<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2014/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Seifip</id>
	<title>Technologies and Politics of Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2014/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Seifip"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/Special:Contributions/Seifip"/>
	<updated>2026-04-07T07:59:48Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Final_Projects&amp;diff=2942</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Final_Projects&amp;diff=2942"/>
		<updated>2014-05-13T19:16:10Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2014/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Also, the course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in to the HES website] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Castille|Castille]] 23:45, 9 May 2014 (EDT)&lt;br /&gt;
*Title: Self Help or Self Harm? Tumblr&#039;s governance of its self harm communities&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/File:CastilleRath_LSTU_FINAL_PAPER.doc&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:MikeJohnson|MikeJohnson]] 14:55, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Twitch Plays Pokémon - How Mediating Gameplay Changes the Game&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:MikeJohnson_FinalProject.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: ([[User:Margorm|Margorm]] 18:06, 12 May 2014 (EDT))&lt;br /&gt;
*Title: Controlling our personal genomes: How has 23andMe changed its policies, norms, and architecture in response to the recent FDA ban and how has this impacted data sharing? &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Monroe_Final.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:Marissa1989|Marissa1989]] 13:29, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Airbnb: Online Trust theory &amp;amp; Lessig&#039;s four modalities of control. &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Final_project_barkey.pdf&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: ([[User:Dancoron|Dancoron]] 21:51, 12 May 2014 (EDT))&lt;br /&gt;
*Title: Forum policy guidelines at Anandtech.com: Examining the CPU&#039;s and Overclocking sub-forum behavioral characteristics.&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Dancoron_Final.doc&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Drogowski|Drogowski]] 00:30, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Censoring the Bitcoin Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Bitcoin_Project,_Daniel_Rogowski.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Jradoff|Jradoff]] 00:30, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Comparing Forum Communities for Two Major Online Games&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:LSTU_Assignment5.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Luciagamboaso|Luciagamboaso]] 13:44, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Control vs. collaboration: The case of Mexico’s Open Data Policy government-run platform&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Luciagamboaso_FinalAssignment.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:akk22|akk22]] 11:40, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Gendered Online Communities: Targeted Harassment and Successful Interventions&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Final_akk22.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:Castille|Castille]] 23:45, 9 May 2014 (EDT)&lt;br /&gt;
*Title: Self Help or Self Harm? Tumblr&#039;s governance of its self harm communities&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/File:CastilleRath_LSTU_FINAL_PAPER.doc&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:Lpereira|Lpereira]] 13:44, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Understanding Online Interaction: Who Sets the Norm on Youtube Communities?&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/File:Assingment_4_Final.docx&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:Seifip|Seifip]] 15:15, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Bounties and underrepresented topics &lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120FinalPaper_%281%29.pdf&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Final_Projects&amp;diff=2940</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Final_Projects&amp;diff=2940"/>
		<updated>2014-05-13T19:15:52Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2014/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Also, the course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in to the HES website] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Castille|Castille]] 23:45, 9 May 2014 (EDT)&lt;br /&gt;
*Title: Self Help or Self Harm? Tumblr&#039;s governance of its self harm communities&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/File:CastilleRath_LSTU_FINAL_PAPER.doc&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:MikeJohnson|MikeJohnson]] 14:55, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Twitch Plays Pokémon - How Mediating Gameplay Changes the Game&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:MikeJohnson_FinalProject.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: ([[User:Margorm|Margorm]] 18:06, 12 May 2014 (EDT))&lt;br /&gt;
*Title: Controlling our personal genomes: How has 23andMe changed its policies, norms, and architecture in response to the recent FDA ban and how has this impacted data sharing? &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Monroe_Final.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:Marissa1989|Marissa1989]] 13:29, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Airbnb: Online Trust theory &amp;amp; Lessig&#039;s four modalities of control. &lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Final_project_barkey.pdf&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: ([[User:Dancoron|Dancoron]] 21:51, 12 May 2014 (EDT))&lt;br /&gt;
*Title: Forum policy guidelines at Anandtech.com: Examining the CPU&#039;s and Overclocking sub-forum behavioral characteristics.&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Dancoron_Final.doc&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Drogowski|Drogowski]] 00:30, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Censoring the Bitcoin Community&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Bitcoin_Project,_Daniel_Rogowski.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Jradoff|Jradoff]] 00:30, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Comparing Forum Communities for Two Major Online Games&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:LSTU_Assignment5.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym: [[User:Luciagamboaso|Luciagamboaso]] 13:44, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Control vs. collaboration: The case of Mexico’s Open Data Policy government-run platform&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Luciagamboaso_FinalAssignment.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:akk22|akk22]] 11:40, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Gendered Online Communities: Targeted Harassment and Successful Interventions&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Final_akk22.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:Castille|Castille]] 23:45, 9 May 2014 (EDT)&lt;br /&gt;
*Title: Self Help or Self Harm? Tumblr&#039;s governance of its self harm communities&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/File:CastilleRath_LSTU_FINAL_PAPER.doc&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: [[User:Lpereira|Lpereira]] 13:44, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Understanding Online Interaction: Who Sets the Norm on Youtube Communities?&lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/File:Assingment_4_Final.docx&lt;br /&gt;
----&lt;br /&gt;
*Name or Pseudonym: --[[User:Seifip|Seifip]] 15:15, 13 May 2014 (EDT)&lt;br /&gt;
*Title: Bounties and underrepresented topics &lt;br /&gt;
*Link:http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120FinalPaper_%281%29.pdf&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2610</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2610"/>
		<updated>2014-05-06T19:44:05Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 6th.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade. If you are presenting in class on the 13th, but do not have material to upload, please indicate so on the section below.&lt;br /&gt;
&lt;br /&gt;
If you do plan on uploading a file, &#039;&#039;please name your file &amp;quot;wikiusername_extracredit,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a PowerPoint document your file should be named &amp;quot;jdoe_extracredit.ppt.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2014/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2014/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Julie|My presentation will explain how North Korea is portrayed on Twitter, focusing on the symbiotic relationship between traditional media and citizen journalism. I do not have extra materials to upload for my presentation.}}&lt;br /&gt;
[[User:Julie|Julie]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Lucia Gamboa |Video: Control &amp;amp; success: The case of Mexico&#039;s Open data policy government-run platform&lt;br /&gt;
I will present a short video focusing on how a good balance of moderation and control led to the platform&#039;s success as an online participatory tool}}]&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 18:21, 5 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Watson|Video: The Internet, Liveleak, and the Dissemination of Information in Syria|&lt;br /&gt;
https://vimeo.com/93904486 Password: LSTUE120|}}&lt;br /&gt;
[[User:Watson|Watson]] 18:17, 4 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Castille|[http://www.youtube.com/watch?v=oEBleuuKWOw Video: Self Help or Self Harm: Tumblr&#039;s governance of its self harm community]}}&lt;br /&gt;
[[[User:Castille|Castille]] 01:26, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vance.Puchalski|Project: Regulators and the Spread of (Mis)Information|&lt;br /&gt;
Presenting findings in class with no material to upload|}}&lt;br /&gt;
[[[[[User:Vance.puchalski|Vance.puchalski]] 02:02, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|akk22|Audio file: 3. min interview with Women Action Media Blogger S. Alcid about experience with online harassment and successful regulations &amp;amp; community interventions|&lt;br /&gt;
Link to itunes file |}}&lt;br /&gt;
[[[User:akk22|akk22]] 10:27, 6 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Byrnes|Powerpoint presentations on Rankopedia&#039;s community ownership vs Lessig&#039;s four forces. | Presenting in class}}&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 14:36, 6 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Philip Seyfi&lt;br /&gt;
[http://www.youtube.com/watch?v=oEBleuuKWOw Podcast: StackOverflow, unbalanced communities]&lt;br /&gt;
[[User:Seifip|Seifip]] 15:41, 6 May 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2609</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2609"/>
		<updated>2014-05-06T19:43:05Z</updated>

		<summary type="html">&lt;p&gt;Seifip: Undo revision 2607 by Seifip (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 6th.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade. If you are presenting in class on the 13th, but do not have material to upload, please indicate so on the section below.&lt;br /&gt;
&lt;br /&gt;
If you do plan on uploading a file, &#039;&#039;please name your file &amp;quot;wikiusername_extracredit,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a PowerPoint document your file should be named &amp;quot;jdoe_extracredit.ppt.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2014/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2014/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Julie|My presentation will explain how North Korea is portrayed on Twitter, focusing on the symbiotic relationship between traditional media and citizen journalism. I do not have extra materials to upload for my presentation.}}&lt;br /&gt;
[[User:Julie|Julie]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Lucia Gamboa |Video: Control &amp;amp; success: The case of Mexico&#039;s Open data policy government-run platform&lt;br /&gt;
I will present a short video focusing on how a good balance of moderation and control led to the platform&#039;s success as an online participatory tool}}]&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 18:21, 5 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Watson|Video: The Internet, Liveleak, and the Dissemination of Information in Syria|&lt;br /&gt;
https://vimeo.com/93904486 Password: LSTUE120|}}&lt;br /&gt;
[[User:Watson|Watson]] 18:17, 4 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Castille|[http://www.youtube.com/watch?v=oEBleuuKWOw Video: Self Help or Self Harm: Tumblr&#039;s governance of its self harm community]}}&lt;br /&gt;
[[[User:Castille|Castille]] 01:26, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vance.Puchalski|Project: Regulators and the Spread of (Mis)Information|&lt;br /&gt;
Presenting findings in class with no material to upload|}}&lt;br /&gt;
[[[[[User:Vance.puchalski|Vance.puchalski]] 02:02, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|akk22|Audio file: 3. min interview with Women Action Media Blogger S. Alcid about experience with online harassment and successful regulations &amp;amp; community interventions|&lt;br /&gt;
Link to itunes file |}}&lt;br /&gt;
[[[User:akk22|akk22]] 10:27, 6 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Byrnes|Powerpoint presentations on Rankopedia&#039;s community ownership vs Lessig&#039;s four forces. | Presenting in class}}&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 14:36, 6 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Podcast: StackOverflow, unbalanced communities|&lt;br /&gt;
http://www.youtube.com/watch?v=oEBleuuKWOw |}}[[User:Seifip|Seifip]] 15:41, 6 May 2014 (EDT)}&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2608</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2608"/>
		<updated>2014-05-06T19:42:27Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 6th.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade. If you are presenting in class on the 13th, but do not have material to upload, please indicate so on the section below.&lt;br /&gt;
&lt;br /&gt;
If you do plan on uploading a file, &#039;&#039;please name your file &amp;quot;wikiusername_extracredit,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a PowerPoint document your file should be named &amp;quot;jdoe_extracredit.ppt.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2014/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2014/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Julie|My presentation will explain how North Korea is portrayed on Twitter, focusing on the symbiotic relationship between traditional media and citizen journalism. I do not have extra materials to upload for my presentation.}}&lt;br /&gt;
[[User:Julie|Julie]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Lucia Gamboa |Video: Control &amp;amp; success: The case of Mexico&#039;s Open data policy government-run platform&lt;br /&gt;
I will present a short video focusing on how a good balance of moderation and control led to the platform&#039;s success as an online participatory tool}}]&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 18:21, 5 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Watson|Video: The Internet, Liveleak, and the Dissemination of Information in Syria|&lt;br /&gt;
https://vimeo.com/93904486 Password: LSTUE120|}}&lt;br /&gt;
[[User:Watson|Watson]] 18:17, 4 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Castille|[http://www.youtube.com/watch?v=oEBleuuKWOw Video: Self Help or Self Harm: Tumblr&#039;s governance of its self harm community]}}&lt;br /&gt;
[[[User:Castille|Castille]] 01:26, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vance.Puchalski|Project: Regulators and the Spread of (Mis)Information|&lt;br /&gt;
Presenting findings in class with no material to upload|}}&lt;br /&gt;
[[[[[User:Vance.puchalski|Vance.puchalski]] 02:02, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|akk22|Audio file: 3. min interview with Women Action Media Blogger S. Alcid about experience with online harassment and successful regulations &amp;amp; community interventions|&lt;br /&gt;
Link to itunes file |}}&lt;br /&gt;
[[[User:akk22|akk22]] 10:27, 6 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Byrnes|Powerpoint presentations on Rankopedia&#039;s community ownership vs Lessig&#039;s four forces. | Presenting in class}}&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 14:36, 6 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Podcast: StackOverflow, unbalanced communities| [http://www.youtube.com/watch?v=oEBleuuKWOw] |}}[[User:Seifip|Seifip]] 15:41, 6 May 2014 (EDT)}&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2607</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2607"/>
		<updated>2014-05-06T19:42:02Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 6th.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade. If you are presenting in class on the 13th, but do not have material to upload, please indicate so on the section below.&lt;br /&gt;
&lt;br /&gt;
If you do plan on uploading a file, &#039;&#039;please name your file &amp;quot;wikiusername_extracredit,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a PowerPoint document your file should be named &amp;quot;jdoe_extracredit.ppt.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2014/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2014/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Julie|My presentation will explain how North Korea is portrayed on Twitter, focusing on the symbiotic relationship between traditional media and citizen journalism. I do not have extra materials to upload for my presentation.}}&lt;br /&gt;
[[User:Julie|Julie]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Lucia Gamboa |Video: Control &amp;amp; success: The case of Mexico&#039;s Open data policy government-run platform&lt;br /&gt;
I will present a short video focusing on how a good balance of moderation and control led to the platform&#039;s success as an online participatory tool}}]&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 18:21, 5 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Watson|Video: The Internet, Liveleak, and the Dissemination of Information in Syria|&lt;br /&gt;
https://vimeo.com/93904486 Password: LSTUE120|}}&lt;br /&gt;
[[User:Watson|Watson]] 18:17, 4 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Castille|Video: Self Help or Self Harm: Tumblr&#039;s governance of its self harm community|&lt;br /&gt;
https://vimeo.com/93921029 Password: LSTU|}}&lt;br /&gt;
[[[User:Castille|Castille]] 01:26, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vance.Puchalski|Project: Regulators and the Spread of (Mis)Information|&lt;br /&gt;
Presenting findings in class with no material to upload|}}&lt;br /&gt;
[[[[[User:Vance.puchalski|Vance.puchalski]] 02:02, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|akk22|Audio file: 3. min interview with Women Action Media Blogger S. Alcid about experience with online harassment and successful regulations &amp;amp; community interventions|&lt;br /&gt;
Link to itunes file |}}&lt;br /&gt;
[[[User:akk22|akk22]] 10:27, 6 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Byrnes|Powerpoint presentations on Rankopedia&#039;s community ownership vs Lessig&#039;s four forces. | Presenting in class}}&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 14:36, 6 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Podcast: StackOverflow, unbalanced communities| [http://www.youtube.com/watch?v=oEBleuuKWOw] |}}[[User:Seifip|Seifip]] 15:41, 6 May 2014 (EDT)}&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2606</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Extra_Credit_Submissions&amp;diff=2606"/>
		<updated>2014-05-06T19:41:18Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 6th.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade. If you are presenting in class on the 13th, but do not have material to upload, please indicate so on the section below.&lt;br /&gt;
&lt;br /&gt;
If you do plan on uploading a file, &#039;&#039;please name your file &amp;quot;wikiusername_extracredit,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a PowerPoint document your file should be named &amp;quot;jdoe_extracredit.ppt.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2014/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2014/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Julie|My presentation will explain how North Korea is portrayed on Twitter, focusing on the symbiotic relationship between traditional media and citizen journalism. I do not have extra materials to upload for my presentation.}}&lt;br /&gt;
[[User:Julie|Julie]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Lucia Gamboa |Video: Control &amp;amp; success: The case of Mexico&#039;s Open data policy government-run platform&lt;br /&gt;
I will present a short video focusing on how a good balance of moderation and control led to the platform&#039;s success as an online participatory tool}}]&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 18:21, 5 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Watson|Video: The Internet, Liveleak, and the Dissemination of Information in Syria|&lt;br /&gt;
https://vimeo.com/93904486 Password: LSTUE120|}}&lt;br /&gt;
[[User:Watson|Watson]] 18:17, 4 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Castille|Video: Self Help or Self Harm: Tumblr&#039;s governance of its self harm community|&lt;br /&gt;
https://vimeo.com/93921029 Password: LSTU|}}&lt;br /&gt;
[[[User:Castille|Castille]] 01:26, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Vance.Puchalski|Project: Regulators and the Spread of (Mis)Information|&lt;br /&gt;
Presenting findings in class with no material to upload|}}&lt;br /&gt;
[[[[[User:Vance.puchalski|Vance.puchalski]] 02:02, 5 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|akk22|Audio file: 3. min interview with Women Action Media Blogger S. Alcid about experience with online harassment and successful regulations &amp;amp; community interventions|&lt;br /&gt;
Link to itunes file |}}&lt;br /&gt;
[[[User:akk22|akk22]] 10:27, 6 May 2014 (EDT)]}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Byrnes|Powerpoint presentations on Rankopedia&#039;s community ownership vs Lessig&#039;s four forces. | Presenting in class}}&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 14:36, 6 May 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Podcast: StackOverflow, unbalanced communities|&lt;br /&gt;
http://www.youtube.com/watch?v=oEBleuuKWOw |}}[[User:Seifip|Seifip]] 15:41, 6 May 2014 (EDT)}&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=The_Internet_as_a_Tool_of_Education&amp;diff=2306</id>
		<title>The Internet as a Tool of Education</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=The_Internet_as_a_Tool_of_Education&amp;diff=2306"/>
		<updated>2014-04-29T17:45:24Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You are enrolled in (and hopefully not yet tired of!) a class with students across the country and around the globe, where, through a mix of in-person and online learning, we have been able to explore considerable territory around the Internet and how it is controlled. We have availed ourselves of many of the benefits of the web in doing so: all of our class reading has been publicly-accessible web sites, we use Internet applications like Adobe Connect and the HES platform to deliver content and solicit responses, and the syllabus itself is built on open-source coding designed for collaborative engagement.&lt;br /&gt;
&lt;br /&gt;
But we are still in a fairly traditional model of pedagogy - though one that I hope has been effective this semester. As we wind down our studies, consider for a moment the ways in which this technology can be used for far more radical forms of education, and who stands to benefit from such tools.&lt;br /&gt;
&lt;br /&gt;
Joining us will be [http://cyber.law.harvard.edu/people/jreich Justin Reich], Berkman Fellow and the Richard L. Menschel HarvardX Research Fellow, and [http://cyber.law.harvard.edu/people/aenriquez Ana Enriquez], Berkman Fellow and Head Teaching Fellow of CopyrightX.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Modern distance education&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Massive_open_online_course Wikipedia, Massive Open Online Course (MOOC)]&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.edweek.org/edweek/edtechresearcher/2013/05/is_a_mooc_a_textbook_or_a_course.html Justin Reich, Is a MOOC a Textbook or a Course?]&lt;br /&gt;
&lt;br /&gt;
* [http://www.technologyreview.com/news/506376/ivy-league-20-or-just-another-petscom/ Lee Gomes, Ivy League 2.0 or Just Another Pets.com?]&lt;br /&gt;
&lt;br /&gt;
; What is new and what is not?&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2012/03/01/rb-192-wikis-teaching-and-the-digital-divide/ Radio Berkman, Wikis, Teaching, and the Digital Divide] (audio, about 18 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
; Concerns, doubts, and issues&lt;br /&gt;
&lt;br /&gt;
* [http://chronicle.com/article/The-Document-Open-Letter-From/138937/ Open letter to Michael Sandel from the San Jose State University Department of Philosophy]&lt;br /&gt;
&lt;br /&gt;
* [http://harry-lewis.blogspot.com/2013/05/moocs-and-moods.html Harry Lewis, MOOCs and MOODs]&lt;br /&gt;
&lt;br /&gt;
; Case Studies - HarvardX and CopyrightX&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/people/tfisher/IP/CopyrightX_Assessment.pdf William Fisher, CopyrightX]&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2381263&amp;amp;download=yes Andrew Dean Ho, HarvardX and MITx: The First Year of Open Online Courses]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
It caught my attention when Justin Reich in the Radio Berkman podcast points out how technology adoption in schools, particularly wiki use, needs to be paired with a human development strategy (which is usually more often found in schools with higher socioeconomic status). I believe that with human development, the right path can be taken in making sure that technology covers an existing need in a better way than a traditional teaching method would; rather than adopting a new technology that covers non existing need and is therefore unsuccessful. I think this ties with Justin’s observation that technology should be in the service of learning. &lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 11:12, 26 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Is MOOC a Textbook - really got my attention and more importantly, I guess, my imagination - wow to think that someday classrooms could be obsolete is truly fascinating to say the least - But what really got me thinkig is that a bunch of teachers say about 10-20 could come together and basically start thier own online university in just a matter of weeks or months, and get accrediation online accrediation in a few years - and basically work from home perpetually - Or selling their courses to different universities across the globe - Why not, labs and the such could be duplicated - mail order chemistry and biology kits would be all the rage - and you end up creating a new e-commerce. Or not.&lt;br /&gt;
[[User:Dancoron|Dancoron]] 13:14, 29 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In related news, a very interesting read... [http://complex.foreignpolicy.com/posts/2014/04/22/it_s_not_beijing_s_hackers_you_should_be_worried_about_it_s_moscow_s The Complex: It’s Not Beijing’s Hackers You Should Be Worried About, It’s Moscow’s]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The Russian forces in Ukraine have integrated cyber operations and conventional military tactics in seamless fashion, current and former U.S. officials and experts say.&amp;quot; ... &amp;quot;It was textbook operation that combined centuries old combat tactics with cyber-age assaults.&amp;quot; ... &amp;quot;U.S. intelligence agencies were largely caught off guard by the Russian invasion. The occupying forces limited their use of radios and cell phones and went mostly undetected by the United States&#039; surveillance networks, current and former officials said, an indication of the Russians&#039; technological savvy.&amp;quot; ... &amp;quot;The Russian success is especially stinging for the U.S. because these types of blended attacks -- cyber strikes launched alongside military operations -- are what U.S. military and intelligence officials have for years said will be the hallmarks of America&#039;s future way of fighting a war.&amp;quot; --[[User:Seifip|Seifip]] 14:09, 23 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Has anyone seen this: [http://time.com/74703/net-neutrality-fcc-rules-plan-angers-advocates/]? It&#039;s really thought provoking. On one hand, I see that there is a pertinent argument in that Internet startups might be likely to fail due to not being able to afford to pay the advertising premiums that larger, more established companies can pay, but on the other hand, hasn&#039;t this been done already, to some extent? It seems that most internet users utilize search engines such as Google, Yahoo, Bing, etc. to find information, and all of these have advertisers whose sites are pushed to the top of the search results. Add to that the fact that results are almost always displayed based on what sites are visited most, meaning that the largest companies who can afford to either pay to advertise on the site or via other media are already going to be exponentially more likely to garner further clicks, as they will appear before a smaller Internet start up, for instance. It certainly appears that net neutrality is already a mere theory rather than an actual practice. [[User:Castille|Castille]] 18:45, 24 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Listening to the Radio Berkman piece about wikis, teaching, and the digital divide leaves me with some questions about the emphasis on collaboration. While collaboration is an invaluable social skill that should, in a general sense, be fostered in students, it seems that this obscures the fact that many students are not at their best when forced into a collaborative activity. I don&#039;t mean to suggest that teachers shouldn&#039;t make sure that their students have the ability to collaborate with others, but that still seems distinct from how some students really learn the information/skills at hand. For some, the learning process is less successful/efficient when it&#039;s collaborative, and I think there&#039;s a trend right now to celebrate collaboration in a way that erases the needs of these other students. This seems to be a particular trend in the tech industries... it makes me think of the increasingly popular open office plans that are supposed to make collaboration easier in the workplace. This mood and the excitement about this way of operating/conducting business reminds me of some of the sort of whimsical, utopian ideas people first had about the Internet. [[User:Jkelly|Jkelly]] 23:12, 25 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Obviously, as a student enrolled at HES, I think online learning is a wonderful advancement and will change the face of education. Online learning will not only allow individuals more equal access to higher education, but could alleviate the problems that have been incurred by Public universities, like overcrowding and under funding. With this being said, it is likely that online learning will expand to grade school (especially since high schools all over the country have already started online programs), which presents a bevy of potential problems. Technology is a wonderful thing, and same with online education, however there is no substitute for the social and emotional learning one gets from peer-to-peer interaction, especially during one&#039;s formative years.&lt;br /&gt;
[[User:Castille|Castille]] 16:44, 27 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I greatly enjoyed the Gomes article about the impact of online education on quality &amp;amp; level of education, prestige and market value of online education platforms. I agree with Castille that there is no substitute for peer-to-peer interaction and the active &amp;amp; passive learning that are offered by the classroom experience. I also valued Gomes&#039;s illustration of the current market for online education and possible advancements and pitfalls that the online model offers. Friends who have received online degrees at both the undergraduate and graduate level experience both direct and more subtle discrimination in the current employment environment, and for me the true value of a degree of course lies in return on investment- there is learning for learning&#039;s sake, but far more crucial in today&#039;s for-profit educational model is the assurance of upward income mobility and increased marketability that comes with a degree. Like several authors this week, I too anticipate a shift in attitude towards online education and hope that online degrees come to hold the same cachet as typical college and university degrees. [[User:akk22|akk22]] 12:08, 29 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The advances in technology obviously have a great effect in providing greater access to education, especially to people in economically disadvantaged and under developed areas. However, as education and technology improves, I think we will see a shift in how the two interact. There are so many tools that allow for a more catered and individualized approach to education. I think technology will allow for students to pursue different interests and not be constricted to the limited subjects taught at high schools and grade schools. &lt;br /&gt;
Technology I think will eventually allow us to expand the spectrum of what is taught, shifting from the one-size fits all approach and allowing students to develop other interests. With that said, the importance of social connectivity at schools is important and should never be ruled out. However, greater integration of technology to the school system will fill a gap that at times educators are not able to. &lt;br /&gt;
[[User:Lpereira|Lpereira]] 19:39, 27 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The economics behind MOOCs encourage universities to push the movement forward, and I think forcing traditional education workflow in these systems will not maximize the full potential of MOOCs. As previously stated, people learn the best through different mechanisms (collaborative groups or single handedly or a mix of both). I think MOOCs have the potential to be flexible in adjusting not only to a student&#039;s interest but also learning style. Personally, I think the biggest barrier of MOOCs is encouraging students to attend and stick to the course schedule.  If the dropout rate is high, is that the fault of the MOOC program or the undisciplined student? Hopefully a variety of startups and universities will approach the question of optimizing online education to generate intelligent, efficient thinkers. ([[User:Margorm|Margorm]] 17:37, 28 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
:I had some similar thoughts about the difficulty of getting students to stay involved with MOOCs. I can imagine that it&#039;s much more difficult to stay involved if you&#039;re not equipped with some study skills. Technological literacy is obviously required, but I would be curious to know how skills like time management, organization, and various other study skills effect how likely it is a student will stick with the course. I&#039;m sure interest in and purpose of the course are major factors, but knowing how you best succeed as a student must be important too. I wonder if any online courses have some information or suggestions about this? Most of the skills I imagine I would apply here are things I learned in a traditional classroom as a kid-- keeping lists, tracking assignments, etc. [[User:Jkelly|Jkelly]] 09:30, 29 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Here&#039;s my sampling (and analysis) of the comments made by some of the critics of MOOCs: a) inexperienced founders lacking domain expertise; b) venture capital “bubble”; c) dismissive based on current problems / i.e., no expectation for continuous innovation; d) social arguments about some people being left behind; e) the old guard defending aspects of their product which are in fact not valued quite as much by potential customers as they think it should be; f) failure of the old guard to acknowledge large markets they are currently underserving; g) protective of tradition.&lt;br /&gt;
&lt;br /&gt;
It&#039;s interesting how many of the criticisms of MOOCs parallel various critiques of various applications of the Internet before growth and innovation transformed whole industries: examples include games, ecommerce, online encyclopedias, social networking, etc.  Online education will be no different.&lt;br /&gt;
&lt;br /&gt;
Another observation: people just hate the idea that their favorite university / alma mater might be sharing some of its pedagogy with the hoi poloi.  There&#039;s a large contingent of Harvardians and Ivy Leaguers who absolutely detest the idea of the Extension School.  It wouldn&#039;t be a surprise that some would also detest MOOCs, due to the feeling that it makes their education feel less elite (or the similar perception that students in extension programs are free riders on the university&#039;s reputation).&lt;br /&gt;
[[User:Jradoff|Jradoff]] 13:26, 29 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
As often happens with new technology, MOOCs seem to be blamed for all the problems facing the higher educational system today, when they may in fact be its only hope. The proposition that MOOCs are responsible for reduction of the philosophy department&#039;s faculty is preposterous. Will it replace them? Possibly. Would they the faculty get reduced if MOOCs did not exist? Most probably. Many universities already have many professors who read the texbook and the slides and add little value to their courses. Should we start blaming textbooks too? Maybe propose that courses should be improvised, use no external content whatsoever, to maximize the ROI on the professors&#039; salary? No. The solution is to work with the faculty to use external content, whether textbooks, MOOCs or any other, in the correct way that benefits the students and allows them to remain useful and irreplaceable. --[[User:Seifip|Seifip]] 13:45, 29 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=The_Internet_as_a_Tool_of_Education&amp;diff=2057</id>
		<title>The Internet as a Tool of Education</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=The_Internet_as_a_Tool_of_Education&amp;diff=2057"/>
		<updated>2014-04-23T18:09:02Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 29&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
You are enrolled in (and hopefully not yet tired of!) a class with students across the country and around the globe, where, through a mix of in-person and online learning, we have been able to explore considerable territory around the Internet and how it is controlled. We have availed ourselves of many of the benefits of the web in doing so: all of our class reading has been publicly-accessible web sites, we use Internet applications like Adobe Connect and the HES platform to deliver content and solicit responses, and the syllabus itself is built on open-source coding designed for collaborative engagement.&lt;br /&gt;
&lt;br /&gt;
But we are still in a fairly traditional model of pedagogy - though one that I hope has been effective this semester. As we wind down our studies, consider for a moment the ways in which this technology can be used for far more radical forms of education, and who stands to benefit from such tools.&lt;br /&gt;
&lt;br /&gt;
Joining us will be [http://cyber.law.harvard.edu/people/jreich Justin Reich], Berkman Fellow and the Richard L. Menschel HarvardX Research Fellow, and [http://cyber.law.harvard.edu/people/aenriquez Ana Enriquez], Berkman Fellow and Head Teaching Fellow of CopyrightX.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Modern distance education&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Massive_open_online_course Wikipedia, Massive Open Online Course (MOOC)]&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.edweek.org/edweek/edtechresearcher/2013/05/is_a_mooc_a_textbook_or_a_course.html Justin Reich, Is a MOOC a Textbook or a Course?]&lt;br /&gt;
&lt;br /&gt;
* [http://www.technologyreview.com/news/506376/ivy-league-20-or-just-another-petscom/ Lee Gomes, Ivy League 2.0 or Just Another Pets.com?]&lt;br /&gt;
&lt;br /&gt;
; What is new and what is not?&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.law.harvard.edu/mediaberkman/2012/03/01/rb-192-wikis-teaching-and-the-digital-divide/ Radio Berkman, Wikis, Teaching, and the Digital Divide] (audio, about 18 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
; Concerns, doubts, and issues&lt;br /&gt;
&lt;br /&gt;
* [http://chronicle.com/article/The-Document-Open-Letter-From/138937/ Open letter to Michael Sandel from the San Jose State University Department of Philosophy]&lt;br /&gt;
&lt;br /&gt;
* [http://harry-lewis.blogspot.com/2013/05/moocs-and-moods.html Harry Lewis, MOOCs and MOODs]&lt;br /&gt;
&lt;br /&gt;
; Case Studies - HarvardX and CopyrightX&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/people/tfisher/IP/CopyrightX_Assessment.pdf William Fisher, CopyrightX]&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2381263&amp;amp;download=yes Andrew Dean Ho, HarvardX and MITx: The First Year of Open Online Courses]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Asellars|Asellars]] 15:29, 21 January 2013 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In related news, a very interesting read... [http://complex.foreignpolicy.com/posts/2014/04/22/it_s_not_beijing_s_hackers_you_should_be_worried_about_it_s_moscow_s The Complex: It’s Not Beijing’s Hackers You Should Be Worried About, It’s Moscow’s]&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The Russian forces in Ukraine have integrated cyber operations and conventional military tactics in seamless fashion, current and former U.S. officials and experts say.&amp;quot; ... &amp;quot;It was textbook operation that combined centuries old combat tactics with cyber-age assaults.&amp;quot; ... &amp;quot;U.S. intelligence agencies were largely caught off guard by the Russian invasion. The occupying forces limited their use of radios and cell phones and went mostly undetected by the United States&#039; surveillance networks, current and former officials said, an indication of the Russians&#039; technological savvy.&amp;quot; ... &amp;quot;The Russian success is especially stinging for the U.S. because these types of blended attacks -- cyber strikes launched alongside military operations -- are what U.S. military and intelligence officials have for years said will be the hallmarks of America&#039;s future way of fighting a war.&amp;quot; --[[User:Seifip|Seifip]] 14:09, 23 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=2056</id>
		<title>Hacking, Hackers, and Hacktivism</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=2056"/>
		<updated>2014-04-23T18:07:46Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Defining hackers, hacking, and hacktivism&lt;br /&gt;
&lt;br /&gt;
* [http://gabriellacoleman.org/wp-content/uploads/2012/08/Coleman-Phreaks-Hackers-Trolls.pdf Gabriella Coleman, Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle (from &#039;&#039;The Social Media Reader&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)&lt;br /&gt;
&lt;br /&gt;
:* Sauter uses the term &amp;quot;DDoS&amp;quot; throughout. This is an abbreviation for &amp;quot;distributed denial of service,&amp;quot; a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW. &#039;&#039;Too Much Information&#039;&#039; drifts between fiction and non-fiction, but this excerpt is non-fiction.)&lt;br /&gt;
&lt;br /&gt;
; Law and law enforcement &lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cjr.org/cloud_control/scripps_hackers.php Sarah Laskow, Reporting, Or Illegal Hacking]&lt;br /&gt;
&lt;br /&gt;
; Case studies&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Project_Chanology Wikipedia, Project Chanology]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of &amp;quot;Aaron&#039;s Law&amp;quot; on Aaron Swartz&#039;s Case]&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/ David Kravets, Appeals Court Reverses Hacker/Troll &amp;quot;Weev&amp;quot; Conviction and Sentence]&lt;br /&gt;
&lt;br /&gt;
* [http://www.csmonitor.com/Innovation/2013/1113/Hacking-tool-threatens-Healthcare.gov-site Jeff Ward-Bailey, Hacking Tool Threatens Healthcare.gov Site]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.northwestern.edu/lawreview/v107/n2/795/LR107n2Matwyshyn.pdf Andrea Matwyshyn, Hacking Speech: Informational Speech and the First Amendment]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
CAPTCHAs: http://en.wikipedia.org/wiki/CAPTCHA&lt;br /&gt;
&lt;br /&gt;
Boston Globe paywall: http://www.poynter.org/latest-news/mediawire/242132/boston-globe-drops-paywall-adds-meter-instead/&lt;br /&gt;
&lt;br /&gt;
Examples of Robots.txt: http://www.robotstxt.org/orig.html&lt;br /&gt;
&lt;br /&gt;
Adblock Plus: https://adblockplus.org/&lt;br /&gt;
&lt;br /&gt;
Heartbleed: http://heartbleed.com&lt;br /&gt;
 &lt;br /&gt;
More on heartbleed: http://en.wikipedia.org/wiki/Heartbleed&lt;br /&gt;
&lt;br /&gt;
XKCD explainer of heartbleed: http://xkcd.com/1354/&lt;br /&gt;
&lt;br /&gt;
OpenSSL: http://en.wikipedia.org/wiki/OpenSSL&lt;br /&gt;
&lt;br /&gt;
Bruce on Heartbleed: https://www.schneier.com/blog/archives/2014/04/heartbleed.html&lt;br /&gt;
&lt;br /&gt;
How Netflix Reverse Engineered Hollywood: http://www.theatlantic.com/technology/archive/2014/01/how-netflix-reverse-engineered-hollywood/282679/&lt;br /&gt;
&lt;br /&gt;
Zombie network: http://en.wikipedia.org/wiki/Zombie_(computer_science)&lt;br /&gt;
&lt;br /&gt;
LOIC: http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon&lt;br /&gt;
&lt;br /&gt;
Molly&#039;s Book: http://www.amazon.com/The-Coming-Swarm-Hacktivism-Disobedience/dp/1623564565&lt;br /&gt;
&lt;br /&gt;
Evgeny Morozov defending DDOS as civil disobedience: http://www.slate.com/articles/technology/technology/2010/12/in_defense_of_ddos.html&lt;br /&gt;
&lt;br /&gt;
Troll Face: http://knowyourmeme.com/memes/trollface-coolface-problem&lt;br /&gt;
&lt;br /&gt;
CALEA: http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act&lt;br /&gt;
&lt;br /&gt;
CFAA: http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act&lt;br /&gt;
&lt;br /&gt;
Text of CFAA: http://www.law.cornell.edu/uscode/text/18/1030&lt;br /&gt;
&lt;br /&gt;
Teen hacks into worcester airport: http://www.cnn.com/TECH/computing/9803/18/juvenile.hacker/&lt;br /&gt;
&lt;br /&gt;
Article discussing War Games impact on CFAA:  http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Kapitanyan.FE_.Final_.Weber_.pdf&lt;br /&gt;
&lt;br /&gt;
Weev, whose conviction was just tossed out: http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/&lt;br /&gt;
&lt;br /&gt;
ICCID: http://en.wikipedia.org/wiki/ICCID#ICCID&lt;br /&gt;
&lt;br /&gt;
Heartbleed test: https://filippo.io/Heartbleed/&lt;br /&gt;
&lt;br /&gt;
Google bug bounties: http://www.google.com/about/appsecurity/reward-program/&lt;br /&gt;
&lt;br /&gt;
$115k for an apple bug: http://www.forbes.com/sites/firewall/2010/03/25/the-bounty-for-an-apple-bug-115000/&lt;br /&gt;
&lt;br /&gt;
Fire Sale Hacker message on Live Free or Die Hard: https://www.youtube.com/watch?v=AyGhT3YTP7A&lt;br /&gt;
&lt;br /&gt;
Story about the mom who created fake myspace profile: http://www.dailymail.co.uk/news/article-1089908/Mother-faces-jail-300-000-fine-setting-fake-MySpace-profile-bully-girl-later-killed-herself.html&lt;br /&gt;
&lt;br /&gt;
US federal sentencing guidelines: http://en.wikipedia.org/wiki/United_States_Federal_Sentencing_Guidelines&lt;br /&gt;
&lt;br /&gt;
MBTA vs Anderson: http://en.wikipedia.org/wiki/Massachusetts_Bay_Transportation_Authority_v._Anderson&lt;br /&gt;
&lt;br /&gt;
Aaron Swartz: http://en.wikipedia.org/wiki/Aaron_Swartz&lt;br /&gt;
&lt;br /&gt;
MAC address: http://en.wikipedia.org/wiki/MAC_address&lt;br /&gt;
&lt;br /&gt;
Secret Service&#039;s National Computer Forensics Institute: https://www.ncfi.usss.gov/ncfi/&lt;br /&gt;
&lt;br /&gt;
Felon Voting: http://felonvoting.procon.org/view.resource.php?resourceID=000286&lt;br /&gt;
&lt;br /&gt;
RECAP the law: https://www.recapthelaw.org&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 10:28, 17 December 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:In July 2012, someone successfully hacked my iphone and installed spy software on it. Any and all movements on my iPhone were being stored/tracked unbeknownst to me, including app activity (Chase Bank, emails, etc) for one month. I found out about it when I had taken my iPhone in a shop to get checked out - the screen would glitch at times and would randomly lose about 1% per minute. (I learned this was when my GPS data was being tracked up to minute). Among other things, the next step was to file a police report of this incident for my personal safety, as I’ll never be certain which data of mine was compromised.  At the time I went to local police, either they didn’t care enough or they just didn’t have proper protocol to handle it.&lt;br /&gt;
:I understand this is a miniscule crime, in comparison to the huge cyber-crimes in the class readings. However, it lead me to research how equipped local police are for such smaller incidences. The result: They&#039;re not. (yet).  I’m certain similar, smaller crimes will only increase over time and will be dealt with by the local police. While crime is increasingly moving online, state and local police are having a hard time keeping up. If the case is significant enough, the police have to hire specialized cyber-security companies to conduct digital investigations. The techniques the police will need to be equipped with are going to have to be more “IT specialist” and less “Law and Order” over the next few years. It seems hackers will be one step ahead, at a local level, until the police shift their skill set to more IT training. [[User:Marissa1989|Marissa1989]] 02:41, 21 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:: I&#039;m very glad you mentioned this because I completely agree. On a smaller level such as the local police, I agree that they do not have the resources or the structure in place yet to deal with hacking of cell phones and breaches of personal information.  While large national crimes are handled properly, there should also be an active protocol for situations such as this, which happen very often. The lack of a targeted action by law enforcement against these small time criminals facilitate identity theft and unless there is a strong development in the law enforcement IT department, chances are these crimes will only increase with time. [[User:Lpereira|Lpereira]] 09:16, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
::: Several readings this week caused me to think about the perceived value, real and potential, of personal data. Targeted hacking of trade secrets, governments, publications like the New York Times and other large-scale operations are rooted in fairly straightforward incentives. So too are hacktivists and hackers that are &amp;quot;doing it for the lulz&amp;quot;- outcomes that are for more about provoking a response or creating change. Targeted hacks of individuals for personal data not only are much more difficult to prevent, identify and pursue on the part of law enforcement- they also happen on a scale that is not seen to have a significant enough impact economically, societally or organizationally to receive the attention truly deserved. Given the frequency of such instances, and the yearly increase in information and services processed solely online, the public service and private sector incentive to have structures in place to respond to such attacks surely must reach a tipping point soon? [[User:akk22|akk22]] 14:26, 22 April 2014 (EDT)-----&lt;br /&gt;
Cyber warfare will take on a greater importance in conventional warfare and Government hackers will be crucial to this. It only makes sense as weapons, communications and systems become more sophisticated. Hackers may be used to break into countries systems to steal data and cause widespread disruption or break into the phones of country leaders and their key staff. This is evidenced in the Ukraine crisis by relentless hacking attacks on Russian websites by Ukraninan hackers and visa-versa. http://www.bloomberg.com/news/2014-03-05/russia-ukraine-standoff-going-online-as-hackers-attack.html [[User:Marissa1989|Marissa1989]] 01:06, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Andy, thanks for your article on the Aaron Schwartz prosecution.  As you put it, &amp;quot;CFAA is shockingly broad when it is laid out&amp;quot; -- but that&#039;s not the only issue with it.  It&#039;s just another case of private industry co-opting the criminal justice system to enforce things that ought to be largely handled by the civil system (which strikes me as lousy public policy).  As you noted in your quote from the CFAA itself, &amp;quot;access in violation of an agreement or contractual obligation, such as an acceptable use policy or terms of service agreement...&amp;quot; In other words, the CFAA makes it a crime to violate the AUP or TOS with your ISP.  Outside of copyrights and information technology stuff, how common is it for the US government to get involved in criminalizing the violations of contracts between private parties?&lt;br /&gt;
[[User:Jradoff|Jradoff]] 09:46, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In the article &amp;quot;Hacking tool threatens Healthcare.gov site&amp;quot; a DDoS is the least of  warranted concerns. A DoS attack is grave in nature and is rather simple to perform. Many attempts have been made to develop systems that could either launch a DoS attack or be immune to one, but to assume that the nefarious minds out there in the arena aren’t constantly working on new and novel methods to exploit systems is naïve and foolish. The rash and explosion of virus and malware activity in the recent decades testifies to the fact that there is no dearth of people working to venture into, exploit and topple your systems. The use of pre configured or automated tools that are easy to operate in order to pursue their disruptive activities against systems in a network are identifiable. . DoS attacks are nothing but an onslaught or assault against your system that will affect in that system not being able to accomplish its intended job. The direction of the argument within the article fails to look at the programming and structure of the website itself that may allow for significant data leakage. [[User:VACYBER|VACYBER]] 13:05, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say this is one of the topics I was most looking forward to this semester, particularly with the growing number of hacktivist groups and hackers. I was quite intrigued by the recent events around the Heartbleed bug, which they are calling one of the greatest security threats in the online era (http://en.wikipedia.org/wiki/Heartbleed). As I have noticed in many of your posts already, I believe the growing consensus is that hacking is here to stay and will likely become more predominate in our national security moving forward. As more and more functions of our society move online (think traffic grids, manufacturing processes, defense systems), the urgency to protect against hacking threats grows each year.&lt;br /&gt;
&lt;br /&gt;
What will then intrigue me to hear is what is being done to slow down hackers, particularly those who may pose a greater security risk than say, taking over a facebook page. I believe part of the issue is that the NSA needs to be able to attract and retain elite computer hackers who can help in this regard, yet have been unable to do so. The best computer minds would rather take a payday from Google than work for the government at a more modest wage. &lt;br /&gt;
&lt;br /&gt;
Can&#039;t wait to hear this lecture and see what there is to be said about slowing hackers in the future. &lt;br /&gt;
&lt;br /&gt;
[[User:Drogowski|Drogowski]] 13:13, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Grrr... The site logged me out while I wrote my last message and then proceeded to delete it :( &lt;br /&gt;
&lt;br /&gt;
Any ways, I think this weeks&#039; readings raise a lot of questions about the &amp;quot;morality&amp;quot; of internet behavior and online hacktivism. Interestingly, there seems to be an influx of individuals who wouldn&#039;t necessarily be apt to breaking and entering in the physical world, but who are doing just that via their computers. I wonder in these cases whether it is the ease, the relative security, or that it feels less invasive/illegal that draws people to hacking rather than more physically invasive means.&lt;br /&gt;
&lt;br /&gt;
It also seems that there is a great degree of ambiguity to the laws which govern how one is expected to comport themselves online. This is made especially clear in Sarah Laskow&#039;s article, in which she points out that &amp;quot;The CFAA isn’t a law that journalists are taught to look out for.&amp;quot; This presents us with a scary reality, that individuals like you and I, as well as professionals such as reporters, might be subject to laws which we might not realize exist or understand and could easily be breaking, just by doing what we think is simple research. While I understand the necessity of regulation, it can also be a catch-22. &lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 15:14, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
As it is clear from readings and Aaron&#039;s case, the security of information is the crucial question of nowadays. Data contained in computer, data contained in mobile phone is so essential and important that they ruin lifes once they are disclosed. When it comes to criminalization of hackerisim or non-authorized access or &amp;quot;with exceeding authorizatiob&amp;quot; is a right direction from point of security. But, still I think that this is more technological issue rather than legislative. Aysel Ibayeva ([[User:Aysel|Aysel]] 15:21, 22 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
First of all, I&#039;m surprised that the Intelligence squared debate wasn&#039;t in the required readings, as I found to be the most interesting &amp;quot;reading&amp;quot; this week.&lt;br /&gt;
&lt;br /&gt;
On a different note, Phreaks, Hackers, and Trolls got me thinking about how the line between the hacker community and the general public is getting more and more blurred... I would argue that many of the actors on the internet who would have clearly been assigned to the hacker community just 10 years ago, such as trolls, producers of internet memes, etc., are now no longer clearly a part of that community which created them. At the same time, the lines between these individual actors is becoming more pronounced. I was fairly active in the hacker community in the 2000s, and most people in the community would be at once geeks, trolls, security experts, meme designers and political activists, all bound by similar values. Today, it feels as if this community is almost gone, divided instead into those who use internet for the lolz alone, those who merged with the general internet public, and those who are becoming almost too serious about the agenda and activities. If there is something that remains close in the general feeling, its the Open Source community, but it too is very different from what it was. --[[User:Seifip|Seifip]] 15:39, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Gabriella Coleman’s account clearly shows the relationship status between phone phreaks, hackers, and trolls. Starting with the discovery of the 2600 hertz tone that could “stop the phone”, phreaking developed a huge following with printed magazines, newspapers, and even a magazine named after the 2600 hertz tone itself. The growth of technology caused the Internet and computers to became more available along with new ways to tinker with it. Due to pop culture growth with movies such as War Games, the challenges imposed by code hacking became the new pastime. Trolls, having similarities with hackers (and possibly even being hackers) are different in their lust for the “lulz”. They specialize in audacious, shocking, and flagrant humor. Occasionally, the worst cases acquire a “disease” called CTS where the trolling becomes such a habit that they no longer restrict it to strangers but look for “lulz” by victimizing their own friends and family. &lt;br /&gt;
 &lt;br /&gt;
DDoS attacks are an effective tool that are tricky to guard against. In simple terms, because of the users ability to rapidly intensify the attack by aggregating more users to assist with the attack, the assault becomes overwhelming.&lt;br /&gt;
 &lt;br /&gt;
Operation Payback was a series of DDoS attacks by the group “Anonymous”. They were champions of peer-to-peer sites. Attacking music sites, copyright advocates, governments, law firms, censorship sites, and basically any group that held views against free circulation of data on the Internet, Anonymous received lots of criticism and even some DDoS attacks to their own site. Even Pirate Party UK and United States Pirate Party spoke out against their actions calling for a more democratic “legal” way to handle their problems. Even though the affected sites were down for a little while, there was not enough significant damage to the attacked parties to produce permanent damage. The down time can best be compared to people boycotting an unpopular store.&lt;br /&gt;
 &lt;br /&gt;
The Computer Fraud And Abuse Act seems to be very vague, especially in the way it was applied in the Scripps “Hackers” and Andrew &amp;quot;weev&amp;quot; cases. It is implied that normal regular Internet surfing could have the potential to land someone in jail. [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 22 April 2014 (EDT) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I was recently watching a car review show on YouTube and found out that nowadays hackers are so sophisticated that they can even break into one&#039;s vehicle. Generally speaking, I do not think that hackers do recognize codes as governing forces of the internet as they can manipulate a lot of them as they wish. More e-commerce sites and even some social networking platforms are increasingly doing their best in order to fight with these groups as a way of controlling their audiences. &lt;br /&gt;
([[User:cheikhmbacke|cheikhmbacke]] 15:42, 22 April 2014 (EDT))&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=2054</id>
		<title>Hacking, Hackers, and Hacktivism</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=2054"/>
		<updated>2014-04-23T17:29:17Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Defining hackers, hacking, and hacktivism&lt;br /&gt;
&lt;br /&gt;
* [http://gabriellacoleman.org/wp-content/uploads/2012/08/Coleman-Phreaks-Hackers-Trolls.pdf Gabriella Coleman, Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle (from &#039;&#039;The Social Media Reader&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)&lt;br /&gt;
&lt;br /&gt;
:* Sauter uses the term &amp;quot;DDoS&amp;quot; throughout. This is an abbreviation for &amp;quot;distributed denial of service,&amp;quot; a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW. &#039;&#039;Too Much Information&#039;&#039; drifts between fiction and non-fiction, but this excerpt is non-fiction.)&lt;br /&gt;
&lt;br /&gt;
; Law and law enforcement &lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cjr.org/cloud_control/scripps_hackers.php Sarah Laskow, Reporting, Or Illegal Hacking]&lt;br /&gt;
&lt;br /&gt;
; Case studies&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Project_Chanology Wikipedia, Project Chanology]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of &amp;quot;Aaron&#039;s Law&amp;quot; on Aaron Swartz&#039;s Case]&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/ David Kravets, Appeals Court Reverses Hacker/Troll &amp;quot;Weev&amp;quot; Conviction and Sentence]&lt;br /&gt;
&lt;br /&gt;
