berkman Center for Internet and Society] - 23 Everett Street - Conference room, 2nd floor&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This course examines current legal, political, social, and technical struggles for control of the global Internet—and the content and relationships it conveys. The course focuses on the interaction of new technologies and services with emerging models of production, innovation, communication, learning, and civic engagement—looking at both the US and international contexts. Prerequisites: willingness to experiment with new technologies and to participate in class discussions, whether virtually or in person. (4 credits)  &#039;&#039;&#039;[[course overview|continued...]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Syllabus at a glance&#039;&#039;&#039;==&lt;br /&gt;
{| style=&amp;quot;background-color:#CCCCCC;&amp;quot;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Jan 25&lt;br /&gt;
| [[Politics and Technology of Control: Introduction]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 1&lt;br /&gt;
| [[Paradigms for Studying the Internet]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 8&lt;br /&gt;
| [[New Economic Models]]&lt;br /&gt;
| &#039;&#039;(Assignment 1 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Feb 15&lt;br /&gt;
| [[Peer Production and Collaboration]]&lt;br /&gt;
|-&lt;br /&gt;
| Feb 22&lt;br /&gt;
| [[Collective Action and Decision-making]]&lt;br /&gt;
| &#039;&#039;(Assignment 2 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 1&lt;br /&gt;
| [[New and Old Media, Participation, and Information]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 8&lt;br /&gt;
| [[Law&#039;s Role in Regulating Online Conduct and Speech]]&lt;br /&gt;
|-&lt;br /&gt;
| Mar 15&lt;br /&gt;
| &#039;&#039;No class - Spring Break&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 22&lt;br /&gt;
| [[Regulating Speech Online]]&lt;br /&gt;
| &#039;&#039;(Assignment 3 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Mar 29&lt;br /&gt;
| [[Internet Infrastructure and Regulation]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 5&lt;br /&gt;
| [[Copyright in Cyberspace]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 12&lt;br /&gt;
 |[[Control and Code: Privacy Online]] &lt;br /&gt;
| &#039;&#039;(Assignment 4 due)&#039;&#039;&lt;br /&gt;
|-&lt;br /&gt;
| Apr 19&lt;br /&gt;
| [[Internet and Democracy]]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 26&lt;br /&gt;
| [[Internet and Democracy: The Sequel]]&lt;br /&gt;
|-&lt;br /&gt;
| May 3&lt;br /&gt;
| [[Cybersecurity and Cyberwarfare]]&lt;br /&gt;
|-&lt;br /&gt;
| May 10&lt;br /&gt;
|&#039;&#039;&#039;[[Final Project]] due&#039;&#039;&#039; (no class)&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{|border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
|-valign=&amp;quot;top&amp;quot;&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Course Information:&#039;&#039;&#039;&lt;br /&gt;
* [[Class Participation]]&lt;br /&gt;
* [[Grading]]&lt;br /&gt;
* [[Statement on Plagiarism]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Assignments &amp;amp; Projects:&#039;&#039;&#039;&lt;br /&gt;
* [[Assignments]]&lt;br /&gt;
* [[Assigned Readings|Complete List of Assigned Readings]]&lt;br /&gt;
* [[Final Project]]&lt;br /&gt;
&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;Resources:&#039;&#039;&#039;&lt;br /&gt;
* [[Recorded class videos]]&lt;br /&gt;
* [[Powerpoint Slides from Class]]&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page How to edit a wiki]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;External:&#039;&#039;&#039;&lt;br /&gt;
* [[Upcoming Events]]&lt;br /&gt;
* [[In the news]]&lt;br /&gt;
|&lt;br /&gt;
&#039;&#039;&#039;People:&#039;&#039;&#039;&lt;br /&gt;
* [[Staff Contact Info]]&lt;br /&gt;
* [[List of User Profiles]]&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating During Class (Tuesdays 5:30-7:30 pm EST)&#039;&#039;&#039;==&lt;br /&gt;
* Attend in person at the Berkman Center for Internet &amp;amp; Society, 23 Everett St., Second Floor, Cambridge, MA 02138 ([http://cyber.law.harvard.edu/home/contact directions])&lt;br /&gt;
* Live audio/video stream available during class through [http://www.elluminate.com/ Elluminate.com]:&amp;lt;br&amp;gt;&lt;br /&gt;
** Our virtual classroom is located here: [https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE https://sas.elluminate.com/m.jnlp?sid=2010226&amp;amp;password=M.A6ADC1B59710132C0FD422DAA89AEE]&amp;lt;br&amp;gt;&lt;br /&gt;
** If you have trouble with Elluminate, please visit the Elluminate [http://www.elluminate.com/Support/?id=62 support website] or contact one of the class TAs&lt;br /&gt;
** If your are participating remotely we ask that you change your audio preferences in Elluminate to enable &#039;&#039;Mute the speaker when &amp;quot;talk&amp;quot; is pressed to prevent feedback.&#039;&#039;  You can find this option by going to &#039;&#039;&#039;Tools -&amp;gt; Preferences&#039;&#039;&#039;, and finding &#039;&#039;&#039;Speaker Settings&#039;&#039;&#039; under &#039;&#039;&#039;Audio&#039;&#039;&#039; in the left hand options tree.  Please have this box checked off. (More on how to do this [[Class Participation | here]].)&lt;br /&gt;
** &#039;&#039;&#039;For remote participants:&#039;&#039;&#039; to talk to the class in Cambridge during our regularly scheduled class time, please make sure to:&lt;br /&gt;
*** Set up and test your audio according to the instructions above&lt;br /&gt;
*** Raise your hand in Elluminate by clicking on the hand icon&lt;br /&gt;
*** Make sure that the Gain Volume next to your Talk button is at least at 60%. (You should adjust this manually if we can&#039;t hear you.)&lt;br /&gt;
*** When given the go ahead to talk, click the Talk button.&lt;br /&gt;
&lt;br /&gt;
* You may also IM to Rob or David directly via gtalk (or jabber): lstu.e120@gmail.com&lt;br /&gt;
* You may also IM the TAs directly via gtalk (or jabber): internetsociety2011@gmail.com&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Participating Asynchronously&#039;&#039;&#039;==&lt;br /&gt;
* The Elluminate sessions will be archived and accessible at [https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226 https://sas.elluminate.com/site/external/recording/playback/link/table/meeting?suid=M.9E197D693E21933E6609EF2F4D1401&amp;amp;sid=2010226]&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Contact Information&#039;&#039;&#039;==&lt;br /&gt;
* All questions, comments, etc. should be sent to: internetsociety2011@gmail.com&lt;br /&gt;
** There are no set office hours; feel free to send an email, and the TAs will respond to it as soon as they can.&lt;br /&gt;
* If you need to contact an instructor or TA individually, please use their personal contact info located on the [[Staff Contact Info]] page.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Assignment 4 Office Hours&#039;&#039;&#039;==&lt;br /&gt;
Rebekah and Alex will be available for 15-minute calls or text chats in preparation for Assignment #4 (paper drafts). &lt;br /&gt;
* Rebekah&lt;br /&gt;
** Thursday March 31, 3:30pm - 5:00pm EST (also available in person at 23 Everett)&lt;br /&gt;
* Alex&lt;br /&gt;
** Monday April 4, 5:00pm - 6:30pm EST&lt;br /&gt;
Email internetsociety@gmail.com to schedule a meeting.&lt;br /&gt;
&lt;br /&gt;
==&#039;&#039;&#039;Student Feedback Poll&#039;&#039;&#039;==&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/viewform?formkey=dFlTb2VPZkxlSjZfSjN5RXNzem94QUE6MQ&amp;amp;ifq Enter the poll!] (You have the opportunity to submit anonymous feedback.)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6428</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6428"/>