* [http://www.csmonitor.com/Innovation/2013/1113/Hacking-tool-threatens-Healthcare.gov-site Jeff Ward-Bailey, Hacking Tool Threatens Healthcare.gov Site]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.northwestern.edu/lawreview/v107/n2/795/LR107n2Matwyshyn.pdf Andrea Matwyshyn, Hacking Speech: Informational Speech and the First Amendment]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
CAPTCHAs: http://en.wikipedia.org/wiki/CAPTCHA&lt;br /&gt;
&lt;br /&gt;
Boston Globe paywall: http://www.poynter.org/latest-news/mediawire/242132/boston-globe-drops-paywall-adds-meter-instead/&lt;br /&gt;
&lt;br /&gt;
Examples of Robots.txt: http://www.robotstxt.org/orig.html&lt;br /&gt;
&lt;br /&gt;
Adblock Plus: https://adblockplus.org/&lt;br /&gt;
&lt;br /&gt;
Heartbleed: http://heartbleed.com&lt;br /&gt;
 &lt;br /&gt;
More on heartbleed: http://en.wikipedia.org/wiki/Heartbleed&lt;br /&gt;
&lt;br /&gt;
XKCD explainer of heartbleed: http://xkcd.com/1354/&lt;br /&gt;
&lt;br /&gt;
OpenSSL: http://en.wikipedia.org/wiki/OpenSSL&lt;br /&gt;
&lt;br /&gt;
Bruce on Heartbleed: https://www.schneier.com/blog/archives/2014/04/heartbleed.html&lt;br /&gt;
&lt;br /&gt;
How Netflix Reverse Engineered Hollywood: http://www.theatlantic.com/technology/archive/2014/01/how-netflix-reverse-engineered-hollywood/282679/&lt;br /&gt;
&lt;br /&gt;
Zombie network: http://en.wikipedia.org/wiki/Zombie_(computer_science)&lt;br /&gt;
&lt;br /&gt;
LOIC: http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon&lt;br /&gt;
&lt;br /&gt;
Molly&#039;s Book: http://www.amazon.com/The-Coming-Swarm-Hacktivism-Disobedience/dp/1623564565&lt;br /&gt;
&lt;br /&gt;
Evgeny Morozov defending DDOS as civil disobedience: http://www.slate.com/articles/technology/technology/2010/12/in_defense_of_ddos.html&lt;br /&gt;
&lt;br /&gt;
Troll Face: http://knowyourmeme.com/memes/trollface-coolface-problem&lt;br /&gt;
&lt;br /&gt;
CALEA: http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act&lt;br /&gt;
&lt;br /&gt;
CFAA: http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act&lt;br /&gt;
&lt;br /&gt;
Text of CFAA: http://www.law.cornell.edu/uscode/text/18/1030&lt;br /&gt;
&lt;br /&gt;
Teen hacks into worcester airport: http://www.cnn.com/TECH/computing/9803/18/juvenile.hacker/&lt;br /&gt;
&lt;br /&gt;
Article discussing War Games impact on CFAA:  http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Kapitanyan.FE_.Final_.Weber_.pdf&lt;br /&gt;
&lt;br /&gt;
Weev, whose conviction was just tossed out: http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/&lt;br /&gt;
&lt;br /&gt;
ICCID: http://en.wikipedia.org/wiki/ICCID#ICCID&lt;br /&gt;
&lt;br /&gt;
Heartbleed test: https://filippo.io/Heartbleed/&lt;br /&gt;
&lt;br /&gt;
Google bug bounties: http://www.google.com/about/appsecurity/reward-program/&lt;br /&gt;
&lt;br /&gt;
$115k for an apple bug: http://www.forbes.com/sites/firewall/2010/03/25/the-bounty-for-an-apple-bug-115000/&lt;br /&gt;
&lt;br /&gt;
Fire Sale Hacker message on Live Free or Die Hard: https://www.youtube.com/watch?v=AyGhT3YTP7A&lt;br /&gt;
&lt;br /&gt;
Story about the mom who created fake myspace profile: http://www.dailymail.co.uk/news/article-1089908/Mother-faces-jail-300-000-fine-setting-fake-MySpace-profile-bully-girl-later-killed-herself.html&lt;br /&gt;
&lt;br /&gt;
US federal sentencing guidelines: http://en.wikipedia.org/wiki/United_States_Federal_Sentencing_Guidelines&lt;br /&gt;
&lt;br /&gt;
MBTA vs Anderson: http://en.wikipedia.org/wiki/Massachusetts_Bay_Transportation_Authority_v._Anderson&lt;br /&gt;
&lt;br /&gt;
Aaron Swartz: http://en.wikipedia.org/wiki/Aaron_Swartz&lt;br /&gt;
&lt;br /&gt;
MAC address: http://en.wikipedia.org/wiki/MAC_address&lt;br /&gt;
&lt;br /&gt;
Secret Service&#039;s National Computer Forensics Institute: https://www.ncfi.usss.gov/ncfi/&lt;br /&gt;
&lt;br /&gt;
Felon Voting: http://felonvoting.procon.org/view.resource.php?resourceID=000286&lt;br /&gt;
&lt;br /&gt;
RECAP the law: https://www.recapthelaw.org&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 10:28, 17 December 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:In July 2012, someone successfully hacked my iphone and installed spy software on it. Any and all movements on my iPhone were being stored/tracked unbeknownst to me, including app activity (Chase Bank, emails, etc) for one month. I found out about it when I had taken my iPhone in a shop to get checked out - the screen would glitch at times and would randomly lose about 1% per minute. (I learned this was when my GPS data was being tracked up to minute). Among other things, the next step was to file a police report of this incident for my personal safety, as I’ll never be certain which data of mine was compromised.  At the time I went to local police, either they didn’t care enough or they just didn’t have proper protocol to handle it.&lt;br /&gt;
:I understand this is a miniscule crime, in comparison to the huge cyber-crimes in the class readings. However, it lead me to research how equipped local police are for such smaller incidences. The result: They&#039;re not. (yet).  I’m certain similar, smaller crimes will only increase over time and will be dealt with by the local police. While crime is increasingly moving online, state and local police are having a hard time keeping up. If the case is significant enough, the police have to hire specialized cyber-security companies to conduct digital investigations. The techniques the police will need to be equipped with are going to have to be more “IT specialist” and less “Law and Order” over the next few years. It seems hackers will be one step ahead, at a local level, until the police shift their skill set to more IT training. [[User:Marissa1989|Marissa1989]] 02:41, 21 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:: I&#039;m very glad you mentioned this because I completely agree. On a smaller level such as the local police, I agree that they do not have the resources or the structure in place yet to deal with hacking of cell phones and breaches of personal information.  While large national crimes are handled properly, there should also be an active protocol for situations such as this, which happen very often. The lack of a targeted action by law enforcement against these small time criminals facilitate identity theft and unless there is a strong development in the law enforcement IT department, chances are these crimes will only increase with time. [[User:Lpereira|Lpereira]] 09:16, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
::: Several readings this week caused me to think about the perceived value, real and potential, of personal data. Targeted hacking of trade secrets, governments, publications like the New York Times and other large-scale operations are rooted in fairly straightforward incentives. So too are hacktivists and hackers that are &amp;quot;doing it for the lulz&amp;quot;- outcomes that are for more about provoking a response or creating change. Targeted hacks of individuals for personal data not only are much more difficult to prevent, identify and pursue on the part of law enforcement- they also happen on a scale that is not seen to have a significant enough impact economically, societally or organizationally to receive the attention truly deserved. Given the frequency of such instances, and the yearly increase in information and services processed solely online, the public service and private sector incentive to have structures in place to respond to such attacks surely must reach a tipping point soon? [[User:akk22|akk22]] 14:26, 22 April 2014 (EDT)-----&lt;br /&gt;
Cyber warfare will take on a greater importance in conventional warfare and Government hackers will be crucial to this. It only makes sense as weapons, communications and systems become more sophisticated. Hackers may be used to break into countries systems to steal data and cause widespread disruption or break into the phones of country leaders and their key staff. This is evidenced in the Ukraine crisis by relentless hacking attacks on Russian websites by Ukraninan hackers and visa-versa. http://www.bloomberg.com/news/2014-03-05/russia-ukraine-standoff-going-online-as-hackers-attack.html [[User:Marissa1989|Marissa1989]] 01:06, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Andy, thanks for your article on the Aaron Schwartz prosecution.  As you put it, &amp;quot;CFAA is shockingly broad when it is laid out&amp;quot; -- but that&#039;s not the only issue with it.  It&#039;s just another case of private industry co-opting the criminal justice system to enforce things that ought to be largely handled by the civil system (which strikes me as lousy public policy).  As you noted in your quote from the CFAA itself, &amp;quot;access in violation of an agreement or contractual obligation, such as an acceptable use policy or terms of service agreement...&amp;quot; In other words, the CFAA makes it a crime to violate the AUP or TOS with your ISP.  Outside of copyrights and information technology stuff, how common is it for the US government to get involved in criminalizing the violations of contracts between private parties?&lt;br /&gt;
[[User:Jradoff|Jradoff]] 09:46, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In the article &amp;quot;Hacking tool threatens Healthcare.gov site&amp;quot; a DDoS is the least of  warranted concerns. A DoS attack is grave in nature and is rather simple to perform. Many attempts have been made to develop systems that could either launch a DoS attack or be immune to one, but to assume that the nefarious minds out there in the arena aren’t constantly working on new and novel methods to exploit systems is naïve and foolish. The rash and explosion of virus and malware activity in the recent decades testifies to the fact that there is no dearth of people working to venture into, exploit and topple your systems. The use of pre configured or automated tools that are easy to operate in order to pursue their disruptive activities against systems in a network are identifiable. . DoS attacks are nothing but an onslaught or assault against your system that will affect in that system not being able to accomplish its intended job. The direction of the argument within the article fails to look at the programming and structure of the website itself that may allow for significant data leakage. [[User:VACYBER|VACYBER]] 13:05, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say this is one of the topics I was most looking forward to this semester, particularly with the growing number of hacktivist groups and hackers. I was quite intrigued by the recent events around the Heartbleed bug, which they are calling one of the greatest security threats in the online era (http://en.wikipedia.org/wiki/Heartbleed). As I have noticed in many of your posts already, I believe the growing consensus is that hacking is here to stay and will likely become more predominate in our national security moving forward. As more and more functions of our society move online (think traffic grids, manufacturing processes, defense systems), the urgency to protect against hacking threats grows each year.&lt;br /&gt;
&lt;br /&gt;
What will then intrigue me to hear is what is being done to slow down hackers, particularly those who may pose a greater security risk than say, taking over a facebook page. I believe part of the issue is that the NSA needs to be able to attract and retain elite computer hackers who can help in this regard, yet have been unable to do so. The best computer minds would rather take a payday from Google than work for the government at a more modest wage. &lt;br /&gt;
&lt;br /&gt;
Can&#039;t wait to hear this lecture and see what there is to be said about slowing hackers in the future. &lt;br /&gt;
&lt;br /&gt;
[[User:Drogowski|Drogowski]] 13:13, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Grrr... The site logged me out while I wrote my last message and then proceeded to delete it :( &lt;br /&gt;
&lt;br /&gt;
Any ways, I think this weeks&#039; readings raise a lot of questions about the &amp;quot;morality&amp;quot; of internet behavior and online hacktivism. Interestingly, there seems to be an influx of individuals who wouldn&#039;t necessarily be apt to breaking and entering in the physical world, but who are doing just that via their computers. I wonder in these cases whether it is the ease, the relative security, or that it feels less invasive/illegal that draws people to hacking rather than more physically invasive means.&lt;br /&gt;
&lt;br /&gt;
It also seems that there is a great degree of ambiguity to the laws which govern how one is expected to comport themselves online. This is made especially clear in Sarah Laskow&#039;s article, in which she points out that &amp;quot;The CFAA isn’t a law that journalists are taught to look out for.&amp;quot; This presents us with a scary reality, that individuals like you and I, as well as professionals such as reporters, might be subject to laws which we might not realize exist or understand and could easily be breaking, just by doing what we think is simple research. While I understand the necessity of regulation, it can also be a catch-22. &lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 15:14, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
As it is clear from readings and Aaron&#039;s case, the security of information is the crucial question of nowadays. Data contained in computer, data contained in mobile phone is so essential and important that they ruin lifes once they are disclosed. When it comes to criminalization of hackerisim or non-authorized access or &amp;quot;with exceeding authorizatiob&amp;quot; is a right direction from point of security. But, still I think that this is more technological issue rather than legislative. Aysel Ibayeva ([[User:Aysel|Aysel]] 15:21, 22 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
First of all, I&#039;m surprised that the Intelligence squared debate wasn&#039;t in the required readings, as I found to be the most interesting &amp;quot;reading&amp;quot; this week.&lt;br /&gt;
&lt;br /&gt;
On a different note, Phreaks, Hackers, and Trolls got me thinking about how the line between the hacker community and the general public is getting more and more blurred... I would argue that many of the actors on the internet who would have clearly been assigned to the hacker community just 10 years ago, such as trolls, producers of internet memes, etc., are now no longer clearly a part of that community which created them. At the same time, the lines between these individual actors is becoming more pronounced. I was fairly active in the hacker community in the 2000s, and most people in the community would be at once geeks, trolls, security experts, meme designers and political activists, all bound by similar values. Today, it feels as if this community is almost gone, divided instead into those who use internet for the lolz alone, those who merged with the general internet public, and those who are becoming almost too serious about the agenda and activities. If there is something that remains close in the general feeling, its the Open Source community, but it too is very different from what it was. --[[User:Seifip|Seifip]] 15:39, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Gabriella Coleman’s account clearly shows the relationship status between phone phreaks, hackers, and trolls. Starting with the discovery of the 2600 hertz tone that could “stop the phone”, phreaking developed a huge following with printed magazines, newspapers, and even a magazine named after the 2600 hertz tone itself. The growth of technology caused the Internet and computers to became more available along with new ways to tinker with it. Due to pop culture growth with movies such as War Games, the challenges imposed by code hacking became the new pastime. Trolls, having similarities with hackers (and possibly even being hackers) are different in their lust for the “lulz”. They specialize in audacious, shocking, and flagrant humor. Occasionally, the worst cases acquire a “disease” called CTS where the trolling becomes such a habit that they no longer restrict it to strangers but look for “lulz” by victimizing their own friends and family. &lt;br /&gt;
 &lt;br /&gt;
DDoS attacks are an effective tool that are tricky to guard against. In simple terms, because of the users ability to rapidly intensify the attack by aggregating more users to assist with the attack, the assault becomes overwhelming.&lt;br /&gt;
 &lt;br /&gt;
Operation Payback was a series of DDoS attacks by the group “Anonymous”. They were champions of peer-to-peer sites. Attacking music sites, copyright advocates, governments, law firms, censorship sites, and basically any group that held views against free circulation of data on the Internet, Anonymous received lots of criticism and even some DDoS attacks to their own site. Even Pirate Party UK and United States Pirate Party spoke out against their actions calling for a more democratic “legal” way to handle their problems. Even though the affected sites were down for a little while, there was not enough significant damage to the attacked parties to produce permanent damage. The down time can best be compared to people boycotting an unpopular store.&lt;br /&gt;
 &lt;br /&gt;
The Computer Fraud And Abuse Act seems to be very vague, especially in the way it was applied in the Scripps “Hackers” and Andrew &amp;quot;weev&amp;quot; cases. It is implied that normal regular Internet surfing could have the potential to land someone in jail. [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 22 April 2014 (EDT) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I was recently watching a car review show on YouTube and found out that nowadays hackers are so sophisticated that they can even break into one&#039;s vehicle. Generally speaking, I do not think that hackers do recognize codes as governing forces of the internet as they can manipulate a lot of them as they wish. More e-commerce sites and even some social networking platforms are increasingly doing their best in order to fight with these groups as a way of controlling their audiences. &lt;br /&gt;
([[User:cheikhmbacke|cheikhmbacke]] 15:42, 22 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In related news... [http://complex.foreignpolicy.com/posts/2014/04/22/it_s_not_beijing_s_hackers_you_should_be_worried_about_it_s_moscow_s The Complex: It’s Not Beijing’s Hackers You Should Be Worried About, It’s Moscow’s] --[[User:Seifip|Seifip]] 13:28, 23 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=2053</id>
		<title>Hacking, Hackers, and Hacktivism</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=2053"/>
		<updated>2014-04-23T17:28:48Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Defining hackers, hacking, and hacktivism&lt;br /&gt;
&lt;br /&gt;
* [http://gabriellacoleman.org/wp-content/uploads/2012/08/Coleman-Phreaks-Hackers-Trolls.pdf Gabriella Coleman, Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle (from &#039;&#039;The Social Media Reader&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)&lt;br /&gt;
&lt;br /&gt;
:* Sauter uses the term &amp;quot;DDoS&amp;quot; throughout. This is an abbreviation for &amp;quot;distributed denial of service,&amp;quot; a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW. &#039;&#039;Too Much Information&#039;&#039; drifts between fiction and non-fiction, but this excerpt is non-fiction.)&lt;br /&gt;
&lt;br /&gt;
; Law and law enforcement &lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cjr.org/cloud_control/scripps_hackers.php Sarah Laskow, Reporting, Or Illegal Hacking]&lt;br /&gt;
&lt;br /&gt;
; Case studies&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Project_Chanology Wikipedia, Project Chanology]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of &amp;quot;Aaron&#039;s Law&amp;quot; on Aaron Swartz&#039;s Case]&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/ David Kravets, Appeals Court Reverses Hacker/Troll &amp;quot;Weev&amp;quot; Conviction and Sentence]&lt;br /&gt;
&lt;br /&gt;
* [http://www.csmonitor.com/Innovation/2013/1113/Hacking-tool-threatens-Healthcare.gov-site Jeff Ward-Bailey, Hacking Tool Threatens Healthcare.gov Site]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.northwestern.edu/lawreview/v107/n2/795/LR107n2Matwyshyn.pdf Andrea Matwyshyn, Hacking Speech: Informational Speech and the First Amendment]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
CAPTCHAs: http://en.wikipedia.org/wiki/CAPTCHA&lt;br /&gt;
&lt;br /&gt;
Boston Globe paywall: http://www.poynter.org/latest-news/mediawire/242132/boston-globe-drops-paywall-adds-meter-instead/&lt;br /&gt;
&lt;br /&gt;
Examples of Robots.txt: http://www.robotstxt.org/orig.html&lt;br /&gt;
&lt;br /&gt;
Adblock Plus: https://adblockplus.org/&lt;br /&gt;
&lt;br /&gt;
Heartbleed: http://heartbleed.com&lt;br /&gt;
 &lt;br /&gt;
More on heartbleed: http://en.wikipedia.org/wiki/Heartbleed&lt;br /&gt;
&lt;br /&gt;
XKCD explainer of heartbleed: http://xkcd.com/1354/&lt;br /&gt;
&lt;br /&gt;
OpenSSL: http://en.wikipedia.org/wiki/OpenSSL&lt;br /&gt;
&lt;br /&gt;
Bruce on Heartbleed: https://www.schneier.com/blog/archives/2014/04/heartbleed.html&lt;br /&gt;
&lt;br /&gt;
How Netflix Reverse Engineered Hollywood: http://www.theatlantic.com/technology/archive/2014/01/how-netflix-reverse-engineered-hollywood/282679/&lt;br /&gt;
&lt;br /&gt;
Zombie network: http://en.wikipedia.org/wiki/Zombie_(computer_science)&lt;br /&gt;
&lt;br /&gt;
LOIC: http://en.wikipedia.org/wiki/Low_Orbit_Ion_Cannon&lt;br /&gt;
&lt;br /&gt;
Molly&#039;s Book: http://www.amazon.com/The-Coming-Swarm-Hacktivism-Disobedience/dp/1623564565&lt;br /&gt;
&lt;br /&gt;
Evgeny Morozov defending DDOS as civil disobedience: http://www.slate.com/articles/technology/technology/2010/12/in_defense_of_ddos.html&lt;br /&gt;
&lt;br /&gt;
Troll Face: http://knowyourmeme.com/memes/trollface-coolface-problem&lt;br /&gt;
&lt;br /&gt;
CALEA: http://en.wikipedia.org/wiki/Communications_Assistance_for_Law_Enforcement_Act&lt;br /&gt;
&lt;br /&gt;
CFAA: http://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act&lt;br /&gt;
&lt;br /&gt;
Text of CFAA: http://www.law.cornell.edu/uscode/text/18/1030&lt;br /&gt;
&lt;br /&gt;
Teen hacks into worcester airport: http://www.cnn.com/TECH/computing/9803/18/juvenile.hacker/&lt;br /&gt;
&lt;br /&gt;
Article discussing War Games impact on CFAA:  http://moritzlaw.osu.edu/students/groups/is/files/2012/02/Kapitanyan.FE_.Final_.Weber_.pdf&lt;br /&gt;
&lt;br /&gt;
Weev, whose conviction was just tossed out: http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/&lt;br /&gt;
&lt;br /&gt;
ICCID: http://en.wikipedia.org/wiki/ICCID#ICCID&lt;br /&gt;
&lt;br /&gt;
Heartbleed test: https://filippo.io/Heartbleed/&lt;br /&gt;
&lt;br /&gt;
Google bug bounties: http://www.google.com/about/appsecurity/reward-program/&lt;br /&gt;
&lt;br /&gt;
$115k for an apple bug: http://www.forbes.com/sites/firewall/2010/03/25/the-bounty-for-an-apple-bug-115000/&lt;br /&gt;
&lt;br /&gt;
Fire Sale Hacker message on Live Free or Die Hard: https://www.youtube.com/watch?v=AyGhT3YTP7A&lt;br /&gt;
&lt;br /&gt;
Story about the mom who created fake myspace profile: http://www.dailymail.co.uk/news/article-1089908/Mother-faces-jail-300-000-fine-setting-fake-MySpace-profile-bully-girl-later-killed-herself.html&lt;br /&gt;
&lt;br /&gt;
US federal sentencing guidelines: http://en.wikipedia.org/wiki/United_States_Federal_Sentencing_Guidelines&lt;br /&gt;
&lt;br /&gt;
MBTA vs Anderson: http://en.wikipedia.org/wiki/Massachusetts_Bay_Transportation_Authority_v._Anderson&lt;br /&gt;
&lt;br /&gt;
Aaron Swartz: http://en.wikipedia.org/wiki/Aaron_Swartz&lt;br /&gt;
&lt;br /&gt;
MAC address: http://en.wikipedia.org/wiki/MAC_address&lt;br /&gt;
&lt;br /&gt;
Secret Service&#039;s National Computer Forensics Institute: https://www.ncfi.usss.gov/ncfi/&lt;br /&gt;
&lt;br /&gt;
Felon Voting: http://felonvoting.procon.org/view.resource.php?resourceID=000286&lt;br /&gt;
&lt;br /&gt;
RECAP the law: https://www.recapthelaw.org&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 10:28, 17 December 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:In July 2012, someone successfully hacked my iphone and installed spy software on it. Any and all movements on my iPhone were being stored/tracked unbeknownst to me, including app activity (Chase Bank, emails, etc) for one month. I found out about it when I had taken my iPhone in a shop to get checked out - the screen would glitch at times and would randomly lose about 1% per minute. (I learned this was when my GPS data was being tracked up to minute). Among other things, the next step was to file a police report of this incident for my personal safety, as I’ll never be certain which data of mine was compromised.  At the time I went to local police, either they didn’t care enough or they just didn’t have proper protocol to handle it.&lt;br /&gt;
:I understand this is a miniscule crime, in comparison to the huge cyber-crimes in the class readings. However, it lead me to research how equipped local police are for such smaller incidences. The result: They&#039;re not. (yet).  I’m certain similar, smaller crimes will only increase over time and will be dealt with by the local police. While crime is increasingly moving online, state and local police are having a hard time keeping up. If the case is significant enough, the police have to hire specialized cyber-security companies to conduct digital investigations. The techniques the police will need to be equipped with are going to have to be more “IT specialist” and less “Law and Order” over the next few years. It seems hackers will be one step ahead, at a local level, until the police shift their skill set to more IT training. [[User:Marissa1989|Marissa1989]] 02:41, 21 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:: I&#039;m very glad you mentioned this because I completely agree. On a smaller level such as the local police, I agree that they do not have the resources or the structure in place yet to deal with hacking of cell phones and breaches of personal information.  While large national crimes are handled properly, there should also be an active protocol for situations such as this, which happen very often. The lack of a targeted action by law enforcement against these small time criminals facilitate identity theft and unless there is a strong development in the law enforcement IT department, chances are these crimes will only increase with time. [[User:Lpereira|Lpereira]] 09:16, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
::: Several readings this week caused me to think about the perceived value, real and potential, of personal data. Targeted hacking of trade secrets, governments, publications like the New York Times and other large-scale operations are rooted in fairly straightforward incentives. So too are hacktivists and hackers that are &amp;quot;doing it for the lulz&amp;quot;- outcomes that are for more about provoking a response or creating change. Targeted hacks of individuals for personal data not only are much more difficult to prevent, identify and pursue on the part of law enforcement- they also happen on a scale that is not seen to have a significant enough impact economically, societally or organizationally to receive the attention truly deserved. Given the frequency of such instances, and the yearly increase in information and services processed solely online, the public service and private sector incentive to have structures in place to respond to such attacks surely must reach a tipping point soon? [[User:akk22|akk22]] 14:26, 22 April 2014 (EDT)-----&lt;br /&gt;
Cyber warfare will take on a greater importance in conventional warfare and Government hackers will be crucial to this. It only makes sense as weapons, communications and systems become more sophisticated. Hackers may be used to break into countries systems to steal data and cause widespread disruption or break into the phones of country leaders and their key staff. This is evidenced in the Ukraine crisis by relentless hacking attacks on Russian websites by Ukraninan hackers and visa-versa. http://www.bloomberg.com/news/2014-03-05/russia-ukraine-standoff-going-online-as-hackers-attack.html [[User:Marissa1989|Marissa1989]] 01:06, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Andy, thanks for your article on the Aaron Schwartz prosecution.  As you put it, &amp;quot;CFAA is shockingly broad when it is laid out&amp;quot; -- but that&#039;s not the only issue with it.  It&#039;s just another case of private industry co-opting the criminal justice system to enforce things that ought to be largely handled by the civil system (which strikes me as lousy public policy).  As you noted in your quote from the CFAA itself, &amp;quot;access in violation of an agreement or contractual obligation, such as an acceptable use policy or terms of service agreement...&amp;quot; In other words, the CFAA makes it a crime to violate the AUP or TOS with your ISP.  Outside of copyrights and information technology stuff, how common is it for the US government to get involved in criminalizing the violations of contracts between private parties?&lt;br /&gt;
[[User:Jradoff|Jradoff]] 09:46, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In the article &amp;quot;Hacking tool threatens Healthcare.gov site&amp;quot; a DDoS is the least of  warranted concerns. A DoS attack is grave in nature and is rather simple to perform. Many attempts have been made to develop systems that could either launch a DoS attack or be immune to one, but to assume that the nefarious minds out there in the arena aren’t constantly working on new and novel methods to exploit systems is naïve and foolish. The rash and explosion of virus and malware activity in the recent decades testifies to the fact that there is no dearth of people working to venture into, exploit and topple your systems. The use of pre configured or automated tools that are easy to operate in order to pursue their disruptive activities against systems in a network are identifiable. . DoS attacks are nothing but an onslaught or assault against your system that will affect in that system not being able to accomplish its intended job. The direction of the argument within the article fails to look at the programming and structure of the website itself that may allow for significant data leakage. [[User:VACYBER|VACYBER]] 13:05, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say this is one of the topics I was most looking forward to this semester, particularly with the growing number of hacktivist groups and hackers. I was quite intrigued by the recent events around the Heartbleed bug, which they are calling one of the greatest security threats in the online era (http://en.wikipedia.org/wiki/Heartbleed). As I have noticed in many of your posts already, I believe the growing consensus is that hacking is here to stay and will likely become more predominate in our national security moving forward. As more and more functions of our society move online (think traffic grids, manufacturing processes, defense systems), the urgency to protect against hacking threats grows each year.&lt;br /&gt;
&lt;br /&gt;
What will then intrigue me to hear is what is being done to slow down hackers, particularly those who may pose a greater security risk than say, taking over a facebook page. I believe part of the issue is that the NSA needs to be able to attract and retain elite computer hackers who can help in this regard, yet have been unable to do so. The best computer minds would rather take a payday from Google than work for the government at a more modest wage. &lt;br /&gt;
&lt;br /&gt;
Can&#039;t wait to hear this lecture and see what there is to be said about slowing hackers in the future. &lt;br /&gt;
&lt;br /&gt;
[[User:Drogowski|Drogowski]] 13:13, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Grrr... The site logged me out while I wrote my last message and then proceeded to delete it :( &lt;br /&gt;
&lt;br /&gt;
Any ways, I think this weeks&#039; readings raise a lot of questions about the &amp;quot;morality&amp;quot; of internet behavior and online hacktivism. Interestingly, there seems to be an influx of individuals who wouldn&#039;t necessarily be apt to breaking and entering in the physical world, but who are doing just that via their computers. I wonder in these cases whether it is the ease, the relative security, or that it feels less invasive/illegal that draws people to hacking rather than more physically invasive means.&lt;br /&gt;
&lt;br /&gt;
It also seems that there is a great degree of ambiguity to the laws which govern how one is expected to comport themselves online. This is made especially clear in Sarah Laskow&#039;s article, in which she points out that &amp;quot;The CFAA isn’t a law that journalists are taught to look out for.&amp;quot; This presents us with a scary reality, that individuals like you and I, as well as professionals such as reporters, might be subject to laws which we might not realize exist or understand and could easily be breaking, just by doing what we think is simple research. While I understand the necessity of regulation, it can also be a catch-22. &lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 15:14, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
As it is clear from readings and Aaron&#039;s case, the security of information is the crucial question of nowadays. Data contained in computer, data contained in mobile phone is so essential and important that they ruin lifes once they are disclosed. When it comes to criminalization of hackerisim or non-authorized access or &amp;quot;with exceeding authorizatiob&amp;quot; is a right direction from point of security. But, still I think that this is more technological issue rather than legislative. Aysel Ibayeva ([[User:Aysel|Aysel]] 15:21, 22 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
First of all, I&#039;m surprised that the Intelligence squared debate wasn&#039;t in the required readings, as I found to be the most interesting &amp;quot;reading&amp;quot; this week.&lt;br /&gt;
&lt;br /&gt;
On a different note, Phreaks, Hackers, and Trolls got me thinking about how the line between the hacker community and the general public is getting more and more blurred... I would argue that many of the actors on the internet who would have clearly been assigned to the hacker community just 10 years ago, such as trolls, producers of internet memes, etc., are now no longer clearly a part of that community which created them. At the same time, the lines between these individual actors is becoming more pronounced. I was fairly active in the hacker community in the 2000s, and most people in the community would be at once geeks, trolls, security experts, meme designers and political activists, all bound by similar values. Today, it feels as if this community is almost gone, divided instead into those who use internet for the lolz alone, those who merged with the general internet public, and those who are becoming almost too serious about the agenda and activities. If there is something that remains close in the general feeling, its the Open Source community, but it too is very different from what it was. --[[User:Seifip|Seifip]] 15:39, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Gabriella Coleman’s account clearly shows the relationship status between phone phreaks, hackers, and trolls. Starting with the discovery of the 2600 hertz tone that could “stop the phone”, phreaking developed a huge following with printed magazines, newspapers, and even a magazine named after the 2600 hertz tone itself. The growth of technology caused the Internet and computers to became more available along with new ways to tinker with it. Due to pop culture growth with movies such as War Games, the challenges imposed by code hacking became the new pastime. Trolls, having similarities with hackers (and possibly even being hackers) are different in their lust for the “lulz”. They specialize in audacious, shocking, and flagrant humor. Occasionally, the worst cases acquire a “disease” called CTS where the trolling becomes such a habit that they no longer restrict it to strangers but look for “lulz” by victimizing their own friends and family. &lt;br /&gt;
 &lt;br /&gt;
DDoS attacks are an effective tool that are tricky to guard against. In simple terms, because of the users ability to rapidly intensify the attack by aggregating more users to assist with the attack, the assault becomes overwhelming.&lt;br /&gt;
 &lt;br /&gt;
Operation Payback was a series of DDoS attacks by the group “Anonymous”. They were champions of peer-to-peer sites. Attacking music sites, copyright advocates, governments, law firms, censorship sites, and basically any group that held views against free circulation of data on the Internet, Anonymous received lots of criticism and even some DDoS attacks to their own site. Even Pirate Party UK and United States Pirate Party spoke out against their actions calling for a more democratic “legal” way to handle their problems. Even though the affected sites were down for a little while, there was not enough significant damage to the attacked parties to produce permanent damage. The down time can best be compared to people boycotting an unpopular store.&lt;br /&gt;
 &lt;br /&gt;
The Computer Fraud And Abuse Act seems to be very vague, especially in the way it was applied in the Scripps “Hackers” and Andrew &amp;quot;weev&amp;quot; cases. It is implied that normal regular Internet surfing could have the potential to land someone in jail. [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 22 April 2014 (EDT) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I was recently watching a car review show on YouTube and found out that nowadays hackers are so sophisticated that they can even break into one&#039;s vehicle. Generally speaking, I do not think that hackers do recognize codes as governing forces of the internet as they can manipulate a lot of them as they wish. More e-commerce sites and even some social networking platforms are increasingly doing their best in order to fight with these groups as a way of controlling their audiences. &lt;br /&gt;
([[User:cheikhmbacke|cheikhmbacke]] 15:42, 22 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In related news... [The Complex: It’s Not Beijing’s Hackers You Should Be Worried About, It’s Moscow’s http://complex.foreignpolicy.com/posts/2014/04/22/it_s_not_beijing_s_hackers_you_should_be_worried_about_it_s_moscow_s] --[[User:Seifip|Seifip]] 13:28, 23 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=1996</id>
		<title>Hacking, Hackers, and Hacktivism</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Hacking,_Hackers,_and_Hacktivism&amp;diff=1996"/>
		<updated>2014-04-22T19:39:40Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 22&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Spend five minutes with anyone who studies “hackers” and you will quickly learn that the term is used to define a wide array of discrete subcultures, from homebrew computer programmers all the way through to military-industrial network vulnerability experts. If there is one unifying characteristic amongst all of these cultures (and there may not be), it is most likely the acknowledgement between these groups that the limitations imposed by code as a mode of regulating behavior can, and should, be subverted. Today we look to hackers, who they are, what they do, and what rules and norms govern those who do not recognize code as a governing influence.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Defining hackers, hacking, and hacktivism&lt;br /&gt;
&lt;br /&gt;
* [http://gabriellacoleman.org/wp-content/uploads/2012/08/Coleman-Phreaks-Hackers-Trolls.pdf Gabriella Coleman, Phreaks, Hackers, and Trolls: The Politics of Transgression and Spectacle (from &#039;&#039;The Social Media Reader&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://vimeo.com/46450688 Molly Sauter, Activist DDOS Campaigns: When Similes and Metaphors Fail] (video, watch from to 1:56 to 21:44)&lt;br /&gt;
&lt;br /&gt;
:* Sauter uses the term &amp;quot;DDoS&amp;quot; throughout. This is an abbreviation for &amp;quot;distributed denial of service,&amp;quot; a specific form of attack to a web server described in more detail [https://en.wikipedia.org/wiki/DDos#Distributed_attack here].&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW. &#039;&#039;Too Much Information&#039;&#039; drifts between fiction and non-fiction, but this excerpt is non-fiction.)&lt;br /&gt;
&lt;br /&gt;
; Law and law enforcement &lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cjr.org/cloud_control/scripps_hackers.php Sarah Laskow, Reporting, Or Illegal Hacking]&lt;br /&gt;
&lt;br /&gt;
; Case studies&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Project_Chanology Wikipedia, Project Chanology]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of &amp;quot;Aaron&#039;s Law&amp;quot; on Aaron Swartz&#039;s Case]&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/ David Kravets, Appeals Court Reverses Hacker/Troll &amp;quot;Weev&amp;quot; Conviction and Sentence]&lt;br /&gt;
&lt;br /&gt;
* [http://www.csmonitor.com/Innovation/2013/1113/Hacking-tool-threatens-Healthcare.gov-site Jeff Ward-Bailey, Hacking Tool Threatens Healthcare.gov Site]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.northwestern.edu/lawreview/v107/n2/795/LR107n2Matwyshyn.pdf Andrea Matwyshyn, Hacking Speech: Informational Speech and the First Amendment]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 10:28, 17 December 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
:In July 2012, someone successfully hacked my iphone and installed spy software on it. Any and all movements on my iPhone were being stored/tracked unbeknownst to me, including app activity (Chase Bank, emails, etc) for one month. I found out about it when I had taken my iPhone in a shop to get checked out - the screen would glitch at times and would randomly lose about 1% per minute. (I learned this was when my GPS data was being tracked up to minute). Among other things, the next step was to file a police report of this incident for my personal safety, as I’ll never be certain which data of mine was compromised.  At the time I went to local police, either they didn’t care enough or they just didn’t have proper protocol to handle it.&lt;br /&gt;
:I understand this is a miniscule crime, in comparison to the huge cyber-crimes in the class readings. However, it lead me to research how equipped local police are for such smaller incidences. The result: They&#039;re not. (yet).  I’m certain similar, smaller crimes will only increase over time and will be dealt with by the local police. While crime is increasingly moving online, state and local police are having a hard time keeping up. If the case is significant enough, the police have to hire specialized cyber-security companies to conduct digital investigations. The techniques the police will need to be equipped with are going to have to be more “IT specialist” and less “Law and Order” over the next few years. It seems hackers will be one step ahead, at a local level, until the police shift their skill set to more IT training. [[User:Marissa1989|Marissa1989]] 02:41, 21 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:: I&#039;m very glad you mentioned this because I completely agree. On a smaller level such as the local police, I agree that they do not have the resources or the structure in place yet to deal with hacking of cell phones and breaches of personal information.  While large national crimes are handled properly, there should also be an active protocol for situations such as this, which happen very often. The lack of a targeted action by law enforcement against these small time criminals facilitate identity theft and unless there is a strong development in the law enforcement IT department, chances are these crimes will only increase with time. [[User:Lpereira|Lpereira]] 09:16, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
::: Several readings this week caused me to think about the perceived value, real and potential, of personal data. Targeted hacking of trade secrets, governments, publications like the New York Times and other large-scale operations are rooted in fairly straightforward incentives. So too are hacktivists and hackers that are &amp;quot;doing it for the lulz&amp;quot;- outcomes that are for more about provoking a response or creating change. Targeted hacks of individuals for personal data not only are much more difficult to prevent, identify and pursue on the part of law enforcement- they also happen on a scale that is not seen to have a significant enough impact economically, societally or organizationally to receive the attention truly deserved. Given the frequency of such instances, and the yearly increase in information and services processed solely online, the public service and private sector incentive to have structures in place to respond to such attacks surely must reach a tipping point soon? [[User:akk22|akk22]] 14:26, 22 April 2014 (EDT)-----&lt;br /&gt;
Cyber warfare will take on a greater importance in conventional warfare and Government hackers will be crucial to this. It only makes sense as weapons, communications and systems become more sophisticated. Hackers may be used to break into countries systems to steal data and cause widespread disruption or break into the phones of country leaders and their key staff. This is evidenced in the Ukraine crisis by relentless hacking attacks on Russian websites by Ukraninan hackers and visa-versa. http://www.bloomberg.com/news/2014-03-05/russia-ukraine-standoff-going-online-as-hackers-attack.html [[User:Marissa1989|Marissa1989]] 01:06, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Andy, thanks for your article on the Aaron Schwartz prosecution.  As you put it, &amp;quot;CFAA is shockingly broad when it is laid out&amp;quot; -- but that&#039;s not the only issue with it.  It&#039;s just another case of private industry co-opting the criminal justice system to enforce things that ought to be largely handled by the civil system (which strikes me as lousy public policy).  As you noted in your quote from the CFAA itself, &amp;quot;access in violation of an agreement or contractual obligation, such as an acceptable use policy or terms of service agreement...&amp;quot; In other words, the CFAA makes it a crime to violate the AUP or TOS with your ISP.  Outside of copyrights and information technology stuff, how common is it for the US government to get involved in criminalizing the violations of contracts between private parties?&lt;br /&gt;
[[User:Jradoff|Jradoff]] 09:46, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In the article &amp;quot;Hacking tool threatens Healthcare.gov site&amp;quot; a DDoS is the least of  warranted concerns. A DoS attack is grave in nature and is rather simple to perform. Many attempts have been made to develop systems that could either launch a DoS attack or be immune to one, but to assume that the nefarious minds out there in the arena aren’t constantly working on new and novel methods to exploit systems is naïve and foolish. The rash and explosion of virus and malware activity in the recent decades testifies to the fact that there is no dearth of people working to venture into, exploit and topple your systems. The use of pre configured or automated tools that are easy to operate in order to pursue their disruptive activities against systems in a network are identifiable. . DoS attacks are nothing but an onslaught or assault against your system that will affect in that system not being able to accomplish its intended job. The direction of the argument within the article fails to look at the programming and structure of the website itself that may allow for significant data leakage. [[User:VACYBER|VACYBER]] 13:05, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say this is one of the topics I was most looking forward to this semester, particularly with the growing number of hacktivist groups and hackers. I was quite intrigued by the recent events around the Heartbleed bug, which they are calling one of the greatest security threats in the online era (http://en.wikipedia.org/wiki/Heartbleed). As I have noticed in many of your posts already, I believe the growing consensus is that hacking is here to stay and will likely become more predominate in our national security moving forward. As more and more functions of our society move online (think traffic grids, manufacturing processes, defense systems), the urgency to protect against hacking threats grows each year.&lt;br /&gt;
&lt;br /&gt;
What will then intrigue me to hear is what is being done to slow down hackers, particularly those who may pose a greater security risk than say, taking over a facebook page. I believe part of the issue is that the NSA needs to be able to attract and retain elite computer hackers who can help in this regard, yet have been unable to do so. The best computer minds would rather take a payday from Google than work for the government at a more modest wage. &lt;br /&gt;
&lt;br /&gt;
Can&#039;t wait to hear this lecture and see what there is to be said about slowing hackers in the future. &lt;br /&gt;
&lt;br /&gt;
[[User:Drogowski|Drogowski]] 13:13, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Grrr... The site logged me out while I wrote my last message and then proceeded to delete it :( &lt;br /&gt;
&lt;br /&gt;
Any ways, I think this weeks&#039; readings raise a lot of questions about the &amp;quot;morality&amp;quot; of internet behavior and online hacktivism. Interestingly, there seems to be an influx of individuals who wouldn&#039;t necessarily be apt to breaking and entering in the physical world, but who are doing just that via their computers. I wonder in these cases whether it is the ease, the relative security, or that it feels less invasive/illegal that draws people to hacking rather than more physically invasive means.&lt;br /&gt;
&lt;br /&gt;
It also seems that there is a great degree of ambiguity to the laws which govern how one is expected to comport themselves online. This is made especially clear in Sarah Laskow&#039;s article, in which she points out that &amp;quot;The CFAA isn’t a law that journalists are taught to look out for.&amp;quot; This presents us with a scary reality, that individuals like you and I, as well as professionals such as reporters, might be subject to laws which we might not realize exist or understand and could easily be breaking, just by doing what we think is simple research. While I understand the necessity of regulation, it can also be a catch-22. &lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 15:14, 22 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
As it is clear from readings and Aaron&#039;s case, the security of information is the crucial question of nowadays. Data contained in computer, data contained in mobile phone is so essential and important that they ruin lifes once they are disclosed. When it comes to criminalization of hackerisim or non-authorized access or &amp;quot;with exceeding authorizatiob&amp;quot; is a right direction from point of security. But, still I think that this is more technological issue rather than legislative. Aysel Ibayeva ([[User:Aysel|Aysel]] 15:21, 22 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
First of all, I&#039;m surprised that the Intelligence squared debate wasn&#039;t in the required readings, as I found to be the most interesting &amp;quot;reading&amp;quot; this week.&lt;br /&gt;
&lt;br /&gt;
On a different note, Phreaks, Hackers, and Trolls got me thinking about how the line between the hacker community and the general public is getting more and more blurred... I would argue that many of the actors on the internet who would have clearly been assigned to the hacker community just 10 years ago, such as trolls, producers of internet memes, etc., are now no longer clearly a part of that community which created them. At the same time, the lines between these individual actors is becoming more pronounced. I was fairly active in the hacker community in the 2000s, and most people in the community would be at once geeks, trolls, security experts, meme designers and political activists, all bound by similar values. Today, it feels as if this community is almost gone, divided instead into those who use internet for the lolz alone, those who merged with the general internet public, and those who are becoming almost too serious about the agenda and activities. If there is something that remains close in the general feeling, its the Open Source community, but it too is very different from what it was. --[[User:Seifip|Seifip]] 15:39, 22 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_4_Submissions&amp;diff=1943</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_4_Submissions&amp;diff=1943"/>
		<updated>2014-04-22T09:02:27Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment4,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment4.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Project title: &lt;br /&gt;
*Link to rough draft: (add your link here)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Margo Monroe|Controlling our personal genomes|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/Monroe_Assignment_Four.docx]]}}&lt;br /&gt;
([[User:Margorm|Margorm]] 08:21, 1 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Bounties and underrepresented topics|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment4.pdf]]}}&lt;br /&gt;
([[User:Seifip|Seifip]] 04:52, 22 April 2014 (EDT))&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_4_Submissions&amp;diff=1942</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_4_Submissions&amp;diff=1942"/>
		<updated>2014-04-22T08:53:09Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment4,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment4.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Project title: &lt;br /&gt;
*Link to rough draft: (add your link here)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Margo Monroe|Controlling our personal genomes|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/Monroe_Assignment_Four.docx]]}}&lt;br /&gt;
([[User:Margorm|Margorm]] 08:21, 1 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Bounties and underrepresented topics|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment4.pdf]]}}&lt;br /&gt;
([[User:Seifip|Seifip]] 04:52, 22 April 2014 (EDT))&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_4_Submissions&amp;diff=1941</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_4_Submissions&amp;diff=1941"/>
		<updated>2014-04-22T08:52:58Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment4,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment4.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Project title: &lt;br /&gt;
*Link to rough draft: (add your link here)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Margo Monroe|Controlling our personal genomes|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/Monroe_Assignment_Four.docx]]}}&lt;br /&gt;
([[User:Margorm|Margorm]] 08:21, 1 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
===&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Bounties and underrepresented topics|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment4.pdf]]}}&lt;br /&gt;
([[User:Seifip|Seifip]] 04:52, 22 April 2014 (EDT))&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Informing_the_Public_in_the_Internet_Age&amp;diff=1673</id>
		<title>Informing the Public in the Internet Age</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Informing_the_Public_in_the_Internet_Age&amp;diff=1673"/>
		<updated>2014-04-13T17:14:18Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 15&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The profusion of low-cost media production and distribution has led to the rise of an alternative citizen-led media sector. Is this a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed? Will the current trends lead to more information, better information, and better informed people or to an infinite stream of unreliable chatter? Will it lead to a more politically engaged populace or to an increasingly polarized society that picks its sources of information to match its biases and ignorance?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; The whos and wheres of modern journalism&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Persephone Miel and Rob Faris, News and Information as Digital Media Come of Age] (read executive summary)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Typologies_MR.pdf Persephone Miel and Rob Faris, A Typology of Media Organizations] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://transition.fcc.gov/osp/inc-report/INoC-Executive_Summary.pdf Federal Communications Commission, Information Needs of Communities] (read executive summary, skim overview)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_7.pdf Yochai Benkler, The Wealth of Networks (Chapter 7)] (read from 225 (&amp;quot;Our second story focuses…&amp;quot;) to 241 (end before &amp;quot;On Power Law Distributions, Network Topology, and Being Heard&amp;quot;); read from 261-66 (&amp;quot;Who Will Play the Watchdog Function?&amp;quot;))&lt;br /&gt;
&lt;br /&gt;
; Threats and issues&lt;br /&gt;
&lt;br /&gt;
* [http://www.thisamericanlife.org/radio-archives/episode/493/picture-show?act=0#play This American Life, Picture Show] (audio, from 0:00 to 5:09)&lt;br /&gt;
&lt;br /&gt;
* [http://law.wlu.edu/deptimages/Law%20Review/68-2Jones.pdf RonNell Anderson Jones, Litigation, Legislation, and Democracy in a Post-Newspaper America] (Section I only)&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=K3TRKPSmoZk Brendan Nyhan, Biases Abound] (about 15 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/112554 Yochai Benkler, The Dangerous Logic of the Bradley Manning Case]&lt;br /&gt;
&lt;br /&gt;
* [http://archive.pressthink.org/2009/01/12/atomization.html Jay Rosen, Audience Atomization Overcome: Why the Internet Weakens the Authority of the Press]&lt;br /&gt;
&lt;br /&gt;
; New technologies and models&lt;br /&gt;
&lt;br /&gt;
* [http://globe.mediameter.org/ Catherine D&#039;Ignazio, Ali Hashmi, and Ethan Zuckerman, Mapping the (Boston) Globe] (play with the website)&lt;br /&gt;
&lt;br /&gt;
* [http://banyanproject.com/index.php?title=Main_Page Banyan Project, Introduction and Overview]&lt;br /&gt;
&lt;br /&gt;
* [http://thephoenix.com/boston/news/111660-muckrock-city/ Chris Faraone, MuckRock City (&#039;&#039;Boston Phoenix&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2012/05/from-cold-calls-to-community-building-propublica-tries-to-make-crowdsourcing-more-meaningful/ Adrienne LaFrance, From Cold Calls to Community Building, ProPublica Tries to Make Crowdsourcing More Meaningful (&#039;&#039;Nieman Journalism Lab&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=NXZAIrDI66E&amp;amp;playnext=1&amp;amp;list=PL1E8598023D37F7AC&amp;amp;feature=results_video Jonathan Zittrain, 2009 Richard S. Salant Lecture on Freedom of the Press] (the lecture starts at 19:45)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cjr.org/behind_the_news/syria_not_orphan_boy_pic.php?page=1 Sara Morrison, The Photo That Cried Wolf]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I just came across this video about a different kind of censorship that is happening on Facebook: &lt;br /&gt;
[http://www.youtube.com/watch?v=l9ZqXlHl65g#t=392]&lt;br /&gt;
It&#039;s really interesting to consider that censorship is not only happening as a result of laws or terms of use, but now as a way of &amp;quot;forcing&amp;quot; people/companies to pay. [[User:Castille|Castille]] 13:12, 9 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I&#039;m very thankful for the readings on the implications of the new media revolution on the Fourth Amendment as it&#039;s an issue I&#039;ve never thought about before. Indeed, if the laws are not appropriately updated, these changes could have a massive impact on the freedom of journalism. I wonder whether one way to work around the issue would be to form some form of unions that would encompass many individual amateur reporters, providing them with legal protection, but without limiting the freedoms of the individual participants.--[[User:Seifip|Seifip]] 13:14, 13 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Privacy_Part_2:_Government_Surveillance&amp;diff=1609</id>
		<title>Privacy Part 2: Government Surveillance</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Privacy_Part_2:_Government_Surveillance&amp;diff=1609"/>
		<updated>2014-04-08T18:56:34Z</updated>

		<summary type="html">&lt;p&gt;Seifip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 8&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Last week we looked at big-picture concepts of privacy and how the Internet and Internet companies reflect these issues. This week we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments&#039;) citizens, and what that does to us and the Internet as a system.&lt;br /&gt;
&lt;br /&gt;
Joining us for this week are Berkman fellow and online security expert [http://cyber.law.harvard.edu/people/bschneier Bruce Schneier] and Berkman Clinical Instructional Fellow [http://cyber.law.harvard.edu/people/cwalsh Kit Walsh]. &lt;br /&gt;
&lt;br /&gt;
There is a [http://cyber.law.harvard.edu/events/2014/04/unownedinternet related event] at Harvard Law School earlier on this class day that may be of interest to students (RSVP required).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Government vs. Corporate Surveillance&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/ Brian Fung, Yes, There Is Actually a Huge Difference Between Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 (&amp;quot;Mass surveillance raises issues beyond individual surveillance,&amp;quot; &amp;quot;Secret and confusing law,&amp;quot; and &amp;quot;Chilling Effects&amp;quot;) only)&lt;br /&gt;
&lt;br /&gt;
; Case Study - the NSA Scandal and Surveillance Policy&lt;br /&gt;
&lt;br /&gt;
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (peruse)&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (peruse)&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.slate.com/articles/news_and_politics/war_stories/2014/01/edward_snowden_doesn_t_deserve_clemency_the_nsa_leaker_hasn_t_proved_he.single.html Fred Kaplan, Why Snowden Won&#039;t (and Shouldn&#039;t) Get Clemency]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=h0d_QDgl3gI Bruce Schneier, The Battle for Power on the Internet] (approx. 12:30, watch all)&lt;br /&gt;
&lt;br /&gt;
; Surveillance and U.S. law&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA&#039;s Spying Powers: Reading the Statute]&lt;br /&gt;
&lt;br /&gt;
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue&#039;s Comprehensive Case Against Bulk Metadata Collection]&lt;br /&gt;
&lt;br /&gt;
:* If you&#039;re interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here].&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment&lt;br /&gt;
&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/metadata-fourth-amendment/ Granick&#039;s opening]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/debate-metadata-fourth-amendment-reply-jennifer-granick/ Kerr&#039;s response]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick&#039;s reply]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr&#039;s sur-reply] &lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/09/the_limitations.html Bruce Schneier, The Limitations of Intelligence]&lt;br /&gt;
&lt;br /&gt;
* [http://iheid.revues.org/321 Johannes Köppel, The International Dimension of the SWIFT Affair]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Maybe I&#039;m missing something, but what, exactly, has the government been doing with the information they have gotten through the NSA? It doesn&#039;t seem like they&#039;ve been using it to incriminate individual citizens or even monitor them too extensively-- otherwise, wouldn&#039;t they have been able to track down would-be criminals prior to them committing crimes, a la Minority Report? They also don&#039;t seem to be monitoring it for the purpose of censorship, as is the case in China and Russia or the HUAC. And how are they even conducting their &amp;quot;research&amp;quot;? Do individuals actually go through all of that information, or is it a case whereby a machine compiles data and directs NSA employees&#039; attentions only to cases where there are a multitude of &#039;questionable&#039; searches/calls/etc.? As far as foreign policy is concerned, the act of spying on other governments has been practiced since the beginning of history. Does the advent of technology change what is acceptable in regards to spying, or only make it more accessible? With nuclear war so very possible in our times, it seems like some sort of action must be taken to monitor the intentions of other countries and their relations with the US and alliances with other countries, since transparency seems to be an impossible ideal for all countries. &lt;br /&gt;
[[User:Castille|Castille]] 15:52, 5 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:* The problem is that we don&#039;t know what they do with the information because that is secret, and is also used for secret trials in secret courts. The problem is that even if the use of the information is benevolent and well-intentioned, it is worrisome because we&#039;re creating the technological foundation for totalitarianism. Now, I don&#039;t actually think we&#039;re extremely close to creating a totalitarian state but it doesn&#039;t mean that it isn&#039;t worrisome or that in the wrong political environment we might eventually get there. [[User:Jradoff|Jradoff]] 08:25, 8 April 2014 (EDT)&lt;br /&gt;
::* Ah, gotcha! No wonder I felt like I was missing something-- we all are! I didn&#039;t realize that they&#039;re actually hiding what they&#039;re doing with the information. Do you know what theory for how they are using the data is most likely?&lt;br /&gt;
[[User:Castille|Castille]] 12:19, 8 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The Guardian article- informative content, but I want to comment on its amazing user interface. This is where the web should be heading. In the same way that HTML provides markup to words and sentences, the interactive features of this article help to mark up the thoughts &amp;amp; ideas presented in the article. Very nicely done. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:55, 6 April 2014 (EDT)&lt;br /&gt;
:*I couldn&#039;t agree more. The interface was AMAZING! Don&#039;t think I&#039;ve ever seen an article like that before.&lt;br /&gt;
[[User:Castille|Castille]] 12:19, 8 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am very interested to see what new data mining policies are made or both the government and corporations. Despite the reveal that we lack privacy (collection of lots of personal data from each sector), it would be nice if we had the right to know which data and on what terms data is collected on us. Agreed these are probably in the majority of privacy agreements I don&#039;t read. Trying harder to be transparent and clear with these privacy regulations would help society to at least be not as shocked by large government leaks.&lt;br /&gt;
([[User:Margorm|Margorm]] 17:58, 7 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Brian Fung article makes a fine point about the higher &amp;quot;cost&amp;quot; of switching from the United States to a different country, due to the government&#039;s monopoly on a range of services.  However, this strikes me as a weak way to compare corporate data mining to government intrusion.  In my opinion, the purpose of having a Constitution containing guaranteed rights is so that these costs need not be considered or incurred in the first place.  If the US government needs to collect private information about its citizens, then it needs to be done within the restrictions of the Fourth Amendment.  If exceptions need to be made it needs to be done with the public&#039;s knowledge and consent. [[User:Jradoff|Jradoff]] 08:35, 8 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I too came away from the Brian Fung article feeling dissatisfied with the comparison of government and corporate intrusion-- especially in light of this week&#039;s readings that make it abundantly clear to me that we are not able to &amp;quot;quit&amp;quot; or opt-out of either corporate data mining or government surveillance. I lived overseas in Asia and Europe with my last job and certainly didn&#039;t &amp;quot;quit&amp;quot; the United States, in fact I anticipated a greater impact on my &amp;quot;hard-to-measure modicum of privacy&amp;quot;- both tangible and intangible. As Fung suggests, most expats or Americans on short-term contracts overseas whom I knew and worked with openly acknowledged the higher level of scrutiny anticipated regarding correspondence, finances, and eve relationships once overseas- especially for those who intended to return to working life in the US after a time. Interestingly, the majority of these individuals were often more comfortable with- and even welcomed- decreased privacy given the positive correlation in their minds with increased security for their work and families while overseas. I will be interested to see whether cases related to data privacy and online surveillance engage the fourth amendment in the coming years- and especially whether the legal landscape at the highest levels is equipped to respond to such a quickly-evolving corporate and government culture of surveillance. [[User:akk22|akk22]] 10:39, 8 April 2014 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Regarding the &#039;huge difference between government and corporate surveillance.&#039; | There&#039;s so much to talk about on this topic, so I&#039;ll keep it short by playing a bit of devil&#039;s advocate. Is there truly that much of a significant difference between the two surveillance types? Both are working towards the same goal: the protection and accumulation of dollars. In the corporate sense, surveillance allows for the ability to make more dollars. With government surveillance, it allows for the preservation of the capitalist system — to maintain the corporate ecosystem. (Hence the argument that corporations still have a stronghold on our online privacy, regardless of who is responsible for the act of surveillance.) [[User:Twood|Twood]] 09:31, 8 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:*It seems unfair to me to suggest that government surveillance is solely to preserve the corporate ecosystem-- surely, issues of national security extend to individuals as well as corporations. I think that government surveillance is much more geared towards protection of the individual than corporate surveillance, which is completely for the purpose of accumulating capital. [[User:Castille|Castille]] 12:19, 8 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Playing Devils Advocate as well, I&#039;m less concerned with government collection of data traffic. The massive collections that exist and increase exponentially on a daily basis are still subject to human interaction. Hiring of skilled staff with Hadoop, Hive, Pig, HBase, R, etc., are still subject to the human element. Threats are real within national security and threats are many. One might argue that we cannot handle sifting the data for agreed upon missions. I&#039;m certainly not worried about my conversation requesting the more mundane issues of life. I am worried however, about the collection, packaging, selling and reselling of corporate collected data. The data crosses so many entities that control is truly impossible. There is a reason the Romans would hide items under a Rose bush - Messengers can always be intercepted.[[User:VACYBER|VACYBER]] 13:59, 8 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Battle for Power on the Internet was a great talk and made some great points. I like his idea of the quick versus the strong, saying that the marginalized was quick to use the Internet to organize but although the institutions were slower, they use power more effectively. I’m looking forward to talking more about this in class.&lt;br /&gt;
[[User:Lpereira|Lpereira]] 14:06, 8 April 2014 (EDT)&lt;br /&gt;
-----&lt;br /&gt;
After reading all materials it seems that it is impossible to be secured from survellience in the &amp;quot;century of technologies&amp;quot;. From one hand, the government survelliance aims to protect us from terrorizm and other hazards. From another hand, it restricts the people&#039;s right on freedom of speech. But, nowadays I didn&#039;t see that just ordinary citizen was killed because of the content of his message. Let&#039;s assume that the content of email is accessed by government, but it doesn&#039;t become public. But, the situation is different when it comes to active person, whose speechs/e-mail could rise threats to government. If the threat already exist, this person would be under survellience even in times BC and now, in time of technologies. So, the internet doesn&#039;t play a great role here. Still, there are some tools which could somehow prevent the cyber attacks: for example strong code combination. If the code is secure, then it will be diffucult for the computer to break your code. Aysel Ibayeva ([[User:Aysel|Aysel]] 14:37, 8 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I thought this might be useful as well: &amp;quot;Big data is here to stay, as it should be. But let’s be realistic: It’s an important resource for anyone analyzing data, not a silver bullet.&amp;quot; http://www.nytimes.com/2014/04/07/opinion/eight-no-nine-problems-with-big-data.html?src=me&amp;amp;module=Ribbon&amp;amp;version=context&amp;amp;region=Header&amp;amp;action=click&amp;amp;contentCollection=Most%20Emailed&amp;amp;pgtype=article [[User:VACYBER|VACYBER]] 14:53, 8 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Whether consciously or uncosciously, Bruce Schneier in The Battle for Power on the Internet voice not only the obvious warning as to the ever increasing powers corporations and governments are gaining, but also the reason we this should not stop us from exploring new technologies may and probably will magnify that power even further in the decades to come. Yes, the magnification effect does, in the long run, give superior powers to larger actors, but as Schneier described so well, small, nimble, distributed actors tend to be at least a few years, if not decades ahead of the curve, which makes sure that as any good uses arise from new technology as the detrimental effects that follow. Privacy, liberty, and similar values are of great importances, but that should not be a reason to protest new developments such as Google Glass, cloud computing or bioengineering. The technologies we now all use daily certainly gave corporations and the government better access to our data, but they have also undoubtedly improved our lives. There is no reason to believe that things should be any different with most of the technologies that are on the horizon, that many are so concerned about. --[[User:Seifip|Seifip]] 14:56, 8 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Privacy_Part_1:_Corporate_Data_Gathering&amp;diff=1539</id>
		<title>Privacy Part 1: Corporate Data Gathering</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Privacy_Part_1:_Corporate_Data_Gathering&amp;diff=1539"/>
		<updated>2014-04-01T20:14:11Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online, our interests may fall to the interests of profitability, online behavior regulation, and cybersecurity. &lt;br /&gt;
&lt;br /&gt;
Over the next two weeks we&#039;ll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns. Next week we&#039;ll build on these concepts with an eye toward government surveillance and law enforcement.&lt;br /&gt;
&lt;br /&gt;
Our own [http://cyber.law.harvard.edu/people/dobrien David O&#039;Brien] will be leading the class discussion this week.&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;The deadline for [[Assignments#Assignment_3:_Project_Outline|Assignment 3]]  moved from March 25th to today, April 1st.&#039;&#039;&#039;&#039;&#039; Please [[Assignment_3_Submissions|upload your assignment]] prior to class today.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Conceptualizing privacy&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, &#039;&#039;Understanding Privacy&#039;&#039; (Chapter 1)] (skim)&lt;br /&gt;
&lt;br /&gt;
; Privacy and data&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/science/discoveries/magazine/16-07/pb_theory Chris Anderson, The End of Theory] (Wired appears to be having some troubles with their links this week, so if that doesn&#039;t work, try this [http://webcache.googleusercontent.com/search?q=cache:ZTLbNugcikUJ:www.wired.com/science/discoveries/magazine/16-07/pb_theory+&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us cached version].)&lt;br /&gt;
&lt;br /&gt;
* [http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data Viktor Mayer-Shoenberger, The Rise of Big Data]&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213 Bruce Schneier, Why Anonymous Data Sometimes Isn&#039;t] (see the note above about Wired - try this [http://webcache.googleusercontent.com/search?q=cache:XkYbG5I9RtkJ:www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213+&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us cached version] if the link above doesn&#039;t work).&lt;br /&gt;
&lt;br /&gt;
* Play around with some of the websites by [http://latanyasweeney.org/ Latanya Sweeney]&lt;br /&gt;
&lt;br /&gt;
:* [http://thedatamap.org/ The Data Map]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyride.org/more.html About My Ride]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyinfo.org/ About My Info]&lt;br /&gt;
&lt;br /&gt;
; Corporate data practices&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.wsj.com/digits/2012/12/07/how-dataium-watches-you/ Jeremy Singer-Vine, How Dataium Watches You] &lt;br /&gt;
&lt;br /&gt;
* [http://www.interactually.com/linkedin-creepiest-social-network/ David Veldt, LinkedIn: The Creepiest Social Network]&lt;br /&gt;
&lt;br /&gt;
* [http://online.wsj.com/news/articles/SB10001424127887323777204578189391813881534 Jennifer Valentino-Devires, Jeremy Singer-Vine, Ashkan Soltani, Websites Vary Prices, Deals Based on Users&#039; Information] (if this appears behind a paywal, [http://blogs.wsj.com/wtk/ play around with the WSJ&#039;s interactive graphics])&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, &#039;&#039;The Future of the Internet and How to Stop It&#039;&#039; (Chapter 9)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, &#039;&#039;Blown to Bits&#039;&#039; (Chapter 2)] (pages 36-42)&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, &#039;&#039;Code 2.0&#039;&#039; (Chapter 7)] (focus on &amp;quot;Privacy in Public: Data&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States Wikipedia, Privacy Laws of the United States]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship]&lt;br /&gt;
&lt;br /&gt;
* [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/05/the_eyes_and_ea.html Bruce Schneier, Surveillance and the Internet of Things]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This week&#039;s readings on privacy have been really thought provoking. Whether we have a &#039;right&#039; to internet privacy is a tough subject to ponder, as we have no obligation to use the internet, thus making our use subject to a company&#039;s terms, yet there are also a number of other factors to consider. Some of the biggest concerns are that the &amp;quot;data collection&amp;quot; isn&#039;t merely studied but disseminated, and also that that collection doesn&#039;t end at internet usage. It infiltrates every aspect of our lives, with surveillance footage being taken unbeknownst to those being viewed. I&#039;m not sure if it was in this class or in another discussion, but supposedly we&#039;re not far away from a kind of optical monitoring whereby stores can track what a shopper looks at most intently to cater advertising to them specifically. Where does this invasion of privacy end?&lt;br /&gt;
&lt;br /&gt;
Adding to the links above, I found this article linked in one of the above articles. It&#039;s very informative and interesting.&lt;br /&gt;
&lt;br /&gt;
http://query.nytimes.com/gst/fullpage.html?res=9E0CE3DD1F3FF93AA3575BC0A9609C8B63&lt;br /&gt;
&lt;br /&gt;
Sidebar- loved the article by Veldt on LinkedIn... I, too, have always wondered HOW they can suggest people who I know in real life but with whom I haven&#039;t had any connection with via social networks or even e-mail. &lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 16:33, 29 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:Great questions on privacy, Castille, just to piggy-back on what you&#039;ve brought up….&lt;br /&gt;
:Data gathering will become more intrusive, especially as we advance technologically. This will impede on personal privacy to a point where it becomes a major issue. For example, Google glasses will open many avenues for companies to gather personal data. &lt;br /&gt;
:But where do ethics come in? &lt;br /&gt;
:Companies don&#039;t have moral ethics if it means they can convert personal data into potential profits. It may already be too late to legislate laws and then how do we enforce them? Its actually quite alarming how much personal information is available digitally and more to come as new devices (such as wearables) make it easier for companies (and other individuals) to exploit. [[User:Marissa1989|Marissa1989]] 02:09, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:I agree, Castille, that thinking about online privacy is complicated by the fact that users agree to certain terms of use and are not truly compelled to use the Internet, though it is undoubtedly next to impossible for some of us to avoid. I think that in spite of this (in spite of the fact that we automatically check the box agreeing to these terms of use), people will always feel that they have the right to privacy at least in the sense of having the right to be left alone. The mentality may be that if I&#039;m not doing something wrong, if my behavior doesn&#039;t effect other people, then I shouldn&#039;t be bothered, shouldn&#039;t be observed without very explicit consent, and shouldn&#039;t have to feel like I&#039;m being watched. [[User:Jkelly|Jkelly]] 23:11, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The data we can gather through automation is undoubtedly incredible. The weakness with big data lies in the quality - relying too much on the results spit out from the tools could lead to numerous mistakes. That’s when human intellect comes into play; real-time observation and analysis will be critical for spotting errors. &lt;br /&gt;
Human ingenuity is the source of progress.  Any company can better leverage the data available to them and generate a competitive advantage, as long as they’re equipped with inquisitive minds and critical thinkers who can best apply the data presented. [[User:Marissa1989|Marissa1989]] 02:01, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I too enjoyed the article by Veldt on LinkedIn. I am an active LinkedIn user but like Castille have been troubled by the connection- generating ability of a site that I have not linked to other social networks or connected to my email. LinkedIn use has led many friends and colleagues of mine to tangible professional benefits and opportunities- headhunters and recruiters rely increasingly on the LinkedIn pool for scouting talent. In the contexts of other readings this week, and the question of whether it is truly possible to &amp;quot;opt-out&amp;quot;- LinkedIn is one platform that I feel is worth the privacy trade-off. Indeed, as a recent college graduate, in the early stages of my career, I often find myself faced with the unsettling truth that limiting my internet presence and enhancing security features on social media platforms with an aim to preserve my privacy is actually detrimental to my professional, educational and personal goals. In the name of upward mobility and maximizing exposure to opportunities, we choose not too think to hard about just how LinkedIn knows &amp;quot;People You May Know.&amp;quot; Indeed, as highlighted in an NYT article late last year [http://www.nytimes.com/2013/12/05/technology/personaltech/the-path-to-happy-employment-contact-by-contact-on-linkedin.html?_r=0], opting not to include a photo, complete a full profile and maximize the public reach of your profile in many ways defeats the purpose of being on LinkedIn in the first place. --[[User:Akk22|Akk22]] 10:25, 1 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
Not related to this week&#039;s lecture, but for those interested, a major revamp is in the works for copyright law in the UK, including the addition of a US-like fair use clause - [http://www.ipo.gov.uk/response-2011-copyright-final.pdf Modernising Copyright: A modern, robust and flexible framework] --[[User:Seifip|Seifip]] 17:43, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
I ran across an article shared through Reddit this week and I think it relates somewhat to the topic this week. It describes how Dropbox is able to know when copyrighted content is being shared, without infringing on a person&#039;s privacy. It is able to do this by &amp;quot;file hashing against a blacklist.&amp;quot; It&#039;s an interesting read, especially for someone like me who isn&#039;t too familiar with computer technicalities. You can find the article here: http://techcrunch.com/2014/03/30/how-dropbox-knows-when-youre-sharing-copyrighted-stuff-without-actually-looking-at-your-stuff/&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 19:58, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:I also saw a write up about this on Slate. What&#039;s interesting to me is this snippet: &amp;quot;It&#039;s almost impossible to find a service that stores your data but doesn&#039;t have a way to look at it with either human eyes or algorithms.&amp;quot; People have concerns about actual employees at Dropbox looking at their stuff, but even the idea of algorithms &amp;quot;looking&amp;quot; can be unsettling. I wonder how much of this has to do with being uncomfortable with the idea that someone out there is rifling through your files and how much has to do with concern about computer programs, algorithms, etc. being presented as an impersonal solution to privacy problems. But even if there&#039;s not a &#039;&#039;who&#039;&#039; looking at your stuff, there&#039;s still a &#039;&#039;what,&#039;&#039; and the principle doesn&#039;t seem too different if you think of it abstractly.  [[User:Jkelly|Jkelly]] 07:43, 1 April 2014 (EDT)&lt;br /&gt;
-----&lt;br /&gt;
I can&#039;t say I was surprised by anything in Schneier piece (&amp;quot;Why &#039;Anonymous&#039; Data Sometimes Isn&#039;t&amp;quot;) about how easy it is to take &amp;quot;anonymous&amp;quot; information and attach it to a specific individual. The ease with which I can find someone online (on Twitter, Facebook, or other social media) with just two or three pieces of identifying information-- name, college he/she graduated from, workplace, username, etc.-- long ago left me assuming that anyone could do the same. When you factor in huge amounts of data and more sophisticated techniques to leverage that data, I wouldn&#039;t imagine anything would remain hidden. A few seemingly trivial bits of information can certainly add up very quickly.&lt;br /&gt;
[[User:Jkelly|Jkelly]] 23:01, 31 March 2014 (EDT)&lt;br /&gt;
----&lt;br /&gt;
I really enjoyed the chapter from Daniel Solove&#039;s book in which he tries to develop a new understanding of privacy. One of the bits that resonated the most with me is where he writes &amp;quot;Instead of attempting to locate the common denominator of these activities [that are disrupted by violations of privacy], we should conceptualize privacy by focusing on the specific types of disruption.&amp;quot; It&#039;s interesting to approach privacy based on the problems violations cause rather than the type of information or behavior associated with those violations. So, it&#039;s not about whether or not giving out my phone number violates my privacy but whether that generates an innocuous or malicious outcome. I think this dovetails nicely with the idea (from the article about variable online pricing, I think) that there&#039;s not one answer to the privacy problem because there isn&#039;t one reason it&#039;s happening. Conceptualizing privacy in such a way that it can apply to all situations and problems could easily abstract it to a point that the theories are vague to a point of meaninglessness. [[User:Jkelly|Jkelly]] 23:17, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I really love the article &amp;quot;LINKEDIN: THE CREEPIEST SOCIAL NETWORK&amp;quot; that&#039;s written by David Veldt.&lt;br /&gt;
I always wonder how social networks like facebook or linkedin know that I in fact know that person. And the advertisements that are on the right side of the facebook page are things that I am interested in. It is interesting how Linkedin is trying not to disclose to the users that they are tracking our search histories and might even our emails. Frankly speaking, I am not surprised that Facebook, Linkedin or even Google are tracking our personal information, as this is how their business work. Data gathering is a very important part for them to make money.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Is anything done or seen today on the Internet really private? With the introduction of “N=ALL” data and the “datafication” of various parts of life, information previously never even thought of being capable of quantification is now not only being able to be studied but also put into good use. The usefulness and practicality of Big Data is beyond what people can even imagine, from translating languages, fire prevention, to new ways of security, and even making it easier to rent a bicycle. Quantifying or the &amp;quot;datafication&amp;quot; of information can transform the way we operate as a society. Big Data can be described in terms of Petabytes. Then you have the different ways that Big data is collected; logging information such as mouse clicks (as Dataium does), analyzing census data, or CSS history sniffing are all methods of collection. Then you have companies like LinkedIn, Staples, and Amazon who provide different services or prices by utilizing peoples various “browsing history, geolocation&amp;quot; and other personal information.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
While big data is extremely useful, one for the biggest downsides is the almost complete lost of privacy when searching on the web. But how does one define privacy? Its’ strewed across vague lines as when one uploads all their personal information, pictures, videos and what they are thinking are on Facebook, Twitter, and Google’s servers for them to survey and classify. [[User:Emmanuelsurillo|Emmanuelsurillo]] 14:52, 1 April 2014 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier has another great piece that may be of interest: The Public-Private Surveillance Partnership. &lt;br /&gt;
http://www.bloombergview.com/articles/2013-07-31/the-public-private-surveillance-partnership&lt;br /&gt;
I&#039;m always amazed at the level of detail you can gather about an individual from freely given information in exchange for grocery or gas discounts. The reality of today certainly seems to demonstrate that we value our privacy and data much less than we claim. [[User:VACYBER|VACYBER]] 14:59, 1 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:Bruce has a number of great articles and books in the space – and he&#039;s our guest lecturer next week! So be sure to think of some good questions to ask him about his research. [[User:Andy|Andy]] 16:03, 1 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
I believe that Internet privacy will continue to be a great topic of discussion for years to come. I had the chance to learn about big data and cyber security companies such as Fireeye and what they do from a control and commercial perspectives. Personally, I think that there is much interest in profitability as there is in control. Both governments and corporations want some sort of control in their populations&#039; and users&#039; information respectively.  &lt;br /&gt;
&lt;br /&gt;
[[User:cheikh|cheikhmbacke]] 15:59, 1 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
On a related note, am I the only one who approaches online privacy from the standpoint &amp;quot;anything I post online, I assume is public&amp;quot;? Most people find it crazy that I don&#039;t sit and change privacy settings for every single item I publish online, yet I find this the absolute best method as 1. I save time and stress by not having to think about privacy settings 2. I can&#039;t make a mistake by mislabeling something 3. If some site is hacked or Facebook developers make everything public through some bug there&#039;s no risk of anything confidential leaking out 4. It makes me think about every action I make, so that I have an explanation to stand by anything I do. If I don&#039;t want someone to see something I did, and I can&#039;t argument my choice, do I really want to do it in the first place? and 5. As I assume everyone, of course including the government and related parties, have access to everything I publish, I simply won&#039;t publish something I wouldn&#039;t want them to see... as they say, a secret is no longer a secret once it is uttered.--[[User:Seifip|Seifip]] 16:14, 1 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_3_Submissions&amp;diff=1517</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_3_Submissions&amp;diff=1517"/>
		<updated>2014-04-01T18:00:09Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Please note that the deadline for this assignment has moved from March 25th to April 1st.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on April 1st.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [[Special:Upload|Upload file]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
You can use the same bullet format if you wish:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Optionally you can use a new template to create a title box for your assignment.  In order to do this use the following format:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
 {{AssignmentInfo|Name|My assignment description|Link to your file}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If used properly you should see the following:&lt;br /&gt;
{{AssignmentInfo|My Name|My assignment description|http://yourlinkhere}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
And if you&#039;re feeling very adventurous, you may also use some new templates for comments and responses:  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Comment|type your comment here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Comment|Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor inviduntut labore et dolore magna aliquyam erat, sed diam voluptua. }}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can enter a response in a similar way:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{{Response|type your response here}}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Should look like:&lt;br /&gt;
{{Response|thank you very much for commenting on my assignment.}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you are not using the comment boxes, please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Akk22|Gendered Online Communities: Targeted Harassment and Successful Interventions |&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/Assignment3.docx]]}}&lt;br /&gt;
[[User:Akk22]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Dan Coronado|Examining forum control policies at Anandtech.com – the good, the bad and the ugly!|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/File:Dancoron_Assignment3.docx]]}}&lt;br /&gt;
[[User:Dancoron]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Castille Rath|Tumblr&#039;s Self-Harm Blogs|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/CastilleRath_ASSIGNMENT_THREE.doc]]}}&lt;br /&gt;
[[User:Castille|Castille]] 11:52, 25 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{{AssignmentInfo|Jane Kelly|Bitch Media&#039;s Comment Policy &amp;amp; User Behavior|http://cyber.law.harvard.edu/is2014/File:Jkelly_assignment3.odt}}&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Watson|Assignment 3 Project Outline|http://cyber.law.harvard.edu/is2014/File:Watson_assignment3.docx}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Margo Monroe|Controlling our personal genomes|&lt;br /&gt;
[[http://cyber.law.harvard.edu/is2014/sites/is2014/images/Assignment3Outline_Monroe.docx]]}}&lt;br /&gt;
([[User:Margorm|Margorm]] 08:21, 1 April 2014 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|PSL|PubMed Commons|&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/sites/is2014/images/Psl_Assignment3Outline.pdf}}&lt;br /&gt;
[[User:Psl|Psl]] 12:34, 1 April 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo| [[User:Lpereira|Lpereira]] 13:58, 1 April 2014 (EDT) |An Analysis of Two Youtube Communities and Norms|http://cyber.law.harvard.edu/is2014/File:LSTU_Assingment_3.docx}}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{{AssignmentInfo|Philip Seyfi|Reputation systems and unbalanced communities|&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment3_%281%29.pdf}}&lt;br /&gt;
[[User:Seifip|Seifip]] 14:00, 1 April 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Privacy_Part_1:_Corporate_Data_Gathering&amp;diff=1480</id>
		<title>Privacy Part 1: Corporate Data Gathering</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Privacy_Part_1:_Corporate_Data_Gathering&amp;diff=1480"/>
		<updated>2014-03-31T21:43:53Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 1&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s own privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet governance. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online, our interests may fall to the interests of profitability, online behavior regulation, and cybersecurity. &lt;br /&gt;
&lt;br /&gt;
Over the next two weeks we&#039;ll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns. Next week we&#039;ll build on these concepts with an eye toward government surveillance and law enforcement.&lt;br /&gt;
&lt;br /&gt;
Our own [http://cyber.law.harvard.edu/people/dobrien David O&#039;Brien] will be leading the class discussion this week.&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;The deadline for [[Assignments#Assignment_3:_Project_Outline|Assignment 3]]  moved from March 25th to today, April 1st.&#039;&#039;&#039;&#039;&#039; Please [[Assignment_3_Submissions|upload your assignment]] prior to class today.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Conceptualizing privacy&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, &#039;&#039;Understanding Privacy&#039;&#039; (Chapter 1)] (skim)&lt;br /&gt;
&lt;br /&gt;
; Privacy and data&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/science/discoveries/magazine/16-07/pb_theory Chris Anderson, The End of Theory] (Wired appears to be having some troubles with their links this week, so if that doesn&#039;t work, try this [http://webcache.googleusercontent.com/search?q=cache:XkYbG5I9RtkJ:www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213+&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us cached version].)&lt;br /&gt;
&lt;br /&gt;
* [http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data Viktor Mayer-Shoenberger, The Rise of Big Data]&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213 Bruce Schneier, Why Anonymous Data Sometimes Isn&#039;t] (see the note above about Wired - try this [http://webcache.googleusercontent.com/search?q=cache:XkYbG5I9RtkJ:www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213+&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us cached version] if the link above doesn&#039;t work).&lt;br /&gt;
&lt;br /&gt;
* Play around with some of the websites by [http://latanyasweeney.org/ Latanya Sweeney]&lt;br /&gt;
&lt;br /&gt;
:* [http://thedatamap.org/ The Data Map]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyride.org/more.html About My Ride]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyinfo.org/ About My Info]&lt;br /&gt;
&lt;br /&gt;
; Corporate data practices&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.wsj.com/digits/2012/12/07/how-dataium-watches-you/ Jeremy Singer-Vine, How Dataium Watches You] &lt;br /&gt;
&lt;br /&gt;
* [http://www.interactually.com/linkedin-creepiest-social-network/ David Veldt, LinkedIn: The Creepiest Social Network]&lt;br /&gt;
&lt;br /&gt;
* [http://online.wsj.com/news/articles/SB10001424127887323777204578189391813881534 Jennifer Valentino-Devires, Jeremy Singer-Vine, Ashkan Soltani, Websites Vary Prices, Deals Based on Users&#039; Information] (if this appears behind a paywal, [http://blogs.wsj.com/wtk/ play around with the WSJ&#039;s interactive graphics])&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, &#039;&#039;The Future of the Internet and How to Stop It&#039;&#039; (Chapter 9)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, &#039;&#039;Blown to Bits&#039;&#039; (Chapter 2)] (pages 36-42)&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, &#039;&#039;Code 2.0&#039;&#039; (Chapter 7)] (focus on &amp;quot;Privacy in Public: Data&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States Wikipedia, Privacy Laws of the United States]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship]&lt;br /&gt;
&lt;br /&gt;
* [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/05/the_eyes_and_ea.html Bruce Schneier, Surveillance and the Internet of Things]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This week&#039;s readings on privacy have been really thought provoking. Whether we have a &#039;right&#039; to internet privacy is a tough subject to ponder, as we have no obligation to use the internet, thus making our use subject to a company&#039;s terms, yet there are also a number of other factors to consider. Some of the biggest concerns are that the &amp;quot;data collection&amp;quot; isn&#039;t merely studied but disseminated, and also that that collection doesn&#039;t end at internet usage. It infiltrates every aspect of our lives, with surveillance footage being taken unbeknownst to those being viewed. I&#039;m not sure if it was in this class or in another discussion, but supposedly we&#039;re not far away from a kind of optical monitoring whereby stores can track what a shopper looks at most intently to cater advertising to them specifically. Where does this invasion of privacy end?&lt;br /&gt;
&lt;br /&gt;
Adding to the links above, I found this article linked in one of the above articles. It&#039;s very informative and interesting.&lt;br /&gt;
&lt;br /&gt;
http://query.nytimes.com/gst/fullpage.html?res=9E0CE3DD1F3FF93AA3575BC0A9609C8B63&lt;br /&gt;
&lt;br /&gt;
Sidebar- loved the article by Veldt on LinkedIn... I, too, have always wondered HOW they can suggest people who I know in real life but with whom I haven&#039;t had any connection with via social networks or even e-mail. &lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 16:33, 29 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
:Great questions on privacy, Castille, just to piggy-back on what you&#039;ve brought up….&lt;br /&gt;
:Data gathering will become more intrusive, especially as we advance technologically. This will impede on personal privacy to a point where it becomes a major issue. For example, Google glasses will open many avenues for companies to gather personal data. &lt;br /&gt;
:But where do ethics come in? &lt;br /&gt;
:Companies don&#039;t have moral ethics if it means they can convert personal data into potential profits. It may already be too late to legislate laws and then how do we enforce them? Its actually quite alarming how much personal information is available digitally and more to come as new devices (such as wearables) make it easier for companies (and other individuals) to exploit. [[User:Marissa1989|Marissa1989]] 02:09, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The data we can gather through automation is undoubtedly incredible. The weakness with big data lies in the quality - relying too much on the results spit out from the tools could lead to numerous mistakes. That’s when human intellect comes into play; real-time observation and analysis will be critical for spotting errors. &lt;br /&gt;
Human ingenuity is the source of progress.  Any company can better leverage the data available to them and generate a competitive advantage, as long as they’re equipped with inquisitive minds and critical thinkers who can best apply the data presented. [[User:Marissa1989|Marissa1989]] 02:01, 31 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Not related to this week&#039;s lecture, but for those interested, a major revamp is in the works for copyright law in the UK, including the addition of a US-like fair use clause - [http://www.ipo.gov.uk/response-2011-copyright-final.pdf Modernising Copyright: A modern, robust and flexible framework] --[[User:Seifip|Seifip]] 17:43, 31 March 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Peer_Production:_Development_from_the_Edges_and_from_the_Crowd&amp;diff=1431</id>
		<title>Peer Production: Development from the Edges and from the Crowd</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Peer_Production:_Development_from_the_Edges_and_from_the_Crowd&amp;diff=1431"/>
		<updated>2014-03-25T14:24:22Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Beyond merely providing a forum for political activism, scholars are increasingly aware of the benefits the Internet provides as a mode of production. How can the Internet help us make things together? How much hierarchy and control is needed to produce? How good is the material that peer production creates? And finally, what are the risks to producers (and society) inherent to peer production?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;The deadline for [[Assignments#Assignment_3:_Project_Outline|Assignment 3]]  has moved from March 25th to April 1st.&#039;&#039;&#039;&#039;&#039; All other deadlines will not change.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Development from the edges&lt;br /&gt;
&lt;br /&gt;
* [http://web.mit.edu/evhippel/www/democ1.htm Eric Von Hippel, &#039;&#039;Democratizing Innovation&#039;&#039;] (Chapter 1, focus on pages 1-3 and 13-15, skim rest)&lt;br /&gt;
&lt;br /&gt;
; Development as a crowd&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/events/luncheon/2013/12/hergueux Jerome Hergeaux, Cooperation in a Peer Production Economy: Experimental Evidence from Wikipedia] (video, watch from beginning to 47:50)&lt;br /&gt;
&lt;br /&gt;
* [http://video.mit.edu/watch/news-information-and-the-wealth-of-networks-9187/ Yochai Benkler, News, Information and the Wealth of Networks] (video, watch from 8:32 to 26:07)&lt;br /&gt;
&lt;br /&gt;
:* if you’re not familiar, you may want to spend a little time looking at Wikipedia’s entry on [https://en.wikipedia.org/wiki/Seti@home Seti@home].&lt;br /&gt;
&lt;br /&gt;
* [http://web.media.mit.edu/~cebrian/p78-tang.pdf John Tang et al, Reflecting on the DARPA Red Balloon Challenge (&#039;&#039;Communications of the ACM&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
; Crowd intelligence&lt;br /&gt;
&lt;br /&gt;
* [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html James Surowiecki, &#039;&#039;The Wisdom of Crowds&#039;&#039;] (read excerpt)&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2006/11/30/cass-sunsteins-infotopia/ Ethan Zuckerman, Review of Cass Sunstein’s “Infotopia”]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Reliability_of_Wikipedia Wikipedia, Reliability of Wikipedia]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=1uJWwLVkKTU Jonathan Zittrain, Minds for Sale] (video, watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://rcmap.hatnote.com/#en Hatnote, Real Time Wikipedia Changes Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
COMMENTS ON &amp;quot;Jerome Hergeaux, Cooperation in a Peer Production Economy: Experimental Evidence from Wikipedia&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Coming from an operations research background, I find the application of game theoretic approaches to this project rather interesting.  However, there are other aspects which were not taken into account.  For example, the utility of social recognition derived by contributors to Wikipedia can be obtained at significantly reduced cost and risk compared to other options like authoring a book or publishing a paper in a peer-reviewed journal.  Furthermore, the results are immediate so the perceived utility is also immediate.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 08:40, 25 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
QUALITY OF CONTENT FROM PEER PRODUCTION IN WIKIPEDIA&lt;br /&gt;
&lt;br /&gt;
Because Wikipedia content lacks originality and are mostly copied from other sources, I beg to differ on the usefulness of mentioning contributions to Wikipedia in one&#039;s resume.  Real scholars would rather contribute to peer-reviewed journals where the benefits are far greater, including promotion and salary increase if working in an academic institution.  So while Wikipedia content may be useful to the general public, the quality of the content may not be of high academic value.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 09:17, 25 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I think that one of the great examples of Democratizing Innovation are games... A number of highly successful games have been initially created as mods developed by gamers, and later turned into commercial products by the companies whose games were built upon... Some examples off the top of my head include many Half Life/Source engine based multiplayer games, DotA - originally based on Warcraft III, or, outside of video games, the many unofficial rulebooks, expansions and modifications of Dungeons &amp;amp; Dragons or some of the Wizards of the Coast&#039;s collectible card games. --[[User:Seifip|Seifip]] 10:24, 25 March 2014 (EDT)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Collective_Action,_Politics,_and_Protests&amp;diff=1380</id>
		<title>Collective Action, Politics, and Protests</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Collective_Action,_Politics,_and_Protests&amp;diff=1380"/>
		<updated>2014-03-11T13:37:39Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 11&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Last class we learned about SOPA, and the fear that it engendered in many Internet commentators. SOPA lead to what is often considered the high-water mark of American engagement online in domestic policy circles (so far). But the Internet has been used for collective action since its inception. When does this work? When does it fail? Who gets included and who are we leaving behind? Does the Internet serve as a better facilitator to protests in some areas versus others?&lt;br /&gt;
&lt;br /&gt;
Today will be an exploration of online protests and collective action, both in general and through the lens of some famous recent examples. Along the way we&#039;ll grapple with limitations of online protest activity, the criticisms weighed against online protest behavior, and some of the ethical questions that come up when different organizations fight for attention to their specific causes.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/aliciasn Alicia Solow-Niederman], a Berkman project manager who studies collective action online. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; Framing&lt;br /&gt;
&lt;br /&gt;
* [http://web.mit.edu/comm-forum/forums/civic_media.html MIT Communications Forum, What is Civic Media?] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://www.utsc.utoronto.ca/~farrell/blogpaperfinal.pdf Daniel Drezner and Henry Farrel, The Power and Politics of Blogs] (read introduction, &amp;quot;The networked structure of the blogosphere;&amp;quot; skim &amp;quot;How skewedness affects politics;&amp;quot; read &amp;quot;The constraints on blog influence&amp;quot; and conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://dash.harvard.edu/bitstream/handle/1/4609956/SAIS%20online%20organizing%20paper%20final.pdf?sequence=1 Bruce Etling et al., Political Change in the Digital Age: The Fragility and Promise of Online Organizing] (read introduction, &amp;quot;Digital Technologies, Information and Political Transitions,&amp;quot; &amp;quot;Online Organizing and Contentious Politics,&amp;quot; and &amp;quot;The Uncertain Future of Digital Organizing&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
; Case Studies&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2295953 Yochai Benkler et al., Social Mobilization and the Networked Public Sphere: Mapping the SOPA/PIPA Debate] (read 4-10, skim 12-38, read 39-46)&lt;br /&gt;
&lt;br /&gt;
:* You may also want to play around with the [http://cyber.law.harvard.edu/research/mediacloud/2013/mapping_sopa_pipa/# controversy mapper] Media Cloud put together in connection with this report.&lt;br /&gt;
&lt;br /&gt;
* [http://civic.mit.edu/blog/erhardt/mapping-the-trayvon-martin-media-controversy Erhardt Graeff, Mapping the Trayvon Martin Media Controversy]&lt;br /&gt;
&lt;br /&gt;
* [http://www2.scedu.unibo.it/roversi/SocioNet/AdamicGlanceBlogWWW.pdf Lada Adamic and Natalie Glance, The Political Blogosphere and the 2004 U.S. Election: Divided They Blog] (read introduction, analysis, and conclusion – i.e., pages 1-3 and 8-15)&lt;br /&gt;
&lt;br /&gt;
* [http://journalistsresource.org/studies/international/global-tech/social-media-protest-egypt-tahrir-square Alex Remington, Social Media and Participation in Political Protest: Observations from Tahrir Square]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=904 Zeynep Tufekci, #Kony2012, Understanding Networked Symbolic Action &amp;amp; Why Slacktivism is Conceptually Misleading]&lt;br /&gt;
&lt;br /&gt;
; Observations, tactics, and methods&lt;br /&gt;
&lt;br /&gt;
* [http://civicmedia.info/ideas/aaron-swartz-theory-of-change/ Aaron Swartz, A Theory of Change]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/04/20/the-tweetbomb-and-the-ethics-of-attention/ Ethan Zuckerman, The Tweetbomb and the Ethics of Attention]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=Fgh2dFngFsg Aaron Swartz, How We Stopped SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.socialflow.com/post/7120244932/data-viz-kony2012-see-how-invisible-networks-helped-a-campaign-capture-the-worlds-attention Gilad Lotan, KONY2012: See How Invisible Networks Helped a Campaign Capture the World’s Attention]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/publications/2010/Tale_Two_Blogospheres_Discursive_Practices_Left_Right Yochai Benkler and Aaron Shaw, A Tale of Two Blogospheres: Discursive Practices on the Left and Right]&lt;br /&gt;
&lt;br /&gt;
* [http://opennet.net/sites/opennet.net/files/PolicingContent.pdf  Jillian York, Policing Content in the Quasi-Public Sphere] (focus on the Introduction, and “Social Media: Privacy Companies, Public Responsibilities”)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_7.pdf Yochai Benker, &#039;&#039;The Wealth of Networks&#039;&#039;] (Chapter 7 - &amp;quot;The Emergence of a Networked Public Sphere&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 11:51, 11 February 2014 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
He also explained that people who claim that technology is neutral have typically zoomed out so far that the relationship between the individual, society and the technology are lost. He used the argument that while it may be accurate to say that either a gun or a toothbrush can be used to kill, but this theoretical accuracy is so abstract that it loses credibility.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
I really like this, reminds me of [http://en.wikipedia.org/wiki/Emergence Emergent properties] &lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:48, 9 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Benkler et al&#039;s &amp;quot;Social Mobilization and the Networked Public Sphere&amp;quot; defines the networked public sphere as &amp;quot;an alternative arena for public discourse and political debate, an arena that is less dominated by large media entities, less subject to government control, and more open to wider participation.&amp;quot; Thinking about how other parts of the public sphere are subject to each of these forces of control certainly makes the &amp;quot;public sphere&amp;quot; sound a little less &amp;quot;public.&amp;quot; While the mainstream American media can often look like a circus, particularly if you&#039;re looking at the 24 hour news networks, with Benkler&#039;s ideas about the networked public sphere in mind, they don&#039;t really feel like something the public engages in. Rather, it is something we can engage with. Less a participatory medium than one that we have the option to either consume or not.&lt;br /&gt;
[[User:Jkelly|Jkelly]] 12:01, 10 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I found the article mapping the Trayvon Martin case particularly interesting as I grew up near where the incident occurred and it caused such a frenzy all over Florida (and all over the country, for that matter). I happen to know someone really high up in the DA&#039;s office in FL, so hearing the facts of the case in comparison to what the media was broadcasting was shocking. The media completely created a story to propel their own political agenda and made it fit what they wanted to say. This is not at all to say that the message regarding race relations wasn&#039;t important, but it is interesting how they would squash facts which came up on the opposing side and emphasize and exaggerate other aspects so that they&#039;re telling the story that they want to tell. It&#039;s especially fascinating when you consider the story of Travyon to that of Jordan Davis, another black teenager who was shot by a white man in Florida, which was CLEARLY a race issue. Unlike the case of Trayvon, Davis&#039;s case was cut-and-dry, yet the latter case didn&#039;t get nearly as much media attention despite the fact that it could&#039;ve actually spoken more loudly and to a more severe degree about race relations.&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 12:07, 10 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I thought the article on the KONY 2012 campaign and the concept of slack-tivism very interesting, especially since I remember very well watching the movement unfold and ultimately deflate. I do think that the internet can be effective in stirring debate and real change, but how we harness that power is ultimately unable to be controlled and can be easily manipulated, as we saw with the whole Kony movement. The organization was followed by scrutiny and met with a lot of accusations and controversy. However, the campaign did teach a valuable lesson: online movements can have real impacts and stir public conversation. The response from the video definitely brought Uganda to media attention as people investigated the message and the country.&lt;br /&gt;
&lt;br /&gt;
There are some positive examples of collective action online, such as sites like Kickstarter that depend on action by strangers to support projects. It is a successful example, in a smaller and arguably more effective scale, on how the Internet is able to influence people’s lives and connect strangers. It would be interesting to see how sites like this can maintain it&#039;s audience and continue to inspire people to donate and participate. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 19:51, 10 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the article “The Power and Politics of Blogs” by Daniel Drezner and Henry Farrel really interesting. I always wonder why blogging has such a big impact and influence on people and the media when as a matter of fact, there are not many readers. “Blogging is many things, yet the typical blog is written by a teenage girl who uses it twice a month to update her friends and classmates on happenings in her life”, when now it has become an important media that could make a Senate Majority Leader resigns from the position.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 02:26, 11 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
A CRITIQUE OF THE PAPER BY DREZNER AND FARREL&lt;br /&gt;
&lt;br /&gt;
The distribution graphs shown at the end of the paper are too academic and technical and serves no practical purpose.  They cannot be easily be interpreted.  There are no graphs showing relationship between skewness and the variables the authors were supposedly measuring.  No variables, political or otherwise, were explicity mentioned.&lt;br /&gt;
&lt;br /&gt;
It also seems flawed to argue that politicians or the government should make decisions or &amp;quot;coordinate&amp;quot; their actions around a somewhat mysterious &amp;quot;Z&amp;quot; variable.  One won&#039;t get a majority vote or approval by making decisions based on such a &amp;quot;calculation&amp;quot;.  And the problem of decision-making does not encompass a single &amp;quot;z&amp;quot; variable but more often an interplay of multiple factors.  Cognitive maps, stakeholder analyses, and game theoretic approaches, etc., taking into account multiple criteria may be more appropriate.&lt;br /&gt;
&lt;br /&gt;
The importance of blogs may have been overstated and needs some qualification.  Generally, nobody is interested to read just anybody&#039;s blog.  But if an articulate, prominent and influential blogger continues to write and maintains his blog online, people may pay attention.  Some such blogs may get the attention of lots of people and lots of contributions.  But my bet is majority of individual blogs don&#039;t get significant attention.  It is true though, if one intends to get more attention, one would write on blogs of popular bloggers or blogs of popular online communities...and also link them to one&#039;s own blog.  The people who has the power and means to take action to improve our world do not have time to scour and read the blogs.  The need for more organized online information and data flow cannot be over-emphasized and blogs are not the appropriate medium.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 08:33, 11 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I was in Cambridge when Aaron Swartz committed suicide last year, and witnessed how vocal the local community became during the weeks that followed. It was a pleasure to reread and rewatch some of his work today, and a wonderful reminder how much impact a person can have by mobilizing online communities, especially through the theory of change he described so well on his blog. --[[User:Seifip|Seifip]] 09:37, 11 March 2014 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1331</id>
		<title>Copyright Part 2: Enforcement and Balances</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1331"/>
		<updated>2014-03-04T20:47:40Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital technologies spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies for control and copyright enforcement. “Controversial” may be putting it lightly; the ongoing fight between copyright owners and Internet evangelists is one of the most popularly debated fights surrounding Internet control.&lt;br /&gt;
&lt;br /&gt;
This class focuses on how copyright is enforced online, with particular emphasis on the &amp;quot;notice-and-takedown&amp;quot; provisions of the Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;), which allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The class will also look to the now-famous fight concerning SOPA and PIPA, and other attempts to more strictly regulate against online piracy.&lt;br /&gt;
&lt;br /&gt;
Joining us will be [http://cyber.law.harvard.edu/people/aholland Adam Holland], who works here at Berkman on the [https://www.chillingeffects.org/ Chilling Effects] project.&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The second half of assignment 2 (commenting on prospectuses) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The DMCA Notice-And-Takedown Process&lt;br /&gt;
&lt;br /&gt;
* Digital Media Law Project, [http://www.dmlp.org/legal-guide/copyright-claims-based-user-content Claims Based on User Content] and [http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content Protecting Yourself Against Copyright Claims Based on User Content]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/takedowns Electronic Frontier Foundation, Takedown Hall of Shame] (peruse)&lt;br /&gt;
&lt;br /&gt;
* Chilling Effects, [http://www.chillingeffects.org/about About] and peruse the [http://www.chillingeffects.org/weather.cgi weather reports].&lt;br /&gt;
&lt;br /&gt;
* [http://paidcontent.org/2013/02/24/how-google-did-the-right-thing-with-the-nascar-crash-video-and-why-it-matters/ Matthew Ingram, Paid Content, How Google did the right thing with the NASCAR crash video, and why it matters]&lt;br /&gt;
&lt;br /&gt;
; Case Study - SOPA/PIPA&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/reading-sopa Jonathan Zittrain, Kendra Albert, and Alicia Solow-Niederman, A Close Look at SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/01/15/mit-media-lab-opposes-sopa-pipa/ Ethan Zuckerman and Joi Ito, MIT Media Lab Opposes SOPA, PIPA]&lt;br /&gt;
&lt;br /&gt;
; The big picture&lt;br /&gt;
&lt;br /&gt;
* [http://torrentfreak.com/bittorrent-traffic-drops-in-america-grows-in-europe-131111/ Ernesto Van Der Sar, BitTorrent Traffic Drops in America, Grows in Europe]&lt;br /&gt;
&lt;br /&gt;
* [https://www.techdirt.com/blog/casestudies/articles/20120405/11221818390/perspective-complexities-copyright-creativity-victim-infringement.shtml Erin McKeown, A Perspective On the Complexities of Copyright and Creativity from a Victim of Infringement]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
; Case Study - ISP &amp;quot;Six Strikes&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/2013/feb/01/copyright-alert-system-and-six-strikes/ Brooke Gladstone, Interview with Jill Lesser of Center for Copyright Information (&#039;&#039;On The Media&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.plagiarismtoday.com/2013/02/25/the-6-likely-impact-of-six-strikes/ Jonathan Bailey, Plagiarism Today, The 6 Likely Impact of Six Strikes]&lt;br /&gt;
&lt;br /&gt;
; Case Study - Operation In Our Sites&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1835604 Andy Sellars, Seized Sites: The In Rem Forfeiture of Copyright-Infringing Domain Names]&lt;br /&gt;
&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Wendy Seltzer, Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With so much copyrighted material out in cyberspace it is helpful to have provisions like the DMCA takedown and notice provisions to help combat copyright infringement.  I think it is a reasonable approach to helping prevent abuses of copyright.  On the other hand, instances like the Akon takedown do appear to fall into abuse of the DMCA.  Nevertheless, I would argue that the DMCA actually worked in that instance because the material was taken down, but appealed and re-posted.  However, if the political satirist in the Akon incident did not have legal counsel, the takedown probably would have remained.  So there, I think is a flaw in the system, in that, companies with large pockets, and legal teams may be able to enforce their own form of censorship.  With the proliferation of user generated content like blogs, with bloggers commentating and re-mixing copyrighted content, what constitutes infringement is more difficult to see.  The good thing is that for the most part DMCA does not impose any prior restraint on expression.  Posters are allowed to post without restraint, and for the most part they are not liable as long as the material in question is taken down quickly (as least I think that last part is true?).&lt;br /&gt;
The class readings about chilling effects dig deeper into the problems that cease and desist letters, and DMCA takedowns have for expression on the Internet.  The Chilling Effects website talks about the harm that these C&amp;amp;D letters can have on expression.  Internet bloggers, satirists, and others may takedown their content on their own, causing a sort of self censorship for fear of prosecution from powerful adversaries.&lt;br /&gt;
SOPA, and PIPPA also would have caused a chilling effect, and probably out and out prior restraint on many users expression on the Internet. I think that a robust activist element from groups like the Berkman Center(shameless plug lol), the EFF, and Chilling Effects, help Internet users to know when new laws are being introduced to curb expression, and even help represent users who have had their material wrongfully censored or removed from the Internet. Yet, it concerns me a little bit that without such advocacy groups the little guys on the Internet would be at an even bigger disadvantage to the bigger fish on the internet. &lt;br /&gt;