		<updated>2011-03-29T21:39:49Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
March 29 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Regulating_Speech_Online&amp;diff=6427</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Regulating_Speech_Online&amp;diff=6427"/>
		<updated>2011-03-29T21:39:27Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. It is a profoundly democratizing force. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can &amp;quot;become a town crier with a voice that resonates farther than it could from any soapbox.&amp;quot;  Reno v. ACLU, 521 U.S. 884, 896-97 (1997). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, with the rise of web 2.0, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a national (and global) audience with virtually no oversight? How can a society protect its children from porn and its inboxes from spam?  Does defamation law apply to online publishers in the same way it applied to newspapers and other traditional print publications? Is online anonymity part of a noble tradition in political discourse stretching back to the founding fathers or the electronic equivalent of graffiti on the bathroom wall?  In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.  &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf Slides: Regulating Speech Online]&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3 due]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Parts I &amp;amp; II)&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230]&lt;br /&gt;
* [http://www.nytimes.com/2010/02/25/technology/companies/25google.html Larger Threat is Seen in Google Case NYT]&lt;br /&gt;
* [http://www.portfolio.com/news-markets/national-news/portfolio/2009/02/11/Two-Lawyers-Fight-Cyber-Bullying/index.html David Margolick, &amp;quot;Slimed Online,&amp;quot; Portfolio.com, February 11, 2009, read all]&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey and Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks,&amp;quot; Ars Technica, March 5, 2009, read all]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Wikipedia on Reno v. ACLU].&lt;br /&gt;
* [http://www.socialtext.net/codev2/index.cgi?free_speech Lawrence Lessig, Code 2.0, Chapter 12: Free Speech]&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1689865 David Ardia, Reputation in a Networked World: Revisiting the Social Foundations of Defamation Law] (Part III) &lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
Regarding the AutoaAdmit case, does anyone have further details on what happened with Anthony Ciolli&#039;s countersuit against the two women and their legal advisor? For further reading on cyberbullying, defamation, privacy etc. an excellent book of essays is The Offensive Internet, edited by Saul Levmore and Martha Nussbaum.[[User:Mary Van Gils|Mary Van Gils]] 21:21, 22 March 2011 (UTC) &lt;br /&gt;
&lt;br /&gt;
This comment really applies to a previous class, but you might be interested in reading about the latest counter-tactics in the struggle for a &amp;quot;borderless Internet&amp;quot; against government control in this article: [http://www.economist.com/node/18386151 Unorthodox links to the internet: Signalling dissent] [[User:Smithbc|Smithbc]] 16:56, 19 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Though the introduction to this session states that &amp;quot;nstead of large media companies and corporate advertisers controlling the channels of speech...&amp;quot;, we&#039;ve reached a point where intermediaries--Facebook, Google, etc--are essentially controlling online speech.  Our networks have landed in private, corporate, centralized locations. I hope that we&#039;ll be adding intermediary censorship to the discussion :) [[User:Jyork|Jyork]] 00:02, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Another story in the vein of &amp;quot;AutoAdmit&amp;quot; out right now is at [http://www.smh.com.au/technology/technology-news/cut-and-die-the-web-loves-to-hate-rebecca-black-20110321-1c2tz.html &#039;Cut and die&#039;: the web loves to hate Rebecca Black] About a 13-year old cut-and-paste singer who has become popular on You-Tube for all the wrong reasons; she is receiving death threats via user comments and web discussions. [[User:Smithbc|Smithbc]] 00:23, 22 March 2011 (UTC)&lt;br /&gt;
 &lt;br /&gt;
To my knowledge, in US, you have different laws for intermediary liability for speech online (sec 230) and copyright (DMCA), maybe even more. In EU, there are 4 articles in one single act governing liability of ISPs. Especially for hosting providers one specific art. 14. For those interested, here is a link to Ecomerce Directive containing (see art. 12 to 15, hosting providers art. 14) [http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000L0031:en:NOT]. Comparing art. 14(1)b and art. 14(2) of the EC directive with sec. 320 plus explanation of what is publisher and distributor liability from first reading, conclusion is that in EU, hosting provider would be liable under similarly as a distributor or publisher as in US. There are problems with EU legal framework and liability of ISPs and currently it is under review. If you read art. 14 you might realise what can be problem. There is no explanation of terms, such as &#039;actual knowledge&#039;or &#039;expediously&#039;. Or even how should &#039;notice and take down&#039; procedure look like when comparing it to DMCA. It will be interesting to see how the law will change in future. Hopeully in near future:)As regard to google case in Italy, although I was aware of the issue, I did no read decision and can not say my opinion based only on the article read. However, based on my information, I would say that this was exceptional case in EU, and would not therefore make some outcome about threat in EU only based on this case.[[User:VladimirTrojak|VladimirTrojak]] 16:56, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
FWIW, I meant not intermediary liability, but intermediary censorship; e.g., Amazon&#039;s takedown of Wikileaks or Facebook removing Egyptian protest groups.[[User:Jyork|Jyork]] 21:21, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
I wonder whether Section 230 of the Communications Decency Act would follow the footsteps of so-called journalist&#039;s privilege. As the emergence of millions of amateur reporters and publishers, the conventional definition of journalist&#039;s privilege is rather obsolete now. Likewise, the act which was enacted more than a decade ago seems to not hold the effectiveness any more. There is literally a tremendous number of interactive computer service providers and we have witnessed numerous side-effects burgeoning with the widespread of the online communities. Would it be still okay to give immunity to these providers? --[[User:Yu Ri|Yu Ri]] 19:33, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/User:Yu_Ri Yu Ri,] I am disappointed that we ran out of time in class to have the full discussion you propose. Perhaps we can continue in this forum. &lt;br /&gt;
 &lt;br /&gt;
From my perspective [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Section 230 of the Communications Decency Act] protecting internet intermediaries has had many undesirable unintended consequences.  At the same time, however, it is impossible to know what today’s internet would be like if Section 230 were not made law and not have survived the [http://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union Reno v. ACLU] challenge. The internet and the offline world for that matter would surely be significantly different.  &lt;br /&gt;