One question I have was about the Bit torrent article, I didn&#039;t understand the importance of Bit torrents decline in use in the US. Was it that the decline might signify that users are avoiding bit torrent for some reason? Also, I saw that bit torrent and youtube, and netflix use disproportionate  amounts of space on the system. Is this sustainable? Is it fair that a few applications and companies use up so much of the space? Does that cause harm, or take from other uses that the space could be used for? I&#039;m not really sure how that &amp;quot;space&amp;quot; works. Is it unlimited?[[User:Mikewitwicki|Mikewitwicki]] 08:13, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I can&#039;t wait to hear the information in this lecture pertaining to copyrighted material. I am often amazed at the sheer magnitude of the task of enforcing rights to certain types of media, particularly with the precipitous expansion of the internet. Recently a friend of mine directed me to the website letmewatchthis.ch, where you can stream movies that are currently in theaters. Many of the movies seem to be marked &amp;quot;for awards consideration only&amp;quot; which would indicate that professionals in the industry are leaking this media to the internet.  As more and more people around the world gain access to the internet (I read somewhere that 8 new people a second gain access to the internet), how will copyright enforcement agencies be able to keep up? Also, it seems to me that it will require the commitment of those responsible for the content (such as those professionals in the film industry leaking content) and that buy-in does not seem to be widely taking place. [[User:Drogowski|Drogowski]] 14:35, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Yet again, related to an earlier class, but another interesting write-up was just published on The Verge: [http://www.theverge.com/2014/2/25/5431382/the-internet-is-fucked The Internet Is Fucked (but we can fix it)] --[[User:Seifip|Seifip]] 19:05, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Could you try to fix it by the end of the semester and outline the rectification in your final research project please? I&#039;m certain we would all appreciate your efforts (smile).&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ditto, not related to Copyright, but the theme of the class in general, politics &amp;amp; control of the Internet. The Quebec government started [http://www.thestar.com/news/canada/2014/02/26/quebecs_language_watchdog_targets_stores_use_of_english_on_facebook.html fining businesses] for not writing in French on their Facebook pages. I&#039;ve never understood why Canada has such a stereotype of being &#039;nice&#039;. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:37, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Erin, thanks for sharing this. Seems like a really interesting example of the ways in which the Internet and digital technologies are a new place for old and ongoing debates to play out. With so much of our lives now taking place online, it makes sense that concerns about language, heritage, and culture have to be grappled with anew. I wonder if some of the push-back from business owners-- like the one in this article who says &amp;quot;Facebook has nothing to do with Quebec&amp;quot;-- stems from the idea that the Internet is a malleable and border-less place and confusion over what laws govern speech on a global forum run by a US-based company. And yes, I have heard some Quebecois friends get a little less than &amp;quot;nice&amp;quot; when it comes to discussing their francophone heritage... [[User:Jkelly|Jkelly]] 15:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Wow! That&#039;s crazy. Do you know what justification they have (or are using) to fine the businesses? Is it a case like the ADA, which prohibits discrimination against disabilities by such measures as requiring all public establishments to follow building codes to ensure disabled individuals are accommodated? By this I mean, is Quebec doing this so that French-speaking people are not excluded?[[User:Castille|Castille]] 15:51, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
Hi [[User:Castille|Castille]] I have a hard time discussing this without letting it get personal, because I&#039;ve faced off with Language Police, was beaten up as a kid in Quebec for being Anglophone (I was born in USA), and grew up following Quebec&#039;s laws which are at odds with the UN&#039;s Charter of Human rights (once again, WHY do Americans steriotype Canada as &#039;nice&#039;??!!). So now, hearing that the Language Police are trying to control Facebook, which is an &#039;&#039;American&#039;&#039; company, I just get so mad. &lt;br /&gt;
Side-note: My own mother just received a letter from another Quebec Gov&#039;t agency, stating that she must delete any comments from users/customers on her company&#039;s Facebook page. [http://en.wikipedia.org/wiki/Charter_of_the_French_Language Here is a link] to the laws in question, in case anyone is interested [[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:32, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Thanks for the link Erin! I am surprised Wikipedia hasn’t received a notice to re-write the Charter of the French language under Loi 101…in French (smile).  Quebec had no official language prior to 1974, and it makes a person ponder what Camille Laurin’s intent was to propose such a ridiculous idea. If the government is so fond of the language, why not impose regulation on the import/export business? All commodities created by any business residing in Quebec could be written in French.  A great majority of the world would have no idea if they had purchased crude oil or a tank of CoolAid ,and we could all guess what type of prescriptions we are purchasing from them on line.  If they tightened the controls a little more, and enforced all imports to be written in French, we could slowly watch Quebec become non-existent. We could read about Quebec in our history books just like the Mayan. Brilliant idea! &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:50, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The highly controversial Section 512 of the DMCA, 17 U.S.C. § 512 provides a “safety zone”, where online service providers could operate shielded from liability charges on account of copyright infringement. Service providers function by allowing people to modify, post, and search content on their servers. By hosting foreign content that is not generated by the OSP or ISP, they were placing themselves into position of being held liable on infringement charges. This changed in 1998, because as long as roughly three essential steps were taken, an OSP could take advantage of the “safe-harbor” clause.  One of those steps is the “expeditious” removal of infringing content. On the other side, the alleged offender can send a counter-notice disputing the copyright holders claim. This might seem in favor of the public domain with an anti-copyright agenda, but it does not diminish the copyright holders privileges in any way. This provision also allows the first step of prosecution in the form of takedown notices. While these measures are beneficial for the public good and provide a degree of protection, they seem utterly inefficient in situations like Erin McKeown experienced. In an attempt to control infringers and pirates, the ICE has engaged in domain seizures, which resulted in tens of thousands of innocent websites being shut down. [[User:Emmanuelsurillo|Emmanuelsurillo]] 22:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
The Electronic Frontier Foundation’s Takedown Hall of Shame has excellent examples of cease and desist letter offenders, even citing unusual claims such as one over the copyright privileges of a monkey’s photos! That is where major companies should take and follow Google’s example of standing up for users rights. The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA), MIT points out that to stop pirating has many dangerous side effects including but not limited to being unconstitutional in violating certain aspects of free speech. [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:06, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was unable to find out anything about how many actions have been taken under the Copyright Alert System.  Are there any known statistics on how many of these notices have been sent out or how many consumers have been affected? (whether centrally managed, or done by a third-party watchdog like EFF?)&lt;br /&gt;
[[User:Jradoff|Jradoff]] 13:48, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: [http://thehill.com/blogs/hillicon-valley/technology/199124-six-strikes-thwarting-piracy-leader-says The Hill] reported that an annual report should be expected soon on Six Strikes. (It just passed its first anniversary since implementation.) We&#039;re still waiting to see if that will have a level of analysis like this. [[User:Andy|Andy]] 10:26, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m in a creative industry where intellectual property is important (software / online games).  Yet I think that criminalization of intellectual property violations is ridiculous.&lt;br /&gt;
&lt;br /&gt;
I called all my U.S. senators and representatives back when SOPA/PIPA was in the legislative process--I found it highly offensive. It seems absurd to me that someone would be placed in jail for copyright infringement, or that we are making agencies of the U.S. government an arm of private industry by using them to enforce this (not to mention giving government broad control over shutting down content that some moneyed interest finds objectionable).&lt;br /&gt;
&lt;br /&gt;
The argument used by the industry is that copyright violation is equivalent to theft.  I agree that many cases of copyvio are totally wrong, but I don&#039;t see why it can&#039;t be handled entirely through civil systems.  The fact is that intellectual property violations *are* different from stealing a physical good, simply because in the former case we&#039;re dealing with a nonrival good (i.e., if you steal my car then I can&#039;t use it anymore; if you copy my software package, I&#039;ve lost some potential revenue from you but you haven&#039;t deprived my ability to sell it to others).  Furthermore, intellectual property violations are way more complex--these are cases that just aren&#039;t as clear-cut as showing that a theft actually occurred when you are caught with my stolen car.&lt;br /&gt;
&lt;br /&gt;
I listened to the songs mentioned in the &amp;quot;Touch the Sun&amp;quot; / &amp;quot;Slung-lo&amp;quot; controversy referred to in the reading materials.  I empathize with the creator of Slung-lo if they really feel their creation was improperly exploited, but I simply don&#039;t see the basis for their claim.  But upon my listening I found both songs to be different, and the lyrics were (as far as I could tell) totally different.  Billions of songs get made--lots will be similar.  I shudder to think that a large and well-funded copyright holder could use claims like this to abuse others with the threat of criminal enforcement.&lt;br /&gt;
[[User:Jradoff|Jradoff]] 13:58, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It seems that SOPA, PIPA, and the DCMA all seem to be working towards the same goal, that of eradicating copyright infringement/piracy. Why is the DCMA not sufficient? Internet piracy is a huge issue for the motion picture and music industries (and I&#039;m sure for plenty of other industries) as it is stealing. I agree with Jradoff that it&#039;s not &#039;&#039;quite&#039;&#039; as bad as actual theft of property and therefore might not warrant a jail sentence, but it is essentially the same thing. What is the difference between going into a Best Buy and stealing a DVD or CD and stealing it from home? It seems the primary difference is simply the ease of convenience for the thief. I think we have only been desensitized to this kind of theft because it is so prevalent in society. Anyways, if we agree that internet piracy is &amp;quot;wrong&amp;quot;, what can be done to curtail it further than the rules currently in place (i.e. the DCMA)? Have SOPA and/or PIPA been revised? In this article that I found on Forbes [http://www.forbes.com/sites/derekbroes/2012/01/20/why-should-you-fear-sopa-and-pipa/], author Derek Broes claims to have testified before Congress to propose &amp;quot;many solutions, none of which violate our First Amendment Right to Free Speech&amp;quot;, but he does not elaborate on any specific alternatives or amendments to SOPA/PIPA. What effective alternatives are there, which would go above and beyond what is already in place, but wouldn&#039;t be as &amp;quot;harmful&amp;quot; as SOPA/PIPA? Is there still talk of a new iteration of the legislature? I would imagine that with the onslaught of backlash from the initial bills, they would have to call them something different to mitigate any potential hate...[[User:Castille|Castille]] 15:51, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The former government in Australia tried for many years to implement a voluntary scheme to crack down on piracy through a series of discussions with ISPs, instead of having the government legislating enforcement of copyright. The meetings stopped happening, as the representatives from iiNet (large Australian ISP), would often get up and walk out of the meetings. &lt;br /&gt;
&lt;br /&gt;
About 18 months ago, Australian Attorney-General George Brandis made a case against iiNet which attempted to hold them liable for their users on BitTorrent for piracy purposes, which was taken to the High Court. The entertainment industry was attempting to hold the ISP&#039;s liable because it is obviously not economically viable, (even if it is in fact possible) to prosecute each piracy user individually. iiNet was successful in their defense to which the High Court unanimously ruled the ISP is not liable for the acts of their users. &lt;br /&gt;
&lt;br /&gt;
iiNet’s routine business of providing access to the internet will not, by itself, mean that they authorise their customers&#039; acts of copyright infringement.  At the same time, iiNet is not obliged to contact customers or terminate their accounts in response to notices from copyright owners.  Although users are liable for copyright infringement, it is hardly enforced at all in Australia. Australia is needing legislative reform in regard to copyright laws, as their attempts to enforce it have been futile. [[User:Marissa1989|Marissa1989]] 20:41, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
I should also note that this is very low on the government&#039;s agenda. Most of the pirated entertainment comes from the USA. There’s no motive or benefit for the Australian Government to fight against illegal downloading on behalf of the American entertainment industry. In addition, most websites used by Australians to pirate, like BitTorrent and Pirates Bay, are American-based websites, which adds another disincentive for them. Unfortunately, a lot of piracy goes on here all too easily without intervention or blocking; almost makes me wonder if (per capita), more piracy happens here. Unless it becomes a political issue or the Australian government loses money over it, they’ll remain reluctant to spend the time or energy to fix it.  [[User:Marissa1989|Marissa1989]] 00:03, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exciting-- I was just searching Google for an episode of Girls that I accidentally deleted from my DVR and found the following notification at the bottom of the search page:&lt;br /&gt;
In response to a complaint we received under the US Digital Millennium Copyright Act, we have removed 1 result(s) from this page. If you wish, you may read the DMCA complaint that caused the removal(s) at ChillingEffects.org. [[User:Castille|Castille]] 00:22, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It was interesting to read more on DMCA. I&#039;ve never been too familiar with the specifics of the law but have faced it&#039;s effects constantly on YouTube as so many videos are removed over copyright claims. Reading more on it, I found this article very interesting: http://www.wired.com/threatlevel/2008/10/ten-years-later/ It portrays DMCA in a positive light, going as far as saying it &amp;quot;saved the web.&amp;quot; I don&#039;t completely agree with the article, but I do think that content creators should have some safety net to ensure that their content cannot be used without proper credit or consent. And so, some safety net needs to be present but a filter that is too large is very concerning. The list of Takedown Hall of Shame is an alerting example of filtering gone wrong for the wrong reasons. It would interesting to see the solutions we come up with in the future. Will greater efforts of copyright regulation always be followed by an internet protest as large as the SOPA/PIPA one?&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 20:45, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Piracy is a major issue in Australia. The copyright laws are more loose than compared with other countries such as the US and it is relatively easy to download content illegally. Before watching a movie, an advertisement airs with the line “You wouldn’t steal a car, you wouldn’t steal a handbag, you wouldn’t steal a movie. Downloading pirated films is stealing. Piracy - it’s a crime!”. I understand this commercial has a moral angle in hopes to minimise illegal downloading. However,  If someone steals a car, handbag or wallet, a physical object that belongs to someone else has been removed without permission or payment. That would be theft. In one sense, if you download something illegally, it is a digital copy that changes hands. (‘Copy’ being the operative word). With piracy, nobody is physically deprived of anything, which is why I think most Australians don’t have a moral conflict when downloading illegally, which makes the advertisement’s suggestion that you are ‘stealing’ seem ludicrous.&lt;br /&gt;
&lt;br /&gt;
Of course, this pirate ‘thief’ can make the work available to anyone for profit. However, not all online piracy is done for profit. Those profiting from piracy are the people selling copied films and CDs out of the back of their car, and people selling software ‘compilation’ disks. &lt;br /&gt;
&lt;br /&gt;
Which brings me to the point, while the original creator might not be deprived of something, they ARE missing potential earnings. This is the difficult problem to solve. The past 10-odd years, we have seen a large value transfer from studios and publishers to those who will illegally download. However, I question whether or not the aspect of lost income from the entertainment industry is accurate. How is this measured? Are these estimated numbers exaggerated, or is this an honest reflection of loss for the entertainment industry?&lt;br /&gt;
&lt;br /&gt;
One of the main objectives of the Copyright Alert System is to return the earnings to the entertainment industry and original owners of content. But in the end, will this system end up throttling the internet and the principles associated, i.e. free speech, that we believe the internet should stand for? &lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 00:24, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Marissa --&lt;br /&gt;
&lt;br /&gt;
:What a wonderful post! I think you excellently encapsulate the problem both in terms of in terms of monetary quandaries when dealing with the entertainment industry online (assessing profit lost) and the moral dilemma both the user and publisher must confront.  With iTunes charging $1.29 per song and most people having at least a few hundred songs on their iPod, the temptation is high to illegally download - especially amongst college student communities. iTunes has increased their prices probably to offset the lost profit from illegally downloading.  &lt;br /&gt;
&lt;br /&gt;
:Prominent musicians have also responded in conflicted ways with some actually embracing the idea.  Artist Shakira is a known supporter of illegally downloading and has stated so in several interviews. Likewise, Beatles legend, John Lennon once said, “Music is everybody’s possession. It’s only the publishers who think that people own it&amp;quot; (Vignos 2012).  On the other hand, Stevie Wonder fears that illegally downloading will lead to music being treated like &amp;quot;garbage&amp;quot; in the streets.  The music industry has drastically changed with big business taking over as evidenced from the history of &amp;quot;Motown&amp;quot; music and the rise and fall of the father of Motown records, Berry Gordy.&lt;br /&gt;
&lt;br /&gt;
:As Marissa, notes the term &amp;quot;stealing&amp;quot; is perhaps not the appropriate verb for the act because you are not physically depriving someone of something; however, it is the actual profit lost that is at stake.  The problem is how this would-be profit would be calculated.  How many people would have actually bought the song instead of downloading?  I would guess the number would be much lower that those who went ahead and downloaded.  Clearly, illegally downloading and copying music is immoral but how can we prevent this widespread practice most effectively?  As it stands, very seldom are people prosecuted.  Perhaps this is because the crime is not taken as seriously as other types of theft or is not as despised or looked down upon in our society.  On the other hand, it might be just too difficult to catch all of the downloaders and trace their activity to a point where it would hold up in court with reasonable cause.  &lt;br /&gt;
&lt;br /&gt;
:http://www.michigandaily.com/opinion/viewpoint-illegal-downloads-music-industry&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 10:50, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::You guys are hitting on some great points! The question of whether to call infringement &amp;quot;theft&amp;quot; or &amp;quot;stealing&amp;quot; is about as controversial as they come. On the one hand, and to borrow from [http://press-pubs.uchicago.edu/founders/documents/a1_8_8s12.html Jefferson], sharing an idea/expression/discovery is by its inherent nature nonrivalrous - I can share with you an idea without diminishing my possession of the same idea. On the other hand, if I give you something in lieu of you buying it yourself, I may not be diminishing my own possession, but I may be interfering with the author&#039;s income, and thus risking their incentive to create in the first place. But on the other, other, hand, the studies that have looked at piracy&#039;s effect on sales are wildly divergent as to whether a download can be translated to a lost sale - some, including [http://www.unc.edu/~cigar/papers/FileSharing_March2004.pdf Felix Oberholzer-Gee and Koleman Strumpf] have found that there is actually no correlation between downloads and lost sales. That sounds totally insane at first, but when you consider the possibility that a large margin of people download music they would never buy (if required to obtain the music in that way), it is much more plausible. (The study still has many other critics, of course.) [[User:Andy|Andy]] 11:01, 4 March 2014 (EST)&lt;br /&gt;
      &lt;br /&gt;
 &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The recent Federal Appeals Court ruling ordering Google to remove the inflammatory film &amp;quot;The Innocence of Muslims&amp;quot; from YouTube.com, appears to stretch the copyright interpretation. The ruling certainly sets a precedent for both basic copyright law, eectronic distribution and the First Amendment. Not being a lawyer, Kozinski&#039;s ruling appears troubling. In reading the copyright interpretation, I get the impression we&#039;ve exceed copyright law and entered in to some troubling precedents. Any thought?[[User:VACYBER|VACYBER]] 10:12, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:We&#039;ll be talking about the Garcia v. Google case for a while in the second half of class today. Stay tuned! [[User:Andy|Andy]] 10:26, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thanks for sharing this, Vacyber.  I find this to be a dangerous, unconstitutional precedent and appalling ruling!  If anyone has seen the video, it did not incite violence of any kind.  Simply because someone interpreted a video to be insulting does not warrant its removal.  If everything posted online that someone (or some group) deemed offense were to be removed, the court would never have a day off and the internet as we know it may cease to exist (at least in terms of its vast information-sharing capabilities).  By catering to one group and limiting freedom of speech, we are not doing anyone any favors and are only foolishly destructing our own liberties.  It will be interesting to see how future cases will be handled and I look forward to the class discussion!&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 11:01, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Erin McKeown&#039;s article rises a very important point that is common too most of the legal system, not just copyright: Most laws claim that they intent to protect those most in need, but in fact favour the big and powerful, usually rich as opposed to poor, and groups and corporations as opposed to individuals. Now, I&#039;m not one of the people who believe poor individuals intrinsically deserve more that rich corporations, but I do believe they deserve to have equal protection in our legal system, and not just on paper. The problem is, the way copyright law, and many other laws work, it is usually not viable for individuals to sue infringers because it takes too much time, money, knowledge (for starters, the knowledge that you &#039;&#039;can&#039;&#039; sue at all) and other resources. Especially given that most individuals do not have the knowledge or a legal team behind them who could provide them with the knowledge related to copyright law, they are much less likely to benefit from it as they cannot easily estimate whether any action will be worth the investment. This is a major problem that needs to be resolved, lest the copyright law benefits more those who infringe, than their victims. --[[User:Seifip|Seifip]] 11:50, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This just in... The Russian court in Khabarovsk forced Rostelekom to block internet access to Wikipedia (!!), Yandex (largest Russian website) and Kinopoisk (Russian IMDB). The pretext is that the three websites contain anti-semitic content, in case of Wikipedia a link to Mein Kampf in the article on Hitler. --[[User:Seifip|Seifip]] 13:18, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Having read all articles, I came to conclusion that &amp;quot;takedown notices&amp;quot; are quite enough for prevention of copyrights infringement. It sould also be applied to defamation, trademark and other intellectual property rights as the system proves to be very effective. POPA and PIPA cannot be accepted as: 1) they are unlikely to be implemented due to absence of mechanism of searching the sites that infringe copyrights (there are hundrends/thousands of them); if this legislation is adopted and not implemented in future, the power of legislation can be undermoned 2) the website may contain legal and &amp;quot;illegal&amp;quot; materials, so it will be unfair to block the particular webiste on this ground. Aysel Ibayeva([[User:Aysel|Aysel]] 14:28, 4 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The problematics of copyright infringements is widespread on the web. From musicians to journalists and other content creators, it is becoming harder and harder to track it all particularly due to the amount of content being uploaded every second. However, I think that a mere &amp;quot;take-down&amp;quot; notice should suffice to prevent such act. I like to use the example of YouTube&#039;s Contend ID technology for it is an effective and quick way to help resolve copyright infringement claims from content creators. For YouTube, they could resolve copyright infringement claims in three different ways. The content owner could choose to block, remove, or better yet monetize their claim. Therefore, the payoff for the claimer is highest in any case. Unfortunately, all governments, regulators, and ISPs do not have YouTube&#039;s technology or resources to handle copyright infringements claims at the same level. As a result, I think that a &amp;quot;take-down&amp;quot; notice should be enough.  [[User:cheikhmbacke|cheikhmbacke]] 15:32, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
First of all , during my reading of the class discussion, I recalled Spotify that offers streaming service created by Daniel Ek and sponsored by Sean Parker, with the purpose of reducing piracy in a European country such as Sweden. At the time, Sweden was the home of Pirate Bay where the Swedish thought was a right to listen free lyrics. Is It a solution against piracy sponsored by the creator of Napster? Nowadays, where transformations occur online, where social interactions are hype, where the share of information is a global necessity. Therefore, the market for music develops with greater efficiency. Many companies are creating ways to combat piracy and developing the market with a higher quality service in order to change the behaviors of the users. However, the rules of copyright are not adapted for the challenges of the new concept of the new virtual market. Gisellebatista&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1291</id>
		<title>Copyright Part 2: Enforcement and Balances</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1291"/>
		<updated>2014-03-04T18:18:38Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital technologies spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies for control and copyright enforcement. “Controversial” may be putting it lightly; the ongoing fight between copyright owners and Internet evangelists is one of the most popularly debated fights surrounding Internet control.&lt;br /&gt;
&lt;br /&gt;
This class focuses on how copyright is enforced online, with particular emphasis on the &amp;quot;notice-and-takedown&amp;quot; provisions of the Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;), which allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The class will also look to the now-famous fight concerning SOPA and PIPA, and other attempts to more strictly regulate against online piracy.&lt;br /&gt;
&lt;br /&gt;
Joining us will be [http://cyber.law.harvard.edu/people/aholland Adam Holland], who works here at Berkman on the [https://www.chillingeffects.org/ Chilling Effects] project.&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The second half of assignment 2 (commenting on prospectuses) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The DMCA Notice-And-Takedown Process&lt;br /&gt;
&lt;br /&gt;
* Digital Media Law Project, [http://www.dmlp.org/legal-guide/copyright-claims-based-user-content Claims Based on User Content] and [http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content Protecting Yourself Against Copyright Claims Based on User Content]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/takedowns Electronic Frontier Foundation, Takedown Hall of Shame] (peruse)&lt;br /&gt;
&lt;br /&gt;
* Chilling Effects, [http://www.chillingeffects.org/about About] and peruse the [http://www.chillingeffects.org/weather.cgi weather reports].&lt;br /&gt;
&lt;br /&gt;
* [http://paidcontent.org/2013/02/24/how-google-did-the-right-thing-with-the-nascar-crash-video-and-why-it-matters/ Matthew Ingram, Paid Content, How Google did the right thing with the NASCAR crash video, and why it matters]&lt;br /&gt;
&lt;br /&gt;
; Case Study - SOPA/PIPA&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/reading-sopa Jonathan Zittrain, Kendra Albert, and Alicia Solow-Niederman, A Close Look at SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/01/15/mit-media-lab-opposes-sopa-pipa/ Ethan Zuckerman and Joi Ito, MIT Media Lab Opposes SOPA, PIPA]&lt;br /&gt;
&lt;br /&gt;
; The big picture&lt;br /&gt;
&lt;br /&gt;
* [http://torrentfreak.com/bittorrent-traffic-drops-in-america-grows-in-europe-131111/ Ernesto Van Der Sar, BitTorrent Traffic Drops in America, Grows in Europe]&lt;br /&gt;
&lt;br /&gt;
* [https://www.techdirt.com/blog/casestudies/articles/20120405/11221818390/perspective-complexities-copyright-creativity-victim-infringement.shtml Erin McKeown, A Perspective On the Complexities of Copyright and Creativity from a Victim of Infringement]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
; Case Study - ISP &amp;quot;Six Strikes&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/2013/feb/01/copyright-alert-system-and-six-strikes/ Brooke Gladstone, Interview with Jill Lesser of Center for Copyright Information (&#039;&#039;On The Media&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.plagiarismtoday.com/2013/02/25/the-6-likely-impact-of-six-strikes/ Jonathan Bailey, Plagiarism Today, The 6 Likely Impact of Six Strikes]&lt;br /&gt;
&lt;br /&gt;
; Case Study - Operation In Our Sites&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1835604 Andy Sellars, Seized Sites: The In Rem Forfeiture of Copyright-Infringing Domain Names]&lt;br /&gt;
&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Wendy Seltzer, Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With so much copyrighted material out in cyberspace it is helpful to have provisions like the DMCA takedown and notice provisions to help combat copyright infringement.  I think it is a reasonable approach to helping prevent abuses of copyright.  On the other hand, instances like the Akon takedown do appear to fall into abuse of the DMCA.  Nevertheless, I would argue that the DMCA actually worked in that instance because the material was taken down, but appealed and re-posted.  However, if the political satirist in the Akon incident did not have legal counsel, the takedown probably would have remained.  So there, I think is a flaw in the system, in that, companies with large pockets, and legal teams may be able to enforce their own form of censorship.  With the proliferation of user generated content like blogs, with bloggers commentating and re-mixing copyrighted content, what constitutes infringement is more difficult to see.  The good thing is that for the most part DMCA does not impose any prior restraint on expression.  Posters are allowed to post without restraint, and for the most part they are not liable as long as the material in question is taken down quickly (as least I think that last part is true?).&lt;br /&gt;
The class readings about chilling effects dig deeper into the problems that cease and desist letters, and DMCA takedowns have for expression on the Internet.  The Chilling Effects website talks about the harm that these C&amp;amp;D letters can have on expression.  Internet bloggers, satirists, and others may takedown their content on their own, causing a sort of self censorship for fear of prosecution from powerful adversaries.&lt;br /&gt;
SOPA, and PIPPA also would have caused a chilling effect, and probably out and out prior restraint on many users expression on the Internet. I think that a robust activist element from groups like the Berkman Center(shameless plug lol), the EFF, and Chilling Effects, help Internet users to know when new laws are being introduced to curb expression, and even help represent users who have had their material wrongfully censored or removed from the Internet. Yet, it concerns me a little bit that without such advocacy groups the little guys on the Internet would be at an even bigger disadvantage to the bigger fish on the internet. &lt;br /&gt;
One question I have was about the Bit torrent article, I didn&#039;t understand the importance of Bit torrents decline in use in the US. Was it that the decline might signify that users are avoiding bit torrent for some reason? Also, I saw that bit torrent and youtube, and netflix use disproportionate  amounts of space on the system. Is this sustainable? Is it fair that a few applications and companies use up so much of the space? Does that cause harm, or take from other uses that the space could be used for? I&#039;m not really sure how that &amp;quot;space&amp;quot; works. Is it unlimited?[[User:Mikewitwicki|Mikewitwicki]] 08:13, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Yet again, related to an earlier class, but another interesting write-up was just published on The Verge: [http://www.theverge.com/2014/2/25/5431382/the-internet-is-fucked The Internet Is Fucked (but we can fix it)] --[[User:Seifip|Seifip]] 19:05, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ditto, not related to Copyright, but the theme of the class in general, politics &amp;amp; control of the Internet. The Quebec government started [http://www.thestar.com/news/canada/2014/02/26/quebecs_language_watchdog_targets_stores_use_of_english_on_facebook.html fining businesses] for not writing in French on their Facebook pages. I&#039;ve never understood why Canada has such a stereotype of being &#039;nice&#039;. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:37, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Erin, thanks for sharing this. Seems like a really interesting example of the ways in which the Internet and digital technologies are a new place for old and ongoing debates to play out. With so much of our lives now taking place online, it makes sense that concerns about language, heritage, and culture have to be grappled with anew. I wonder if some of the push-back from business owners-- like the one in this article who says &amp;quot;Facebook has nothing to do with Quebec&amp;quot;-- stems from the idea that the Internet is a malleable and border-less place and confusion over what laws govern speech on a global forum run by a US-based company. And yes, I have heard some Quebecois friends get a little less than &amp;quot;nice&amp;quot; when it comes to discussing their francophone heritage... [[User:Jkelly|Jkelly]] 15:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Wow! That&#039;s crazy. Do you know what justification they have (or are using) to fine the businesses? Is it a case like the ADA, which prohibits discrimination against disabilities by such measures as requiring all public establishments to follow building codes to ensure disabled individuals are accommodated? By this I mean, is Quebec doing this so that French-speaking people are not excluded?[[User:Castille|Castille]] 15:51, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
Hi [[User:Castille|Castille]] I have a hard time discussing this without letting it get personal, because I&#039;ve faced off with Language Police, was beaten up as a kid in Quebec for being Anglophone (I was born in USA), and grew up following Quebec&#039;s laws which are at odds with the UN&#039;s Charter of Human rights (once again, WHY do Americans steriotype Canada as &#039;nice&#039;??!!). So now, hearing that the Language Police are trying to control Facebook, which is an &#039;&#039;American&#039;&#039; company, I just get so mad. &lt;br /&gt;
Side-note: My own mother just received a letter from another Quebec Gov&#039;t agency, stating that she must delete any comments from users/customers on her company&#039;s Facebook page. [http://en.wikipedia.org/wiki/Charter_of_the_French_Language Here is a link] to the laws in question, in case anyone is interested [[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:32, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The highly controversial Section 512 of the DMCA, 17 U.S.C. § 512 provides a “safety zone”, where online service providers could operate shielded from liability charges on account of copyright infringement. Service providers function by allowing people to modify, post, and search content on their servers. By hosting foreign content that is not generated by the OSP or ISP, they were placing themselves into position of being held liable on infringement charges. This changed in 1998, because as long as roughly three essential steps were taken, an OSP could take advantage of the “safe-harbor” clause.  One of those steps is the “expeditious” removal of infringing content. On the other side, the alleged offender can send a counter-notice disputing the copyright holders claim. This might seem in favor of the public domain with an anti-copyright agenda, but it does not diminish the copyright holders privileges in any way. This provision also allows the first step of prosecution in the form of takedown notices. While these measures are beneficial for the public good and provide a degree of protection, they seem utterly inefficient in situations like Erin McKeown experienced. In an attempt to control infringers and pirates, the ICE has engaged in domain seizures, which resulted in tens of thousands of innocent websites being shut down. [[User:Emmanuelsurillo|Emmanuelsurillo]] 22:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
The Electronic Frontier Foundation’s Takedown Hall of Shame has excellent examples of cease and desist letter offenders, even citing unusual claims such as one over the copyright privileges of a monkey’s photos! That is where major companies should take and follow Google’s example of standing up for users rights. The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA), MIT points out that to stop pirating has many dangerous side effects including but not limited to being unconstitutional in violating certain aspects of free speech. [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:06, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was unable to find out anything about how many actions have been taken under the Copyright Alert System.  Are there any known statistics on how many of these notices have been sent out or how many consumers have been affected? (whether centrally managed, or done by a third-party watchdog like EFF?)&lt;br /&gt;
[[User:Jradoff|Jradoff]] 13:48, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: [http://thehill.com/blogs/hillicon-valley/technology/199124-six-strikes-thwarting-piracy-leader-says The Hill] reported that an annual report should be expected soon on Six Strikes. (It just passed its first anniversary since implementation.) We&#039;re still waiting to see if that will have a level of analysis like this. [[User:Andy|Andy]] 10:26, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m in a creative industry where intellectual property is important (software / online games).  Yet I think that criminalization of intellectual property violations is ridiculous.&lt;br /&gt;
&lt;br /&gt;
I called all my U.S. senators and representatives back when SOPA/PIPA was in the legislative process--I found it highly offensive. It seems absurd to me that someone would be placed in jail for copyright infringement, or that we are making agencies of the U.S. government an arm of private industry by using them to enforce this (not to mention giving government broad control over shutting down content that some moneyed interest finds objectionable).&lt;br /&gt;
&lt;br /&gt;
The argument used by the industry is that copyright violation is equivalent to theft.  I agree that many cases of copyvio are totally wrong, but I don&#039;t see why it can&#039;t be handled entirely through civil systems.  The fact is that intellectual property violations *are* different from stealing a physical good, simply because in the former case we&#039;re dealing with a nonrival good (i.e., if you steal my car then I can&#039;t use it anymore; if you copy my software package, I&#039;ve lost some potential revenue from you but you haven&#039;t deprived my ability to sell it to others).  Furthermore, intellectual property violations are way more complex--these are cases that just aren&#039;t as clear-cut as showing that a theft actually occurred when you are caught with my stolen car.&lt;br /&gt;
&lt;br /&gt;
I listened to the songs mentioned in the &amp;quot;Touch the Sun&amp;quot; / &amp;quot;Slung-lo&amp;quot; controversy referred to in the reading materials.  I empathize with the creator of Slung-lo if they really feel their creation was improperly exploited, but I simply don&#039;t see the basis for their claim.  But upon my listening I found both songs to be different, and the lyrics were (as far as I could tell) totally different.  Billions of songs get made--lots will be similar.  I shudder to think that a large and well-funded copyright holder could use claims like this to abuse others with the threat of criminal enforcement.&lt;br /&gt;
[[User:Jradoff|Jradoff]] 13:58, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It seems that SOPA, PIPA, and the DCMA all seem to be working towards the same goal, that of eradicating copyright infringement/piracy. Why is the DCMA not sufficient? Internet piracy is a huge issue for the motion picture and music industries (and I&#039;m sure for plenty of other industries) as it is stealing. I agree with Jradoff that it&#039;s not &#039;&#039;quite&#039;&#039; as bad as actual theft of property and therefore might not warrant a jail sentence, but it is essentially the same thing. What is the difference between going into a Best Buy and stealing a DVD or CD and stealing it from home? It seems the primary difference is simply the ease of convenience for the thief. I think we have only been desensitized to this kind of theft because it is so prevalent in society. Anyways, if we agree that internet piracy is &amp;quot;wrong&amp;quot;, what can be done to curtail it further than the rules currently in place (i.e. the DCMA)? Have SOPA and/or PIPA been revised? In this article that I found on Forbes [http://www.forbes.com/sites/derekbroes/2012/01/20/why-should-you-fear-sopa-and-pipa/], author Derek Broes claims to have testified before Congress to propose &amp;quot;many solutions, none of which violate our First Amendment Right to Free Speech&amp;quot;, but he does not elaborate on any specific alternatives or amendments to SOPA/PIPA. What effective alternatives are there, which would go above and beyond what is already in place, but wouldn&#039;t be as &amp;quot;harmful&amp;quot; as SOPA/PIPA? Is there still talk of a new iteration of the legislature? I would imagine that with the onslaught of backlash from the initial bills, they would have to call them something different to mitigate any potential hate...[[User:Castille|Castille]] 15:51, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The former government in Australia tried for many years to implement a voluntary scheme to crack down on piracy through a series of discussions with ISPs, instead of having the government legislating enforcement of copyright. The meetings stopped happening, as the representatives from iiNet (large Australian ISP), would often get up and walk out of the meetings. &lt;br /&gt;
&lt;br /&gt;
About 18 months ago, Australian Attorney-General George Brandis made a case against iiNet which attempted to hold them liable for their users on BitTorrent for piracy purposes, which was taken to the High Court. The entertainment industry was attempting to hold the ISP&#039;s liable because it is obviously not economically viable, (even if it is in fact possible) to prosecute each piracy user individually. iiNet was successful in their defense to which the High Court unanimously ruled the ISP is not liable for the acts of their users. &lt;br /&gt;
&lt;br /&gt;
iiNet’s routine business of providing access to the internet will not, by itself, mean that they authorise their customers&#039; acts of copyright infringement.  At the same time, iiNet is not obliged to contact customers or terminate their accounts in response to notices from copyright owners.  Although users are liable for copyright infringement, it is hardly enforced at all in Australia. Australia is needing legislative reform in regard to copyright laws, as their attempts to enforce it have been futile. [[User:Marissa1989|Marissa1989]] 20:41, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
I should also note that this is very low on the government&#039;s agenda. Most of the pirated entertainment comes from the USA. There’s no motive or benefit for the Australian Government to fight against illegal downloading on behalf of the American entertainment industry. In addition, most websites used by Australians to pirate, like BitTorrent and Pirates Bay, are American-based websites, which adds another disincentive for them. Unfortunately, a lot of piracy goes on here all too easily without intervention or blocking; almost makes me wonder if (per capita), more piracy happens here. Unless it becomes a political issue or the Australian government loses money over it, they’ll remain reluctant to spend the time or energy to fix it.  [[User:Marissa1989|Marissa1989]] 00:03, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exciting-- I was just searching Google for an episode of Girls that I accidentally deleted from my DVR and found the following notification at the bottom of the search page:&lt;br /&gt;
In response to a complaint we received under the US Digital Millennium Copyright Act, we have removed 1 result(s) from this page. If you wish, you may read the DMCA complaint that caused the removal(s) at ChillingEffects.org. [[User:Castille|Castille]] 00:22, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It was interesting to read more on DMCA. I&#039;ve never been too familiar with the specifics of the law but have faced it&#039;s effects constantly on YouTube as so many videos are removed over copyright claims. Reading more on it, I found this article very interesting: http://www.wired.com/threatlevel/2008/10/ten-years-later/ It portrays DMCA in a positive light, going as far as saying it &amp;quot;saved the web.&amp;quot; I don&#039;t completely agree with the article, but I do think that content creators should have some safety net to ensure that their content cannot be used without proper credit or consent. And so, some safety net needs to be present but a filter that is too large is very concerning. The list of Takedown Hall of Shame is an alerting example of filtering gone wrong for the wrong reasons. It would interesting to see the solutions we come up with in the future. Will greater efforts of copyright regulation always be followed by an internet protest as large as the SOPA/PIPA one?&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 20:45, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Piracy is a major issue in Australia. The copyright laws are more loose than compared with other countries such as the US and it is relatively easy to download content illegally. Before watching a movie, an advertisement airs with the line “You wouldn’t steal a car, you wouldn’t steal a handbag, you wouldn’t steal a movie. Downloading pirated films is stealing. Piracy - it’s a crime!”. I understand this commercial has a moral angle in hopes to minimise illegal downloading. However,  If someone steals a car, handbag or wallet, a physical object that belongs to someone else has been removed without permission or payment. That would be theft. In one sense, if you download something illegally, it is a digital copy that changes hands. (‘Copy’ being the operative word). With piracy, nobody is physically deprived of anything, which is why I think most Australians don’t have a moral conflict when downloading illegally, which makes the advertisement’s suggestion that you are ‘stealing’ seem ludicrous.&lt;br /&gt;
&lt;br /&gt;
Of course, this pirate ‘thief’ can make the work available to anyone for profit. However, not all online piracy is done for profit. Those profiting from piracy are the people selling copied films and CDs out of the back of their car, and people selling software ‘compilation’ disks. &lt;br /&gt;
&lt;br /&gt;
Which brings me to the point, while the original creator might not be deprived of something, they ARE missing potential earnings. This is the difficult problem to solve. The past 10-odd years, we have seen a large value transfer from studios and publishers to those who will illegally download. However, I question whether or not the aspect of lost income from the entertainment industry is accurate. How is this measured? Are these estimated numbers exaggerated, or is this an honest reflection of loss for the entertainment industry?&lt;br /&gt;
&lt;br /&gt;
One of the main objectives of the Copyright Alert System is to return the earnings to the entertainment industry and original owners of content. But in the end, will this system end up throttling the internet and the principles associated, i.e. free speech, that we believe the internet should stand for? &lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 00:24, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Marissa --&lt;br /&gt;
&lt;br /&gt;
:What a wonderful post! I think you excellently encapsulate the problem both in terms of in terms of monetary quandaries when dealing with the entertainment industry online (assessing profit lost) and the moral dilemma both the user and publisher must confront.  With iTunes charging $1.29 per song and most people having at least a few hundred songs on their iPod, the temptation is high to illegally download - especially amongst college student communities. iTunes has increased their prices probably to offset the lost profit from illegally downloading.  &lt;br /&gt;
&lt;br /&gt;
:Prominent musicians have also responded in conflicted ways with some actually embracing the idea.  Artist Shakira is a known supporter of illegally downloading and has stated so in several interviews. Likewise, Beatles legend, John Lennon once said, “Music is everybody’s possession. It’s only the publishers who think that people own it&amp;quot; (Vignos 2012).  On the other hand, Stevie Wonder fears that illegally downloading will lead to music being treated like &amp;quot;garbage&amp;quot; in the streets.  The music industry has drastically changed with big business taking over as evidenced from the history of &amp;quot;Motown&amp;quot; music and the rise and fall of the father of Motown records, Berry Gordy.&lt;br /&gt;
&lt;br /&gt;
:As Marissa, notes the term &amp;quot;stealing&amp;quot; is perhaps not the appropriate verb for the act because you are not physically depriving someone of something; however, it is the actual profit lost that is at stake.  The problem is how this would-be profit would be calculated.  How many people would have actually bought the song instead of downloading?  I would guess the number would be much lower that those who went ahead and downloaded.  Clearly, illegally downloading and copying music is immoral but how can we prevent this widespread practice most effectively?  As it stands, very seldom are people prosecuted.  Perhaps this is because the crime is not taken as seriously as other types of theft or is not as despised or looked down upon in our society.  On the other hand, it might be just too difficult to catch all of the downloaders and trace their activity to a point where it would hold up in court with reasonable cause.  &lt;br /&gt;
&lt;br /&gt;
:http://www.michigandaily.com/opinion/viewpoint-illegal-downloads-music-industry&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 10:50, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::You guys are hitting on some great points! The question of whether to call infringement &amp;quot;theft&amp;quot; or &amp;quot;stealing&amp;quot; is about as controversial as they come. On the one hand, and to borrow from [http://press-pubs.uchicago.edu/founders/documents/a1_8_8s12.html Jefferson], sharing an idea/expression/discovery is by its inherent nature nonrivalrous - I can share with you an idea without diminishing my possession of the same idea. On the other hand, if I give you something in lieu of you buying it yourself, I may not be diminishing my own possession, but I may be interfering with the author&#039;s income, and thus risking their incentive to create in the first place. But on the other, other, hand, the studies that have looked at piracy&#039;s effect on sales are wildly divergent as to whether a download can be translated to a lost sale - some, including [http://www.unc.edu/~cigar/papers/FileSharing_March2004.pdf Felix Oberholzer-Gee and Koleman Strumpf] have found that there is actually no correlation between downloads and lost sales. That sounds totally insane at first, but when you consider the possibility that a large margin of people download music they would never buy (if required to obtain the music in that way), it is much more plausible. (The study still has many other critics, of course.) [[User:Andy|Andy]] 11:01, 4 March 2014 (EST)&lt;br /&gt;
      &lt;br /&gt;
 &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The recent Federal Appeals Court ruling ordering Google to remove the inflammatory film &amp;quot;The Innocence of Muslims&amp;quot; from YouTube.com, appears to stretch the copyright interpretation. The ruling certainly sets a precedent for both basic copyright law, eectronic distribution and the First Amendment. Not being a lawyer, Kozinski&#039;s ruling appears troubling. In reading the copyright interpretation, I get the impression we&#039;ve exceed copyright law and entered in to some troubling precedents. Any thought?[[User:VACYBER|VACYBER]] 10:12, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:We&#039;ll be talking about the Garcia v. Google case for a while in the second half of class today. Stay tuned! [[User:Andy|Andy]] 10:26, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thanks for sharing this, Vacyber.  I find this to be a dangerous, unconstitutional precedent and appalling ruling!  If anyone has seen the video, it did not incite violence of any kind.  Simply because someone interpreted a video to be insulting does not warrant its removal.  If everything posted online that someone (or some group) deemed offense were to be removed, the court would never have a day off and the internet as we know it may cease to exist (at least in terms of its vast information-sharing capabilities).  By catering to one group and limiting freedom of speech, we are not doing anyone any favors and are only foolishly destructing our own liberties.  It will be interesting to see how future cases will be handled and I look forward to the class discussion!&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 11:01, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Erin McKeown&#039;s article rises a very important point that is common too most of the legal system, not just copyright: Most laws claim that they intent to protect those most in need, but in fact favour the big and powerful, usually rich as opposed to poor, and groups and corporations as opposed to individuals. Now, I&#039;m not one of the people who believe poor individuals intrinsically deserve more that rich corporations, but I do believe they deserve to have equal protection in our legal system, and not just on paper. The problem is, the way copyright law, and many other laws work, it is usually not viable for individuals to sue infringers because it takes too much time, money, knowledge (for starters, the knowledge that you &#039;&#039;can&#039;&#039; sue at all) and other resources. Especially given that most individuals do not have the knowledge or a legal team behind them who could provide them with the knowledge related to copyright law, they are much less likely to benefit from it as they cannot easily estimate whether any action will be worth the investment. This is a major problem that that needs to be resolved, lest the copyright law benefits more those who infringe, than their victims. --[[User:Seifip|Seifip]] 11:50, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This just in... The Russian court in Khabarovsk forced Rostelekom to block internet access to Wikipedia (!!), Yandex (largest Russian website) and Kinopoisk (Russian IMDB). The pretext is that the three websites contain anti-semitic content, in case of Wikipedia a link to Mein Kampf in the article on Hitler. --[[User:Seifip|Seifip]] 13:18, 4 March 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1278</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1278"/>
		<updated>2014-03-04T17:28:47Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jolie Ho - Wan Lap Ho&lt;br /&gt;
*Instagram vs Flickr&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Jolie_Assignment_2.docx&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 16:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How do you propose to collect data to answer the last question? [[User:Ichua|Ichua]] 15:22, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey Jolie! You picked a really fascinating topic to cover! Just a few thoughts I hope will help. How do you plan on pinpointing how all the users behave differently, just because there are so many registered accounts you might be able to find people who behave nearly the same or certain individuals who have accounts on both Instagram and Flickr. Just as a mere suggestion maybe you can find a niche that is unique to each site and compare them? Maybe Instagram has thousands of pictures of food and seflis while Flickr has more professional content? I hope this will help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:15, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like your topic to dive into why Instagram has been so successful compared to Flicker. It may be interesting to compare the age groups of each users. Instagram seems more accessible because it is a phone app that is simple and immediate to use, whereas Flicker users upload a batch of vacation photos, etc. I like Emmanuel&#039;s suggestion to compare the content between users. Another suggestion which relates to the selfies/food photos may be to compare the users themselves. I think older people tend to use Flickr and therefore may not post as much. However, younger people (who no long user facebook) posting to instagram all the time would provide a way for facebook to get back that market. ([[User:Margorm|Margorm]] 14:31, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
::Hi Jolie: This is a very interesting topic, with many possible areas focus on! (Also, a nice mix between the tech and creative worlds.) You mentioned that Instagram and Flickr diverge where mobile apps are concerned. This looked particularly interesting, especially following the Flickr app&#039;s overhaul. Anecdotally, via Twitter, it looked as though the Flickr update was a major talking point in both the Instagram and Flickr user groups. My thought was that it may be interesting to look at whether this major app update had any bearing on either of the two communities, as it may have impacted some of your research questions. Best! [[User:Twood|Twood]] 09:33, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How would this differ from other imaginary items of trade like currency/commodity derivatives and futures and virtual commodities like pork bellies?   [[User:Ichua|Ichua]] 15:17, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Daniel,&lt;br /&gt;
What an interesting topic! I was not even aware that state governments recognized these currencies. Would you be able to come up with more material if you focus on one or two countries and their reaction to the online currency? Also Ichua gave great advice; maybe one country’s reaction and policies to multiple online currencies would help in the scope of observation. Your idea of creating a website to report and share your findings is really novel! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Very interesting topic Daniel. Ive been following the progress of Bitcoin as a personal interest. Apart from the regulatory challenges Bitcoin poses for Governments, its also vulnerable to cyber attacks which can erode trust in using the currency. Whilst the actual Bitcoin itself is heavily encrypted, the Bitcoin exchanges are vulnerable to hacking and cyber theft as evidenced recently by the successful attacks on Mt Gox, one of the world&#039;s largest Bitcoin exchanges. It would be interesting to observe the effect (if any) this would have on the regulatory view of the currency by Governments. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Marissa1989&lt;br /&gt;
*Prospectus title: The rise of the collaborative consumption movement: Analyzing effective control of communication, structures of gaining trust &amp;amp; verification, and legal issues.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:Assignment_2_Barkey-2.pdf&lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 23:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hi, Marissa! I used AirBnB to rent out my apartment last summer and it actually resulted in me being robbed by the person to the tune of $10,000-- not including the rent for the summer, which he didn&#039;t pay (I didn&#039;t get any of it back, either, despite the insurance). It was a nasty situation. Anyways, from what I understand, the majority of communication on AirBnB is done privately. Without staging anything or intervening, how do you plan to observe enough to answer your question(s)? I think this is basically the same concern with one of the other treatments I read, regarding Facebook. I do think the security of platforms like AirBnB is of great concern and would be a very interesting subject to study in depth![[User:Castille|Castille]] 21:16, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Marissa,&lt;br /&gt;
I loved the idea for your prospectus! Just as a suggestion, would you consider comparing a few corresponding sites like 9flats, Couchsurfing International, or Hospitality Club? You could analyze how they handle different verifiability and security issues while also comparing how the sites are constructed to better “vet” their users. This may yield insight on how trustworthy their users are to each other. You might even want to inquire if one has had “major” legal issues in the past. I hope this helps! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:32, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Greetings Marissa!&lt;br /&gt;
&lt;br /&gt;
Your topic is very interesting and it appears we have a few of the same elements in the companies we have selected to research: Verification and trust. From what I understand, you are addressing issues of users on auction/garage sale platforms surrounding the tiers of user verifiability. In other words, who is protecting one user from being taken advantage of by another user.&lt;br /&gt;
&lt;br /&gt;
The comment you posted on the wiki under my topic in regards to the effectiveness of how the sites that I have selected deal with inaccurate comments made about companies by the general public are dealt with is of great importance-the public can ruin a business for no other reason than spite. In other words, who protects the companies from users. &lt;br /&gt;
&lt;br /&gt;
The proposal you submitted intrigues me in many ways. By studying the community of airbnb.com, it appears you will be analyzing the controls implemented to make the site successful (verification, quality feedback, security, payment, userability and collaboration). &lt;br /&gt;
&lt;br /&gt;
In summary, it appears we are both working on protection issues, and if the verification process is significant enough to gain consumer trust. &lt;br /&gt;
&lt;br /&gt;
Would you mind if I ask how you plan to analyze the user? I would be interested in your methodology, and we may even find each other’s approach helpful to each other. We may even be able to compare and contrast the communities with a similar approach and work together if you would be interested. &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 15:18, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Melissaluke|Melissaluke]] 18:36, 25 February 2014 (EST)&lt;br /&gt;
*Change.org vrs Ripp Off Report&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_Research_Paper-Final.docx&lt;br /&gt;
&lt;br /&gt;
Dear Melissa, &lt;br /&gt;
What a great topic and area of coverage!!! I’m hoping my comments and questions will be of help to you! Which site succumbs more readily to outside pressure and take down requests? Also you mentioned that a susceptible compliant to both is that they are accused of not “vetting” their sources. You could possible test to see which one (if either of them do) checks them more thoroughly. This might be, and I know nothing about it, accomplished by putting posts of your own and noting if they require any amount of proof, citation, source, or quote of any kind. I really hope this helps you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:35, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thank you so much Emmanuel! Your ideas are superb and very helpful!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Melissa, these sites can be a boon for consumers in helping to identify unscrupulous businesses and thus avoiding them. The issue that I find with these sites, that&#039;s never been effectively dealt with, is how do they identify and remove potentially inaccurate comments attacking a business as a result of say, a personal vendetta by a disgruntled employee or a customer who was unreasonable. Many small and medium size businesses rely on word of mouth for new customers. If the site allows the comments to remain, it may affect the business.  This in effect may lead to possible blackmail of businesses by threatening to post inaccurate information on these sites. I&#039;m also very interested in the sample groups and postings that you choose. Great topic! [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marissa, Excellent insight and the problems posed are valid. Your questions are helping to me and assist in narrowing the topic-which is clearly too broad at the moment.&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Melissa, Just a quick note, because I loved your prospectus so much (it&#039;s such a creative take on the assignment, but still seems to hit on all the prof&#039;s requirements, really amazing job). With your &#039;&#039;&#039;Q1&#039;&#039;&#039;, &#039;&#039;Why would one site be more popular?&#039;&#039;- I can;t help but wonder, does the fact that it has such a simple, perfect 1-word URL have any effect? Also, due to the time (2007) &amp;amp; place (USA) I automatically assumed this website was somehow related to Obama&#039;s election campaign- though from quick Google search there doesn&#039;t seem to be any direct link. Anyways, just wanted to say, I really like your prospectus. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:49, 3 March 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hey Mike, it would absolutely be my pleasure to provide feedback to you. I won&#039;t go too far before having the time to focus &amp;amp; read it completely- so my first feedback to you is: if you didn&#039;t pick such an interesting topic, I would have actually read the full prospectus. However after reading your first paragraph, I ended up watching TPP and reading its subreddit and forgot to finish reading your prospectus! hahaha. But this weekend I&#039;ll spend time focusing and try to provide you feedback, hopefully as good as the feedback you gave me (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 10:34, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Mike! After reading [[User:Jkelly|Jkelly]]&#039;s comments below, I&#039;m kinda worried about posting my comments, cus I think I understood your questions from a different point of view. &lt;br /&gt;
::*First of all, my question- how do you approach your 2nd qualitative question? I&#039;m not completely sure I understand what you mean by vulnerability.&lt;br /&gt;
::*Second, my advice, feel free to take it or leave it: to keep within scope of this project (2500 word paper seems so short!), I believe it may be easier to tackle Qualitative questions #1 &amp;amp; 3, and your second quantitative question (&#039;&#039;Has it helped or hurt the game to impose such controls?&#039;&#039;). I get the impression that these questions would be the ones that would be easiest to answer from following the community discussion on the subreddit. That being said, if we were writing 8000 word papers, it would be so much fun for you to really dive into the architecture &amp;amp; UX of the game itself, while paralleling it with the subreddit(!!!). Really awesome topic &amp;amp; prospectus.&lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:After reading your prospectus, I have a few questions based on your questions, or maybe some questions that combine the ones you already have. It seems clear from what you write in your prospectus that the user experience is absolutely vulnerable to the controls imposed by the game, but I&#039;m curious to know in what ways. Were users bumping up against controls they didn&#039;t like before there were changes, or was it only after the controls of the creator were made clear (he made himself known in an explicit way, rather than operating quietly in the background) that users began to find fault? (Another way of thinking about this might be- were a lot of users thinking about the controls imposed by the game before the creator&#039;s changes forced them to think about it?) If I understand the current set up correctly, it seems that users still have the option to have commands parsed as they go instead of waiting for them to be tallied and then implemented. So, were the controls only seen as problematic once users considered that there was one person making a decision that affected every user? Is the lack of democratic decision-making behind the scenes a bigger problem for users than the actual changes in user experience?&lt;br /&gt;
&lt;br /&gt;
:As far as your quantitative question goes, I&#039;m wondering if there&#039;s any way for you to know how many users stopped playing the game after the creator made changes? Do you have a means of seeing the changes over time? [[User:Jkelly|Jkelly]] 14:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
Dear Michael, &lt;br /&gt;
I find your prospective very interesting! I thought to give you these few suggestions. I hope they will help! You might want to see what percentage of Flickr users are a part of the Creative Commons community and whether it consists of a majority or a minority. Another area of research might be into the other forms of control that Flickr uses to protect copyrighted material, and then to compare them with Creative Commons to see if they are as effective, prevalent, or well known. Also, when there are infringements in copyright policy, do people respond to correction or do they just ignore and continue violating the rules? Lastly, how does the Creative Commons community handle repeat violators (if there are any)? Wish you the best! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:43, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
You&#039;ve mentioned architectural methods used to encourage correct attribution, but another architectural detail to consider is how and whether Flickr encourages users to publish their content under (cc) as opposed to (c) and if so, whether the users are in fact aware of the rights they retain and give away. --[[User:Seifip|Seifip]] 12:28, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Lucia, This is looks to be very interesting - I was wondering if you can be more specific on what types of data the initiative is exploring. Are they looking for statistical data mainly, do you vote on what subjects you are going to put on the website or research? It looks like a great example of policy control via the government. I would to know more about the website and its overall goals - something that helps define its missions parameters, as I visited the website main page and got an idea of what they were saying - I am just needing some more clarity that&#039;s all. But again, the subject looks like a great idea and should be very interesting...[[User:Dancoron|Dancoron]] 18:48, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Lucía! &lt;br /&gt;
I think your choice of study fits perfectly with the theme of the course! Perhaps you can also investigate to see if they are stifling public opinion or whether they are flooding the docs with pro-government voices to influence the theme towards their agenda?  Also as a suggestion, can you see if it is truly open to everyone? Maybe you would like to find another similar program that the government has tried in the past (assuming that they have tried). Do the number of participants fluxuate? Is there a trend in what the government sees as inappropriate? Or is it just random edits that are corrected by the government? I hope these comments can help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:13, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I&#039;d really like to read and comment on your prospectus, but it seems like the file didn&#039;t upload. Happy to respond to it once it&#039;s up!&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 20:57, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I second Jkelly&#039;s comment. This look very intriguing and I&#039;d like to learn more about your plans for the project! [[User:Twood|Twood]] 23:14, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Third. --[[User:Seifip|Seifip]] 11:58, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hello, Dan! Admittedly, I had never heard of “Anandtech.com” prior to reading your prospectus, but I’m glad that you told me about it. I really like their “Cable TVification” assessment of the internet in recent years. After reading your prospectus it seems to me that you are focusing on Lessig’s norms as regulators within the site’s forums, as well as “laws&amp;quot; instituted by the website. It is an interesting subject, because as you say, this particular forum is very successful in fostering an environment where users are likely to return. That said, I see that you qualify users of the site as “good,” and I’m curious to know how you will operationalize this term for your project. You mention words like “courteous” and “helpful,” but I’m wondering: what characteristics do you think you will look for when observing, in order to qualify a “good user.” For comparison, do you have an example of what behavior that “bad” users might entail? Lastly, I see that there are literally millions of post on the forum; you may wish to focus on a specific topic and/or date range in order to have a more manageable data set to observe. I’m interested to see what you’re project will entail, especially being that I am also observing forums for my project. [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Vance, thanks for taking the time to look at my prospectus - Basically, what I meant to convey is that these are the characteristics of a &amp;quot;good&amp;quot; website, a website that demonstrates use and activity to by the administrators and its members/users. What I will be focusing in on is, how is the site&#039;s control policy administered and conveyed to its members, both historically and presently, through the links in my prospectus – and to answer your question about bad behavior in online forums, yes I will, as I think that is a critical component regarding context – And this also goes out too Marissa as well, what I really wanted to focus in on was how does bad behavior and is control policies in its forums, effect a webite economically - as I think ths would even go further towards Lessig&#039;s FOUR norms of regulation on where the dot lands - but for obvious reasons, that could end up being too big. However, I still might toss something like that in - My goal is to pick out a couple of instances of the control poliy being implemented and see what the results were based on specific incident/instance was there a ban and how long was it for - what was the reason, what was the community&#039;s response to that action and so forth... - Again, thanks for the input and suggestions.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Dan, forums have proven very useful mediums for learning and troubleshooting. What would be interesting is how forums deal with covert advertising I.e. Forum posters who may be businesses, subtly advertising their own goods or services under the guise of responding to threads without paying for advertising rights. Would paid advertisers pose potential conflicts of interest to the neutrality of forums? I&#039;d also be interested in seeing how you compare the Anandtech&#039;s forum controls against others. Would you choose similar types of forums with respect to content type? [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marrisa, I tried to include your response with Vance&#039;s up top :O) [[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Dan!&lt;br /&gt;
If you are mainly comparing Anandtech’s forum site policies, maybe you could also compare past versions of the rules? Also, you might want to see if Anandtech has any unique features in toxicity control that would make it standout from other less successful forums. Overall the concept is fantastic! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Emmanuel, thanks for the feedback - ya, I am going to try and put some type of onus on Anandtech as well, and see if some of their reactions to their policies could be considered a little over zealous or a bit too far reaching. Most times, their admins/moderators are pretty decent, but again, like everyone else, there are times when a few of their admins/moderators could be having a bad day and maybe be a little too heavy handed - we&#039;ll see, stay tuned to find out. just a little humor :o) Thanks again for the input.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:First of all, GREAT TITLE!!! Second of all, this seems like an extremely interesting subject and I&#039;d love to read more about it. I do wonder whether you&#039;ll be able to get access to the material you might be looking for by doing &amp;quot;undercover investigation&amp;quot; and the other research methods you listed. It seems to me that the kind of exchanges you&#039;re discussing would be difficult to observe on Facebook as they likely wouldn&#039;t be out in the open. I may be completely mistaken, but I was also under the impression that the assignment encouraged examining a more open forum or something of the like where observation was more feasible. I know that there are public matchmaking sites and I would assume there are also forums geared towards those who wish to have illicit affairs, so that might be an area into which you may want to delve. [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:I also love the topic and find the subject very interesting! I share Castille&#039;s concerns above. It seems challenging to get access to the materials you will need to answer these questions. I wonder if there is an open forum somewhere in the internet where angry divorcees can go to vent about how social media ruined their marriage? It may be a biased site, but it may provide resources to other statistics or materials that may help? Or if there is a community you could observe and monitor the degree of online flirting? ([[User:Margorm|Margorm]] 14:48, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wow very cool subject - and one I am sure that deserves a lot of attention these days. With that said, it seems that this subject matter could be a thesis or dissertation as the material collected probably seems to be endless. I was wondering what specific community are you going to target on facebook, as this looks to be potentially a very large paper? I have to admit that I am fascinated to see what other statistics this might uncover, as I am sure we all have heard stories of spouses leaving their significant other for someone they met online. Yet maybe, you can focus on something more specific then a facebook community - as there might be other communities or even forums that have support groups for such instances or circumstances that you mentioned earlier. Maybe seeing how they interact with each other and what rules or policies can be observed and commented on. Overall the topic is really great and I am sure it will have some very interesting content that is fascinating.[[User:Dancoron|Dancoron]] 19:13, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Very interesting subject matter Amy!&lt;br /&gt;
&lt;br /&gt;
You may have selected one of the most controversial and highly emotional subjects out of all proposals presented.  I would agree with Dancoron. The questions outlined could lead to a doctoral dissertation. Additionally, Castille does bring a good point to light, in that we are encouraged to avoid any work as an “alias”. &lt;br /&gt;
&lt;br /&gt;
I think many of us are having trouble (to include myself) narrowing the research down to a tolerable amount of data collection for an in depth analysis.&lt;br /&gt;
&lt;br /&gt;
In your proposal, you suggested comparing and contrasting divorce rates. What sources would you be comparing and contrasting? Are you speaking to different communities in the United States or on a larger level?  Or, are you addressing the male/female divorce ratio? &lt;br /&gt;
&lt;br /&gt;
Secondly, will you be cross-examining two nations who have access to Facebook, in efforts to compare and contrast divorce ratios in direct correlation to Facebook usage? &lt;br /&gt;
&lt;br /&gt;
If your research goals are to use Facebook as the platform for study concerning divorce, it may be difficult to get access to this information unless you are accepted into a person’s profile, group or community. In efforts to stay objective, I don’t think you would want to study anyone that you personally know.  Pornography could be a difficult study, in direct correlation to pornography with the controls Facebook allows for each individual user. &lt;br /&gt;
&lt;br /&gt;
Would it be possible for you to follow a smaller, more open group that readily blogs/views pornography that is open to the public for data collection in a short period of time? &lt;br /&gt;
&lt;br /&gt;
Unfortunately this is completely out of my arena. I have never been married and I don’t view porn sites. But, your topic is fabulously interesting. &lt;br /&gt;
&lt;br /&gt;
Good luck with your research and I can’t wait to see your results.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hi [[User:Margorm|Margorm]]! I love your topic. Your prospectus, combined with our brief discussions in class have really made me wonder- if 23andme is part of the first iteration of DNA decoding tools for personal use, where will we be in 25 years (: Just my general thoughts on this great topic- my comments specifically regarding your prospectus are below:&lt;br /&gt;
::*I really like that you asked whether the FDA is the best agency to regulate DNA testing, especially your last sentence &#039;&#039;what regulatory bodies outside of the FDA should be paying attention to this personalized and identifiable database?&#039;&#039;. Throughout this class, I&#039;ve had similar types of questions many times.&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, however it seems that the data you will collect (assessing changes in attitudes of community members) will be more apt to answer your 2nd question (&#039;&#039;How has the ban on delivering health-related risk assessments to the 23andMe community impacted the consumer’s trust toward the product?&#039;&#039;), rather than the underlined question that I referred to in my previous bullet.&lt;br /&gt;
:Please note that I am most interested in your underlined question regarding the FDA! However my advice is that your second question regarding attitudes &amp;amp; trust may be easier to study with respect to your methodology.&lt;br /&gt;
:[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST) - updated 03 March 2014 ~11pm&lt;br /&gt;
&lt;br /&gt;
:It seems clear that although institutional positions and statements are mostly contrary to the patentability of human genes as such, however international patent offices (U.S., Europe, and Japan) have accepted the patenting of human DNA sequences if they meet the technical and legal requirements, including the “utility”. DNA occurs naturally in the human body and should not be patented by a single company that can then use its patents to limit scientific research and the free exchange of ideas. As said by Koepsell “Laws of patent are meant to be used to protect inventions — things that engineers are doing — not things that scientist discover” (Holman, 2007). A regulatory block of decoding tools for personal use would seem to be an exercise in economic control. I believe you&#039;ll find an ample supply of public opinion in regards to attitudes of community members.  [[User:VACYBER|VACYBER]] 10:28, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
::Castille, I think you have a really excellent topic here. My first thought is that it would probably be helpful to choose a particular self-harming behavior that&#039;s discussed on Tumblr to help narrow the scope of your work. Additionally, while these issues can and often are related, I imagine that the Tumblr communities that surround each issue probably have a distinct culture. This topic makes me think of the Jessica McKenzie piece, &amp;quot;Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag&amp;quot; we read in week four. I would be curious to know how many of the controversial hashtags are actually used in subversive ways. Some of the reactions to Tumblr&#039;s policy change seem to touch on this when users write that they use these tags to address their own struggle with self-harming behavior. After these policy changes got some press, did it shed enough light on these self-harm blogs to inspire users to use these potentially triggering hashtags in new and positive ways?&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 13:56, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thanks for your feedback! I&#039;m planning to narrow the scope to primarily center on pro-suicide blog postings, but I think I&#039;ll have to use some other examples such as cutting and possibly even pro-eating disorder blogs, as they all seem to interact with each other. It appears from my research thus far that the communities are intrinsically linked much more so than I expected. I agree, it would be interesting to see if things have changed-- though I&#039;m not quite sure how to gauge pre-policy versus post-policy changes. If you have any ideas, I&#039;d love to hear them! [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Castille, fantastic topic! I like your approach to analysing this topic and its a subject which is very controversial &amp;amp; personal. I agree, the main challenge for any Government is to try and regulate the numerous blogs and hashtags on sites like Tumblr, effectively putting a suicide watch on them. Would this be an effective use of tax payer funds and how many suicides could this prevent? What would be the process be if a potential suicide victim was identified? We have to be careful not to act in a knee-jerk reaction when there is a death and expect the Government to do something about it. I think there needs to be a balance of responsibility between these site operators and the Government. I&#039;m very interested in the outcome of your topic. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Watson!&lt;br /&gt;
&lt;br /&gt;
A few questions:&lt;br /&gt;
&lt;br /&gt;
How would you determine which distribution channel the Syrian opposition used the most?&lt;br /&gt;
&lt;br /&gt;
How would you be able to detect the limitations of public information if it has not been disclosed?&lt;br /&gt;
&lt;br /&gt;
If you were to select two media channels to compare/contrast,  would there be enough data available in those two communities to properly “diagnose”, or is the data withheld from the public?&lt;br /&gt;
&lt;br /&gt;
If you chart a paper on what capacitated the Syrian opposition groups to communicate their cause, will this information lead to a report or a true communal study on the Internet? &lt;br /&gt;
&lt;br /&gt;
Very interesting proposal and I wish you the best in your research!&lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:This is a very interesting topic. There is a lot to examine here, especially since a large part of the attacks and arguments happened online. An interesting topic would be to mention the Syrian Electronic Army and the many acts of online vandalism that they did. You can find more info here: https://en.wikipedia.org/wiki/Syrian_Electronic_Army The Internet was certainly a tool in the conflict. An interesting focus would be to investigate their motives and the impact this electronic army had on the Syrian conflict. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 21:01, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LRS_IS_prospectus.docx&lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Laura – Instagram is not only the biggest mobile photo sharing app, but is also now owned by Facebook, and thus a disproportionate amount of mobile peer to peer communication falls to the censorship whims of this company. This is an incredibly worthy area to research, if not lofty. Since Instagram now allows direct, private communication of photos, you have to wonder if there is a difference in how moderated these communications are versus a post intended for the public that uses hashtags (let us not forget that the hashtag’s original use was searchability, not irony). That said it might be very difficult monitor the differences in speed and effectiveness of what gets censored without interfering with the community you’re observing. One way may be to follow news events (such as this recent one: http://abclocal.go.com/wtvd/story?section=news/local&amp;amp;id=9448993) that show Instagram’s policy enforcement in action. The issue with that approach is that it is cherry picking the successful takedowns rather than observing uncensored posts that are breaking the terms of service.  Another option may be monitoring Instagram’s list of banned hashtags and searching synonyms or alternate hashtags, but again this is a difficult aspect of their policy to observe in action. &lt;br /&gt;
::I believe there is still strategizing to be done to design your observation of the community, above merely reporting their policy. I hope my take somehow helps you with this endeavor! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 09:55, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi, Laura! I think Instagram is a really great topic and will provide a massive amount of material, which I think can be beneficial and detrimental. It seems you might want to consider focusing on a specific aspect of censorship on Instagram, like nudity, drug references, or profanity (if any of those are prohibited-- I don&#039;t know their specific terms of use). What aspect of Instagram&#039;s censorship do you find to have the highest potential to become problematic? Is their choice as a company to disallow certain messages/images actually infringing on free speech, when they don&#039;t have any power over whether an individual chooses to express himself (IE he/she is still capable of posting the material on another site), they merely control/monitor the postings on their own site? [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
:Hi Jon- My first thoughts on your prospectus have to do with scope. In comparing these three different games, I think there might be too many factors to consider-- subscription-based vs. free, PC vs. iOS, etc. I wonder if it wouldn&#039;t be more manageable to tackle your research questions if you focused in on two games that were more similar so that you have fewer variables to contend with when you&#039;re thinking about your research questions. My instinct is that working with WoW and League of Legends would work since you can still attempt to tackle each of Lessig&#039;s four forces. I&#039;m not sure how much the law in the US varies from that in Finland, but removing Clash of Clans from the equation might help the narrow your scope in that sense as well. [[User:Jkelly|Jkelly]] 14:27, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Jane – It is a great idea to compare feminist discussion within the confines of a feminist-oriented website to discussion in a public space without this slant. The regulations on discussion are obviously going to be wildly different in each of these communities. You identify Facebook and Twitter as less thoughtful in their discussion for feminist topics - perhaps as a result of their differences in comment policy? I was interested in the comment policy of Bitch Media that you mentioned in the prospectus, so I looked it up. (For others: it can be found here: http://bitchmagazine.org/comments-policy) One line that stood out to me was the following: “As far as moderation of this space goes, guest bloggers moderate the comments on their respective posts, but website moderators will step in when necessary.” – Does this mean that each blog post is technically regulated in a different way? It is not a deal killer if so, because it sparked the following idea: Because FB and Twitter are big places, could you find a smaller community (that is not inherently feminist-oriented) that is discussing the same thing as mentioned in one or a few of the Bitch Media posts, and compare the discussions directly? Just a thought! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:54, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Does &#039;&#039;anyone else&#039;&#039; see the awesome irony of a woman named Jane writing about Bitch magazine? Am I the only one on here who was a teenage girl in the &#039;90s? I remember clear as day, reading [http://bitchmagazine.org/article/ten-things-hate-about-jane Bitch&#039;s criticisms of Jane] back in 1998. BTW [[User:Jkelly|Jkelly]] I hope you understand that as a very longtime fan of Bitch magazine I am in no way criticizing your project, I actually think it&#039;s &#039;&#039;&#039;such&#039;&#039;&#039; a cool topic. You &amp;amp; I would probably have been awesome friends as teenagers. p.s. This doesn&#039;t count as a comment on the prospectus!!! I hope. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:44, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Haha, thanks so much for sharing that Erin!! I haven&#039;t had a chance to read the whole thing, but when you see words and phrases like &amp;quot;fake, sanctimonious,&amp;quot; &amp;quot;self-obsessed,&amp;quot; &amp;quot;narcissism,&amp;quot; &amp;quot;blithe unconcern with which they suggest spending huge amounts of money on items of debatable utility,&amp;quot; and &amp;quot;overweening focus on the superficial, ersatz do-it-for-you tone, and fake individualism&amp;quot; in just a quick scan of the article, it&#039;s bound to be a fun read. Thanks! [[User:Jkelly|Jkelly]] 08:53, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
:: Erin - I think the comparison of two subreddits with different regulations is a solid method of studying the effect of regulation on political discussion. I also believe the two subreddits you have chosen make for a great comparison. The only reservation I have in your prospectus is the focus on word count of the regulations as indicative of the rigor of the moderation. For example, one subreddit may simply say &amp;quot;Discussion of Russia is forbidden&amp;quot; - which in five words hampers more conversation than either of the two sets of regulations do in actuality. I do not think the word count is a meaningful statistic. Apropos your question of whether those without internet access will be under-represented in our studies, I would say that because we are focusing on specific small communities to begin with, we are under-representing the reactions (to control) of everyone in the world who is not in that community. The vast majority of the world is not included. Our focus is on only those within the community itself that we can observe. Ultimately I believe your project is designed very well. Since I too am studying a subreddit for my project, I will be following your progress closely!&lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:23, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Hi [[User:MikeJohnson|MikeJohnson]]! Thank you very much for the feedback, very good point about the empirical data on the rules, hopefully I can expand when I have 2500 words to work with. BTW, I just wanted to comment- the question about people without Internet access was actually [[User:Ichua|Ichua]]&#039;s question. My understanding of the assignment is to study &#039;&#039;only&#039;&#039; online communities for this assignment (and not offline humans, which excludes anyone who doesn&#039;t or can&#039;t access the Internets). My question that [[User:Ichua|Ichua]] commented on is whether &#039;&#039;&amp;quot;users are intimidated by the effort or research required to post, thus limiting participation to a narrow audience&amp;quot;&#039;&#039;. Sidenote- &#039;&#039;&#039;Thank you&#039;&#039;&#039; very much for introducing us to the Twitch Plays Pokémon phenomenon in class. So freaking cool. My God do I ever love the Internet.-[[User:Deluxegourmet|Erin Saucke-Lacelle]]&lt;br /&gt;
&lt;br /&gt;
:::: Thanks Erin! I think it is absolutely amazing as well, and I&#039;ve never played Pokémon. If you would like to read my prospectus and help me think about potential research questions using their subreddit, I am all ears. [[User:MikeJohnson|MikeJohnson]] 11:34, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Ian, great topic and I like the innovative approach you&#039;re taking. I agree that social media is an important medium for Governments to gauge public mood or opinion. In fact, Australia&#039;s Prime Minister, Tony Abbott recently spent $4 million to analyse social media and gauge the public mood on certain policies he introduced. From my understanding, you&#039;re looking to build something like a mind map to organise the social media feedback and also meta tag it? This would effectively allow content to be searched and categorised similar to a knowledge base. Just a couple of questions though....How will you apply the cognitive map? Do you have a specific social media medium and Government in mind? Looking forward to reading the final outcome! [[User:Marissa1989|Marissa1989]] 07:42, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I was unaware of this community exits, and I think it will be a great place for graduate students and researchers to find which papers they should be reading. For example, if I need to utilize a method that is slightly outside of my field, this community will help identify the appropriate and esteemed papers. This may also serve as a better model for Peer Review (one day). Because PubMed is already an exclusive database primarily for biomedical researchers, I am interested to what you observe. I am worried that because only pubmed users (or people using a University IP address) have access to pubmed articles, open access will play a minimal role in which articles spark more conversation. Unfortunately, people tend to converse about papers in high-impact journals like Nature and Science, and I would expect these articles to compete with the open access ones. Perhaps an observation of which articles receive complaints about not being open-access for the curious science lover who is no longer in academia may be an interesting perspective.. ([[User:Margorm|Margorm]] 13:45, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
:::Hi Paul! Thank you for introducing me to PubMed Commons! I have to agree with [[User:Margorm|Margorm]]: people who are &#039;allowed&#039; to comment on PubMed articles often have access to most articles through their Universities or Institutions. That being said, since first reading your prospectus, I&#039;ve thought so much about the access to PubMed Commons. In order to be part of the community, the major factor is that you are an author of a paper appearing in PubMed. An author can &#039;invite themselves&#039; only if PubMed has your email address on file. For personal/professional interest of being a member of this site, I&#039;ve checked with 8 different people (who are all corresponding authors on separate PubMed articles) whether they could invite themselves, and only 1 of the 8 authors could gain access. I understand why it is important for PubMed to confirm identity, however I believe this factor will strongly limit the adoption of PubMed Commons. It should also be noted that I am not an average PubMed author- most scientists I talked to about this think &#039;social media is stupid&#039; or a waste of time. Very few will go through the trouble of asking 8 separate authors to try to log in, until they find one person who can. However, exactly as Margo pointed out, &amp;quot;This may also serve as a better model for Peer Review (one day)&amp;quot;.&lt;br /&gt;
:::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I can see where this topic would make an interesting focal point for a review article or commentary on the exploitation opportunities, (legal and criminal) that open source software packages like these permit. As an administrator of several IT systems myself, reading your prospectus has made me curious to learn more about NESSUS and Metasploit, and perhaps use them to test out weaknesses in my own servers.&lt;br /&gt;
&lt;br /&gt;
::Let&#039;s continue along that thought...and say I will download and experiment with this software... I&#039;m using this scenario &amp;quot;hypothetically&amp;quot; in hopes that it may help you focus more on the key question(s) you are hoping to answer, and to also consider &amp;quot;from where&amp;quot; you will be able to make some observations to address that question. In other words, where might you be able to follow some online community activity over the next few weeks, and observe some interactions between the users, developers, and IT administrators who work with these software packages?&lt;br /&gt;
&lt;br /&gt;
::So, after just now learning of these open source packages, I want to download them on my Linux box and experiment. I want to see how others have installed, implemented, and customized the software to exploit a variety of possibilities. Is there an open community where I can lurk and maybe participate in a discussion to learn about various ways I can use this software to test out my servers for vulnerabilities and bugs? What kind of controls might I be subjected to within that community that may prevent me from discussing specifics about what known vulnerabilities have been discovered, and what security holes one can exploit? If I discover a major security flaw, can (or should) I document this within that online community? Are there normative, legal, and/or architectural controls that prevent or discourage divulging too much information within his community? I noticed a discussion forum at http://discussions.nessus.org/welcome, and https://community.rapid7.com/community/metasploit... would these be the communities you were considering?&lt;br /&gt;
&lt;br /&gt;
::Anyway, hoping this helps out. I just wanted to raise these questions as a way to help you identify the specific online community where some observable activity will occur, and focus in on what controls you hope to be able to see playing-out during the rest of the semester. You may already have that in mind, but it wasn&#039;t in the prospectus, so I thought I&#039;d raise the questions here. I think knowing the answer to these questions will help put the ideas into the context of the Final Project&#039;s objectives and should also help with the next task of building the outline in Assignment 3. [[User:Psl|Psl]] 14:25, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Somehow the uploaded RTF file had been converted to a CALC spreadsheet file, making some of the contents hard to read. [[User:Ichua|Ichua]] 15:08, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:: Hi Twood. I find your paper topic to be incredibly interesting and well-thought out. I wish I had constructive criticism to give you, but I find that you are on the right path. My only question at the moment: how do you plan on measuring the response of community members to the each sites&#039; control mechanisms? [[User:Lrsanchez|Lrsanchez]] 11:41, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Twood, I find this to be a very cool topic and being a musician myself, makes it even more so. I have never ever been a fan of sampling music outright and then adding a new beat and some remixing to make it one&#039;s own, just not my style. I like the prospect of you examining a smaller or less commercialized community musically (as compared to You tube). Again, as own who owns small studio at home and records pretty solidly, it is always great to see musicians recording and producing their own stuff from scratch with small home studio setups. I hope you show an example of a community catching someone in the act of stealing another&#039;s music or idea and what the outcome of that interaction will be - because as musicians we always borrow, modify or improves someone else&#039;s cord progression or guitar lick to make it our own. So, it would be great to see if you could hint about that distinction - as I am sure it comes up a lot in communities like this. But, overall really nice topic to concentrate on.[[User:Dancoron|Dancoron]] 19:42, 2 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Cheikh, I&#039;m looking forward to reading your paper. Online technology journalism is indeed a most interesting industry... after all, a tech journalist with sufficient influence can single-handedly kill an up and coming technology project with billions in R&amp;amp;D costs, and this is particularly worrying given how easy it is for a competing company with a sufficient budget to influence said journalists, as well as how often these journalists write reviews having used the product in questions for mere minutes, or without necessary expertise in the are where such product can be useful. That said, my suggestion to you is to narrow your topic to one single research question. At the moment, you paper risks going astray as you intend to cover a wide array of very different concerns. --[[User:Seifip|Seifip]] 12:06, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Emmanuelsurillo&lt;br /&gt;
*Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:You raise some great research questions to examine within these communities. You might want to narrow your focus more. Will you be talking about the legalities of “jail-breaking” and it’s effect on the Apple and Android market? Considering the topics we discussed in class, it might be interesting to develop your research to mention the view of major companies toward these forums and the rogue developers. Once an iphone is jail-broken, it losses its apple warranty coverage. This might be a topic you want to bring up with your research. Good luck! [[User:Lpereira|Lpereira]] 21:36, 3 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Emmanuel,&lt;br /&gt;
&lt;br /&gt;
You have selected a really “hot” topic. Mobile applications appear to be taking over actual web development these days. I’m in the process of creating a new site, for the general public, to locate assistance after they have been harmed by other entities. The developer of my site highly recommended that I create a mobile app at the same time.  He is correct and the only reason I do not plan to follow his suggestion is directly related to cost.&lt;br /&gt;
&lt;br /&gt;
I’m unclear of the real statistics, but Internet users seem to be using phones as their selected source of information more frequently than computers. Most people carry their phones (even to bed) but fewer seem to be in constant travel with their laptop.  &lt;br /&gt;
&lt;br /&gt;
I am not familiar with the sites you listed in your proposal since I am not a mobile application developer, but I am happy to learn there are forums to enhance applications through large communities. &lt;br /&gt;
&lt;br /&gt;
It appears many of our classmates are attempting to use a compare/contrast approach, which seems logical, if we want to identify how resourceful one community is versus another. Your research will be extremely useful to many, and I would like to pass your results onto my developer after you have completed all the hard work (smile). &lt;br /&gt;
&lt;br /&gt;
A few questions for you: &lt;br /&gt;
  &lt;br /&gt;
“I want to compare how useful and productive these web sites are to the users end for accomplishing these goals.”&lt;br /&gt;
&lt;br /&gt;
1.	How do you plan to compare and contrast the central 7-9 questions outlined in your proposal for the final project? In other words, will you be able to summarize the data from each research question in one succinct paragraph to meet the page requirements?&lt;br /&gt;
2.	Do you think it would be easier to select 2-3 questions presented in your proposal to dig a little deeper or perhaps ask a few others from the class to join you on a team to cover all the questions presented?&lt;br /&gt;
&lt;br /&gt;
I ask these questions, because I am struggling with these issues myself.  I believe if I ask enough people in our community who are using a similar approach, I will (eventually) determine a model that may be useful for my own research. &lt;br /&gt;
&lt;br /&gt;
Another suggestion: Could we potentially find a group of people in our research community (class) that are interested in using a similar approach, but still collectively analyze the communities we selected for personal purposes? In other words, I am certain most students have selected the entities of study for some reason, such as personal satisfaction or business achievement.  However, Andy has made it clear that he would entertain teams multiple times. In fact, the option has been posted on every page of our instructions for the main project.  In fact, the option has been posted so many times that I am beginning to think he may be giving us a subtle hint or clue: “This assignment will be more effective if you work collectively together and you may gain more valuable research by teaming”. I don’t read minds, but… &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
I am attempting to look at the effectiveness of two sites created to allegedly help people who have been taken advantage of by either an entity or a person. Section 203 under the Communication Decency Act assists people in their ability to say whatever they think, regardless if correct.&lt;br /&gt;
&lt;br /&gt;
You are comparing two mobile application sites to analyze how useful and productive the sites are for the users to include accuracy and validity.&lt;br /&gt;
&lt;br /&gt;
Marissa is researching the validity of airbnb.com, and looking at the controls put in place by the website to protect people.&lt;br /&gt;
&lt;br /&gt;
I still have many proposals to read today, but it does appear that many of us are running in a few general hypothetical areas of question:   &lt;br /&gt;
&lt;br /&gt;
Which site is more effective due to the controls implemented by the site itself? (Compare/Contrast)&lt;br /&gt;
&lt;br /&gt;
Can the data on these sites be considered valid? Is so, why or why not?&lt;br /&gt;
&lt;br /&gt;
Could we potentially work together on a research methodology for all three sites to compare and contrast if the model is effective in and of itself while measuring the data across the board for multiple communications? In summary, we could compare and contrast the model that we collectively created against the sites we personally selected.&lt;br /&gt;
&lt;br /&gt;
My biggest concern with many of our proposals is that they are too broad and we will not find the depth.  Most of our topics could be potential dissertations; unfortunately we are lacking 5 years of research time (smile).  I plan to look for commonality in proposals submitted-perhaps we can all make this better together. Could we potentially try to use our class community to research the depth of the Internet communities.?&lt;br /&gt;
&lt;br /&gt;
Just thoughts. &lt;br /&gt;
&lt;br /&gt;
Cheers!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 17:07, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Emmanuel,&lt;br /&gt;
&lt;br /&gt;
Great topic!!&lt;br /&gt;
I am not sure if you would like to go into that direction, but from my point of view, I would say there is a big difference in the active level between iphone users via Android users in forum.&lt;br /&gt;
Iphone users are usually not as active as Android users in forum. And I think this is a really interesting topic to look into.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I think it would be a good idea to narrow down your topic as there are 9 research questions that you are planning to coverin your paper. It would be difficult to talk about each question in depth with the words limit.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:42, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
::Hi [[User:Seifip|Seifip]]! Few bits of feedback for you. First of all, I like that you tied back to Lessig&#039;s regulators. Very strong prospectus overall. Second, I wonder how you define an &#039;&#039;effective way of shaping an online community&#039;&#039; ? I assume that you didn&#039;t define &#039;effective&#039; because of the 400-word limit for this assignment. My advice would be for you to perhaps draw specific comparisons between StackOverflow and another online developer support community. Alternatively (and perhaps more fun), you might change the phrasing of your research question to something like &#039;In what ways does X architectural element affect conversation on StackOverflow?&#039;. Overall though, I think this is a very strong topic for your final project, because developer communities are some of the most in-depth technical discussions on the web. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::: Thanks for your feedback, Erin! I&#039;ll consider narrowing down the research question to a single element. --[[User:Seifip|Seifip]] 10:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Art.Mescon&lt;br /&gt;
*Title: Do Etsy’s regulations aim to help buyers and/or sellers or are they primarily protective of the company itself, leaving third parties on their own to seek out reputable transaction partners? &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Art.Mescon_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
::You raise some great ideas in your prospectus that would make for an interesting research paper around Etsy. However, I wonder if it might be best to focus more on the controls for which you can already observe playing out within the Etsy community&#039;s online activities? In other words, the community norms and architecture controls within Etsy itself (user-&amp;quot;self-regulation&amp;quot; and Etsy&#039;s-&amp;quot;private-regulation&amp;quot;) might be the most reliable &amp;quot;observable data&amp;quot; that you will be able to anticipate over the next few weeks. The government level controls (public-regulation) you suggest may require moving outside this community, and I am not sure that a useful discussion (with observational data) will be possible within the page limit, nor would it be crucial to answering your research question.&lt;br /&gt;
&lt;br /&gt;
::I like the research question very much, and I think it couches the challenges you hope to observe within the methodology you propose. Also, I anticipate that the community interactions over the next couple of months should provide you with enough observational data to answer your question. One more tip on the question... What would you think about starting the question with &amp;quot;How&amp;quot; rather than &amp;quot;Do&amp;quot;...? Play around with the phrase of your question, and see how it feels. My thinking is that you will allow yourself some flexibility in what you will truly have to report on when it comes time to write up the results. The answer to a &amp;quot;Do&amp;quot; question requires one to choose a yes or no and your findings will likely challenge any &amp;quot;absolute&amp;quot; judgment call... So don&#039;t let yourself get cornered into having to make that choice (at least not at this early stage). By starting the question with &amp;quot;How do Etsy’s regulations...&amp;quot;, will allow you to have more flexibility to report on what the observations will show, and your can balance your discussion section on some good and not-so-good controls that play out over the next few weeks.&lt;br /&gt;
&lt;br /&gt;
::Last point. In your sentence &amp;quot;I intend to identify how Etsy controls, or fails to control content in a manner that is advantageous to their users.&amp;quot;, I wasn&#039;t sure if by &amp;quot;users&amp;quot; you meant the buyers, sellers, or both. My mind is interpreting that &amp;quot;user&amp;quot; is the buyer in this sentence’s context, and the word &amp;quot;content&amp;quot; is used to define both the items and community sellers that are being controlled. True? That distinction may be important to clarify as the full report gets written, because the Etsy controls and observations being gathered will (I suspect) impact buyers vs sellers vs content each a little differently.  On a similar note... To cut down on the need to follow every buyer, seller and thing in &amp;quot;Top Searches&amp;quot; for this community, do you think it would be helpful to focus on just one type of craft? I don&#039;t know enough about Etsy specifically to determine if that would work for this project, but it might be another way to find a sub-group/sub-community limit, and still provide you with enough observational data to draw some conclusions.&lt;br /&gt;
&lt;br /&gt;
::Hoping these comments are helpful! [[User:Psl|Psl]] 12:22, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Title: YouTube Comment Filtering and Other Cyberbullying Initiatives&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/File:Lpereira_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 16:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Might be interesting to determine whether and how Youtube encourages positive comments and discourage negative or hate comments.  Ultimately, it would be ideal if the character of misbehaving individuals could be improved.  Some ideas might be the use of &amp;quot;Like&amp;quot; and &amp;quot;Dislike&amp;quot; votes on these comments and/or the award/deduction of &amp;quot;attitude points&amp;quot;.  The individuals posting hate and aggressive comments could be prohibited from further postings if the attitude point reaches a certain limit. [[User:Ichua|Ichua]] 15:02, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like the focal point you will be observing, and you are quite right in pointing out that this &amp;quot;negativity&amp;quot; is becoming an unfortunate reality for many &amp;quot;open comment&amp;quot; sections within these online spaces. Even what can begin as constructive dialog and healthy debate, can quickly degenerate into blather, flames, and hate words when anonymity can be so effectively used as a shield. Interestingly, we can&#039;t always point our finger at just one &amp;quot;troll&amp;quot; injecting some deliberate provocation...because sometimes the breakdown occurs with the 3 or 4 community members who (hither to) we&#039;re exchanging words in a perfectly eloquent &amp;amp; respectful manner. But the hate, racism, and bullying that poison the dialog on these comment-boards are on a much more disturbing level, and one that certainly will make for an interesting study.&lt;br /&gt;
&lt;br /&gt;
::So, The broad question that I am hearing in your prospectus is &amp;quot;What are the most important controls that an online service provider can successfully implement to intercept and discourage cyberbullying, hate-speech, and irrelevant negativity? The sub-question then would be &amp;quot;How effective and/or constraining are those controls on the community&#039;s ability to engage with each other in a meaningful unbiased dialog about the content? (YouTube in this example)? &lt;br /&gt;
&lt;br /&gt;
::Have you given some thought to the subject matter that you will focus on, as a way to observe how these comments progress? It may be helpful to put your lens onto a consistent subject to observe the cycle of communication. From there you should be able to witness what prompts the conversation to begin in the first place; when do counter-points get introduced, how long is constructive dialog able to bridge back and fourth, what is the &amp;quot;poison-pill&amp;quot; that kills the conversation, and when do the controls kick-in?.  (Observing where the controls kick in would obviously be the essential part to report on, not so much each of those elements of the cycle of communication I itemized there.) &lt;br /&gt;
&lt;br /&gt;
::I’d be curious to also know if the observation shows that the cycle of communication is more (or less) positive throughout based on the type of subject that initiates the conversation? News stories on &amp;quot;hot button&amp;quot; topics or baseball contrasted with (say) a page dealing with baking fudge probably have different trajectories of &amp;quot;success&amp;quot; in remaining positive. (I am thinking about the inherent behavior of the potential community members themselves… one lends itself to polarized opinions with predictable “zealots” appearing in either camp, while the other community may be more welcoming of differing opinions and tastes).  SO for example, thinking of an individual wearing that New York Yankees hat in Fenway Park on game day....vs... a group of bakers talking about chocolate vs. peanut butter fudge recipes…The former is likely to risk some taunting, a black eye, a broken tooth, and perhaps a small riot... while those in the latter group, might, at worst, receive only a cavity.  Anyway, my point is that it might be interesting compare a couple of focused topics of conversation as a way of discovering a smaller sub-community that builds around a YouTube comment-board (With one engaging in  a &amp;quot;Hot button&amp;quot; topic.... While the other group is discussing something seemingly non-polarizing.)[[User:Psl|Psl]] 12:00, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Ben Harmatz&lt;br /&gt;
*Government Entities: Internet Surveillance and Censorship&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_NSA_1_draft_copy.doc&lt;br /&gt;
[[User:Benh|Benh]] 16:49, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Ben. While I think your prospectus brings up the interesting and very pertinent topic of government control, surveillance, and censorship, I think that it is simply far too broad of a topic. For the assignment, we are supposed to monitor the activities of users on a particular site or group of sites, but looking at the internet as a whole is far too much for an 8-10 page paper! Perhaps consider government control, surveillance, and censorship while observing a particular website that has been named as a victim (by the media) of NSA&#039;s surveillance and dig deeper there. [[User:Lrsanchez|Lrsanchez]] 13:02, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Patricia Byrnes&lt;br /&gt;
*Title: Are moderators effective for policing and protecting a site from illegal use?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Patricia_Byrnes_Assig._Two.doc&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 16:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Patricia, First off, love your idea, moderating internet speech, as well as your methodology: if what you want to measure is moderating behavior, norms, and free speech concerns, the “Politics &amp;amp; Leaders” forum is a fantastic place to do so since It appears that discussions there can turn from heated to vituperative in the blink of an eye! With respect to your research question, by specifying “effective,” I assume that you will quantify instances of behavior that violate the established rules of the site. This method is good since you give yourself a verifiable and quantifiable measure. You can then use Lessig’s and other scholars work to explain these data. Now, you say that you wish to &amp;quot;research the rules and regulations of the site,” which looks like it might be an insurmountable task. I visited the site’s “Super Editor handbook” and I see that it is quite extensive. Perhaps you might want to focus specifically on one type of violation, such as &amp;quot;3.4.1 Discouraged Ranking Themes - Personal Experience / Personal Preference Rankings” ? [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: This is a very interesting topic, and a complement of sorts to mine. As Vance has mentioned, it might be a good idea to focus on a single type of infringement. Also, keep in mind that looking up formal charges for infringement may not lead to a very accurate data point given that many take down notices are delivered through more traditional, private systems such as email (as an owner of several websites, I&#039;ve received quite a few infringement notifications pertaining to content post by our users, all of them as a personal email, none through the official DMCA means or through our hosting provider). --[[User:Seifip|Seifip]] 12:23, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Vance.Puchalski&lt;br /&gt;
*Regulators and the Spread of (Mis)Information&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Puchalski-Assignment2.docx&lt;br /&gt;