&lt;br /&gt;
One thing that probably would have happened is that large numbers of companies that today provide internet based intermediary services would not be in the business because of the costs incurred due of the threat of law suits. &lt;br /&gt;
&lt;br /&gt;
What if one of those companies that decided the costs related to the risk of litigation was too high was google? What if google’s investors decided they could make more money by investing in some other industry and chose not to fund google? How different would our world be? I think of things in the real world that might not be the same. &lt;br /&gt;
&lt;br /&gt;
For instance, what might have happened in Egypt if [http://www.cbsnews.com/8301-503543_162-20030485-503543.html Wael Ghonim] had not found a job at google and followed a different career path? Would the changes we are seeing all across the globe have happened if the social networking tools used so effectively by dissidents never came into existence without Section 230? &lt;br /&gt;
&lt;br /&gt;
Very interesting questions and I’d like to hear your thoughts and those of others in the class. Thanks! --[[User:Gclinch|Gclinch]] 02:29, 23 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A very interesting study on &#039;Four Phases of Internet Regulation&#039;. It talk about how the concept of internet regulation has changed since its early day to present times:&lt;br /&gt;
[http://www.law.harvard.edu/faculty/faculty-workshops/palfrey.faculty.workshop.summer.2010.pdf Four Phases of Internet Regulation][[User:syedshirazi|SyedShirazi]] 21:53, 22 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In professor Lessig’s [http://www.socialtext.net/codev2/index.cgi?free_speech Chapter 12: Free Speech] he makes the well reasoned proposal that a system to protect children from unwanted speech on the internet would be to implement the browser tag &amp;lt;H2M&amp;gt;. I well understand his reasoning and it makes a great deal of sense. In suggesting how to accomplish universal acceptance of this technique professor Lessig says, “This is the role for government.”&lt;br /&gt;
&lt;br /&gt;
Now I haven’t finished his book and knowing how well he backs his arguments I won’t be surprised to find he has tackled this question but until I get there I must ask: Do we really want government to get into the business of legislating actual code? &lt;br /&gt;
&lt;br /&gt;
Professor Lessig’s point that “code is law” teaches us that the code writer can be the secret hand that regulates us by the choices made when programs are written. For instance when we are in a virtual environment we are limited in what we can do substantially by the choices that the programmer has made when she wrote the program.  I think it is the legitimate role of government to protect us from the undue influence of the coder, especially when the software involved might be used by an intermediary who has been granted special status by [http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Communications Decency Act § 230.]  &lt;br /&gt;
&lt;br /&gt;
I’m not so sure that we should carry the logic to the next level by saying that it is government’s role to actually dictate aspects of code. Classmates: what do you think? --[[User:Gclinch|Gclinch]] 01:49, 23 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Recently during the height of confusion about the disasters in Japan there was a case involving the posting of a highly offensive Youtube video by a UCLA student that at best insensitively mocked Asian peers.  While the school chose not to take disciplinary action claiming that her video did not violate school policy, the community at large took action by shunning and harassing her to the point she withdrew from the school. UCLA is also being criticized by academics of race and gender stating that the objectification of Asians in the video is harmful and displays a deep rooted often overlooked racism that falls outside of the black/white paradigm.  It has been recommended that UCLA should promote a more multicultural understanding and sensitivity by introducing mandatory courses and/or workshops.  I understand how this video and the girl&#039;s views are protected as free speech regardless of how repugnant her words are, but I also find it deeply disturbing that the video went viral mainly due to morbid curiosity.  A good analysis of the deeper harmful racist views and effeccts can be read here [http://www.insidehighered.com/news/2011/03/22/ucla_student_s_youtube_video_illustrates_many_asian_racial_stereotypes?loc=interstitialskip UCLA Student&#039;s Youtube Video Illustrates Many Asain Racial Stereotypes].  While there may be no legal action that can be taken toward a video of this nature, we as a culture unwittingly make it popular and far reaching through multiple views and backlash videos which is something I think we should all think about before we click on that next &amp;quot;shocking&amp;quot; link.  With such ease of access to such content on the internet I think that there comes a personal responsibility as to what goes viral for the wrong reasons, and what just gets lost in the far corners of the internet. [[User:Deinous|Deinous]] 02:14, 25 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This article from the NY Times takes issues from the AutoAdmit case even farther. It deals with teens, sexually explicit photos and texting. Again, what speech is protected? What is not? What about cyberbulling among teens as opposed to adults? Is there any kind of legal relief that the target can seek?  http://www.nytimes.com/2011/03/27/us/27sexting.html&lt;br /&gt;
--[[User:SCL|SCL]] 14:00, 28 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;br /&gt;
&lt;br /&gt;
Slides for today&#039;s class: [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011-3.22.11-Regulating_Speech_Online.ppt.pdf]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Internet_Infrastructure_and_Regulation&amp;diff=6425</id>
		<title>Internet Infrastructure and Regulation</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Internet_Infrastructure_and_Regulation&amp;diff=6425"/>
		<updated>2011-03-29T21:35:30Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; text-align: center;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Syllabus&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; cellspacing=&amp;quot;4&amp;quot; cellpadding=&amp;quot;4&amp;quot; style=&amp;quot;background:#eeeeff; text-align: left;&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
* [[Politics and Technology of Control: Introduction|Jan 25]]&lt;br /&gt;
* [[Paradigms for Studying the Internet|Feb 1]]&lt;br /&gt;
* [[New Economic Models|Feb 8]]&lt;br /&gt;
* [[Peer Production and Collaboration|Feb 15]]&lt;br /&gt;
* [[Collective Action and Decision-making|Feb 22]]&lt;br /&gt;
* [[New and Old Media, Participation, and Information|Mar 1]]&lt;br /&gt;
* [[Law&#039;s Role in Regulating Online Conduct and Speech|Mar 8]]&lt;br /&gt;
* Mar 15 - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
| &lt;br /&gt;
* [[Regulating Speech Online|Mar 22]]&lt;br /&gt;
* [[Internet Infrastructure and Regulation|Mar 29]]&lt;br /&gt;
* [[Copyright in Cyberspace|Apr 5]]&lt;br /&gt;
* [[Control and Code: Privacy Online|Apr 12]] &lt;br /&gt;
* [[Internet and Democracy|Apr 19]]&lt;br /&gt;
* [[Internet and Democracy: The Sequel|Apr 26]]&lt;br /&gt;