[[User:Vance.puchalski|Vance.puchalski]] 17:17, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:As an extension student and a reader of both sites, I agree that extension student is often more accurate especially due to the required affiliation. You should consider when collecting your data that often information is not so black and white. A lot of people on these treads seek opinion, which is more of a personal thought rather than right or wrong. A lot on forums is opinion based, not fact based and so I think you should prepare for your data to be filled with a lot of gray areas, which you might already be expecting. The correlation between accuracy and monitoring is certainty an interesting topic. Anyway, great research topic and I’m interested to see your findings. Good luck! [[User:Lpereira|Lpereira]] 21:20, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A. Tom Anteus&lt;br /&gt;
*Cryptocurrency Uses in Conflict Zones Around the World&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Cryptocurrency_Uses_in_Conflict_Zones_Around_the_World.pdf&lt;br /&gt;
[[User:A. Tom Anteus|A. Tom Anteus]] 17:26, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Tom, intriguing topic! I&#039;m a keen follower of the Bitcoin revolution myself so have been naturally drawn to your prospectus and Daniel&#039;s as well. However I would say its quite difficult to follow your proposal. I&#039;m not quite sure how you intend to analyse and measure the use of cryptocurrency in conflict zones. Which conflict areas will you be targeting? Do you intend to follow forums or analyse chatter on various websites. If so, which ones?  [[User:Marissa1989|Marissa1989]] 07:36, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: One interesting avenue to explore might be how government control of internet in countries like China affect, and could affect the adoption and use of Bitcoin. I&#039;ve followed Bitcoin for a long time and one of my concerns has always been that Bitcoin is dependent on some infrastructure that is relatively vulnerable to government control and influence, and that if Bitcoin ever grew sufficiently to compete with official state currencies it might invite even more internet regulation. --[[User:Seifip|Seifip]] 12:14, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Julie Dubela&lt;br /&gt;
*Mapping Social Media Debate on the OHCHR Report on North Korea&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Julie_Assignment2.txt&lt;br /&gt;
[[User:Julie|Julie]] 18:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Julie, great prospectus. I find the whole North Korea situation appalling from a global response perspective. A lot of the articles, commentary and reactions from people around the world have been effectively muzzled. Your approach to analyse public reaction through social media is methodical and well thought through. Your plan to use specific tools to collect information from twitter hash tags, Google trends etc and follow up by analysing them to find common themes and trends is great. I look forward to reading the final report!  [[User:Marissa1989|Marissa1989]] 07:52, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Andrew Grant&lt;br /&gt;
*Quantified Self and Qualified Liability: Strava and Lessig&#039;s Four Forces&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Andrew_Grant_Assigmnment_Two_02252014.docx&lt;br /&gt;
[[User:AndrewGrant|Andrew Grant]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Andrew, your prospectus sounds fantastic. Lots of interesting questions being asked in light of Lessig&#039;s Four Forces and the Quantified Self movement. I think that you many be asking too many questions for an 8-10 page paper, if you are to go into sufficient depth for each one. Do you think that it&#039;s realistic to answer the five research questions in so short of a paper? Other than that, I think you are off to a great start and I am interested in hearing more about it. [[User:Lrsanchez|Lrsanchez]] 11:49, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In general, it might be helpful to state why your project is important and how the outcome of the research might help regulate/control or improve human behavior on the internet. [[User:Ichua|Ichua]] 19:58, 27 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1277</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1277"/>
		<updated>2014-03-04T17:23:30Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jolie Ho - Wan Lap Ho&lt;br /&gt;
*Instagram vs Flickr&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Jolie_Assignment_2.docx&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 16:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How do you propose to collect data to answer the last question? [[User:Ichua|Ichua]] 15:22, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey Jolie! You picked a really fascinating topic to cover! Just a few thoughts I hope will help. How do you plan on pinpointing how all the users behave differently, just because there are so many registered accounts you might be able to find people who behave nearly the same or certain individuals who have accounts on both Instagram and Flickr. Just as a mere suggestion maybe you can find a niche that is unique to each site and compare them? Maybe Instagram has thousands of pictures of food and seflis while Flickr has more professional content? I hope this will help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:15, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like your topic to dive into why Instagram has been so successful compared to Flicker. It may be interesting to compare the age groups of each users. Instagram seems more accessible because it is a phone app that is simple and immediate to use, whereas Flicker users upload a batch of vacation photos, etc. I like Emmanuel&#039;s suggestion to compare the content between users. Another suggestion which relates to the selfies/food photos may be to compare the users themselves. I think older people tend to use Flickr and therefore may not post as much. However, younger people (who no long user facebook) posting to instagram all the time would provide a way for facebook to get back that market. ([[User:Margorm|Margorm]] 14:31, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
::Hi Jolie: This is a very interesting topic, with many possible areas focus on! (Also, a nice mix between the tech and creative worlds.) You mentioned that Instagram and Flickr diverge where mobile apps are concerned. This looked particularly interesting, especially following the Flickr app&#039;s overhaul. Anecdotally, via Twitter, it looked as though the Flickr update was a major talking point in both the Instagram and Flickr user groups. My thought was that it may be interesting to look at whether this major app update had any bearing on either of the two communities, as it may have impacted some of your research questions. Best! [[User:Twood|Twood]] 09:33, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How would this differ from other imaginary items of trade like currency/commodity derivatives and futures and virtual commodities like pork bellies?   [[User:Ichua|Ichua]] 15:17, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Daniel,&lt;br /&gt;
What an interesting topic! I was not even aware that state governments recognized these currencies. Would you be able to come up with more material if you focus on one or two countries and their reaction to the online currency? Also Ichua gave great advice; maybe one country’s reaction and policies to multiple online currencies would help in the scope of observation. Your idea of creating a website to report and share your findings is really novel! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Very interesting topic Daniel. Ive been following the progress of Bitcoin as a personal interest. Apart from the regulatory challenges Bitcoin poses for Governments, its also vulnerable to cyber attacks which can erode trust in using the currency. Whilst the actual Bitcoin itself is heavily encrypted, the Bitcoin exchanges are vulnerable to hacking and cyber theft as evidenced recently by the successful attacks on Mt Gox, one of the world&#039;s largest Bitcoin exchanges. It would be interesting to observe the effect (if any) this would have on the regulatory view of the currency by Governments. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Marissa1989&lt;br /&gt;
*Prospectus title: The rise of the collaborative consumption movement: Analyzing effective control of communication, structures of gaining trust &amp;amp; verification, and legal issues.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:Assignment_2_Barkey-2.pdf&lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 23:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hi, Marissa! I used AirBnB to rent out my apartment last summer and it actually resulted in me being robbed by the person to the tune of $10,000-- not including the rent for the summer, which he didn&#039;t pay (I didn&#039;t get any of it back, either, despite the insurance). It was a nasty situation. Anyways, from what I understand, the majority of communication on AirBnB is done privately. Without staging anything or intervening, how do you plan to observe enough to answer your question(s)? I think this is basically the same concern with one of the other treatments I read, regarding Facebook. I do think the security of platforms like AirBnB is of great concern and would be a very interesting subject to study in depth![[User:Castille|Castille]] 21:16, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Marissa,&lt;br /&gt;
I loved the idea for your prospectus! Just as a suggestion, would you consider comparing a few corresponding sites like 9flats, Couchsurfing International, or Hospitality Club? You could analyze how they handle different verifiability and security issues while also comparing how the sites are constructed to better “vet” their users. This may yield insight on how trustworthy their users are to each other. You might even want to inquire if one has had “major” legal issues in the past. I hope this helps! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:32, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Greetings Marissa!&lt;br /&gt;
&lt;br /&gt;
Your topic is very interesting and it appears we have a few of the same elements in the companies we have selected to research: Verification and trust. From what I understand, you are addressing issues of users on auction/garage sale platforms surrounding the tiers of user verifiability. In other words, who is protecting one user from being taken advantage of by another user.&lt;br /&gt;
&lt;br /&gt;
The comment you posted on the wiki under my topic in regards to the effectiveness of how the sites that I have selected deal with inaccurate comments made about companies by the general public are dealt with is of great importance-the public can ruin a business for no other reason than spite. In other words, who protects the companies from users. &lt;br /&gt;
&lt;br /&gt;
The proposal you submitted intrigues me in many ways. By studying the community of airbnb.com, it appears you will be analyzing the controls implemented to make the site successful (verification, quality feedback, security, payment, userability and collaboration). &lt;br /&gt;
&lt;br /&gt;
In summary, it appears we are both working on protection issues, and if the verification process is significant enough to gain consumer trust. &lt;br /&gt;
&lt;br /&gt;
Would you mind if I ask how you plan to analyze the user? I would be interested in your methodology, and we may even find each other’s approach helpful to each other. We may even be able to compare and contrast the communities with a similar approach and work together if you would be interested. &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 15:18, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Melissaluke|Melissaluke]] 18:36, 25 February 2014 (EST)&lt;br /&gt;
*Change.org vrs Ripp Off Report&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_Research_Paper-Final.docx&lt;br /&gt;
&lt;br /&gt;
Dear Melissa, &lt;br /&gt;
What a great topic and area of coverage!!! I’m hoping my comments and questions will be of help to you! Which site succumbs more readily to outside pressure and take down requests? Also you mentioned that a susceptible compliant to both is that they are accused of not “vetting” their sources. You could possible test to see which one (if either of them do) checks them more thoroughly. This might be, and I know nothing about it, accomplished by putting posts of your own and noting if they require any amount of proof, citation, source, or quote of any kind. I really hope this helps you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:35, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thank you so much Emmanuel! Your ideas are superb and very helpful!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Melissa, these sites can be a boon for consumers in helping to identify unscrupulous businesses and thus avoiding them. The issue that I find with these sites, that&#039;s never been effectively dealt with, is how do they identify and remove potentially inaccurate comments attacking a business as a result of say, a personal vendetta by a disgruntled employee or a customer who was unreasonable. Many small and medium size businesses rely on word of mouth for new customers. If the site allows the comments to remain, it may affect the business.  This in effect may lead to possible blackmail of businesses by threatening to post inaccurate information on these sites. I&#039;m also very interested in the sample groups and postings that you choose. Great topic! [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marissa, Excellent insight and the problems posed are valid. Your questions are helping to me and assist in narrowing the topic-which is clearly too broad at the moment.&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Melissa, Just a quick note, because I loved your prospectus so much (it&#039;s such a creative take on the assignment, but still seems to hit on all the prof&#039;s requirements, really amazing job). With your &#039;&#039;&#039;Q1&#039;&#039;&#039;, &#039;&#039;Why would one site be more popular?&#039;&#039;- I can;t help but wonder, does the fact that it has such a simple, perfect 1-word URL have any effect? Also, due to the time (2007) &amp;amp; place (USA) I automatically assumed this website was somehow related to Obama&#039;s election campaign- though from quick Google search there doesn&#039;t seem to be any direct link. Anyways, just wanted to say, I really like your prospectus. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:49, 3 March 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hey Mike, it would absolutely be my pleasure to provide feedback to you. I won&#039;t go too far before having the time to focus &amp;amp; read it completely- so my first feedback to you is: if you didn&#039;t pick such an interesting topic, I would have actually read the full prospectus. However after reading your first paragraph, I ended up watching TPP and reading its subreddit and forgot to finish reading your prospectus! hahaha. But this weekend I&#039;ll spend time focusing and try to provide you feedback, hopefully as good as the feedback you gave me (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 10:34, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Mike! After reading [[User:Jkelly|Jkelly]]&#039;s comments below, I&#039;m kinda worried about posting my comments, cus I think I understood your questions from a different point of view. &lt;br /&gt;
::*First of all, my question- how do you approach your 2nd qualitative question? I&#039;m not completely sure I understand what you mean by vulnerability.&lt;br /&gt;
::*Second, my advice, feel free to take it or leave it: to keep within scope of this project (2500 word paper seems so short!), I believe it may be easier to tackle Qualitative questions #1 &amp;amp; 3, and your second quantitative question (&#039;&#039;Has it helped or hurt the game to impose such controls?&#039;&#039;). I get the impression that these questions would be the ones that would be easiest to answer from following the community discussion on the subreddit. That being said, if we were writing 8000 word papers, it would be so much fun for you to really dive into the architecture &amp;amp; UX of the game itself, while paralleling it with the subreddit(!!!). Really awesome topic &amp;amp; prospectus.&lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:After reading your prospectus, I have a few questions based on your questions, or maybe some questions that combine the ones you already have. It seems clear from what you write in your prospectus that the user experience is absolutely vulnerable to the controls imposed by the game, but I&#039;m curious to know in what ways. Were users bumping up against controls they didn&#039;t like before there were changes, or was it only after the controls of the creator were made clear (he made himself known in an explicit way, rather than operating quietly in the background) that users began to find fault? (Another way of thinking about this might be- were a lot of users thinking about the controls imposed by the game before the creator&#039;s changes forced them to think about it?) If I understand the current set up correctly, it seems that users still have the option to have commands parsed as they go instead of waiting for them to be tallied and then implemented. So, were the controls only seen as problematic once users considered that there was one person making a decision that affected every user? Is the lack of democratic decision-making behind the scenes a bigger problem for users than the actual changes in user experience?&lt;br /&gt;
&lt;br /&gt;
:As far as your quantitative question goes, I&#039;m wondering if there&#039;s any way for you to know how many users stopped playing the game after the creator made changes? Do you have a means of seeing the changes over time? [[User:Jkelly|Jkelly]] 14:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
Dear Michael, &lt;br /&gt;
I find your prospective very interesting! I thought to give you these few suggestions. I hope they will help! You might want to see what percentage of Flickr users are a part of the Creative Commons community and whether it consists of a majority or a minority. Another area of research might be into the other forms of control that Flickr uses to protect copyrighted material, and then to compare them with Creative Commons to see if they are as effective, prevalent, or well known. Also, when there are infringements in copyright policy, do people respond to correction or do they just ignore and continue violating the rules? Lastly, how does the Creative Commons community handle repeat violators (if there are any)? Wish you the best! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:43, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Lucia, This is looks to be very interesting - I was wondering if you can be more specific on what types of data the initiative is exploring. Are they looking for statistical data mainly, do you vote on what subjects you are going to put on the website or research? It looks like a great example of policy control via the government. I would to know more about the website and its overall goals - something that helps define its missions parameters, as I visited the website main page and got an idea of what they were saying - I am just needing some more clarity that&#039;s all. But again, the subject looks like a great idea and should be very interesting...[[User:Dancoron|Dancoron]] 18:48, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Lucía! &lt;br /&gt;
I think your choice of study fits perfectly with the theme of the course! Perhaps you can also investigate to see if they are stifling public opinion or whether they are flooding the docs with pro-government voices to influence the theme towards their agenda?  Also as a suggestion, can you see if it is truly open to everyone? Maybe you would like to find another similar program that the government has tried in the past (assuming that they have tried). Do the number of participants fluxuate? Is there a trend in what the government sees as inappropriate? Or is it just random edits that are corrected by the government? I hope these comments can help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:13, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I&#039;d really like to read and comment on your prospectus, but it seems like the file didn&#039;t upload. Happy to respond to it once it&#039;s up!&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 20:57, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I second Jkelly&#039;s comment. This look very intriguing and I&#039;d like to learn more about your plans for the project! [[User:Twood|Twood]] 23:14, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Third. --[[User:Seifip|Seifip]] 11:58, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hello, Dan! Admittedly, I had never heard of “Anandtech.com” prior to reading your prospectus, but I’m glad that you told me about it. I really like their “Cable TVification” assessment of the internet in recent years. After reading your prospectus it seems to me that you are focusing on Lessig’s norms as regulators within the site’s forums, as well as “laws&amp;quot; instituted by the website. It is an interesting subject, because as you say, this particular forum is very successful in fostering an environment where users are likely to return. That said, I see that you qualify users of the site as “good,” and I’m curious to know how you will operationalize this term for your project. You mention words like “courteous” and “helpful,” but I’m wondering: what characteristics do you think you will look for when observing, in order to qualify a “good user.” For comparison, do you have an example of what behavior that “bad” users might entail? Lastly, I see that there are literally millions of post on the forum; you may wish to focus on a specific topic and/or date range in order to have a more manageable data set to observe. I’m interested to see what you’re project will entail, especially being that I am also observing forums for my project. [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Vance, thanks for taking the time to look at my prospectus - Basically, what I meant to convey is that these are the characteristics of a &amp;quot;good&amp;quot; website, a website that demonstrates use and activity to by the administrators and its members/users. What I will be focusing in on is, how is the site&#039;s control policy administered and conveyed to its members, both historically and presently, through the links in my prospectus – and to answer your question about bad behavior in online forums, yes I will, as I think that is a critical component regarding context – And this also goes out too Marissa as well, what I really wanted to focus in on was how does bad behavior and is control policies in its forums, effect a webite economically - as I think ths would even go further towards Lessig&#039;s FOUR norms of regulation on where the dot lands - but for obvious reasons, that could end up being too big. However, I still might toss something like that in - My goal is to pick out a couple of instances of the control poliy being implemented and see what the results were based on specific incident/instance was there a ban and how long was it for - what was the reason, what was the community&#039;s response to that action and so forth... - Again, thanks for the input and suggestions.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Dan, forums have proven very useful mediums for learning and troubleshooting. What would be interesting is how forums deal with covert advertising I.e. Forum posters who may be businesses, subtly advertising their own goods or services under the guise of responding to threads without paying for advertising rights. Would paid advertisers pose potential conflicts of interest to the neutrality of forums? I&#039;d also be interested in seeing how you compare the Anandtech&#039;s forum controls against others. Would you choose similar types of forums with respect to content type? [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marrisa, I tried to include your response with Vance&#039;s up top :O) [[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Dan!&lt;br /&gt;
If you are mainly comparing Anandtech’s forum site policies, maybe you could also compare past versions of the rules? Also, you might want to see if Anandtech has any unique features in toxicity control that would make it standout from other less successful forums. Overall the concept is fantastic! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Emmanuel, thanks for the feedback - ya, I am going to try and put some type of onus on Anandtech as well, and see if some of their reactions to their policies could be considered a little over zealous or a bit too far reaching. Most times, their admins/moderators are pretty decent, but again, like everyone else, there are times when a few of their admins/moderators could be having a bad day and maybe be a little too heavy handed - we&#039;ll see, stay tuned to find out. just a little humor :o) Thanks again for the input.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:First of all, GREAT TITLE!!! Second of all, this seems like an extremely interesting subject and I&#039;d love to read more about it. I do wonder whether you&#039;ll be able to get access to the material you might be looking for by doing &amp;quot;undercover investigation&amp;quot; and the other research methods you listed. It seems to me that the kind of exchanges you&#039;re discussing would be difficult to observe on Facebook as they likely wouldn&#039;t be out in the open. I may be completely mistaken, but I was also under the impression that the assignment encouraged examining a more open forum or something of the like where observation was more feasible. I know that there are public matchmaking sites and I would assume there are also forums geared towards those who wish to have illicit affairs, so that might be an area into which you may want to delve. [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:I also love the topic and find the subject very interesting! I share Castille&#039;s concerns above. It seems challenging to get access to the materials you will need to answer these questions. I wonder if there is an open forum somewhere in the internet where angry divorcees can go to vent about how social media ruined their marriage? It may be a biased site, but it may provide resources to other statistics or materials that may help? Or if there is a community you could observe and monitor the degree of online flirting? ([[User:Margorm|Margorm]] 14:48, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wow very cool subject - and one I am sure that deserves a lot of attention these days. With that said, it seems that this subject matter could be a thesis or dissertation as the material collected probably seems to be endless. I was wondering what specific community are you going to target on facebook, as this looks to be potentially a very large paper? I have to admit that I am fascinated to see what other statistics this might uncover, as I am sure we all have heard stories of spouses leaving their significant other for someone they met online. Yet maybe, you can focus on something more specific then a facebook community - as there might be other communities or even forums that have support groups for such instances or circumstances that you mentioned earlier. Maybe seeing how they interact with each other and what rules or policies can be observed and commented on. Overall the topic is really great and I am sure it will have some very interesting content that is fascinating.[[User:Dancoron|Dancoron]] 19:13, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Very interesting subject matter Amy!&lt;br /&gt;
&lt;br /&gt;
You may have selected one of the most controversial and highly emotional subjects out of all proposals presented.  I would agree with Dancoron. The questions outlined could lead to a doctoral dissertation. Additionally, Castille does bring a good point to light, in that we are encouraged to avoid any work as an “alias”. &lt;br /&gt;
&lt;br /&gt;
I think many of us are having trouble (to include myself) narrowing the research down to a tolerable amount of data collection for an in depth analysis.&lt;br /&gt;
&lt;br /&gt;
In your proposal, you suggested comparing and contrasting divorce rates. What sources would you be comparing and contrasting? Are you speaking to different communities in the United States or on a larger level?  Or, are you addressing the male/female divorce ratio? &lt;br /&gt;
&lt;br /&gt;
Secondly, will you be cross-examining two nations who have access to Facebook, in efforts to compare and contrast divorce ratios in direct correlation to Facebook usage? &lt;br /&gt;
&lt;br /&gt;
If your research goals are to use Facebook as the platform for study concerning divorce, it may be difficult to get access to this information unless you are accepted into a person’s profile, group or community. In efforts to stay objective, I don’t think you would want to study anyone that you personally know.  Pornography could be a difficult study, in direct correlation to pornography with the controls Facebook allows for each individual user. &lt;br /&gt;
&lt;br /&gt;
Would it be possible for you to follow a smaller, more open group that readily blogs/views pornography that is open to the public for data collection in a short period of time? &lt;br /&gt;
&lt;br /&gt;
Unfortunately this is completely out of my arena. I have never been married and I don’t view porn sites. But, your topic is fabulously interesting. &lt;br /&gt;
&lt;br /&gt;
Good luck with your research and I can’t wait to see your results.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hi [[User:Margorm|Margorm]]! I love your topic. Your prospectus, combined with our brief discussions in class have really made me wonder- if 23andme is part of the first iteration of DNA decoding tools for personal use, where will we be in 25 years (: Just my general thoughts on this great topic- my comments specifically regarding your prospectus are below:&lt;br /&gt;
::*I really like that you asked whether the FDA is the best agency to regulate DNA testing, especially your last sentence &#039;&#039;what regulatory bodies outside of the FDA should be paying attention to this personalized and identifiable database?&#039;&#039;. Throughout this class, I&#039;ve had similar types of questions many times.&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, however it seems that the data you will collect (assessing changes in attitudes of community members) will be more apt to answer your 2nd question (&#039;&#039;How has the ban on delivering health-related risk assessments to the 23andMe community impacted the consumer’s trust toward the product?&#039;&#039;), rather than the underlined question that I referred to in my previous bullet.&lt;br /&gt;
:Please note that I am most interested in your underlined question regarding the FDA! However my advice is that your second question regarding attitudes &amp;amp; trust may be easier to study with respect to your methodology.&lt;br /&gt;
:[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST) - updated 03 March 2014 ~11pm&lt;br /&gt;
&lt;br /&gt;
:It seems clear that although institutional positions and statements are mostly contrary to the patentability of human genes as such, however international patent offices (U.S., Europe, and Japan) have accepted the patenting of human DNA sequences if they meet the technical and legal requirements, including the “utility”. DNA occurs naturally in the human body and should not be patented by a single company that can then use its patents to limit scientific research and the free exchange of ideas. As said by Koepsell “Laws of patent are meant to be used to protect inventions — things that engineers are doing — not things that scientist discover” (Holman, 2007). A regulatory block of decoding tools for personal use would seem to be an exercise in economic control. I believe you&#039;ll find an ample supply of public opinion in regards to attitudes of community members.  [[User:VACYBER|VACYBER]] 10:28, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
::Castille, I think you have a really excellent topic here. My first thought is that it would probably be helpful to choose a particular self-harming behavior that&#039;s discussed on Tumblr to help narrow the scope of your work. Additionally, while these issues can and often are related, I imagine that the Tumblr communities that surround each issue probably have a distinct culture. This topic makes me think of the Jessica McKenzie piece, &amp;quot;Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag&amp;quot; we read in week four. I would be curious to know how many of the controversial hashtags are actually used in subversive ways. Some of the reactions to Tumblr&#039;s policy change seem to touch on this when users write that they use these tags to address their own struggle with self-harming behavior. After these policy changes got some press, did it shed enough light on these self-harm blogs to inspire users to use these potentially triggering hashtags in new and positive ways?&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 13:56, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thanks for your feedback! I&#039;m planning to narrow the scope to primarily center on pro-suicide blog postings, but I think I&#039;ll have to use some other examples such as cutting and possibly even pro-eating disorder blogs, as they all seem to interact with each other. It appears from my research thus far that the communities are intrinsically linked much more so than I expected. I agree, it would be interesting to see if things have changed-- though I&#039;m not quite sure how to gauge pre-policy versus post-policy changes. If you have any ideas, I&#039;d love to hear them! [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Castille, fantastic topic! I like your approach to analysing this topic and its a subject which is very controversial &amp;amp; personal. I agree, the main challenge for any Government is to try and regulate the numerous blogs and hashtags on sites like Tumblr, effectively putting a suicide watch on them. Would this be an effective use of tax payer funds and how many suicides could this prevent? What would be the process be if a potential suicide victim was identified? We have to be careful not to act in a knee-jerk reaction when there is a death and expect the Government to do something about it. I think there needs to be a balance of responsibility between these site operators and the Government. I&#039;m very interested in the outcome of your topic. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Watson!&lt;br /&gt;
&lt;br /&gt;
A few questions:&lt;br /&gt;
&lt;br /&gt;
How would you determine which distribution channel the Syrian opposition used the most?&lt;br /&gt;
&lt;br /&gt;
How would you be able to detect the limitations of public information if it has not been disclosed?&lt;br /&gt;
&lt;br /&gt;
If you were to select two media channels to compare/contrast,  would there be enough data available in those two communities to properly “diagnose”, or is the data withheld from the public?&lt;br /&gt;
&lt;br /&gt;
If you chart a paper on what capacitated the Syrian opposition groups to communicate their cause, will this information lead to a report or a true communal study on the Internet? &lt;br /&gt;
&lt;br /&gt;
Very interesting proposal and I wish you the best in your research!&lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:This is a very interesting topic. There is a lot to examine here, especially since a large part of the attacks and arguments happened online. An interesting topic would be to mention the Syrian Electronic Army and the many acts of online vandalism that they did. You can find more info here: https://en.wikipedia.org/wiki/Syrian_Electronic_Army The Internet was certainly a tool in the conflict. An interesting focus would be to investigate their motives and the impact this electronic army had on the Syrian conflict. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 21:01, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LRS_IS_prospectus.docx&lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Laura – Instagram is not only the biggest mobile photo sharing app, but is also now owned by Facebook, and thus a disproportionate amount of mobile peer to peer communication falls to the censorship whims of this company. This is an incredibly worthy area to research, if not lofty. Since Instagram now allows direct, private communication of photos, you have to wonder if there is a difference in how moderated these communications are versus a post intended for the public that uses hashtags (let us not forget that the hashtag’s original use was searchability, not irony). That said it might be very difficult monitor the differences in speed and effectiveness of what gets censored without interfering with the community you’re observing. One way may be to follow news events (such as this recent one: http://abclocal.go.com/wtvd/story?section=news/local&amp;amp;id=9448993) that show Instagram’s policy enforcement in action. The issue with that approach is that it is cherry picking the successful takedowns rather than observing uncensored posts that are breaking the terms of service.  Another option may be monitoring Instagram’s list of banned hashtags and searching synonyms or alternate hashtags, but again this is a difficult aspect of their policy to observe in action. &lt;br /&gt;
::I believe there is still strategizing to be done to design your observation of the community, above merely reporting their policy. I hope my take somehow helps you with this endeavor! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 09:55, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi, Laura! I think Instagram is a really great topic and will provide a massive amount of material, which I think can be beneficial and detrimental. It seems you might want to consider focusing on a specific aspect of censorship on Instagram, like nudity, drug references, or profanity (if any of those are prohibited-- I don&#039;t know their specific terms of use). What aspect of Instagram&#039;s censorship do you find to have the highest potential to become problematic? Is their choice as a company to disallow certain messages/images actually infringing on free speech, when they don&#039;t have any power over whether an individual chooses to express himself (IE he/she is still capable of posting the material on another site), they merely control/monitor the postings on their own site? [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
:Hi Jon- My first thoughts on your prospectus have to do with scope. In comparing these three different games, I think there might be too many factors to consider-- subscription-based vs. free, PC vs. iOS, etc. I wonder if it wouldn&#039;t be more manageable to tackle your research questions if you focused in on two games that were more similar so that you have fewer variables to contend with when you&#039;re thinking about your research questions. My instinct is that working with WoW and League of Legends would work since you can still attempt to tackle each of Lessig&#039;s four forces. I&#039;m not sure how much the law in the US varies from that in Finland, but removing Clash of Clans from the equation might help the narrow your scope in that sense as well. [[User:Jkelly|Jkelly]] 14:27, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Jane – It is a great idea to compare feminist discussion within the confines of a feminist-oriented website to discussion in a public space without this slant. The regulations on discussion are obviously going to be wildly different in each of these communities. You identify Facebook and Twitter as less thoughtful in their discussion for feminist topics - perhaps as a result of their differences in comment policy? I was interested in the comment policy of Bitch Media that you mentioned in the prospectus, so I looked it up. (For others: it can be found here: http://bitchmagazine.org/comments-policy) One line that stood out to me was the following: “As far as moderation of this space goes, guest bloggers moderate the comments on their respective posts, but website moderators will step in when necessary.” – Does this mean that each blog post is technically regulated in a different way? It is not a deal killer if so, because it sparked the following idea: Because FB and Twitter are big places, could you find a smaller community (that is not inherently feminist-oriented) that is discussing the same thing as mentioned in one or a few of the Bitch Media posts, and compare the discussions directly? Just a thought! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:54, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Does &#039;&#039;anyone else&#039;&#039; see the awesome irony of a woman named Jane writing about Bitch magazine? Am I the only one on here who was a teenage girl in the &#039;90s? I remember clear as day, reading [http://bitchmagazine.org/article/ten-things-hate-about-jane Bitch&#039;s criticisms of Jane] back in 1998. BTW [[User:Jkelly|Jkelly]] I hope you understand that as a very longtime fan of Bitch magazine I am in no way criticizing your project, I actually think it&#039;s &#039;&#039;&#039;such&#039;&#039;&#039; a cool topic. You &amp;amp; I would probably have been awesome friends as teenagers. p.s. This doesn&#039;t count as a comment on the prospectus!!! I hope. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:44, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Haha, thanks so much for sharing that Erin!! I haven&#039;t had a chance to read the whole thing, but when you see words and phrases like &amp;quot;fake, sanctimonious,&amp;quot; &amp;quot;self-obsessed,&amp;quot; &amp;quot;narcissism,&amp;quot; &amp;quot;blithe unconcern with which they suggest spending huge amounts of money on items of debatable utility,&amp;quot; and &amp;quot;overweening focus on the superficial, ersatz do-it-for-you tone, and fake individualism&amp;quot; in just a quick scan of the article, it&#039;s bound to be a fun read. Thanks! [[User:Jkelly|Jkelly]] 08:53, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
:: Erin - I think the comparison of two subreddits with different regulations is a solid method of studying the effect of regulation on political discussion. I also believe the two subreddits you have chosen make for a great comparison. The only reservation I have in your prospectus is the focus on word count of the regulations as indicative of the rigor of the moderation. For example, one subreddit may simply say &amp;quot;Discussion of Russia is forbidden&amp;quot; - which in five words hampers more conversation than either of the two sets of regulations do in actuality. I do not think the word count is a meaningful statistic. Apropos your question of whether those without internet access will be under-represented in our studies, I would say that because we are focusing on specific small communities to begin with, we are under-representing the reactions (to control) of everyone in the world who is not in that community. The vast majority of the world is not included. Our focus is on only those within the community itself that we can observe. Ultimately I believe your project is designed very well. Since I too am studying a subreddit for my project, I will be following your progress closely!&lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:23, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Hi [[User:MikeJohnson|MikeJohnson]]! Thank you very much for the feedback, very good point about the empirical data on the rules, hopefully I can expand when I have 2500 words to work with. BTW, I just wanted to comment- the question about people without Internet access was actually [[User:Ichua|Ichua]]&#039;s question. My understanding of the assignment is to study &#039;&#039;only&#039;&#039; online communities for this assignment (and not offline humans, which excludes anyone who doesn&#039;t or can&#039;t access the Internets). My question that [[User:Ichua|Ichua]] commented on is whether &#039;&#039;&amp;quot;users are intimidated by the effort or research required to post, thus limiting participation to a narrow audience&amp;quot;&#039;&#039;. Sidenote- &#039;&#039;&#039;Thank you&#039;&#039;&#039; very much for introducing us to the Twitch Plays Pokémon phenomenon in class. So freaking cool. My God do I ever love the Internet.-[[User:Deluxegourmet|Erin Saucke-Lacelle]]&lt;br /&gt;
&lt;br /&gt;
:::: Thanks Erin! I think it is absolutely amazing as well, and I&#039;ve never played Pokémon. If you would like to read my prospectus and help me think about potential research questions using their subreddit, I am all ears. [[User:MikeJohnson|MikeJohnson]] 11:34, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Ian, great topic and I like the innovative approach you&#039;re taking. I agree that social media is an important medium for Governments to gauge public mood or opinion. In fact, Australia&#039;s Prime Minister, Tony Abbott recently spent $4 million to analyse social media and gauge the public mood on certain policies he introduced. From my understanding, you&#039;re looking to build something like a mind map to organise the social media feedback and also meta tag it? This would effectively allow content to be searched and categorised similar to a knowledge base. Just a couple of questions though....How will you apply the cognitive map? Do you have a specific social media medium and Government in mind? Looking forward to reading the final outcome! [[User:Marissa1989|Marissa1989]] 07:42, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I was unaware of this community exits, and I think it will be a great place for graduate students and researchers to find which papers they should be reading. For example, if I need to utilize a method that is slightly outside of my field, this community will help identify the appropriate and esteemed papers. This may also serve as a better model for Peer Review (one day). Because PubMed is already an exclusive database primarily for biomedical researchers, I am interested to what you observe. I am worried that because only pubmed users (or people using a University IP address) have access to pubmed articles, open access will play a minimal role in which articles spark more conversation. Unfortunately, people tend to converse about papers in high-impact journals like Nature and Science, and I would expect these articles to compete with the open access ones. Perhaps an observation of which articles receive complaints about not being open-access for the curious science lover who is no longer in academia may be an interesting perspective.. ([[User:Margorm|Margorm]] 13:45, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
:::Hi Paul! Thank you for introducing me to PubMed Commons! I have to agree with [[User:Margorm|Margorm]]: people who are &#039;allowed&#039; to comment on PubMed articles often have access to most articles through their Universities or Institutions. That being said, since first reading your prospectus, I&#039;ve thought so much about the access to PubMed Commons. In order to be part of the community, the major factor is that you are an author of a paper appearing in PubMed. An author can &#039;invite themselves&#039; only if PubMed has your email address on file. For personal/professional interest of being a member of this site, I&#039;ve checked with 8 different people (who are all corresponding authors on separate PubMed articles) whether they could invite themselves, and only 1 of the 8 authors could gain access. I understand why it is important for PubMed to confirm identity, however I believe this factor will strongly limit the adoption of PubMed Commons. It should also be noted that I am not an average PubMed author- most scientists I talked to about this think &#039;social media is stupid&#039; or a waste of time. Very few will go through the trouble of asking 8 separate authors to try to log in, until they find one person who can. However, exactly as Margo pointed out, &amp;quot;This may also serve as a better model for Peer Review (one day)&amp;quot;.&lt;br /&gt;
:::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I can see where this topic would make an interesting focal point for a review article or commentary on the exploitation opportunities, (legal and criminal) that open source software packages like these permit. As an administrator of several IT systems myself, reading your prospectus has made me curious to learn more about NESSUS and Metasploit, and perhaps use them to test out weaknesses in my own servers.&lt;br /&gt;
&lt;br /&gt;
::Let&#039;s continue along that thought...and say I will download and experiment with this software... I&#039;m using this scenario &amp;quot;hypothetically&amp;quot; in hopes that it may help you focus more on the key question(s) you are hoping to answer, and to also consider &amp;quot;from where&amp;quot; you will be able to make some observations to address that question. In other words, where might you be able to follow some online community activity over the next few weeks, and observe some interactions between the users, developers, and IT administrators who work with these software packages?&lt;br /&gt;
&lt;br /&gt;
::So, after just now learning of these open source packages, I want to download them on my Linux box and experiment. I want to see how others have installed, implemented, and customized the software to exploit a variety of possibilities. Is there an open community where I can lurk and maybe participate in a discussion to learn about various ways I can use this software to test out my servers for vulnerabilities and bugs? What kind of controls might I be subjected to within that community that may prevent me from discussing specifics about what known vulnerabilities have been discovered, and what security holes one can exploit? If I discover a major security flaw, can (or should) I document this within that online community? Are there normative, legal, and/or architectural controls that prevent or discourage divulging too much information within his community? I noticed a discussion forum at http://discussions.nessus.org/welcome, and https://community.rapid7.com/community/metasploit... would these be the communities you were considering?&lt;br /&gt;
&lt;br /&gt;
::Anyway, hoping this helps out. I just wanted to raise these questions as a way to help you identify the specific online community where some observable activity will occur, and focus in on what controls you hope to be able to see playing-out during the rest of the semester. You may already have that in mind, but it wasn&#039;t in the prospectus, so I thought I&#039;d raise the questions here. I think knowing the answer to these questions will help put the ideas into the context of the Final Project&#039;s objectives and should also help with the next task of building the outline in Assignment 3. [[User:Psl|Psl]] 14:25, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Somehow the uploaded RTF file had been converted to a CALC spreadsheet file, making some of the contents hard to read. [[User:Ichua|Ichua]] 15:08, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:: Hi Twood. I find your paper topic to be incredibly interesting and well-thought out. I wish I had constructive criticism to give you, but I find that you are on the right path. My only question at the moment: how do you plan on measuring the response of community members to the each sites&#039; control mechanisms? [[User:Lrsanchez|Lrsanchez]] 11:41, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Twood, I find this to be a very cool topic and being a musician myself, makes it even more so. I have never ever been a fan of sampling music outright and then adding a new beat and some remixing to make it one&#039;s own, just not my style. I like the prospect of you examining a smaller or less commercialized community musically (as compared to You tube). Again, as own who owns small studio at home and records pretty solidly, it is always great to see musicians recording and producing their own stuff from scratch with small home studio setups. I hope you show an example of a community catching someone in the act of stealing another&#039;s music or idea and what the outcome of that interaction will be - because as musicians we always borrow, modify or improves someone else&#039;s cord progression or guitar lick to make it our own. So, it would be great to see if you could hint about that distinction - as I am sure it comes up a lot in communities like this. But, overall really nice topic to concentrate on.[[User:Dancoron|Dancoron]] 19:42, 2 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Cheikh, I&#039;m looking forward to reading your paper. Online technology journalism is indeed a most interesting industry... after all, a tech journalist with sufficient influence can single-handedly kill an up and coming technology project with billions in R&amp;amp;D costs, and this is particularly worrying given how easy it is for a competing company with a sufficient budget to influence said journalists, as well as how often these journalists write reviews having used the product in questions for mere minutes, or without necessary expertise in the are where such product can be useful. That said, my suggestion to you is to narrow your topic to one single research question. At the moment, you paper risks going astray as you intend to cover a wide array of very different concerns. --[[User:Seifip|Seifip]] 12:06, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Emmanuelsurillo&lt;br /&gt;
*Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:You raise some great research questions to examine within these communities. You might want to narrow your focus more. Will you be talking about the legalities of “jail-breaking” and it’s effect on the Apple and Android market? Considering the topics we discussed in class, it might be interesting to develop your research to mention the view of major companies toward these forums and the rogue developers. Once an iphone is jail-broken, it losses its apple warranty coverage. This might be a topic you want to bring up with your research. Good luck! [[User:Lpereira|Lpereira]] 21:36, 3 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Emmanuel,&lt;br /&gt;
&lt;br /&gt;
You have selected a really “hot” topic. Mobile applications appear to be taking over actual web development these days. I’m in the process of creating a new site, for the general public, to locate assistance after they have been harmed by other entities. The developer of my site highly recommended that I create a mobile app at the same time.  He is correct and the only reason I do not plan to follow his suggestion is directly related to cost.&lt;br /&gt;
&lt;br /&gt;
I’m unclear of the real statistics, but Internet users seem to be using phones as their selected source of information more frequently than computers. Most people carry their phones (even to bed) but fewer seem to be in constant travel with their laptop.  &lt;br /&gt;
&lt;br /&gt;
I am not familiar with the sites you listed in your proposal since I am not a mobile application developer, but I am happy to learn there are forums to enhance applications through large communities. &lt;br /&gt;
&lt;br /&gt;
It appears many of our classmates are attempting to use a compare/contrast approach, which seems logical, if we want to identify how resourceful one community is versus another. Your research will be extremely useful to many, and I would like to pass your results onto my developer after you have completed all the hard work (smile). &lt;br /&gt;
&lt;br /&gt;
A few questions for you: &lt;br /&gt;
  &lt;br /&gt;
“I want to compare how useful and productive these web sites are to the users end for accomplishing these goals.”&lt;br /&gt;
&lt;br /&gt;
1.	How do you plan to compare and contrast the central 7-9 questions outlined in your proposal for the final project? In other words, will you be able to summarize the data from each research question in one succinct paragraph to meet the page requirements?&lt;br /&gt;
2.	Do you think it would be easier to select 2-3 questions presented in your proposal to dig a little deeper or perhaps ask a few others from the class to join you on a team to cover all the questions presented?&lt;br /&gt;
&lt;br /&gt;
I ask these questions, because I am struggling with these issues myself.  I believe if I ask enough people in our community who are using a similar approach, I will (eventually) determine a model that may be useful for my own research. &lt;br /&gt;
&lt;br /&gt;
Another suggestion: Could we potentially find a group of people in our research community (class) that are interested in using a similar approach, but still collectively analyze the communities we selected for personal purposes? In other words, I am certain most students have selected the entities of study for some reason, such as personal satisfaction or business achievement.  However, Andy has made it clear that he would entertain teams multiple times. In fact, the option has been posted on every page of our instructions for the main project.  In fact, the option has been posted so many times that I am beginning to think he may be giving us a subtle hint or clue: “This assignment will be more effective if you work collectively together and you may gain more valuable research by teaming”. I don’t read minds, but… &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
I am attempting to look at the effectiveness of two sites created to allegedly help people who have been taken advantage of by either an entity or a person. Section 203 under the Communication Decency Act assists people in their ability to say whatever they think, regardless if correct.&lt;br /&gt;
&lt;br /&gt;
You are comparing two mobile application sites to analyze how useful and productive the sites are for the users to include accuracy and validity.&lt;br /&gt;
&lt;br /&gt;
Marissa is researching the validity of airbnb.com, and looking at the controls put in place by the website to protect people.&lt;br /&gt;
&lt;br /&gt;
I still have many proposals to read today, but it does appear that many of us are running in a few general hypothetical areas of question:   &lt;br /&gt;
&lt;br /&gt;
Which site is more effective due to the controls implemented by the site itself? (Compare/Contrast)&lt;br /&gt;
&lt;br /&gt;
Can the data on these sites be considered valid? Is so, why or why not?&lt;br /&gt;
&lt;br /&gt;
Could we potentially work together on a research methodology for all three sites to compare and contrast if the model is effective in and of itself while measuring the data across the board for multiple communications? In summary, we could compare and contrast the model that we collectively created against the sites we personally selected.&lt;br /&gt;
&lt;br /&gt;
My biggest concern with many of our proposals is that they are too broad and we will not find the depth.  Most of our topics could be potential dissertations; unfortunately we are lacking 5 years of research time (smile).  I plan to look for commonality in proposals submitted-perhaps we can all make this better together. Could we potentially try to use our class community to research the depth of the Internet communities.?&lt;br /&gt;
&lt;br /&gt;
Just thoughts. &lt;br /&gt;
&lt;br /&gt;
Cheers!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 17:07, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Emmanuel,&lt;br /&gt;
&lt;br /&gt;
Great topic!!&lt;br /&gt;
I am not sure if you would like to go into that direction, but from my point of view, I would say there is a big difference in the active level between iphone users via Android users in forum.&lt;br /&gt;
Iphone users are usually not as active as Android users in forum. And I think this is a really interesting topic to look into.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I think it would be a good idea to narrow down your topic as there are 9 research questions that you are planning to coverin your paper. It would be difficult to talk about each question in depth with the words limit.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:42, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
::Hi [[User:Seifip|Seifip]]! Few bits of feedback for you. First of all, I like that you tied back to Lessig&#039;s regulators. Very strong prospectus overall. Second, I wonder how you define an &#039;&#039;effective way of shaping an online community&#039;&#039; ? I assume that you didn&#039;t define &#039;effective&#039; because of the 400-word limit for this assignment. My advice would be for you to perhaps draw specific comparisons between StackOverflow and another online developer support community. Alternatively (and perhaps more fun), you might change the phrasing of your research question to something like &#039;In what ways does X architectural element affect conversation on StackOverflow?&#039;. Overall though, I think this is a very strong topic for your final project, because developer communities are some of the most in-depth technical discussions on the web. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::: Thanks for your feedback, Erin! I&#039;ll consider narrowing down the research question to a single element. --[[User:Seifip|Seifip]] 10:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Art.Mescon&lt;br /&gt;
*Title: Do Etsy’s regulations aim to help buyers and/or sellers or are they primarily protective of the company itself, leaving third parties on their own to seek out reputable transaction partners? &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Art.Mescon_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
::You raise some great ideas in your prospectus that would make for an interesting research paper around Etsy. However, I wonder if it might be best to focus more on the controls for which you can already observe playing out within the Etsy community&#039;s online activities? In other words, the community norms and architecture controls within Etsy itself (user-&amp;quot;self-regulation&amp;quot; and Etsy&#039;s-&amp;quot;private-regulation&amp;quot;) might be the most reliable &amp;quot;observable data&amp;quot; that you will be able to anticipate over the next few weeks. The government level controls (public-regulation) you suggest may require moving outside this community, and I am not sure that a useful discussion (with observational data) will be possible within the page limit, nor would it be crucial to answering your research question.&lt;br /&gt;
&lt;br /&gt;
::I like the research question very much, and I think it couches the challenges you hope to observe within the methodology you propose. Also, I anticipate that the community interactions over the next couple of months should provide you with enough observational data to answer your question. One more tip on the question... What would you think about starting the question with &amp;quot;How&amp;quot; rather than &amp;quot;Do&amp;quot;...? Play around with the phrase of your question, and see how it feels. My thinking is that you will allow yourself some flexibility in what you will truly have to report on when it comes time to write up the results. The answer to a &amp;quot;Do&amp;quot; question requires one to choose a yes or no and your findings will likely challenge any &amp;quot;absolute&amp;quot; judgment call... So don&#039;t let yourself get cornered into having to make that choice (at least not at this early stage). By starting the question with &amp;quot;How do Etsy’s regulations...&amp;quot;, will allow you to have more flexibility to report on what the observations will show, and your can balance your discussion section on some good and not-so-good controls that play out over the next few weeks.&lt;br /&gt;
&lt;br /&gt;
::Last point. In your sentence &amp;quot;I intend to identify how Etsy controls, or fails to control content in a manner that is advantageous to their users.&amp;quot;, I wasn&#039;t sure if by &amp;quot;users&amp;quot; you meant the buyers, sellers, or both. My mind is interpreting that &amp;quot;user&amp;quot; is the buyer in this sentence’s context, and the word &amp;quot;content&amp;quot; is used to define both the items and community sellers that are being controlled. True? That distinction may be important to clarify as the full report gets written, because the Etsy controls and observations being gathered will (I suspect) impact buyers vs sellers vs content each a little differently.  On a similar note... To cut down on the need to follow every buyer, seller and thing in &amp;quot;Top Searches&amp;quot; for this community, do you think it would be helpful to focus on just one type of craft? I don&#039;t know enough about Etsy specifically to determine if that would work for this project, but it might be another way to find a sub-group/sub-community limit, and still provide you with enough observational data to draw some conclusions.&lt;br /&gt;