* [[Cybersecurity and Cyberwarfare|May 3]]&lt;br /&gt;
* [[Final Project|May 10]] - &#039;&#039;No class&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br clear=&amp;quot;right&amp;quot; /&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;March 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
In this class, we will cover the politics, policy, economics and technology of deploying broadband infrastructure.  We will look at the year-old US National Broadband Plan and the Berkman Center review of international experiences in broadband policy. Additionally, we will look at the substance and politics of the net neutrality debate. &lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* Executive Summary of the National Broadband Plan [http://www.broadband.gov/plan/executive-summary/]&lt;br /&gt;
&lt;br /&gt;
* National Broadband Plan Commission Meeting: National Purposes Update, February 18th 2010 [http://hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-296353A1.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world, Berkman Center [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Berkman_Center_Broadband_Final_Report-C1_15Feb2010.pdf ]&lt;br /&gt;
&lt;br /&gt;
* Net Neutrality 101 [http://www.savetheinternet.com/frequently-asked-questions?gclid=CKbclcK65KcCFULf4AodaxmJCg]&lt;br /&gt;
&lt;br /&gt;
* More Confusion about Internet Freedom [http://techliberation.com/2011/03/01/more-confusion-about-internet-freedom/]&lt;br /&gt;
&lt;br /&gt;
* Hands Off the Internet [http://www.youtube.com/watch?v=tlhSbJYxOnc]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.fcc.gov The Federal Communications Commission]&lt;br /&gt;
* [http://www.broadband.gov National Broadband Plan]&lt;br /&gt;
* [http://www.openinternet.gov OpenInternet.gov]&lt;br /&gt;
* [http://www.ietf.org The Internet Engineering Task Force (IETF)]&lt;br /&gt;
* [http://www.icann.org The Internet Corporation for Assigned Names and Numbers]&lt;br /&gt;
* [http://www.fcc.gov/Reports/tcom1996.txt The Telecommunications Act of 1996]&lt;br /&gt;
* [http://wireless.fcc.gov/auctions/default.htm?job=auctions_home  FCC - Wireless Spectrum Auctions]&lt;br /&gt;
* [http://www.isp-planet.com/cplanet/tech/2004/prime_letter_040301_powell.html Powell&#039;s Four Freedoms]&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
A number of things came to mind during the readings.  The one that I&#039;d like to discuss here is what the economic impact on startup and small businesses and the potential negative effects pipeline tiering might have on the US economy.  Pipeline tiering could and most likely would have a negative effect on the US economy if small and startup businesses seek creating revenue in other countries due to class A and class B access by US ISP&#039;s. This said, it could mean many companies opting not to setup shop in the US.  This in turn means less innovation within our own borders.  In the end the ISP&#039;s lose out on a source of revenue and the US loses it&#039;s position as world class innovator.&lt;br /&gt;
&lt;br /&gt;
Further, if another country dictates that all content is free to anyone, how can it be enforced if our own ISP&#039;s charge a tier pricing to access such sites, data and content?  It would also be a requirement for protection of such sources to be made law or included in the requirement to pay for access.  But how do you collect against a foreign country where the services are housed?  Are this ISP&#039;s really thinking this through?  Are they prepared to lose a large amount of business to foreign providers?  To the majority of us we would not notice if we are going to say the UK for content.&lt;br /&gt;
&lt;br /&gt;
If Sealand were still in existence would it help protect against the possibility of tiered charges?&lt;br /&gt;
--[[User:Adavies01|Adavies01]] 20:38, 29 March 2011 (UTC)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A follow-up to our discussion on limits to free speech and indirect political pressure on third-party private intermediaries.  In this case, four senators are &amp;quot;requesting&amp;quot; Google, Apple, and RIM (maker of Blackberry) to remove apps from their device app stores that identify police DUI checkpoints.  This article is the more passionate and argues for the freedom-of-speech angle: [http://www.eweek.com/c/a/Mobile-and-Wireless/Senators-Pressure-Mobile-App-Stores-to-Kill-Politically-Incorrect-Apps-337124/ Senators Pressure Mobile App Stores to Kill Politically Incorrect Apps.]  While this one is more neutral: [http://news.yahoo.com/s/pcworld/20110323/tc_pcworld/groupsdefenddrunkdrivingcheckpointsoftware Groups Defend Drunk-driving Checkpoint Software.]  But it certainly looks like we&#039;ll see more and more instances of individuals in congress finding favorite online bogeymen to show how patriotic/principled/family-valued/tough-on-crime/fill-in-the-blank they can be! [[User:Smithbc|Smithbc]] 07:05, 24 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
*[http://cyber.law.harvard.edu/is2011/User:Smithbc Smithbc] thanks for pointing out this topic. There’s a couple of interesting discussion topics here. One is, if the purpose of drunken driving checkpoints is to get drunk drivers off the road, why would you combat a technology that would allow a potential offender to see active checkpoints before leaving the bar and maybe think twice, get a cab or stay home? It’s like people being pulled over for flashing their lights at oncoming traffic to let others know about a speed trap or ticketing for speed trap scanners in cars. If the purpose is to get people to slow down, don’t all of these accomplish the goals as much as the presence of enforcement? Of course for this logic to be valid one must assume that the goal is keeping drunk drivers off the road and slowing people down as opposed to arrest quotas and the revenue associated with fines. &lt;br /&gt;
&lt;br /&gt;
-- Putting the soapbox aside, a more focused question about the above related to the topics of class is: is it an effective policy tool to attack one set of social problems by diminishing the fundamental rights insured by the First Amendment or aren’t there many other innovative and direct ways? How about directing enforcement or remediation at the offenders instead of stripping the rest of society of basic rights in an attempt to control the actions of a few? It’s seems arcane. It’s akin to thinking you can cure someone who is anemic by using the ancient medical technique of bloodletting. --[[User:Gclinch|Gclinch]] 14:18, 26 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Classmates: Is it just me or are the subjects we are  studying in this class some of the most real world relevant in any class you’ve taken? Every week it seems like the syllabus tracks the headlines. We studied Wikileaks while in the real world events directly related to the topic unfolded. We studied collaborative technologies and the power of the individual to influence the world through digital technologies while dramatic examples of technology propelling individuals as catalysts for social change and crowd sourced political revolutions continue to unfold across large regions of the globe.&lt;br /&gt;
 &lt;br /&gt;
This week we are studying the Internet Infrastructure and Regulation and the National Broadband Plan and in the news important implications of this topic shout out to us.&lt;br /&gt;
 &lt;br /&gt;
The reason I say these things is that I below are a couple of specific examples that I would like your thoughts on.  May I have your opinion on the following? &lt;br /&gt;
&lt;br /&gt;
Last class we talked about Title V of the Telecommunications Act of 1996 commonly known as the ([http://www.law.cornell.edu/uscode/html/uscode47/usc_sec_47_00000230----000-.html Section 230 of the Communications Decency Act]). One of the primary goals of the 1996 Telecom act was advertised as creating an environment within which competition would flourish. &lt;br /&gt;
  &lt;br /&gt;
Flourish it did, for a relatively short period of time, but in the long run, not so much. This week’s business news started with one of the few remaining independent major wireless carriers in the US agreeing to merger terms with a massive firm that is itself the contemporary result of a string of industry consolidations that have take place in the intervening years since the passage of the Telecom Act of 1996 (see: [http://wwww.networkworld.com/news/2011/032111-att-tmobile-duopoly.html Will AT&amp;amp;T&#039;s T-Mobile buy lead to a duopoly?])&lt;br /&gt;
&lt;br /&gt;
In this week’s class we will be studying [http://www.broadband.gov/ National Broadband Plan] and again recent headlines including, [http://www.govtech.com/public-safety/FCC-Endorses-4G-Wireless-Standard-022411.html “FCC endorsed long term evolution (LTE) as the required standard for any government”] are about highly relevant topics.  One of the goals of the National Broadband Plan is to, “ensure public safety” through addressing the, “lack a nationwide public safety mobile broadband communications network.”&lt;br /&gt;
&lt;br /&gt;
One of the ways the National Broadband Plan proposed to address the lack of a nationwide public safety mobile broadband network was a proposal to auction off a block of spectrum known as the “D Block.” The D Block is a segment of the 700 MHz band that was proposed to be sold to a private entity that would use part of it for commercial purposes and as part of the purchase agreement, the organization would make available and manage part of the spectrum block in support of public safety communications. It’s a very complicated issue, but the bottom line was that the numbers didn’t work out and no private company stepped up to bid enough to cover  the auction reserve (see [http://arstechnica.com/old/content/2008/09/fcc-considering-new-d-block-auction-plan.ars FCC considering new D Block auction]). &lt;br /&gt;
&lt;br /&gt;
This all brings me to a couple of questions I hope we can discuss. Both the Telecommunications Act of 1996 and National Broadband Plan are OMNIBUS initiatives by government to address social challenges.  [http://en.wikipedia.org/wiki/Omnibus_spending_bill Omnibus] is a term that originated (in terms of its use by US government) in the 1970’s for the purpose of handling the national budget when large numbers of funding items would be consolidated into a single piece of legislation.  (This is yet again another topic related to recent headlines see [http://www.heritage.org/Research/Reports/2007/12/Omnibus-Spending-Bill-Busts-the-Budget-to-Pay-for-Pork Omnibus Spending Bill Busts the Budget to Pay for Pork ...])&lt;br /&gt;
&lt;br /&gt;
My first question begins with, “is the omnibus approach a valid way to address challenges?” Can government effectively tackle challenging issues with all encompassing approaches such as omnibus intiatives and legislation? Isn&#039;t it more effective to solve complex problems by chunking them up in more manageable pieces? &lt;br /&gt;
&lt;br /&gt;
Other questions we might discuss tie last week’s readings to this week’s topics. In [https://www.socialtext.net/codev2/free_speech chapter 12 subsection] &#039;&#039;The Regulators of Speech: Distribution&#039;&#039;, Professor Lessig talks about the idea of how the, “deeply held assumption at the core of our jurisprudence governing broadcasting technologies: Only a fixed amount of ‘spectrum’ is available for broadcasting,” and that the way to manage it is to, “allocate slices of it to users,” is a misconception routed in the decades ago understanding of the technology.  Today’s technologies are vastly different and no longer constrain the use of broadcast spectrum in the same ways, yet governance mentality seems stuck in the 1920’s. &lt;br /&gt;
&lt;br /&gt;
What are your thoughts about this idea that even in forward thinking initiatives including the National Broadband Plan policy making seeks to be progressive, yet often is trapped by historical context? &lt;br /&gt;
Thank you. I look forward to your thoughtful comments. --[[User:Gclinch|Gclinch]] 14:18, 26 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
====Thoughts on Net Neutrality and Open Access====&lt;br /&gt;
This week’s readings on the Omnibus Broadband Initiative, net neutrality and Internet freedom are pure advocacy papers.  (Only the Berkman Center study of next generation connectivity conveyed a sense of impartiality.)  Each presents big business or big government as the enemy of the people’s Internet.  Each is correct to a degree, but neither paints a fair and complete picture.  Theirer warns of inefficient bureaucracy should the government get involved, yet it was a government project from DARPA that created the Internet.  The populist sounding organizations “SaveTheInternet.com” and “HandsOff.org” alternately blame the greedy motives of big businesses like AT&amp;amp;T and Google without discussing the natural competition between content providers and common carriers.  The simple fact of the Internet is that traffic management has existed long before the Internet did – and it has been an integral part of the Internet for most of its life.  The electric company and the telephone company each have business and residential service tiers.  These public utilities are regulated by government to insure and even subsidize a minimum level of residential service.  Business customers pay more for higher service levels.&lt;br /&gt;
This public utility model can serve the Internet as well.  Just as the phone company cannot restrict who you can call (although you may have to pay more for long distance), no Internet service provider should block a particular site’s traffic (although there can be different data plans for capacity and speed).  Many of us perform our own traffic shaping using “Quality of Service” settings (QoS) to grant higher priority “fast lane” access to voice-over-IP (Skype) while relegating email to the slow lane (big deal).  In fact, we welcome the intervention of our ISP for filtering all that spam!  I think the Berkman Center paper gets the concept right by emphasizing “open access” policy – i.e., that every business or other entity has the ability to connect to the infrastructure – but not mandating any policy beyond it.  Promote innovation by allowing tiered service levels with an opportunity to profit from risk, while still guaranteeing basic access to all as a public good in the spirit of the First Amendment. [[User:ChrisSura|-Chris Sura]] 02:51, 29 March 2011 (UTC)&lt;br /&gt;
&lt;br /&gt;
Nice thoughts Chris...I share your opinion as regard your last two sentences...To be honest, I did not know how far net neutrality issue is. Till now I though that it is more problem of future than issue of current days. I was wrong...Information about the blocking skype by T-Mobile in Germany in 2009 made me sure in how important the topic is. ([http://en.wikipedia.org/wiki/Network_neutrality#Law_in_Germany T-Mobile blocking Skype in Germany])&lt;br /&gt;
&lt;br /&gt;
== Links from Class ==&lt;br /&gt;