&lt;br /&gt;
::Hoping these comments are helpful! [[User:Psl|Psl]] 12:22, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Title: YouTube Comment Filtering and Other Cyberbullying Initiatives&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/File:Lpereira_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 16:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Might be interesting to determine whether and how Youtube encourages positive comments and discourage negative or hate comments.  Ultimately, it would be ideal if the character of misbehaving individuals could be improved.  Some ideas might be the use of &amp;quot;Like&amp;quot; and &amp;quot;Dislike&amp;quot; votes on these comments and/or the award/deduction of &amp;quot;attitude points&amp;quot;.  The individuals posting hate and aggressive comments could be prohibited from further postings if the attitude point reaches a certain limit. [[User:Ichua|Ichua]] 15:02, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like the focal point you will be observing, and you are quite right in pointing out that this &amp;quot;negativity&amp;quot; is becoming an unfortunate reality for many &amp;quot;open comment&amp;quot; sections within these online spaces. Even what can begin as constructive dialog and healthy debate, can quickly degenerate into blather, flames, and hate words when anonymity can be so effectively used as a shield. Interestingly, we can&#039;t always point our finger at just one &amp;quot;troll&amp;quot; injecting some deliberate provocation...because sometimes the breakdown occurs with the 3 or 4 community members who (hither to) we&#039;re exchanging words in a perfectly eloquent &amp;amp; respectful manner. But the hate, racism, and bullying that poison the dialog on these comment-boards are on a much more disturbing level, and one that certainly will make for an interesting study.&lt;br /&gt;
&lt;br /&gt;
::So, The broad question that I am hearing in your prospectus is &amp;quot;What are the most important controls that an online service provider can successfully implement to intercept and discourage cyberbullying, hate-speech, and irrelevant negativity? The sub-question then would be &amp;quot;How effective and/or constraining are those controls on the community&#039;s ability to engage with each other in a meaningful unbiased dialog about the content? (YouTube in this example)? &lt;br /&gt;
&lt;br /&gt;
::Have you given some thought to the subject matter that you will focus on, as a way to observe how these comments progress? It may be helpful to put your lens onto a consistent subject to observe the cycle of communication. From there you should be able to witness what prompts the conversation to begin in the first place; when do counter-points get introduced, how long is constructive dialog able to bridge back and fourth, what is the &amp;quot;poison-pill&amp;quot; that kills the conversation, and when do the controls kick-in?.  (Observing where the controls kick in would obviously be the essential part to report on, not so much each of those elements of the cycle of communication I itemized there.) &lt;br /&gt;
&lt;br /&gt;
::I’d be curious to also know if the observation shows that the cycle of communication is more (or less) positive throughout based on the type of subject that initiates the conversation? News stories on &amp;quot;hot button&amp;quot; topics or baseball contrasted with (say) a page dealing with baking fudge probably have different trajectories of &amp;quot;success&amp;quot; in remaining positive. (I am thinking about the inherent behavior of the potential community members themselves… one lends itself to polarized opinions with predictable “zealots” appearing in either camp, while the other community may be more welcoming of differing opinions and tastes).  SO for example, thinking of an individual wearing that New York Yankees hat in Fenway Park on game day....vs... a group of bakers talking about chocolate vs. peanut butter fudge recipes…The former is likely to risk some taunting, a black eye, a broken tooth, and perhaps a small riot... while those in the latter group, might, at worst, receive only a cavity.  Anyway, my point is that it might be interesting compare a couple of focused topics of conversation as a way of discovering a smaller sub-community that builds around a YouTube comment-board (With one engaging in  a &amp;quot;Hot button&amp;quot; topic.... While the other group is discussing something seemingly non-polarizing.)[[User:Psl|Psl]] 12:00, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Ben Harmatz&lt;br /&gt;
*Government Entities: Internet Surveillance and Censorship&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_NSA_1_draft_copy.doc&lt;br /&gt;
[[User:Benh|Benh]] 16:49, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Ben. While I think your prospectus brings up the interesting and very pertinent topic of government control, surveillance, and censorship, I think that it is simply far too broad of a topic. For the assignment, we are supposed to monitor the activities of users on a particular site or group of sites, but looking at the internet as a whole is far too much for an 8-10 page paper! Perhaps consider government control, surveillance, and censorship while observing a particular website that has been named as a victim (by the media) of NSA&#039;s surveillance and dig deeper there. [[User:Lrsanchez|Lrsanchez]] 13:02, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Patricia Byrnes&lt;br /&gt;
*Title: Are moderators effective for policing and protecting a site from illegal use?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Patricia_Byrnes_Assig._Two.doc&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 16:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Patricia, First off, love your idea, moderating internet speech, as well as your methodology: if what you want to measure is moderating behavior, norms, and free speech concerns, the “Politics &amp;amp; Leaders” forum is a fantastic place to do so since It appears that discussions there can turn from heated to vituperative in the blink of an eye! With respect to your research question, by specifying “effective,” I assume that you will quantify instances of behavior that violate the established rules of the site. This method is good since you give yourself a verifiable and quantifiable measure. You can then use Lessig’s and other scholars work to explain these data. Now, you say that you wish to &amp;quot;research the rules and regulations of the site,” which looks like it might be an insurmountable task. I visited the site’s “Super Editor handbook” and I see that it is quite extensive. Perhaps you might want to focus specifically on one type of violation, such as &amp;quot;3.4.1 Discouraged Ranking Themes - Personal Experience / Personal Preference Rankings” ? [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: This is a very interesting topic, and a complement of sorts to mine. As Vance has mentioned, it might be a good idea to focus on a single type of infringement. Also, keep in mind that looking up formal charges for infringement may not lead to a very accurate data point given that many take down notices are delivered through more traditional, private systems such as email (as an owner of several websites, I&#039;ve received quite a few infringement notifications pertaining to content post by our users, all of them as a personal email, none through the official DMCA means or through our hosting provider). --[[User:Seifip|Seifip]] 12:23, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Vance.Puchalski&lt;br /&gt;
*Regulators and the Spread of (Mis)Information&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Puchalski-Assignment2.docx&lt;br /&gt;
[[User:Vance.puchalski|Vance.puchalski]] 17:17, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:As an extension student and a reader of both sites, I agree that extension student is often more accurate especially due to the required affiliation. You should consider when collecting your data that often information is not so black and white. A lot of people on these treads seek opinion, which is more of a personal thought rather than right or wrong. A lot on forums is opinion based, not fact based and so I think you should prepare for your data to be filled with a lot of gray areas, which you might already be expecting. The correlation between accuracy and monitoring is certainty an interesting topic. Anyway, great research topic and I’m interested to see your findings. Good luck! [[User:Lpereira|Lpereira]] 21:20, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A. Tom Anteus&lt;br /&gt;
*Cryptocurrency Uses in Conflict Zones Around the World&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Cryptocurrency_Uses_in_Conflict_Zones_Around_the_World.pdf&lt;br /&gt;
[[User:A. Tom Anteus|A. Tom Anteus]] 17:26, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Tom, intriguing topic! I&#039;m a keen follower of the Bitcoin revolution myself so have been naturally drawn to your prospectus and Daniel&#039;s as well. However I would say its quite difficult to follow your proposal. I&#039;m not quite sure how you intend to analyse and measure the use of cryptocurrency in conflict zones. Which conflict areas will you be targeting? Do you intend to follow forums or analyse chatter on various websites. If so, which ones?  [[User:Marissa1989|Marissa1989]] 07:36, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: One interesting avenue to explore might be how government control of internet in countries like China affect, and could affect the adoption and use of Bitcoin. I&#039;ve followed Bitcoin for a long time and one of my concerns has always been that Bitcoin is dependent on some infrastructure that is relatively vulnerable to government control and influence, and that if Bitcoin ever grew sufficiently to compete with official state currencies it might invite even more internet regulation. --[[User:Seifip|Seifip]] 12:14, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Julie Dubela&lt;br /&gt;
*Mapping Social Media Debate on the OHCHR Report on North Korea&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Julie_Assignment2.txt&lt;br /&gt;
[[User:Julie|Julie]] 18:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Julie, great prospectus. I find the whole North Korea situation appalling from a global response perspective. A lot of the articles, commentary and reactions from people around the world have been effectively muzzled. Your approach to analyse public reaction through social media is methodical and well thought through. Your plan to use specific tools to collect information from twitter hash tags, Google trends etc and follow up by analysing them to find common themes and trends is great. I look forward to reading the final report!  [[User:Marissa1989|Marissa1989]] 07:52, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Andrew Grant&lt;br /&gt;
*Quantified Self and Qualified Liability: Strava and Lessig&#039;s Four Forces&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Andrew_Grant_Assigmnment_Two_02252014.docx&lt;br /&gt;
[[User:AndrewGrant|Andrew Grant]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Andrew, your prospectus sounds fantastic. Lots of interesting questions being asked in light of Lessig&#039;s Four Forces and the Quantified Self movement. I think that you many be asking too many questions for an 8-10 page paper, if you are to go into sufficient depth for each one. Do you think that it&#039;s realistic to answer the five research questions in so short of a paper? Other than that, I think you are off to a great start and I am interested in hearing more about it. [[User:Lrsanchez|Lrsanchez]] 11:49, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In general, it might be helpful to state why your project is important and how the outcome of the research might help regulate/control or improve human behavior on the internet. [[User:Ichua|Ichua]] 19:58, 27 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1276</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1276"/>
		<updated>2014-03-04T17:14:53Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jolie Ho - Wan Lap Ho&lt;br /&gt;
*Instagram vs Flickr&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Jolie_Assignment_2.docx&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 16:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How do you propose to collect data to answer the last question? [[User:Ichua|Ichua]] 15:22, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey Jolie! You picked a really fascinating topic to cover! Just a few thoughts I hope will help. How do you plan on pinpointing how all the users behave differently, just because there are so many registered accounts you might be able to find people who behave nearly the same or certain individuals who have accounts on both Instagram and Flickr. Just as a mere suggestion maybe you can find a niche that is unique to each site and compare them? Maybe Instagram has thousands of pictures of food and seflis while Flickr has more professional content? I hope this will help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:15, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like your topic to dive into why Instagram has been so successful compared to Flicker. It may be interesting to compare the age groups of each users. Instagram seems more accessible because it is a phone app that is simple and immediate to use, whereas Flicker users upload a batch of vacation photos, etc. I like Emmanuel&#039;s suggestion to compare the content between users. Another suggestion which relates to the selfies/food photos may be to compare the users themselves. I think older people tend to use Flickr and therefore may not post as much. However, younger people (who no long user facebook) posting to instagram all the time would provide a way for facebook to get back that market. ([[User:Margorm|Margorm]] 14:31, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
::Hi Jolie: This is a very interesting topic, with many possible areas focus on! (Also, a nice mix between the tech and creative worlds.) You mentioned that Instagram and Flickr diverge where mobile apps are concerned. This looked particularly interesting, especially following the Flickr app&#039;s overhaul. Anecdotally, via Twitter, it looked as though the Flickr update was a major talking point in both the Instagram and Flickr user groups. My thought was that it may be interesting to look at whether this major app update had any bearing on either of the two communities, as it may have impacted some of your research questions. Best! [[User:Twood|Twood]] 09:33, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How would this differ from other imaginary items of trade like currency/commodity derivatives and futures and virtual commodities like pork bellies?   [[User:Ichua|Ichua]] 15:17, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Daniel,&lt;br /&gt;
What an interesting topic! I was not even aware that state governments recognized these currencies. Would you be able to come up with more material if you focus on one or two countries and their reaction to the online currency? Also Ichua gave great advice; maybe one country’s reaction and policies to multiple online currencies would help in the scope of observation. Your idea of creating a website to report and share your findings is really novel! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Very interesting topic Daniel. Ive been following the progress of Bitcoin as a personal interest. Apart from the regulatory challenges Bitcoin poses for Governments, its also vulnerable to cyber attacks which can erode trust in using the currency. Whilst the actual Bitcoin itself is heavily encrypted, the Bitcoin exchanges are vulnerable to hacking and cyber theft as evidenced recently by the successful attacks on Mt Gox, one of the world&#039;s largest Bitcoin exchanges. It would be interesting to observe the effect (if any) this would have on the regulatory view of the currency by Governments. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Marissa1989&lt;br /&gt;
*Prospectus title: The rise of the collaborative consumption movement: Analyzing effective control of communication, structures of gaining trust &amp;amp; verification, and legal issues.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:Assignment_2_Barkey-2.pdf&lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 23:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hi, Marissa! I used AirBnB to rent out my apartment last summer and it actually resulted in me being robbed by the person to the tune of $10,000-- not including the rent for the summer, which he didn&#039;t pay (I didn&#039;t get any of it back, either, despite the insurance). It was a nasty situation. Anyways, from what I understand, the majority of communication on AirBnB is done privately. Without staging anything or intervening, how do you plan to observe enough to answer your question(s)? I think this is basically the same concern with one of the other treatments I read, regarding Facebook. I do think the security of platforms like AirBnB is of great concern and would be a very interesting subject to study in depth![[User:Castille|Castille]] 21:16, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Marissa,&lt;br /&gt;
I loved the idea for your prospectus! Just as a suggestion, would you consider comparing a few corresponding sites like 9flats, Couchsurfing International, or Hospitality Club? You could analyze how they handle different verifiability and security issues while also comparing how the sites are constructed to better “vet” their users. This may yield insight on how trustworthy their users are to each other. You might even want to inquire if one has had “major” legal issues in the past. I hope this helps! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:32, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Greetings Marissa!&lt;br /&gt;
&lt;br /&gt;
Your topic is very interesting and it appears we have a few of the same elements in the companies we have selected to research: Verification and trust. From what I understand, you are addressing issues of users on auction/garage sale platforms surrounding the tiers of user verifiability. In other words, who is protecting one user from being taken advantage of by another user.&lt;br /&gt;
&lt;br /&gt;
The comment you posted on the wiki under my topic in regards to the effectiveness of how the sites that I have selected deal with inaccurate comments made about companies by the general public are dealt with is of great importance-the public can ruin a business for no other reason than spite. In other words, who protects the companies from users. &lt;br /&gt;
&lt;br /&gt;
The proposal you submitted intrigues me in many ways. By studying the community of airbnb.com, it appears you will be analyzing the controls implemented to make the site successful (verification, quality feedback, security, payment, userability and collaboration). &lt;br /&gt;
&lt;br /&gt;
In summary, it appears we are both working on protection issues, and if the verification process is significant enough to gain consumer trust. &lt;br /&gt;
&lt;br /&gt;
Would you mind if I ask how you plan to analyze the user? I would be interested in your methodology, and we may even find each other’s approach helpful to each other. We may even be able to compare and contrast the communities with a similar approach and work together if you would be interested. &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 15:18, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Melissaluke|Melissaluke]] 18:36, 25 February 2014 (EST)&lt;br /&gt;
*Change.org vrs Ripp Off Report&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_Research_Paper-Final.docx&lt;br /&gt;
&lt;br /&gt;
Dear Melissa, &lt;br /&gt;
What a great topic and area of coverage!!! I’m hoping my comments and questions will be of help to you! Which site succumbs more readily to outside pressure and take down requests? Also you mentioned that a susceptible compliant to both is that they are accused of not “vetting” their sources. You could possible test to see which one (if either of them do) checks them more thoroughly. This might be, and I know nothing about it, accomplished by putting posts of your own and noting if they require any amount of proof, citation, source, or quote of any kind. I really hope this helps you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:35, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thank you so much Emmanuel! Your ideas are superb and very helpful!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Melissa, these sites can be a boon for consumers in helping to identify unscrupulous businesses and thus avoiding them. The issue that I find with these sites, that&#039;s never been effectively dealt with, is how do they identify and remove potentially inaccurate comments attacking a business as a result of say, a personal vendetta by a disgruntled employee or a customer who was unreasonable. Many small and medium size businesses rely on word of mouth for new customers. If the site allows the comments to remain, it may affect the business.  This in effect may lead to possible blackmail of businesses by threatening to post inaccurate information on these sites. I&#039;m also very interested in the sample groups and postings that you choose. Great topic! [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marissa, Excellent insight and the problems posed are valid. Your questions are helping to me and assist in narrowing the topic-which is clearly too broad at the moment.&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Melissa, Just a quick note, because I loved your prospectus so much (it&#039;s such a creative take on the assignment, but still seems to hit on all the prof&#039;s requirements, really amazing job). With your &#039;&#039;&#039;Q1&#039;&#039;&#039;, &#039;&#039;Why would one site be more popular?&#039;&#039;- I can;t help but wonder, does the fact that it has such a simple, perfect 1-word URL have any effect? Also, due to the time (2007) &amp;amp; place (USA) I automatically assumed this website was somehow related to Obama&#039;s election campaign- though from quick Google search there doesn&#039;t seem to be any direct link. Anyways, just wanted to say, I really like your prospectus. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:49, 3 March 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hey Mike, it would absolutely be my pleasure to provide feedback to you. I won&#039;t go too far before having the time to focus &amp;amp; read it completely- so my first feedback to you is: if you didn&#039;t pick such an interesting topic, I would have actually read the full prospectus. However after reading your first paragraph, I ended up watching TPP and reading its subreddit and forgot to finish reading your prospectus! hahaha. But this weekend I&#039;ll spend time focusing and try to provide you feedback, hopefully as good as the feedback you gave me (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 10:34, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Mike! After reading [[User:Jkelly|Jkelly]]&#039;s comments below, I&#039;m kinda worried about posting my comments, cus I think I understood your questions from a different point of view. &lt;br /&gt;
::*First of all, my question- how do you approach your 2nd qualitative question? I&#039;m not completely sure I understand what you mean by vulnerability.&lt;br /&gt;
::*Second, my advice, feel free to take it or leave it: to keep within scope of this project (2500 word paper seems so short!), I believe it may be easier to tackle Qualitative questions #1 &amp;amp; 3, and your second quantitative question (&#039;&#039;Has it helped or hurt the game to impose such controls?&#039;&#039;). I get the impression that these questions would be the ones that would be easiest to answer from following the community discussion on the subreddit. That being said, if we were writing 8000 word papers, it would be so much fun for you to really dive into the architecture &amp;amp; UX of the game itself, while paralleling it with the subreddit(!!!). Really awesome topic &amp;amp; prospectus.&lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:After reading your prospectus, I have a few questions based on your questions, or maybe some questions that combine the ones you already have. It seems clear from what you write in your prospectus that the user experience is absolutely vulnerable to the controls imposed by the game, but I&#039;m curious to know in what ways. Were users bumping up against controls they didn&#039;t like before there were changes, or was it only after the controls of the creator were made clear (he made himself known in an explicit way, rather than operating quietly in the background) that users began to find fault? (Another way of thinking about this might be- were a lot of users thinking about the controls imposed by the game before the creator&#039;s changes forced them to think about it?) If I understand the current set up correctly, it seems that users still have the option to have commands parsed as they go instead of waiting for them to be tallied and then implemented. So, were the controls only seen as problematic once users considered that there was one person making a decision that affected every user? Is the lack of democratic decision-making behind the scenes a bigger problem for users than the actual changes in user experience?&lt;br /&gt;
&lt;br /&gt;
:As far as your quantitative question goes, I&#039;m wondering if there&#039;s any way for you to know how many users stopped playing the game after the creator made changes? Do you have a means of seeing the changes over time? [[User:Jkelly|Jkelly]] 14:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
Dear Michael, &lt;br /&gt;
I find your prospective very interesting! I thought to give you these few suggestions. I hope they will help! You might want to see what percentage of Flickr users are a part of the Creative Commons community and whether it consists of a majority or a minority. Another area of research might be into the other forms of control that Flickr uses to protect copyrighted material, and then to compare them with Creative Commons to see if they are as effective, prevalent, or well known. Also, when there are infringements in copyright policy, do people respond to correction or do they just ignore and continue violating the rules? Lastly, how does the Creative Commons community handle repeat violators (if there are any)? Wish you the best! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:43, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Lucia, This is looks to be very interesting - I was wondering if you can be more specific on what types of data the initiative is exploring. Are they looking for statistical data mainly, do you vote on what subjects you are going to put on the website or research? It looks like a great example of policy control via the government. I would to know more about the website and its overall goals - something that helps define its missions parameters, as I visited the website main page and got an idea of what they were saying - I am just needing some more clarity that&#039;s all. But again, the subject looks like a great idea and should be very interesting...[[User:Dancoron|Dancoron]] 18:48, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Lucía! &lt;br /&gt;
I think your choice of study fits perfectly with the theme of the course! Perhaps you can also investigate to see if they are stifling public opinion or whether they are flooding the docs with pro-government voices to influence the theme towards their agenda?  Also as a suggestion, can you see if it is truly open to everyone? Maybe you would like to find another similar program that the government has tried in the past (assuming that they have tried). Do the number of participants fluxuate? Is there a trend in what the government sees as inappropriate? Or is it just random edits that are corrected by the government? I hope these comments can help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:13, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I&#039;d really like to read and comment on your prospectus, but it seems like the file didn&#039;t upload. Happy to respond to it once it&#039;s up!&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 20:57, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I second Jkelly&#039;s comment. This look very intriguing and I&#039;d like to learn more about your plans for the project! [[User:Twood|Twood]] 23:14, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Third. --[[User:Seifip|Seifip]] 11:58, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hello, Dan! Admittedly, I had never heard of “Anandtech.com” prior to reading your prospectus, but I’m glad that you told me about it. I really like their “Cable TVification” assessment of the internet in recent years. After reading your prospectus it seems to me that you are focusing on Lessig’s norms as regulators within the site’s forums, as well as “laws&amp;quot; instituted by the website. It is an interesting subject, because as you say, this particular forum is very successful in fostering an environment where users are likely to return. That said, I see that you qualify users of the site as “good,” and I’m curious to know how you will operationalize this term for your project. You mention words like “courteous” and “helpful,” but I’m wondering: what characteristics do you think you will look for when observing, in order to qualify a “good user.” For comparison, do you have an example of what behavior that “bad” users might entail? Lastly, I see that there are literally millions of post on the forum; you may wish to focus on a specific topic and/or date range in order to have a more manageable data set to observe. I’m interested to see what you’re project will entail, especially being that I am also observing forums for my project. [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Vance, thanks for taking the time to look at my prospectus - Basically, what I meant to convey is that these are the characteristics of a &amp;quot;good&amp;quot; website, a website that demonstrates use and activity to by the administrators and its members/users. What I will be focusing in on is, how is the site&#039;s control policy administered and conveyed to its members, both historically and presently, through the links in my prospectus – and to answer your question about bad behavior in online forums, yes I will, as I think that is a critical component regarding context – And this also goes out too Marissa as well, what I really wanted to focus in on was how does bad behavior and is control policies in its forums, effect a webite economically - as I think ths would even go further towards Lessig&#039;s FOUR norms of regulation on where the dot lands - but for obvious reasons, that could end up being too big. However, I still might toss something like that in - My goal is to pick out a couple of instances of the control poliy being implemented and see what the results were based on specific incident/instance was there a ban and how long was it for - what was the reason, what was the community&#039;s response to that action and so forth... - Again, thanks for the input and suggestions.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Dan, forums have proven very useful mediums for learning and troubleshooting. What would be interesting is how forums deal with covert advertising I.e. Forum posters who may be businesses, subtly advertising their own goods or services under the guise of responding to threads without paying for advertising rights. Would paid advertisers pose potential conflicts of interest to the neutrality of forums? I&#039;d also be interested in seeing how you compare the Anandtech&#039;s forum controls against others. Would you choose similar types of forums with respect to content type? [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marrisa, I tried to include your response with Vance&#039;s up top :O) [[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Dan!&lt;br /&gt;
If you are mainly comparing Anandtech’s forum site policies, maybe you could also compare past versions of the rules? Also, you might want to see if Anandtech has any unique features in toxicity control that would make it standout from other less successful forums. Overall the concept is fantastic! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Emmanuel, thanks for the feedback - ya, I am going to try and put some type of onus on Anandtech as well, and see if some of their reactions to their policies could be considered a little over zealous or a bit too far reaching. Most times, their admins/moderators are pretty decent, but again, like everyone else, there are times when a few of their admins/moderators could be having a bad day and maybe be a little too heavy handed - we&#039;ll see, stay tuned to find out. just a little humor :o) Thanks again for the input.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:First of all, GREAT TITLE!!! Second of all, this seems like an extremely interesting subject and I&#039;d love to read more about it. I do wonder whether you&#039;ll be able to get access to the material you might be looking for by doing &amp;quot;undercover investigation&amp;quot; and the other research methods you listed. It seems to me that the kind of exchanges you&#039;re discussing would be difficult to observe on Facebook as they likely wouldn&#039;t be out in the open. I may be completely mistaken, but I was also under the impression that the assignment encouraged examining a more open forum or something of the like where observation was more feasible. I know that there are public matchmaking sites and I would assume there are also forums geared towards those who wish to have illicit affairs, so that might be an area into which you may want to delve. [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:I also love the topic and find the subject very interesting! I share Castille&#039;s concerns above. It seems challenging to get access to the materials you will need to answer these questions. I wonder if there is an open forum somewhere in the internet where angry divorcees can go to vent about how social media ruined their marriage? It may be a biased site, but it may provide resources to other statistics or materials that may help? Or if there is a community you could observe and monitor the degree of online flirting? ([[User:Margorm|Margorm]] 14:48, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wow very cool subject - and one I am sure that deserves a lot of attention these days. With that said, it seems that this subject matter could be a thesis or dissertation as the material collected probably seems to be endless. I was wondering what specific community are you going to target on facebook, as this looks to be potentially a very large paper? I have to admit that I am fascinated to see what other statistics this might uncover, as I am sure we all have heard stories of spouses leaving their significant other for someone they met online. Yet maybe, you can focus on something more specific then a facebook community - as there might be other communities or even forums that have support groups for such instances or circumstances that you mentioned earlier. Maybe seeing how they interact with each other and what rules or policies can be observed and commented on. Overall the topic is really great and I am sure it will have some very interesting content that is fascinating.[[User:Dancoron|Dancoron]] 19:13, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Very interesting subject matter Amy!&lt;br /&gt;
&lt;br /&gt;
You may have selected one of the most controversial and highly emotional subjects out of all proposals presented.  I would agree with Dancoron. The questions outlined could lead to a doctoral dissertation. Additionally, Castille does bring a good point to light, in that we are encouraged to avoid any work as an “alias”. &lt;br /&gt;
&lt;br /&gt;
I think many of us are having trouble (to include myself) narrowing the research down to a tolerable amount of data collection for an in depth analysis.&lt;br /&gt;
&lt;br /&gt;
In your proposal, you suggested comparing and contrasting divorce rates. What sources would you be comparing and contrasting? Are you speaking to different communities in the United States or on a larger level?  Or, are you addressing the male/female divorce ratio? &lt;br /&gt;
&lt;br /&gt;
Secondly, will you be cross-examining two nations who have access to Facebook, in efforts to compare and contrast divorce ratios in direct correlation to Facebook usage? &lt;br /&gt;
&lt;br /&gt;
If your research goals are to use Facebook as the platform for study concerning divorce, it may be difficult to get access to this information unless you are accepted into a person’s profile, group or community. In efforts to stay objective, I don’t think you would want to study anyone that you personally know.  Pornography could be a difficult study, in direct correlation to pornography with the controls Facebook allows for each individual user. &lt;br /&gt;
&lt;br /&gt;
Would it be possible for you to follow a smaller, more open group that readily blogs/views pornography that is open to the public for data collection in a short period of time? &lt;br /&gt;
&lt;br /&gt;
Unfortunately this is completely out of my arena. I have never been married and I don’t view porn sites. But, your topic is fabulously interesting. &lt;br /&gt;
&lt;br /&gt;
Good luck with your research and I can’t wait to see your results.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hi [[User:Margorm|Margorm]]! I love your topic. Your prospectus, combined with our brief discussions in class have really made me wonder- if 23andme is part of the first iteration of DNA decoding tools for personal use, where will we be in 25 years (: Just my general thoughts on this great topic- my comments specifically regarding your prospectus are below:&lt;br /&gt;
::*I really like that you asked whether the FDA is the best agency to regulate DNA testing, especially your last sentence &#039;&#039;what regulatory bodies outside of the FDA should be paying attention to this personalized and identifiable database?&#039;&#039;. Throughout this class, I&#039;ve had similar types of questions many times.&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, however it seems that the data you will collect (assessing changes in attitudes of community members) will be more apt to answer your 2nd question (&#039;&#039;How has the ban on delivering health-related risk assessments to the 23andMe community impacted the consumer’s trust toward the product?&#039;&#039;), rather than the underlined question that I referred to in my previous bullet.&lt;br /&gt;
:Please note that I am most interested in your underlined question regarding the FDA! However my advice is that your second question regarding attitudes &amp;amp; trust may be easier to study with respect to your methodology.&lt;br /&gt;
:[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST) - updated 03 March 2014 ~11pm&lt;br /&gt;
&lt;br /&gt;
:It seems clear that although institutional positions and statements are mostly contrary to the patentability of human genes as such, however international patent offices (U.S., Europe, and Japan) have accepted the patenting of human DNA sequences if they meet the technical and legal requirements, including the “utility”. DNA occurs naturally in the human body and should not be patented by a single company that can then use its patents to limit scientific research and the free exchange of ideas. As said by Koepsell “Laws of patent are meant to be used to protect inventions — things that engineers are doing — not things that scientist discover” (Holman, 2007). A regulatory block of decoding tools for personal use would seem to be an exercise in economic control. I believe you&#039;ll find an ample supply of public opinion in regards to attitudes of community members.  [[User:VACYBER|VACYBER]] 10:28, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
::Castille, I think you have a really excellent topic here. My first thought is that it would probably be helpful to choose a particular self-harming behavior that&#039;s discussed on Tumblr to help narrow the scope of your work. Additionally, while these issues can and often are related, I imagine that the Tumblr communities that surround each issue probably have a distinct culture. This topic makes me think of the Jessica McKenzie piece, &amp;quot;Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag&amp;quot; we read in week four. I would be curious to know how many of the controversial hashtags are actually used in subversive ways. Some of the reactions to Tumblr&#039;s policy change seem to touch on this when users write that they use these tags to address their own struggle with self-harming behavior. After these policy changes got some press, did it shed enough light on these self-harm blogs to inspire users to use these potentially triggering hashtags in new and positive ways?&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 13:56, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thanks for your feedback! I&#039;m planning to narrow the scope to primarily center on pro-suicide blog postings, but I think I&#039;ll have to use some other examples such as cutting and possibly even pro-eating disorder blogs, as they all seem to interact with each other. It appears from my research thus far that the communities are intrinsically linked much more so than I expected. I agree, it would be interesting to see if things have changed-- though I&#039;m not quite sure how to gauge pre-policy versus post-policy changes. If you have any ideas, I&#039;d love to hear them! [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Castille, fantastic topic! I like your approach to analysing this topic and its a subject which is very controversial &amp;amp; personal. I agree, the main challenge for any Government is to try and regulate the numerous blogs and hashtags on sites like Tumblr, effectively putting a suicide watch on them. Would this be an effective use of tax payer funds and how many suicides could this prevent? What would be the process be if a potential suicide victim was identified? We have to be careful not to act in a knee-jerk reaction when there is a death and expect the Government to do something about it. I think there needs to be a balance of responsibility between these site operators and the Government. I&#039;m very interested in the outcome of your topic. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Watson!&lt;br /&gt;
&lt;br /&gt;
A few questions:&lt;br /&gt;
&lt;br /&gt;
How would you determine which distribution channel the Syrian opposition used the most?&lt;br /&gt;
&lt;br /&gt;
How would you be able to detect the limitations of public information if it has not been disclosed?&lt;br /&gt;
&lt;br /&gt;
If you were to select two media channels to compare/contrast,  would there be enough data available in those two communities to properly “diagnose”, or is the data withheld from the public?&lt;br /&gt;
&lt;br /&gt;
If you chart a paper on what capacitated the Syrian opposition groups to communicate their cause, will this information lead to a report or a true communal study on the Internet? &lt;br /&gt;
&lt;br /&gt;
Very interesting proposal and I wish you the best in your research!&lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:This is a very interesting topic. There is a lot to examine here, especially since a large part of the attacks and arguments happened online. An interesting topic would be to mention the Syrian Electronic Army and the many acts of online vandalism that they did. You can find more info here: https://en.wikipedia.org/wiki/Syrian_Electronic_Army The Internet was certainly a tool in the conflict. An interesting focus would be to investigate their motives and the impact this electronic army had on the Syrian conflict. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 21:01, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LRS_IS_prospectus.docx&lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Laura – Instagram is not only the biggest mobile photo sharing app, but is also now owned by Facebook, and thus a disproportionate amount of mobile peer to peer communication falls to the censorship whims of this company. This is an incredibly worthy area to research, if not lofty. Since Instagram now allows direct, private communication of photos, you have to wonder if there is a difference in how moderated these communications are versus a post intended for the public that uses hashtags (let us not forget that the hashtag’s original use was searchability, not irony). That said it might be very difficult monitor the differences in speed and effectiveness of what gets censored without interfering with the community you’re observing. One way may be to follow news events (such as this recent one: http://abclocal.go.com/wtvd/story?section=news/local&amp;amp;id=9448993) that show Instagram’s policy enforcement in action. The issue with that approach is that it is cherry picking the successful takedowns rather than observing uncensored posts that are breaking the terms of service.  Another option may be monitoring Instagram’s list of banned hashtags and searching synonyms or alternate hashtags, but again this is a difficult aspect of their policy to observe in action. &lt;br /&gt;
::I believe there is still strategizing to be done to design your observation of the community, above merely reporting their policy. I hope my take somehow helps you with this endeavor! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 09:55, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi, Laura! I think Instagram is a really great topic and will provide a massive amount of material, which I think can be beneficial and detrimental. It seems you might want to consider focusing on a specific aspect of censorship on Instagram, like nudity, drug references, or profanity (if any of those are prohibited-- I don&#039;t know their specific terms of use). What aspect of Instagram&#039;s censorship do you find to have the highest potential to become problematic? Is their choice as a company to disallow certain messages/images actually infringing on free speech, when they don&#039;t have any power over whether an individual chooses to express himself (IE he/she is still capable of posting the material on another site), they merely control/monitor the postings on their own site? [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
:Hi Jon- My first thoughts on your prospectus have to do with scope. In comparing these three different games, I think there might be too many factors to consider-- subscription-based vs. free, PC vs. iOS, etc. I wonder if it wouldn&#039;t be more manageable to tackle your research questions if you focused in on two games that were more similar so that you have fewer variables to contend with when you&#039;re thinking about your research questions. My instinct is that working with WoW and League of Legends would work since you can still attempt to tackle each of Lessig&#039;s four forces. I&#039;m not sure how much the law in the US varies from that in Finland, but removing Clash of Clans from the equation might help the narrow your scope in that sense as well. [[User:Jkelly|Jkelly]] 14:27, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Jane – It is a great idea to compare feminist discussion within the confines of a feminist-oriented website to discussion in a public space without this slant. The regulations on discussion are obviously going to be wildly different in each of these communities. You identify Facebook and Twitter as less thoughtful in their discussion for feminist topics - perhaps as a result of their differences in comment policy? I was interested in the comment policy of Bitch Media that you mentioned in the prospectus, so I looked it up. (For others: it can be found here: http://bitchmagazine.org/comments-policy) One line that stood out to me was the following: “As far as moderation of this space goes, guest bloggers moderate the comments on their respective posts, but website moderators will step in when necessary.” – Does this mean that each blog post is technically regulated in a different way? It is not a deal killer if so, because it sparked the following idea: Because FB and Twitter are big places, could you find a smaller community (that is not inherently feminist-oriented) that is discussing the same thing as mentioned in one or a few of the Bitch Media posts, and compare the discussions directly? Just a thought! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:54, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Does &#039;&#039;anyone else&#039;&#039; see the awesome irony of a woman named Jane writing about Bitch magazine? Am I the only one on here who was a teenage girl in the &#039;90s? I remember clear as day, reading [http://bitchmagazine.org/article/ten-things-hate-about-jane Bitch&#039;s criticisms of Jane] back in 1998. BTW [[User:Jkelly|Jkelly]] I hope you understand that as a very longtime fan of Bitch magazine I am in no way criticizing your project, I actually think it&#039;s &#039;&#039;&#039;such&#039;&#039;&#039; a cool topic. You &amp;amp; I would probably have been awesome friends as teenagers. p.s. This doesn&#039;t count as a comment on the prospectus!!! I hope. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:44, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Haha, thanks so much for sharing that Erin!! I haven&#039;t had a chance to read the whole thing, but when you see words and phrases like &amp;quot;fake, sanctimonious,&amp;quot; &amp;quot;self-obsessed,&amp;quot; &amp;quot;narcissism,&amp;quot; &amp;quot;blithe unconcern with which they suggest spending huge amounts of money on items of debatable utility,&amp;quot; and &amp;quot;overweening focus on the superficial, ersatz do-it-for-you tone, and fake individualism&amp;quot; in just a quick scan of the article, it&#039;s bound to be a fun read. Thanks! [[User:Jkelly|Jkelly]] 08:53, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
:: Erin - I think the comparison of two subreddits with different regulations is a solid method of studying the effect of regulation on political discussion. I also believe the two subreddits you have chosen make for a great comparison. The only reservation I have in your prospectus is the focus on word count of the regulations as indicative of the rigor of the moderation. For example, one subreddit may simply say &amp;quot;Discussion of Russia is forbidden&amp;quot; - which in five words hampers more conversation than either of the two sets of regulations do in actuality. I do not think the word count is a meaningful statistic. Apropos your question of whether those without internet access will be under-represented in our studies, I would say that because we are focusing on specific small communities to begin with, we are under-representing the reactions (to control) of everyone in the world who is not in that community. The vast majority of the world is not included. Our focus is on only those within the community itself that we can observe. Ultimately I believe your project is designed very well. Since I too am studying a subreddit for my project, I will be following your progress closely!&lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:23, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Hi [[User:MikeJohnson|MikeJohnson]]! Thank you very much for the feedback, very good point about the empirical data on the rules, hopefully I can expand when I have 2500 words to work with. BTW, I just wanted to comment- the question about people without Internet access was actually [[User:Ichua|Ichua]]&#039;s question. My understanding of the assignment is to study &#039;&#039;only&#039;&#039; online communities for this assignment (and not offline humans, which excludes anyone who doesn&#039;t or can&#039;t access the Internets). My question that [[User:Ichua|Ichua]] commented on is whether &#039;&#039;&amp;quot;users are intimidated by the effort or research required to post, thus limiting participation to a narrow audience&amp;quot;&#039;&#039;. Sidenote- &#039;&#039;&#039;Thank you&#039;&#039;&#039; very much for introducing us to the Twitch Plays Pokémon phenomenon in class. So freaking cool. My God do I ever love the Internet.-[[User:Deluxegourmet|Erin Saucke-Lacelle]]&lt;br /&gt;
&lt;br /&gt;
:::: Thanks Erin! I think it is absolutely amazing as well, and I&#039;ve never played Pokémon. If you would like to read my prospectus and help me think about potential research questions using their subreddit, I am all ears. [[User:MikeJohnson|MikeJohnson]] 11:34, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Ian, great topic and I like the innovative approach you&#039;re taking. I agree that social media is an important medium for Governments to gauge public mood or opinion. In fact, Australia&#039;s Prime Minister, Tony Abbott recently spent $4 million to analyse social media and gauge the public mood on certain policies he introduced. From my understanding, you&#039;re looking to build something like a mind map to organise the social media feedback and also meta tag it? This would effectively allow content to be searched and categorised similar to a knowledge base. Just a couple of questions though....How will you apply the cognitive map? Do you have a specific social media medium and Government in mind? Looking forward to reading the final outcome! [[User:Marissa1989|Marissa1989]] 07:42, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I was unaware of this community exits, and I think it will be a great place for graduate students and researchers to find which papers they should be reading. For example, if I need to utilize a method that is slightly outside of my field, this community will help identify the appropriate and esteemed papers. This may also serve as a better model for Peer Review (one day). Because PubMed is already an exclusive database primarily for biomedical researchers, I am interested to what you observe. I am worried that because only pubmed users (or people using a University IP address) have access to pubmed articles, open access will play a minimal role in which articles spark more conversation. Unfortunately, people tend to converse about papers in high-impact journals like Nature and Science, and I would expect these articles to compete with the open access ones. Perhaps an observation of which articles receive complaints about not being open-access for the curious science lover who is no longer in academia may be an interesting perspective.. ([[User:Margorm|Margorm]] 13:45, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
:::Hi Paul! Thank you for introducing me to PubMed Commons! I have to agree with [[User:Margorm|Margorm]]: people who are &#039;allowed&#039; to comment on PubMed articles often have access to most articles through their Universities or Institutions. That being said, since first reading your prospectus, I&#039;ve thought so much about the access to PubMed Commons. In order to be part of the community, the major factor is that you are an author of a paper appearing in PubMed. An author can &#039;invite themselves&#039; only if PubMed has your email address on file. For personal/professional interest of being a member of this site, I&#039;ve checked with 8 different people (who are all corresponding authors on separate PubMed articles) whether they could invite themselves, and only 1 of the 8 authors could gain access. I understand why it is important for PubMed to confirm identity, however I believe this factor will strongly limit the adoption of PubMed Commons. It should also be noted that I am not an average PubMed author- most scientists I talked to about this think &#039;social media is stupid&#039; or a waste of time. Very few will go through the trouble of asking 8 separate authors to try to log in, until they find one person who can. However, exactly as Margo pointed out, &amp;quot;This may also serve as a better model for Peer Review (one day)&amp;quot;.&lt;br /&gt;
:::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I can see where this topic would make an interesting focal point for a review article or commentary on the exploitation opportunities, (legal and criminal) that open source software packages like these permit. As an administrator of several IT systems myself, reading your prospectus has made me curious to learn more about NESSUS and Metasploit, and perhaps use them to test out weaknesses in my own servers.&lt;br /&gt;
&lt;br /&gt;
::Let&#039;s continue along that thought...and say I will download and experiment with this software... I&#039;m using this scenario &amp;quot;hypothetically&amp;quot; in hopes that it may help you focus more on the key question(s) you are hoping to answer, and to also consider &amp;quot;from where&amp;quot; you will be able to make some observations to address that question. In other words, where might you be able to follow some online community activity over the next few weeks, and observe some interactions between the users, developers, and IT administrators who work with these software packages?&lt;br /&gt;
&lt;br /&gt;
::So, after just now learning of these open source packages, I want to download them on my Linux box and experiment. I want to see how others have installed, implemented, and customized the software to exploit a variety of possibilities. Is there an open community where I can lurk and maybe participate in a discussion to learn about various ways I can use this software to test out my servers for vulnerabilities and bugs? What kind of controls might I be subjected to within that community that may prevent me from discussing specifics about what known vulnerabilities have been discovered, and what security holes one can exploit? If I discover a major security flaw, can (or should) I document this within that online community? Are there normative, legal, and/or architectural controls that prevent or discourage divulging too much information within his community? I noticed a discussion forum at http://discussions.nessus.org/welcome, and https://community.rapid7.com/community/metasploit... would these be the communities you were considering?&lt;br /&gt;
&lt;br /&gt;
::Anyway, hoping this helps out. I just wanted to raise these questions as a way to help you identify the specific online community where some observable activity will occur, and focus in on what controls you hope to be able to see playing-out during the rest of the semester. You may already have that in mind, but it wasn&#039;t in the prospectus, so I thought I&#039;d raise the questions here. I think knowing the answer to these questions will help put the ideas into the context of the Final Project&#039;s objectives and should also help with the next task of building the outline in Assignment 3. [[User:Psl|Psl]] 14:25, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Somehow the uploaded RTF file had been converted to a CALC spreadsheet file, making some of the contents hard to read. [[User:Ichua|Ichua]] 15:08, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:: Hi Twood. I find your paper topic to be incredibly interesting and well-thought out. I wish I had constructive criticism to give you, but I find that you are on the right path. My only question at the moment: how do you plan on measuring the response of community members to the each sites&#039; control mechanisms? [[User:Lrsanchez|Lrsanchez]] 11:41, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Twood, I find this to be a very cool topic and being a musician myself, makes it even more so. I have never ever been a fan of sampling music outright and then adding a new beat and some remixing to make it one&#039;s own, just not my style. I like the prospect of you examining a smaller or less commercialized community musically (as compared to You tube). Again, as own who owns small studio at home and records pretty solidly, it is always great to see musicians recording and producing their own stuff from scratch with small home studio setups. I hope you show an example of a community catching someone in the act of stealing another&#039;s music or idea and what the outcome of that interaction will be - because as musicians we always borrow, modify or improves someone else&#039;s cord progression or guitar lick to make it our own. So, it would be great to see if you could hint about that distinction - as I am sure it comes up a lot in communities like this. But, overall really nice topic to concentrate on.[[User:Dancoron|Dancoron]] 19:42, 2 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Cheikh, I&#039;m looking forward to reading your paper. Online technology journalism is indeed a most interesting industry... after all, a tech journalist with sufficient influence can single-handedly kill an up and coming technology project with billions in R&amp;amp;D costs, and this is particularly worrying given how easy it is for a competing company with a sufficient budget to influence said journalists, as well as how often these journalists write reviews having used the product in questions for mere minutes, or without necessary expertise in the are where such product can be useful. That said, my suggestion to you is to narrow your topic to one single research question. At the moment, you paper risks going astray as you intend to cover a wide array of very different concerns. --[[User:Seifip|Seifip]] 12:06, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Emmanuelsurillo&lt;br /&gt;
*Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:You raise some great research questions to examine within these communities. You might want to narrow your focus more. Will you be talking about the legalities of “jail-breaking” and it’s effect on the Apple and Android market? Considering the topics we discussed in class, it might be interesting to develop your research to mention the view of major companies toward these forums and the rogue developers. Once an iphone is jail-broken, it losses its apple warranty coverage. This might be a topic you want to bring up with your research. Good luck! [[User:Lpereira|Lpereira]] 21:36, 3 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Emmanuel,&lt;br /&gt;
&lt;br /&gt;
You have selected a really “hot” topic. Mobile applications appear to be taking over actual web development these days. I’m in the process of creating a new site, for the general public, to locate assistance after they have been harmed by other entities. The developer of my site highly recommended that I create a mobile app at the same time.  He is correct and the only reason I do not plan to follow his suggestion is directly related to cost.&lt;br /&gt;
&lt;br /&gt;
I’m unclear of the real statistics, but Internet users seem to be using phones as their selected source of information more frequently than computers. Most people carry their phones (even to bed) but fewer seem to be in constant travel with their laptop.  &lt;br /&gt;
&lt;br /&gt;
I am not familiar with the sites you listed in your proposal since I am not a mobile application developer, but I am happy to learn there are forums to enhance applications through large communities. &lt;br /&gt;
&lt;br /&gt;
It appears many of our classmates are attempting to use a compare/contrast approach, which seems logical, if we want to identify how resourceful one community is versus another. Your research will be extremely useful to many, and I would like to pass your results onto my developer after you have completed all the hard work (smile). &lt;br /&gt;
&lt;br /&gt;
A few questions for you: &lt;br /&gt;
  &lt;br /&gt;
“I want to compare how useful and productive these web sites are to the users end for accomplishing these goals.”&lt;br /&gt;
&lt;br /&gt;
1.	How do you plan to compare and contrast the central 7-9 questions outlined in your proposal for the final project? In other words, will you be able to summarize the data from each research question in one succinct paragraph to meet the page requirements?&lt;br /&gt;
2.	Do you think it would be easier to select 2-3 questions presented in your proposal to dig a little deeper or perhaps ask a few others from the class to join you on a team to cover all the questions presented?&lt;br /&gt;