[http://www.law.com/jsp/cc/PubArticleCC.jsp?id=1202486102650&amp;amp;Manhattan_Federal_Judge_Kimba_Wood_Calls_Record_Companies_Request_for__Trillion_in_Damages_Absurd_in_Lime_Wire_Copyright_Case Fed Judge Kimba Wood Calls Record Companies&#039; Request for Trillions in Damages Absurd in LimeWire Copyright Case]  The most interesting part of the article is not the outrageousness of the record companies&#039; claims, but the way the judge reached her decision.  She stated that legislature could not have foreseen the way the internet would interact with copyright law, and thus you can&#039;t use legislative history.  Reasonableness, instead, was the issue to rule on.&lt;br /&gt;
&lt;br /&gt;
Wall Street Journal Op Ed by Yochai Benkler [http://www.nytimes.com/2010/03/21/opinion/21Benkler.html Ending the Internet’s Trench Warfare] March 20, 2010 &lt;br /&gt;
&amp;quot;The Federal Communications Commission’s National Broadband Plan, announced last week, is aimed at providing nearly universal, affordable broadband service by 2020. And while it takes many admirable steps — including very important efforts toward opening space in the broadcast spectrum — it does not address the source of the access problem: without a major policy shift to increase competition, broadband service in the United States will continue to lag far behind the rest of the developed world.&amp;quot; --[[User:Gclinch|Gclinch]] 23:32, 28 March 2011 (UTC)&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6424</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6424"/>
		<updated>2011-03-29T21:35:05Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 29 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6423</id>
		<title>Powerpoint Slides from Class</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Powerpoint_Slides_from_Class&amp;diff=6423"/>
		<updated>2011-03-29T21:34:57Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Feb 1/8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSociety_Feb8_part_I.pdf Slides: Paradigms for Studying the Internet]&lt;br /&gt;
&lt;br /&gt;
Feb 15 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb15.pdf Slides: New Economic &amp;amp; Business Models]&lt;br /&gt;
&lt;br /&gt;
Feb 22 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyFeb22.pdf Slides: Internet Economics &amp;amp; Business + Collective Decision Making]&lt;br /&gt;
&lt;br /&gt;
March 1 - [http://cyber.law.harvard.edu/is2011/Image:IS2011-3.1.11-New_and_Old_Media.pdf Slides: New and Old Media, Participation, and Information]&lt;br /&gt;
&lt;br /&gt;
March 8 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/IS2011slides_2011-03-08.pdf Slides: Law&#039;s Role in Regulating Online Conduct and Speech]&lt;br /&gt;
&lt;br /&gt;
March 39 - [http://cyber.law.harvard.edu/is2011/sites/is2011/images/InternetSocietyMarch29.pdf Slides: Internet Infrastructure and Regulation]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6421</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_3_Submissions&amp;diff=6421"/>
		<updated>2011-03-29T21:33:08Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Distribution of Grades===&lt;br /&gt;
[[Image:Assignment3_gradedistribution.png‎|400px]]&lt;br /&gt;
&lt;br /&gt;
===Assignment 3===&lt;br /&gt;
This assignment is due on March 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name (example: Name_Assignment3.doc) to avoid overwriting someone else&#039;s assignment. &#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2011/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
*Name: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://foo.bar}}&lt;br /&gt;
&lt;br /&gt;
You may also use some new templates for comments and responses.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kimberly Nevas|Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Nevas_kimberly_assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Yaerin Kim|OpenCourseWare: MIT Case Study|http://cyber.law.harvard.edu/is2011/Image:Outline_Kim.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Jamil Buie|Data monetization - Facebook &amp;amp; Google|http://cyber.law.harvard.edu/is2011/Image:Data_monetization_fInal_project_outline.pdf#file}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Anthony Crowe|Tagging (Title Forthcoming)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Crowe_LSTUE120_3.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Saam Batmanghelidj|The Current and Future State of Virtual Intellectual Property from Synthetic Worlds|http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Outline.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Gagan Panjhazari|Effects of the Internet on Revolutions in Egypt and Libya|http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari_Assignment3.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alan Davies-Gavin &amp;amp; Alex Solomon|Deceptions in online site dating architecture|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Davies-Solomon_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|MaryVanGils|Yelp Outline|http://cyber.law.harvard.edu/is2011/Image:Yelp_outline.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Corey MacDonald|Communication for the Fringe: Sites that cater to the unrepresented or under-represented audience.|http://cyber.law.harvard.edu/is2011/Image:Outline_MacDonald_Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Laura Connell|The impact of internet piracy on the UK creative industries (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_3_Prospectus.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Yu Ri Jeong|Collective Intelligence in South Korea: Study on Architecture and Governance of Naver Knowledge iN (Assignment #3)|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_%283%29_Project_Outline.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Jennings|Annuity Companies&#039; Social Media Communities(Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:_Outline_of_annuity_social_media.doc‎}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Andrew Auerbach|Facebook Groups General Outline|http://cyber.law.harvard.edu/is2011/sites/is2011/images/LSTU_Assignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Kristina Meshkova|Music sharing sites (Assignment # 3)|http://cyber.law.harvard.edu/is2011/Image:Kristina_Meshkova_Assignement_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vladimir Trojak|Are different language communities consistent in what topics are permitted and what is removed?|http://cyber.law.harvard.edu/is2011/Image:Vladimir_TrojakAssignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Elisha Surillo|Homophilic Tendencies and the Online Tea Party Movement|http://cyber.law.harvard.edu/is2011/Image:Assignment_3.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Susan Lemont|The Cancer Bioinformatics Grid|http://cyber.law.harvard.edu/is2011/Image:Project_Outline_Lemont.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Richard Kundiger|A Study on Free Riding in the Bitorrent Peer-to-Peer (P2P) network|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_3_Research_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brian Smith|Foursquare Privacy: Data Exposure, Service Architecture, and User Attitudes|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_3_Brian_Smith_v1.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Brandon A. Ceranowicz|A Comparative Study of Open Source Licenses|http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_3_-_Outline_BAC.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Alokika Singh|Feminist Movement in India and the Internet (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:MARCH_22_singh.singh.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Lorena Abuín|Media role in the contribution to prosecuted online activities (Assignment #3)|http://cyber.law.harvard.edu/is2011/Image:Assignment_3_-_Lorena_Abu%C3%ADn.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Jillian C. York|Understanding Lesbanon: Lebanon&#039;s Online Lesbian Community|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon_Outline.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Faye Ryding|What are the explicit and implicit policies for dealing with trolls and vandals on epinions.com?| http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Syed Yasir Shirazi|Monitoring Pledgebank&#039;s Community|&lt;br /&gt;
http://cyber.law.harvard.edu/is2011/Image:SYAS-Assignment_3-Outline-Pledgebank%27s_Community.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Guy Clinch|The Transition to Next Generation 9-1-1 in North America &lt;br /&gt;
Assignment #3|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Adriana Faria Torii &amp;amp; Anna Christiana Marinho C. Machado|Analysis of E-Government Practices in Brazil Assignment #3| http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Ed Arboleda|Outline|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Ed_Arboleda_HES_Internet_and_Society_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Chris Sura|Governance of the Java Community Process|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Chris_Sura_Assignment_3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Jose Uscanga|Cummunity reporting or social activism?  The New Age of online reporting in Mexico.|http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignement_-3.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Joshua Surillo|Government&#039;s Jurisdiction of Wikileaks|http://cyber.law.harvard.edu/is2011/Image:Internet_an_Society_assignment4_outline.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Robert Cunningham| Why preserve cultural artifacts from the internet? also sorry for being tardy I&#039;ve been having internet connection problems |http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_outline_Cunningham3.doc }}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Myra Garza|Putting Your Best Face Forward: Motivations of Contributors to Acne.org|http://cyber.law.harvard.edu/is2011/Image:Assignment-3.Garza.M.doc}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Michelle C Forelle|Vimeo&#039;s Unique Approach to Online Video Sharing:Community, Collaboration, and Clever Commercials|http://cyber.law.harvard.edu/is2011/Image:Assgn3_VimeoOutlineV2.doc}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Tym Lewtak|Social Media Super User Monetization|http://cyber.law.harvard.edu/is2011/sites/is2011/images/Tymoteusz_Lewtak_Assignment3.pdf}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Jessica Sanfilippo|Crowd Funding and Cultural Production|http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_3.doc}}&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6360</id>
		<title>Assignment 4 Details and Links</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Assignment_4_Details_and_Links&amp;diff=6360"/>
		<updated>2011-03-22T21:38:50Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Format */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;Due April 12&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Group_Work|You may work in groups]]&#039;&#039;&#039;, provided you have submitted a short paragraph to the instructors by March 1 explaining why a group approach to your proposed topic for the final project makes sense.&lt;br /&gt;
&lt;br /&gt;
This assignment will be to turn in a rough draft of your final, 8-10 page final project paper. It will be a chance for us to give you some comments, and suggest some places to push your research project forward in the next few weeks. &lt;br /&gt;
&lt;br /&gt;
It&#039;s also an opportunity to get some extra credit. If you are interested, you may create an audiovisual work discussing and presenting your research to date. The work could be an audio file (such as a podcast), a video (such as a remix or animation), or an in-class presentation. You should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). These may be presented in class.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Submit your rough draft (and your extra credit, if applicable) here: [[Assignment 4 Submissions]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Format==&lt;br /&gt;
Your paper should be 8-10 pages long, double spaced, and use a [http://en.wikipedia.org/wiki/Serif serif] font (Times New Roman, Cambria, etc.).  Please upload your paper as a .doc, a .odt, or a .pdf.&lt;br /&gt;
&lt;br /&gt;
You may use any commonly accepted style to cite your sources (Chicago, MLA, etc.), but please be consistent.&lt;br /&gt;
&lt;br /&gt;
== Bonus Credit ==&lt;br /&gt;
&lt;br /&gt;
This bonus credit consists of an audiovisual work of your creation, and should be based on your draft. The work could be an audio file (such as a podcast or song), a video (such as a remix or animation), or a compelling image (such as a mindmap or photo montage). If an audio or video work, you should aim for a length of 3-5 minutes (there is 7 minute maximum). Content and presentation are much more important than length (a compelling 2-minute audio interview would be great). &lt;br /&gt;
&lt;br /&gt;
Possible ideas include:&lt;br /&gt;
&lt;br /&gt;
*An audio podcast or video interview with someone doing influential work related to your project&lt;br /&gt;
*A video medley and/or remix&lt;br /&gt;
*A podcast show in which participants debate the topic&lt;br /&gt;
*A [http://en.wikipedia.org/wiki/Mind_Map mindmap] image that charts out a policy debate or domain&lt;br /&gt;
*A photo montage&lt;br /&gt;
*A short film&lt;br /&gt;
*A song or musical work drawing from various samples such as those on [http://freesound.iua.upf.edu Freesound]&lt;br /&gt;
*A song with lyrics&lt;br /&gt;
*A visualization, perhaps using [http://services.alphaworks.ibm.com/manyeyes/home Many Eyes]&lt;br /&gt;
&lt;br /&gt;
== Uploading Your Bonus Work==&lt;br /&gt;
&lt;br /&gt;
Examples of online services you may use to post your bonus work include:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Video:&#039;&#039;&#039;&lt;br /&gt;
*[http://youtube.com Youtube]&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
*[http://video.google.com Google Video]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Audio:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.ccmixter.com ccMixter] (for music; note: music must be licensed under a [http://www.creativecommons.org Creative Commons] license&lt;br /&gt;
*[http://www.archive.org Internet Archive]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Image:&#039;&#039;&#039;&lt;br /&gt;
*[http://www.flickr.com Flickr]&lt;br /&gt;
&lt;br /&gt;
== Tools and Tutorials ==&lt;br /&gt;
* Audio&lt;br /&gt;
** [http://audacity.sourceforge.net/ Audacity] ([http://www.edhsonline.org/other/audacity/ introduction tutorial], [http://audacity.sourceforge.net/help/documentation more FAQs and Tutorials])&lt;br /&gt;
* Video&lt;br /&gt;
** Mac OS X: iMovie ([http://www.apple.com/ilife/tutorials/#imovie]) or Final Cut&lt;br /&gt;
** Windows: [http://www.avid.com/freedv/ Avid FreeDV] ([http://www.avid.com/freedv/tutorials/index.asp tutorial])&lt;br /&gt;
*Screencast (Screencasting is taking a video of your computer desktop, while you manipulate it) &lt;br /&gt;
**[http://en.wikipedia.org/wiki/Screencast Screencast]&lt;br /&gt;
**[http://en.wikipedia.org/wiki/List_of_screen_recording_software List of screen recording software]&lt;br /&gt;
&lt;br /&gt;
* Video Game / Animation&lt;br /&gt;
** [http://scratch.mit.edu/home/index Scratch]&lt;br /&gt;
* Other&lt;br /&gt;
** [http://en.wikipedia.org/wiki/List_of_Mind_Mapping_software Mind Mapping Software]&lt;br /&gt;
&lt;br /&gt;
== Examples of Finished Products==&lt;br /&gt;
&#039;&#039;(some of these are more highly produced or effort-intensive than your projects need be, but they should give you a sense for what finished pieces look like)&#039;&#039;&lt;br /&gt;
* [http://www.flickr.com/photos/further/404587997/ Mind Map of Democracy and the Internet] by John Palfrey (partial snapshot)&lt;br /&gt;
* [http://thoughtcast.org/casts/beyond-broadcast-2007 Interviews from Beyond Broadcast] on Thoughtcast&lt;br /&gt;
&lt;br /&gt;
== Assignment Four Submissions ==&lt;br /&gt;
&lt;br /&gt;
Post your submissions here: [[Assignment 4 Submissions]]&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Final_Project&amp;diff=6359</id>
		<title>Final Project</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Final_Project&amp;diff=6359"/>
		<updated>2011-03-22T21:38:38Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: /* Format */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div class=&amp;quot;editsection noprint editlink plainlinksneverexpand&amp;quot; align=&amp;quot;right&amp;quot; style=&amp;quot;float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;big&amp;gt;&#039;&#039;&#039;Assignments&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 1 Details and Reporting]]&#039;&#039;&#039; | [[Assignment 1 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 8&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_2:_Prospectus| Assignment 2]]&#039;&#039;&#039; | [[Assignment 2 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due February 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]&#039;&#039;&#039; | [[Assignment 3 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due March 22&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignment 4 Details and Links]]&#039;&#039;&#039; | [[Assignment 4 Submissions|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due April 12&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Final Project]]&#039;&#039;&#039; | [[Final Projects|Submissions]]&amp;lt;br /&amp;gt;&lt;br /&gt;
&#039;&#039;Due May 10&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;DUE MAY 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Description ===&lt;br /&gt;
The final project is a 8-10 page research paper, built around taking the theoretical concepts brought forward in the course, generating a hypothesis around that idea, and then examining a real-world scenario online in the light of that to answer a question. In lieu of submitting a paper, you may present your finding using a different medium, such as a podcast, video, or web page. &lt;br /&gt;
&lt;br /&gt;
The final project should be integrative--bringing together materials and issues from class and expanding upon them. Ideally, students will identify the topic for Assignment 2 and leverage their time working on the other assignments towards the final project. It will be detrimental to change mid-stream, due to the limited time of the course.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Assignments#Group_Work|You may work in groups.]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Format===&lt;br /&gt;
Your paper should be 8-10 pages long, double spaced, and use a [http://en.wikipedia.org/wiki/Serif serif] font (Times New Roman, Cambria, etc.).  Please upload your paper as a .doc, a .odt, or a .pdf.&lt;br /&gt;
&lt;br /&gt;
You may use any commonly accepted style to cite your sources (Chicago, MLA, etc.), but please be consistent.&lt;br /&gt;
&lt;br /&gt;
=== Submissions ===&lt;br /&gt;
&lt;br /&gt;
Please include your final project here, including name(s) and title: [[Final Projects]]  &lt;br /&gt;
&lt;br /&gt;
Submit the final project on or before May 10th.&lt;br /&gt;
&lt;br /&gt;
=== [[Research questions]] ===&lt;br /&gt;
Your project should consist of an original documentation and analysis of Internet activity.  You should decide upon a set of research questions - a single question is fine.  The next step is to define a research frame for your case study.  This could be an online community or set of communities, or participants in a web page or online game.  Your research may focus on a single Internet project or compare two communities.  You might choose to focus on a community that is a sub-unit, or a community that spans more than one URL. For instance: &#039;&#039;a WoW ([http://en.wikipedia.org/wiki/World_of_Warcraft World of Warcraft]) guild is a sub-unit of WoW, but also exists on two or more platforms: voicechat in-game and a website forum out-of-game&#039;&#039;.  Another possible example is to examine how a policy or law we&#039;ve discussed has played out in a specific set of contexts (for example, comparing how different countries approach online censorship or react to Wikileaks). The goal in defining this frame is to focus your research.  &lt;br /&gt;
&lt;br /&gt;
The next step will be to gather evidence that will help to answer your research question.  Finally, you will compile this into a final report that summarizes your research topic, methods and conclusions. We hope that you will be able to weave in one or more of the theories and constructs that have been introduced in the class.&lt;br /&gt;
&lt;br /&gt;
Finding appropriate research questions is often the most complex and time consuming process in research and will normally take many iterations.&lt;br /&gt;
&lt;br /&gt;
Some of the questions you might ask as you search for a more narrow set of questions might include: [[Research questions]] &lt;br /&gt;
&lt;br /&gt;
==== Questions steps ====&lt;br /&gt;
# Decide upon a set of [[Research questions]]&lt;br /&gt;
# Define a research frame (group, community, etc)&lt;br /&gt;
# Gather evidence&lt;br /&gt;
# Compile into report that summarizes your topic, methods, and conclusions&lt;br /&gt;
&lt;br /&gt;
=== [[Project Ideas]] ===&lt;br /&gt;
The possible final project topics and questions can be found here: [[Project Ideas]]. We are open to ideas and questions that lie outside of this set, though you should express this interest and a potential topic as early as possible.&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2013/?title=Template:AssignmentInfo&amp;diff=6355</id>
		<title>Template:AssignmentInfo</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2013/?title=Template:AssignmentInfo&amp;diff=6355"/>
		<updated>2011-03-22T21:30:47Z</updated>

		<summary type="html">&lt;p&gt;RebekahHeacock: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; align=&amp;quot;left&amp;quot; style=&amp;quot;text-align:left; background-color:#ffffcc;&amp;quot;&lt;br /&gt;
|&#039;&#039;&#039;Name:&#039;&#039;&#039;&lt;br /&gt;
|{{{1}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Description:&#039;&#039;&#039; &lt;br /&gt;
|&amp;lt;span style=&amp;quot;color:#FF0080&amp;quot;&amp;gt;&#039;&#039;&#039;{{{2}}}&#039;&#039;&#039;&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Link to Assignment:&#039;&#039;&#039; &lt;br /&gt;
|{{{3}}}&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Timestamp:&#039;&#039;&#039; &lt;br /&gt;
|{{LOCALTIME}}: {{LOCALDAY}} {{LOCALMONTHNAME}}, {{CURRENTYEAR}}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>RebekahHeacock</name></author>
	</entry>
</feed>