&lt;br /&gt;
I ask these questions, because I am struggling with these issues myself.  I believe if I ask enough people in our community who are using a similar approach, I will (eventually) determine a model that may be useful for my own research. &lt;br /&gt;
&lt;br /&gt;
Another suggestion: Could we potentially find a group of people in our research community (class) that are interested in using a similar approach, but still collectively analyze the communities we selected for personal purposes? In other words, I am certain most students have selected the entities of study for some reason, such as personal satisfaction or business achievement.  However, Andy has made it clear that he would entertain teams multiple times. In fact, the option has been posted on every page of our instructions for the main project.  In fact, the option has been posted so many times that I am beginning to think he may be giving us a subtle hint or clue: “This assignment will be more effective if you work collectively together and you may gain more valuable research by teaming”. I don’t read minds, but… &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
I am attempting to look at the effectiveness of two sites created to allegedly help people who have been taken advantage of by either an entity or a person. Section 203 under the Communication Decency Act assists people in their ability to say whatever they think, regardless if correct.&lt;br /&gt;
&lt;br /&gt;
You are comparing two mobile application sites to analyze how useful and productive the sites are for the users to include accuracy and validity.&lt;br /&gt;
&lt;br /&gt;
Marissa is researching the validity of airbnb.com, and looking at the controls put in place by the website to protect people.&lt;br /&gt;
&lt;br /&gt;
I still have many proposals to read today, but it does appear that many of us are running in a few general hypothetical areas of question:   &lt;br /&gt;
&lt;br /&gt;
Which site is more effective due to the controls implemented by the site itself? (Compare/Contrast)&lt;br /&gt;
&lt;br /&gt;
Can the data on these sites be considered valid? Is so, why or why not?&lt;br /&gt;
&lt;br /&gt;
Could we potentially work together on a research methodology for all three sites to compare and contrast if the model is effective in and of itself while measuring the data across the board for multiple communications? In summary, we could compare and contrast the model that we collectively created against the sites we personally selected.&lt;br /&gt;
&lt;br /&gt;
My biggest concern with many of our proposals is that they are too broad and we will not find the depth.  Most of our topics could be potential dissertations; unfortunately we are lacking 5 years of research time (smile).  I plan to look for commonality in proposals submitted-perhaps we can all make this better together. Could we potentially try to use our class community to research the depth of the Internet communities.?&lt;br /&gt;
&lt;br /&gt;
Just thoughts. &lt;br /&gt;
&lt;br /&gt;
Cheers!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 17:07, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Emmanuel,&lt;br /&gt;
&lt;br /&gt;
Great topic!!&lt;br /&gt;
I am not sure if you would like to go into that direction, but from my point of view, I would say there is a big difference in the active level between iphone users via Android users in forum.&lt;br /&gt;
Iphone users are usually not as active as Android users in forum. And I think this is a really interesting topic to look into.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I think it would be a good idea to narrow down your topic as there are 9 research questions that you are planning to coverin your paper. It would be difficult to talk about each question in depth with the words limit.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:42, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
::Hi [[User:Seifip|Seifip]]! Few bits of feedback for you. First of all, I like that you tied back to Lessig&#039;s regulators. Very strong prospectus overall. Second, I wonder how you define an &#039;&#039;effective way of shaping an online community&#039;&#039; ? I assume that you didn&#039;t define &#039;effective&#039; because of the 400-word limit for this assignment. My advice would be for you to perhaps draw specific comparisons between StackOverflow and another online developer support community. Alternatively (and perhaps more fun), you might change the phrasing of your research question to something like &#039;In what ways does X architectural element affect conversation on StackOverflow?&#039;. Overall though, I think this is a very strong topic for your final project, because developer communities are some of the most in-depth technical discussions on the web. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::: Thanks for your feedback, Erin! I&#039;ll consider narrowing down the research question to a single element. --[[User:Seifip|Seifip]] 10:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Art.Mescon&lt;br /&gt;
*Title: Do Etsy’s regulations aim to help buyers and/or sellers or are they primarily protective of the company itself, leaving third parties on their own to seek out reputable transaction partners? &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Art.Mescon_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
::You raise some great ideas in your prospectus that would make for an interesting research paper around Etsy. However, I wonder if it might be best to focus more on the controls for which you can already observe playing out within the Etsy community&#039;s online activities? In other words, the community norms and architecture controls within Etsy itself (user-&amp;quot;self-regulation&amp;quot; and Etsy&#039;s-&amp;quot;private-regulation&amp;quot;) might be the most reliable &amp;quot;observable data&amp;quot; that you will be able to anticipate over the next few weeks. The government level controls (public-regulation) you suggest may require moving outside this community, and I am not sure that a useful discussion (with observational data) will be possible within the page limit, nor would it be crucial to answering your research question.&lt;br /&gt;
&lt;br /&gt;
::I like the research question very much, and I think it couches the challenges you hope to observe within the methodology you propose. Also, I anticipate that the community interactions over the next couple of months should provide you with enough observational data to answer your question. One more tip on the question... What would you think about starting the question with &amp;quot;How&amp;quot; rather than &amp;quot;Do&amp;quot;...? Play around with the phrase of your question, and see how it feels. My thinking is that you will allow yourself some flexibility in what you will truly have to report on when it comes time to write up the results. The answer to a &amp;quot;Do&amp;quot; question requires one to choose a yes or no and your findings will likely challenge any &amp;quot;absolute&amp;quot; judgment call... So don&#039;t let yourself get cornered into having to make that choice (at least not at this early stage). By starting the question with &amp;quot;How do Etsy’s regulations...&amp;quot;, will allow you to have more flexibility to report on what the observations will show, and your can balance your discussion section on some good and not-so-good controls that play out over the next few weeks.&lt;br /&gt;
&lt;br /&gt;
::Last point. In your sentence &amp;quot;I intend to identify how Etsy controls, or fails to control content in a manner that is advantageous to their users.&amp;quot;, I wasn&#039;t sure if by &amp;quot;users&amp;quot; you meant the buyers, sellers, or both. My mind is interpreting that &amp;quot;user&amp;quot; is the buyer in this sentence’s context, and the word &amp;quot;content&amp;quot; is used to define both the items and community sellers that are being controlled. True? That distinction may be important to clarify as the full report gets written, because the Etsy controls and observations being gathered will (I suspect) impact buyers vs sellers vs content each a little differently.  On a similar note... To cut down on the need to follow every buyer, seller and thing in &amp;quot;Top Searches&amp;quot; for this community, do you think it would be helpful to focus on just one type of craft? I don&#039;t know enough about Etsy specifically to determine if that would work for this project, but it might be another way to find a sub-group/sub-community limit, and still provide you with enough observational data to draw some conclusions.&lt;br /&gt;
&lt;br /&gt;
::Hoping these comments are helpful! [[User:Psl|Psl]] 12:22, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Title: YouTube Comment Filtering and Other Cyberbullying Initiatives&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/File:Lpereira_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 16:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Might be interesting to determine whether and how Youtube encourages positive comments and discourage negative or hate comments.  Ultimately, it would be ideal if the character of misbehaving individuals could be improved.  Some ideas might be the use of &amp;quot;Like&amp;quot; and &amp;quot;Dislike&amp;quot; votes on these comments and/or the award/deduction of &amp;quot;attitude points&amp;quot;.  The individuals posting hate and aggressive comments could be prohibited from further postings if the attitude point reaches a certain limit. [[User:Ichua|Ichua]] 15:02, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like the focal point you will be observing, and you are quite right in pointing out that this &amp;quot;negativity&amp;quot; is becoming an unfortunate reality for many &amp;quot;open comment&amp;quot; sections within these online spaces. Even what can begin as constructive dialog and healthy debate, can quickly degenerate into blather, flames, and hate words when anonymity can be so effectively used as a shield. Interestingly, we can&#039;t always point our finger at just one &amp;quot;troll&amp;quot; injecting some deliberate provocation...because sometimes the breakdown occurs with the 3 or 4 community members who (hither to) we&#039;re exchanging words in a perfectly eloquent &amp;amp; respectful manner. But the hate, racism, and bullying that poison the dialog on these comment-boards are on a much more disturbing level, and one that certainly will make for an interesting study.&lt;br /&gt;
&lt;br /&gt;
::So, The broad question that I am hearing in your prospectus is &amp;quot;What are the most important controls that an online service provider can successfully implement to intercept and discourage cyberbullying, hate-speech, and irrelevant negativity? The sub-question then would be &amp;quot;How effective and/or constraining are those controls on the community&#039;s ability to engage with each other in a meaningful unbiased dialog about the content? (YouTube in this example)? &lt;br /&gt;
&lt;br /&gt;
::Have you given some thought to the subject matter that you will focus on, as a way to observe how these comments progress? It may be helpful to put your lens onto a consistent subject to observe the cycle of communication. From there you should be able to witness what prompts the conversation to begin in the first place; when do counter-points get introduced, how long is constructive dialog able to bridge back and fourth, what is the &amp;quot;poison-pill&amp;quot; that kills the conversation, and when do the controls kick-in?.  (Observing where the controls kick in would obviously be the essential part to report on, not so much each of those elements of the cycle of communication I itemized there.) &lt;br /&gt;
&lt;br /&gt;
::I’d be curious to also know if the observation shows that the cycle of communication is more (or less) positive throughout based on the type of subject that initiates the conversation? News stories on &amp;quot;hot button&amp;quot; topics or baseball contrasted with (say) a page dealing with baking fudge probably have different trajectories of &amp;quot;success&amp;quot; in remaining positive. (I am thinking about the inherent behavior of the potential community members themselves… one lends itself to polarized opinions with predictable “zealots” appearing in either camp, while the other community may be more welcoming of differing opinions and tastes).  SO for example, thinking of an individual wearing that New York Yankees hat in Fenway Park on game day....vs... a group of bakers talking about chocolate vs. peanut butter fudge recipes…The former is likely to risk some taunting, a black eye, a broken tooth, and perhaps a small riot... while those in the latter group, might, at worst, receive only a cavity.  Anyway, my point is that it might be interesting compare a couple of focused topics of conversation as a way of discovering a smaller sub-community that builds around a YouTube comment-board (With one engaging in  a &amp;quot;Hot button&amp;quot; topic.... While the other group is discussing something seemingly non-polarizing.)[[User:Psl|Psl]] 12:00, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Ben Harmatz&lt;br /&gt;
*Government Entities: Internet Surveillance and Censorship&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_NSA_1_draft_copy.doc&lt;br /&gt;
[[User:Benh|Benh]] 16:49, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Ben. While I think your prospectus brings up the interesting and very pertinent topic of government control, surveillance, and censorship, I think that it is simply far too broad of a topic. For the assignment, we are supposed to monitor the activities of users on a particular site or group of sites, but looking at the internet as a whole is far too much for an 8-10 page paper! Perhaps consider government control, surveillance, and censorship while observing a particular website that has been named as a victim (by the media) of NSA&#039;s surveillance and dig deeper there. [[User:Lrsanchez|Lrsanchez]] 13:02, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Patricia Byrnes&lt;br /&gt;
*Title: Are moderators effective for policing and protecting a site from illegal use?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Patricia_Byrnes_Assig._Two.doc&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 16:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Patricia, First off, love your idea, moderating internet speech, as well as your methodology: if what you want to measure is moderating behavior, norms, and free speech concerns, the “Politics &amp;amp; Leaders” forum is a fantastic place to do so since It appears that discussions there can turn from heated to vituperative in the blink of an eye! With respect to your research question, by specifying “effective,” I assume that you will quantify instances of behavior that violate the established rules of the site. This method is good since you give yourself a verifiable and quantifiable measure. You can then use Lessig’s and other scholars work to explain these data. Now, you say that you wish to &amp;quot;research the rules and regulations of the site,” which looks like it might be an insurmountable task. I visited the site’s “Super Editor handbook” and I see that it is quite extensive. Perhaps you might want to focus specifically on one type of violation, such as &amp;quot;3.4.1 Discouraged Ranking Themes - Personal Experience / Personal Preference Rankings” ? [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Vance.Puchalski&lt;br /&gt;
*Regulators and the Spread of (Mis)Information&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Puchalski-Assignment2.docx&lt;br /&gt;
[[User:Vance.puchalski|Vance.puchalski]] 17:17, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:As an extension student and a reader of both sites, I agree that extension student is often more accurate especially due to the required affiliation. You should consider when collecting your data that often information is not so black and white. A lot of people on these treads seek opinion, which is more of a personal thought rather than right or wrong. A lot on forums is opinion based, not fact based and so I think you should prepare for your data to be filled with a lot of gray areas, which you might already be expecting. The correlation between accuracy and monitoring is certainty an interesting topic. Anyway, great research topic and I’m interested to see your findings. Good luck! [[User:Lpereira|Lpereira]] 21:20, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A. Tom Anteus&lt;br /&gt;
*Cryptocurrency Uses in Conflict Zones Around the World&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Cryptocurrency_Uses_in_Conflict_Zones_Around_the_World.pdf&lt;br /&gt;
[[User:A. Tom Anteus|A. Tom Anteus]] 17:26, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Tom, intriguing topic! I&#039;m a keen follower of the Bitcoin revolution myself so have been naturally drawn to your prospectus and Daniel&#039;s as well. However I would say its quite difficult to follow your proposal. I&#039;m not quite sure how you intend to analyse and measure the use of cryptocurrency in conflict zones. Which conflict areas will you be targeting? Do you intend to follow forums or analyse chatter on various websites. If so, which ones?  [[User:Marissa1989|Marissa1989]] 07:36, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: One interesting avenue to explore might be how government control of internet in countries like China affect, and could affect the adoption and use of Bitcoin. I&#039;ve followed Bitcoin for a long time and one of my concerns has always been that Bitcoin is dependent on some infrastructure that is relatively vulnerable to government control and influence, and that if Bitcoin ever grew sufficiently to compete with official state currencies it might invite even more internet regulation. --[[User:Seifip|Seifip]] 12:14, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Julie Dubela&lt;br /&gt;
*Mapping Social Media Debate on the OHCHR Report on North Korea&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Julie_Assignment2.txt&lt;br /&gt;
[[User:Julie|Julie]] 18:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Julie, great prospectus. I find the whole North Korea situation appalling from a global response perspective. A lot of the articles, commentary and reactions from people around the world have been effectively muzzled. Your approach to analyse public reaction through social media is methodical and well thought through. Your plan to use specific tools to collect information from twitter hash tags, Google trends etc and follow up by analysing them to find common themes and trends is great. I look forward to reading the final report!  [[User:Marissa1989|Marissa1989]] 07:52, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Andrew Grant&lt;br /&gt;
*Quantified Self and Qualified Liability: Strava and Lessig&#039;s Four Forces&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Andrew_Grant_Assigmnment_Two_02252014.docx&lt;br /&gt;
[[User:AndrewGrant|Andrew Grant]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Andrew, your prospectus sounds fantastic. Lots of interesting questions being asked in light of Lessig&#039;s Four Forces and the Quantified Self movement. I think that you many be asking too many questions for an 8-10 page paper, if you are to go into sufficient depth for each one. Do you think that it&#039;s realistic to answer the five research questions in so short of a paper? Other than that, I think you are off to a great start and I am interested in hearing more about it. [[User:Lrsanchez|Lrsanchez]] 11:49, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In general, it might be helpful to state why your project is important and how the outcome of the research might help regulate/control or improve human behavior on the internet. [[User:Ichua|Ichua]] 19:58, 27 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1275</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1275"/>
		<updated>2014-03-04T17:14:14Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jolie Ho - Wan Lap Ho&lt;br /&gt;
*Instagram vs Flickr&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Jolie_Assignment_2.docx&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 16:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How do you propose to collect data to answer the last question? [[User:Ichua|Ichua]] 15:22, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey Jolie! You picked a really fascinating topic to cover! Just a few thoughts I hope will help. How do you plan on pinpointing how all the users behave differently, just because there are so many registered accounts you might be able to find people who behave nearly the same or certain individuals who have accounts on both Instagram and Flickr. Just as a mere suggestion maybe you can find a niche that is unique to each site and compare them? Maybe Instagram has thousands of pictures of food and seflis while Flickr has more professional content? I hope this will help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:15, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like your topic to dive into why Instagram has been so successful compared to Flicker. It may be interesting to compare the age groups of each users. Instagram seems more accessible because it is a phone app that is simple and immediate to use, whereas Flicker users upload a batch of vacation photos, etc. I like Emmanuel&#039;s suggestion to compare the content between users. Another suggestion which relates to the selfies/food photos may be to compare the users themselves. I think older people tend to use Flickr and therefore may not post as much. However, younger people (who no long user facebook) posting to instagram all the time would provide a way for facebook to get back that market. ([[User:Margorm|Margorm]] 14:31, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
::Hi Jolie: This is a very interesting topic, with many possible areas focus on! (Also, a nice mix between the tech and creative worlds.) You mentioned that Instagram and Flickr diverge where mobile apps are concerned. This looked particularly interesting, especially following the Flickr app&#039;s overhaul. Anecdotally, via Twitter, it looked as though the Flickr update was a major talking point in both the Instagram and Flickr user groups. My thought was that it may be interesting to look at whether this major app update had any bearing on either of the two communities, as it may have impacted some of your research questions. Best! [[User:Twood|Twood]] 09:33, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How would this differ from other imaginary items of trade like currency/commodity derivatives and futures and virtual commodities like pork bellies?   [[User:Ichua|Ichua]] 15:17, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Daniel,&lt;br /&gt;
What an interesting topic! I was not even aware that state governments recognized these currencies. Would you be able to come up with more material if you focus on one or two countries and their reaction to the online currency? Also Ichua gave great advice; maybe one country’s reaction and policies to multiple online currencies would help in the scope of observation. Your idea of creating a website to report and share your findings is really novel! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Very interesting topic Daniel. Ive been following the progress of Bitcoin as a personal interest. Apart from the regulatory challenges Bitcoin poses for Governments, its also vulnerable to cyber attacks which can erode trust in using the currency. Whilst the actual Bitcoin itself is heavily encrypted, the Bitcoin exchanges are vulnerable to hacking and cyber theft as evidenced recently by the successful attacks on Mt Gox, one of the world&#039;s largest Bitcoin exchanges. It would be interesting to observe the effect (if any) this would have on the regulatory view of the currency by Governments. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: One interesting avenue to explore might be how government control of internet in countries like China affect, and could affect the adoption and use of Bitcoin. I&#039;ve followed Bitcoin for a long time and one of my concerns has always been that Bitcoin is dependent on some infrastructure that is relatively vulnerable to government control and influence, and that if Bitcoin ever grew sufficiently to compete with official state currencies it might invite even more internet regulation. --[[User:Seifip|Seifip]] 12:14, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Marissa1989&lt;br /&gt;
*Prospectus title: The rise of the collaborative consumption movement: Analyzing effective control of communication, structures of gaining trust &amp;amp; verification, and legal issues.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:Assignment_2_Barkey-2.pdf&lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 23:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hi, Marissa! I used AirBnB to rent out my apartment last summer and it actually resulted in me being robbed by the person to the tune of $10,000-- not including the rent for the summer, which he didn&#039;t pay (I didn&#039;t get any of it back, either, despite the insurance). It was a nasty situation. Anyways, from what I understand, the majority of communication on AirBnB is done privately. Without staging anything or intervening, how do you plan to observe enough to answer your question(s)? I think this is basically the same concern with one of the other treatments I read, regarding Facebook. I do think the security of platforms like AirBnB is of great concern and would be a very interesting subject to study in depth![[User:Castille|Castille]] 21:16, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Marissa,&lt;br /&gt;
I loved the idea for your prospectus! Just as a suggestion, would you consider comparing a few corresponding sites like 9flats, Couchsurfing International, or Hospitality Club? You could analyze how they handle different verifiability and security issues while also comparing how the sites are constructed to better “vet” their users. This may yield insight on how trustworthy their users are to each other. You might even want to inquire if one has had “major” legal issues in the past. I hope this helps! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:32, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Greetings Marissa!&lt;br /&gt;
&lt;br /&gt;
Your topic is very interesting and it appears we have a few of the same elements in the companies we have selected to research: Verification and trust. From what I understand, you are addressing issues of users on auction/garage sale platforms surrounding the tiers of user verifiability. In other words, who is protecting one user from being taken advantage of by another user.&lt;br /&gt;
&lt;br /&gt;
The comment you posted on the wiki under my topic in regards to the effectiveness of how the sites that I have selected deal with inaccurate comments made about companies by the general public are dealt with is of great importance-the public can ruin a business for no other reason than spite. In other words, who protects the companies from users. &lt;br /&gt;
&lt;br /&gt;
The proposal you submitted intrigues me in many ways. By studying the community of airbnb.com, it appears you will be analyzing the controls implemented to make the site successful (verification, quality feedback, security, payment, userability and collaboration). &lt;br /&gt;
&lt;br /&gt;
In summary, it appears we are both working on protection issues, and if the verification process is significant enough to gain consumer trust. &lt;br /&gt;
&lt;br /&gt;
Would you mind if I ask how you plan to analyze the user? I would be interested in your methodology, and we may even find each other’s approach helpful to each other. We may even be able to compare and contrast the communities with a similar approach and work together if you would be interested. &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 15:18, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Melissaluke|Melissaluke]] 18:36, 25 February 2014 (EST)&lt;br /&gt;
*Change.org vrs Ripp Off Report&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_Research_Paper-Final.docx&lt;br /&gt;
&lt;br /&gt;
Dear Melissa, &lt;br /&gt;
What a great topic and area of coverage!!! I’m hoping my comments and questions will be of help to you! Which site succumbs more readily to outside pressure and take down requests? Also you mentioned that a susceptible compliant to both is that they are accused of not “vetting” their sources. You could possible test to see which one (if either of them do) checks them more thoroughly. This might be, and I know nothing about it, accomplished by putting posts of your own and noting if they require any amount of proof, citation, source, or quote of any kind. I really hope this helps you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:35, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thank you so much Emmanuel! Your ideas are superb and very helpful!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Melissa, these sites can be a boon for consumers in helping to identify unscrupulous businesses and thus avoiding them. The issue that I find with these sites, that&#039;s never been effectively dealt with, is how do they identify and remove potentially inaccurate comments attacking a business as a result of say, a personal vendetta by a disgruntled employee or a customer who was unreasonable. Many small and medium size businesses rely on word of mouth for new customers. If the site allows the comments to remain, it may affect the business.  This in effect may lead to possible blackmail of businesses by threatening to post inaccurate information on these sites. I&#039;m also very interested in the sample groups and postings that you choose. Great topic! [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marissa, Excellent insight and the problems posed are valid. Your questions are helping to me and assist in narrowing the topic-which is clearly too broad at the moment.&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Melissa, Just a quick note, because I loved your prospectus so much (it&#039;s such a creative take on the assignment, but still seems to hit on all the prof&#039;s requirements, really amazing job). With your &#039;&#039;&#039;Q1&#039;&#039;&#039;, &#039;&#039;Why would one site be more popular?&#039;&#039;- I can;t help but wonder, does the fact that it has such a simple, perfect 1-word URL have any effect? Also, due to the time (2007) &amp;amp; place (USA) I automatically assumed this website was somehow related to Obama&#039;s election campaign- though from quick Google search there doesn&#039;t seem to be any direct link. Anyways, just wanted to say, I really like your prospectus. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:49, 3 March 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hey Mike, it would absolutely be my pleasure to provide feedback to you. I won&#039;t go too far before having the time to focus &amp;amp; read it completely- so my first feedback to you is: if you didn&#039;t pick such an interesting topic, I would have actually read the full prospectus. However after reading your first paragraph, I ended up watching TPP and reading its subreddit and forgot to finish reading your prospectus! hahaha. But this weekend I&#039;ll spend time focusing and try to provide you feedback, hopefully as good as the feedback you gave me (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 10:34, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Mike! After reading [[User:Jkelly|Jkelly]]&#039;s comments below, I&#039;m kinda worried about posting my comments, cus I think I understood your questions from a different point of view. &lt;br /&gt;
::*First of all, my question- how do you approach your 2nd qualitative question? I&#039;m not completely sure I understand what you mean by vulnerability.&lt;br /&gt;
::*Second, my advice, feel free to take it or leave it: to keep within scope of this project (2500 word paper seems so short!), I believe it may be easier to tackle Qualitative questions #1 &amp;amp; 3, and your second quantitative question (&#039;&#039;Has it helped or hurt the game to impose such controls?&#039;&#039;). I get the impression that these questions would be the ones that would be easiest to answer from following the community discussion on the subreddit. That being said, if we were writing 8000 word papers, it would be so much fun for you to really dive into the architecture &amp;amp; UX of the game itself, while paralleling it with the subreddit(!!!). Really awesome topic &amp;amp; prospectus.&lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:After reading your prospectus, I have a few questions based on your questions, or maybe some questions that combine the ones you already have. It seems clear from what you write in your prospectus that the user experience is absolutely vulnerable to the controls imposed by the game, but I&#039;m curious to know in what ways. Were users bumping up against controls they didn&#039;t like before there were changes, or was it only after the controls of the creator were made clear (he made himself known in an explicit way, rather than operating quietly in the background) that users began to find fault? (Another way of thinking about this might be- were a lot of users thinking about the controls imposed by the game before the creator&#039;s changes forced them to think about it?) If I understand the current set up correctly, it seems that users still have the option to have commands parsed as they go instead of waiting for them to be tallied and then implemented. So, were the controls only seen as problematic once users considered that there was one person making a decision that affected every user? Is the lack of democratic decision-making behind the scenes a bigger problem for users than the actual changes in user experience?&lt;br /&gt;
&lt;br /&gt;
:As far as your quantitative question goes, I&#039;m wondering if there&#039;s any way for you to know how many users stopped playing the game after the creator made changes? Do you have a means of seeing the changes over time? [[User:Jkelly|Jkelly]] 14:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
Dear Michael, &lt;br /&gt;
I find your prospective very interesting! I thought to give you these few suggestions. I hope they will help! You might want to see what percentage of Flickr users are a part of the Creative Commons community and whether it consists of a majority or a minority. Another area of research might be into the other forms of control that Flickr uses to protect copyrighted material, and then to compare them with Creative Commons to see if they are as effective, prevalent, or well known. Also, when there are infringements in copyright policy, do people respond to correction or do they just ignore and continue violating the rules? Lastly, how does the Creative Commons community handle repeat violators (if there are any)? Wish you the best! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:43, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Lucia, This is looks to be very interesting - I was wondering if you can be more specific on what types of data the initiative is exploring. Are they looking for statistical data mainly, do you vote on what subjects you are going to put on the website or research? It looks like a great example of policy control via the government. I would to know more about the website and its overall goals - something that helps define its missions parameters, as I visited the website main page and got an idea of what they were saying - I am just needing some more clarity that&#039;s all. But again, the subject looks like a great idea and should be very interesting...[[User:Dancoron|Dancoron]] 18:48, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Lucía! &lt;br /&gt;
I think your choice of study fits perfectly with the theme of the course! Perhaps you can also investigate to see if they are stifling public opinion or whether they are flooding the docs with pro-government voices to influence the theme towards their agenda?  Also as a suggestion, can you see if it is truly open to everyone? Maybe you would like to find another similar program that the government has tried in the past (assuming that they have tried). Do the number of participants fluxuate? Is there a trend in what the government sees as inappropriate? Or is it just random edits that are corrected by the government? I hope these comments can help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:13, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I&#039;d really like to read and comment on your prospectus, but it seems like the file didn&#039;t upload. Happy to respond to it once it&#039;s up!&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 20:57, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I second Jkelly&#039;s comment. This look very intriguing and I&#039;d like to learn more about your plans for the project! [[User:Twood|Twood]] 23:14, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Third. --[[User:Seifip|Seifip]] 11:58, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hello, Dan! Admittedly, I had never heard of “Anandtech.com” prior to reading your prospectus, but I’m glad that you told me about it. I really like their “Cable TVification” assessment of the internet in recent years. After reading your prospectus it seems to me that you are focusing on Lessig’s norms as regulators within the site’s forums, as well as “laws&amp;quot; instituted by the website. It is an interesting subject, because as you say, this particular forum is very successful in fostering an environment where users are likely to return. That said, I see that you qualify users of the site as “good,” and I’m curious to know how you will operationalize this term for your project. You mention words like “courteous” and “helpful,” but I’m wondering: what characteristics do you think you will look for when observing, in order to qualify a “good user.” For comparison, do you have an example of what behavior that “bad” users might entail? Lastly, I see that there are literally millions of post on the forum; you may wish to focus on a specific topic and/or date range in order to have a more manageable data set to observe. I’m interested to see what you’re project will entail, especially being that I am also observing forums for my project. [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Vance, thanks for taking the time to look at my prospectus - Basically, what I meant to convey is that these are the characteristics of a &amp;quot;good&amp;quot; website, a website that demonstrates use and activity to by the administrators and its members/users. What I will be focusing in on is, how is the site&#039;s control policy administered and conveyed to its members, both historically and presently, through the links in my prospectus – and to answer your question about bad behavior in online forums, yes I will, as I think that is a critical component regarding context – And this also goes out too Marissa as well, what I really wanted to focus in on was how does bad behavior and is control policies in its forums, effect a webite economically - as I think ths would even go further towards Lessig&#039;s FOUR norms of regulation on where the dot lands - but for obvious reasons, that could end up being too big. However, I still might toss something like that in - My goal is to pick out a couple of instances of the control poliy being implemented and see what the results were based on specific incident/instance was there a ban and how long was it for - what was the reason, what was the community&#039;s response to that action and so forth... - Again, thanks for the input and suggestions.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Dan, forums have proven very useful mediums for learning and troubleshooting. What would be interesting is how forums deal with covert advertising I.e. Forum posters who may be businesses, subtly advertising their own goods or services under the guise of responding to threads without paying for advertising rights. Would paid advertisers pose potential conflicts of interest to the neutrality of forums? I&#039;d also be interested in seeing how you compare the Anandtech&#039;s forum controls against others. Would you choose similar types of forums with respect to content type? [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marrisa, I tried to include your response with Vance&#039;s up top :O) [[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Dan!&lt;br /&gt;
If you are mainly comparing Anandtech’s forum site policies, maybe you could also compare past versions of the rules? Also, you might want to see if Anandtech has any unique features in toxicity control that would make it standout from other less successful forums. Overall the concept is fantastic! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Emmanuel, thanks for the feedback - ya, I am going to try and put some type of onus on Anandtech as well, and see if some of their reactions to their policies could be considered a little over zealous or a bit too far reaching. Most times, their admins/moderators are pretty decent, but again, like everyone else, there are times when a few of their admins/moderators could be having a bad day and maybe be a little too heavy handed - we&#039;ll see, stay tuned to find out. just a little humor :o) Thanks again for the input.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:First of all, GREAT TITLE!!! Second of all, this seems like an extremely interesting subject and I&#039;d love to read more about it. I do wonder whether you&#039;ll be able to get access to the material you might be looking for by doing &amp;quot;undercover investigation&amp;quot; and the other research methods you listed. It seems to me that the kind of exchanges you&#039;re discussing would be difficult to observe on Facebook as they likely wouldn&#039;t be out in the open. I may be completely mistaken, but I was also under the impression that the assignment encouraged examining a more open forum or something of the like where observation was more feasible. I know that there are public matchmaking sites and I would assume there are also forums geared towards those who wish to have illicit affairs, so that might be an area into which you may want to delve. [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:I also love the topic and find the subject very interesting! I share Castille&#039;s concerns above. It seems challenging to get access to the materials you will need to answer these questions. I wonder if there is an open forum somewhere in the internet where angry divorcees can go to vent about how social media ruined their marriage? It may be a biased site, but it may provide resources to other statistics or materials that may help? Or if there is a community you could observe and monitor the degree of online flirting? ([[User:Margorm|Margorm]] 14:48, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wow very cool subject - and one I am sure that deserves a lot of attention these days. With that said, it seems that this subject matter could be a thesis or dissertation as the material collected probably seems to be endless. I was wondering what specific community are you going to target on facebook, as this looks to be potentially a very large paper? I have to admit that I am fascinated to see what other statistics this might uncover, as I am sure we all have heard stories of spouses leaving their significant other for someone they met online. Yet maybe, you can focus on something more specific then a facebook community - as there might be other communities or even forums that have support groups for such instances or circumstances that you mentioned earlier. Maybe seeing how they interact with each other and what rules or policies can be observed and commented on. Overall the topic is really great and I am sure it will have some very interesting content that is fascinating.[[User:Dancoron|Dancoron]] 19:13, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Very interesting subject matter Amy!&lt;br /&gt;
&lt;br /&gt;
You may have selected one of the most controversial and highly emotional subjects out of all proposals presented.  I would agree with Dancoron. The questions outlined could lead to a doctoral dissertation. Additionally, Castille does bring a good point to light, in that we are encouraged to avoid any work as an “alias”. &lt;br /&gt;
&lt;br /&gt;
I think many of us are having trouble (to include myself) narrowing the research down to a tolerable amount of data collection for an in depth analysis.&lt;br /&gt;
&lt;br /&gt;
In your proposal, you suggested comparing and contrasting divorce rates. What sources would you be comparing and contrasting? Are you speaking to different communities in the United States or on a larger level?  Or, are you addressing the male/female divorce ratio? &lt;br /&gt;
&lt;br /&gt;
Secondly, will you be cross-examining two nations who have access to Facebook, in efforts to compare and contrast divorce ratios in direct correlation to Facebook usage? &lt;br /&gt;
&lt;br /&gt;
If your research goals are to use Facebook as the platform for study concerning divorce, it may be difficult to get access to this information unless you are accepted into a person’s profile, group or community. In efforts to stay objective, I don’t think you would want to study anyone that you personally know.  Pornography could be a difficult study, in direct correlation to pornography with the controls Facebook allows for each individual user. &lt;br /&gt;
&lt;br /&gt;
Would it be possible for you to follow a smaller, more open group that readily blogs/views pornography that is open to the public for data collection in a short period of time? &lt;br /&gt;
&lt;br /&gt;
Unfortunately this is completely out of my arena. I have never been married and I don’t view porn sites. But, your topic is fabulously interesting. &lt;br /&gt;
&lt;br /&gt;
Good luck with your research and I can’t wait to see your results.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hi [[User:Margorm|Margorm]]! I love your topic. Your prospectus, combined with our brief discussions in class have really made me wonder- if 23andme is part of the first iteration of DNA decoding tools for personal use, where will we be in 25 years (: Just my general thoughts on this great topic- my comments specifically regarding your prospectus are below:&lt;br /&gt;
::*I really like that you asked whether the FDA is the best agency to regulate DNA testing, especially your last sentence &#039;&#039;what regulatory bodies outside of the FDA should be paying attention to this personalized and identifiable database?&#039;&#039;. Throughout this class, I&#039;ve had similar types of questions many times.&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, however it seems that the data you will collect (assessing changes in attitudes of community members) will be more apt to answer your 2nd question (&#039;&#039;How has the ban on delivering health-related risk assessments to the 23andMe community impacted the consumer’s trust toward the product?&#039;&#039;), rather than the underlined question that I referred to in my previous bullet.&lt;br /&gt;
:Please note that I am most interested in your underlined question regarding the FDA! However my advice is that your second question regarding attitudes &amp;amp; trust may be easier to study with respect to your methodology.&lt;br /&gt;
:[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST) - updated 03 March 2014 ~11pm&lt;br /&gt;
&lt;br /&gt;
:It seems clear that although institutional positions and statements are mostly contrary to the patentability of human genes as such, however international patent offices (U.S., Europe, and Japan) have accepted the patenting of human DNA sequences if they meet the technical and legal requirements, including the “utility”. DNA occurs naturally in the human body and should not be patented by a single company that can then use its patents to limit scientific research and the free exchange of ideas. As said by Koepsell “Laws of patent are meant to be used to protect inventions — things that engineers are doing — not things that scientist discover” (Holman, 2007). A regulatory block of decoding tools for personal use would seem to be an exercise in economic control. I believe you&#039;ll find an ample supply of public opinion in regards to attitudes of community members.  [[User:VACYBER|VACYBER]] 10:28, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
::Castille, I think you have a really excellent topic here. My first thought is that it would probably be helpful to choose a particular self-harming behavior that&#039;s discussed on Tumblr to help narrow the scope of your work. Additionally, while these issues can and often are related, I imagine that the Tumblr communities that surround each issue probably have a distinct culture. This topic makes me think of the Jessica McKenzie piece, &amp;quot;Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag&amp;quot; we read in week four. I would be curious to know how many of the controversial hashtags are actually used in subversive ways. Some of the reactions to Tumblr&#039;s policy change seem to touch on this when users write that they use these tags to address their own struggle with self-harming behavior. After these policy changes got some press, did it shed enough light on these self-harm blogs to inspire users to use these potentially triggering hashtags in new and positive ways?&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 13:56, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thanks for your feedback! I&#039;m planning to narrow the scope to primarily center on pro-suicide blog postings, but I think I&#039;ll have to use some other examples such as cutting and possibly even pro-eating disorder blogs, as they all seem to interact with each other. It appears from my research thus far that the communities are intrinsically linked much more so than I expected. I agree, it would be interesting to see if things have changed-- though I&#039;m not quite sure how to gauge pre-policy versus post-policy changes. If you have any ideas, I&#039;d love to hear them! [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Castille, fantastic topic! I like your approach to analysing this topic and its a subject which is very controversial &amp;amp; personal. I agree, the main challenge for any Government is to try and regulate the numerous blogs and hashtags on sites like Tumblr, effectively putting a suicide watch on them. Would this be an effective use of tax payer funds and how many suicides could this prevent? What would be the process be if a potential suicide victim was identified? We have to be careful not to act in a knee-jerk reaction when there is a death and expect the Government to do something about it. I think there needs to be a balance of responsibility between these site operators and the Government. I&#039;m very interested in the outcome of your topic. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Watson!&lt;br /&gt;
&lt;br /&gt;
A few questions:&lt;br /&gt;
&lt;br /&gt;
How would you determine which distribution channel the Syrian opposition used the most?&lt;br /&gt;
&lt;br /&gt;
How would you be able to detect the limitations of public information if it has not been disclosed?&lt;br /&gt;
&lt;br /&gt;
If you were to select two media channels to compare/contrast,  would there be enough data available in those two communities to properly “diagnose”, or is the data withheld from the public?&lt;br /&gt;
&lt;br /&gt;
If you chart a paper on what capacitated the Syrian opposition groups to communicate their cause, will this information lead to a report or a true communal study on the Internet? &lt;br /&gt;
&lt;br /&gt;
Very interesting proposal and I wish you the best in your research!&lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:This is a very interesting topic. There is a lot to examine here, especially since a large part of the attacks and arguments happened online. An interesting topic would be to mention the Syrian Electronic Army and the many acts of online vandalism that they did. You can find more info here: https://en.wikipedia.org/wiki/Syrian_Electronic_Army The Internet was certainly a tool in the conflict. An interesting focus would be to investigate their motives and the impact this electronic army had on the Syrian conflict. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 21:01, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LRS_IS_prospectus.docx&lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Laura – Instagram is not only the biggest mobile photo sharing app, but is also now owned by Facebook, and thus a disproportionate amount of mobile peer to peer communication falls to the censorship whims of this company. This is an incredibly worthy area to research, if not lofty. Since Instagram now allows direct, private communication of photos, you have to wonder if there is a difference in how moderated these communications are versus a post intended for the public that uses hashtags (let us not forget that the hashtag’s original use was searchability, not irony). That said it might be very difficult monitor the differences in speed and effectiveness of what gets censored without interfering with the community you’re observing. One way may be to follow news events (such as this recent one: http://abclocal.go.com/wtvd/story?section=news/local&amp;amp;id=9448993) that show Instagram’s policy enforcement in action. The issue with that approach is that it is cherry picking the successful takedowns rather than observing uncensored posts that are breaking the terms of service.  Another option may be monitoring Instagram’s list of banned hashtags and searching synonyms or alternate hashtags, but again this is a difficult aspect of their policy to observe in action. &lt;br /&gt;
::I believe there is still strategizing to be done to design your observation of the community, above merely reporting their policy. I hope my take somehow helps you with this endeavor! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 09:55, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi, Laura! I think Instagram is a really great topic and will provide a massive amount of material, which I think can be beneficial and detrimental. It seems you might want to consider focusing on a specific aspect of censorship on Instagram, like nudity, drug references, or profanity (if any of those are prohibited-- I don&#039;t know their specific terms of use). What aspect of Instagram&#039;s censorship do you find to have the highest potential to become problematic? Is their choice as a company to disallow certain messages/images actually infringing on free speech, when they don&#039;t have any power over whether an individual chooses to express himself (IE he/she is still capable of posting the material on another site), they merely control/monitor the postings on their own site? [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
:Hi Jon- My first thoughts on your prospectus have to do with scope. In comparing these three different games, I think there might be too many factors to consider-- subscription-based vs. free, PC vs. iOS, etc. I wonder if it wouldn&#039;t be more manageable to tackle your research questions if you focused in on two games that were more similar so that you have fewer variables to contend with when you&#039;re thinking about your research questions. My instinct is that working with WoW and League of Legends would work since you can still attempt to tackle each of Lessig&#039;s four forces. I&#039;m not sure how much the law in the US varies from that in Finland, but removing Clash of Clans from the equation might help the narrow your scope in that sense as well. [[User:Jkelly|Jkelly]] 14:27, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Jane – It is a great idea to compare feminist discussion within the confines of a feminist-oriented website to discussion in a public space without this slant. The regulations on discussion are obviously going to be wildly different in each of these communities. You identify Facebook and Twitter as less thoughtful in their discussion for feminist topics - perhaps as a result of their differences in comment policy? I was interested in the comment policy of Bitch Media that you mentioned in the prospectus, so I looked it up. (For others: it can be found here: http://bitchmagazine.org/comments-policy) One line that stood out to me was the following: “As far as moderation of this space goes, guest bloggers moderate the comments on their respective posts, but website moderators will step in when necessary.” – Does this mean that each blog post is technically regulated in a different way? It is not a deal killer if so, because it sparked the following idea: Because FB and Twitter are big places, could you find a smaller community (that is not inherently feminist-oriented) that is discussing the same thing as mentioned in one or a few of the Bitch Media posts, and compare the discussions directly? Just a thought! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:54, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Does &#039;&#039;anyone else&#039;&#039; see the awesome irony of a woman named Jane writing about Bitch magazine? Am I the only one on here who was a teenage girl in the &#039;90s? I remember clear as day, reading [http://bitchmagazine.org/article/ten-things-hate-about-jane Bitch&#039;s criticisms of Jane] back in 1998. BTW [[User:Jkelly|Jkelly]] I hope you understand that as a very longtime fan of Bitch magazine I am in no way criticizing your project, I actually think it&#039;s &#039;&#039;&#039;such&#039;&#039;&#039; a cool topic. You &amp;amp; I would probably have been awesome friends as teenagers. p.s. This doesn&#039;t count as a comment on the prospectus!!! I hope. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:44, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Haha, thanks so much for sharing that Erin!! I haven&#039;t had a chance to read the whole thing, but when you see words and phrases like &amp;quot;fake, sanctimonious,&amp;quot; &amp;quot;self-obsessed,&amp;quot; &amp;quot;narcissism,&amp;quot; &amp;quot;blithe unconcern with which they suggest spending huge amounts of money on items of debatable utility,&amp;quot; and &amp;quot;overweening focus on the superficial, ersatz do-it-for-you tone, and fake individualism&amp;quot; in just a quick scan of the article, it&#039;s bound to be a fun read. Thanks! [[User:Jkelly|Jkelly]] 08:53, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
:: Erin - I think the comparison of two subreddits with different regulations is a solid method of studying the effect of regulation on political discussion. I also believe the two subreddits you have chosen make for a great comparison. The only reservation I have in your prospectus is the focus on word count of the regulations as indicative of the rigor of the moderation. For example, one subreddit may simply say &amp;quot;Discussion of Russia is forbidden&amp;quot; - which in five words hampers more conversation than either of the two sets of regulations do in actuality. I do not think the word count is a meaningful statistic. Apropos your question of whether those without internet access will be under-represented in our studies, I would say that because we are focusing on specific small communities to begin with, we are under-representing the reactions (to control) of everyone in the world who is not in that community. The vast majority of the world is not included. Our focus is on only those within the community itself that we can observe. Ultimately I believe your project is designed very well. Since I too am studying a subreddit for my project, I will be following your progress closely!&lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:23, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Hi [[User:MikeJohnson|MikeJohnson]]! Thank you very much for the feedback, very good point about the empirical data on the rules, hopefully I can expand when I have 2500 words to work with. BTW, I just wanted to comment- the question about people without Internet access was actually [[User:Ichua|Ichua]]&#039;s question. My understanding of the assignment is to study &#039;&#039;only&#039;&#039; online communities for this assignment (and not offline humans, which excludes anyone who doesn&#039;t or can&#039;t access the Internets). My question that [[User:Ichua|Ichua]] commented on is whether &#039;&#039;&amp;quot;users are intimidated by the effort or research required to post, thus limiting participation to a narrow audience&amp;quot;&#039;&#039;. Sidenote- &#039;&#039;&#039;Thank you&#039;&#039;&#039; very much for introducing us to the Twitch Plays Pokémon phenomenon in class. So freaking cool. My God do I ever love the Internet.-[[User:Deluxegourmet|Erin Saucke-Lacelle]]&lt;br /&gt;
&lt;br /&gt;
:::: Thanks Erin! I think it is absolutely amazing as well, and I&#039;ve never played Pokémon. If you would like to read my prospectus and help me think about potential research questions using their subreddit, I am all ears. [[User:MikeJohnson|MikeJohnson]] 11:34, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Ian, great topic and I like the innovative approach you&#039;re taking. I agree that social media is an important medium for Governments to gauge public mood or opinion. In fact, Australia&#039;s Prime Minister, Tony Abbott recently spent $4 million to analyse social media and gauge the public mood on certain policies he introduced. From my understanding, you&#039;re looking to build something like a mind map to organise the social media feedback and also meta tag it? This would effectively allow content to be searched and categorised similar to a knowledge base. Just a couple of questions though....How will you apply the cognitive map? Do you have a specific social media medium and Government in mind? Looking forward to reading the final outcome! [[User:Marissa1989|Marissa1989]] 07:42, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I was unaware of this community exits, and I think it will be a great place for graduate students and researchers to find which papers they should be reading. For example, if I need to utilize a method that is slightly outside of my field, this community will help identify the appropriate and esteemed papers. This may also serve as a better model for Peer Review (one day). Because PubMed is already an exclusive database primarily for biomedical researchers, I am interested to what you observe. I am worried that because only pubmed users (or people using a University IP address) have access to pubmed articles, open access will play a minimal role in which articles spark more conversation. Unfortunately, people tend to converse about papers in high-impact journals like Nature and Science, and I would expect these articles to compete with the open access ones. Perhaps an observation of which articles receive complaints about not being open-access for the curious science lover who is no longer in academia may be an interesting perspective.. ([[User:Margorm|Margorm]] 13:45, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
:::Hi Paul! Thank you for introducing me to PubMed Commons! I have to agree with [[User:Margorm|Margorm]]: people who are &#039;allowed&#039; to comment on PubMed articles often have access to most articles through their Universities or Institutions. That being said, since first reading your prospectus, I&#039;ve thought so much about the access to PubMed Commons. In order to be part of the community, the major factor is that you are an author of a paper appearing in PubMed. An author can &#039;invite themselves&#039; only if PubMed has your email address on file. For personal/professional interest of being a member of this site, I&#039;ve checked with 8 different people (who are all corresponding authors on separate PubMed articles) whether they could invite themselves, and only 1 of the 8 authors could gain access. I understand why it is important for PubMed to confirm identity, however I believe this factor will strongly limit the adoption of PubMed Commons. It should also be noted that I am not an average PubMed author- most scientists I talked to about this think &#039;social media is stupid&#039; or a waste of time. Very few will go through the trouble of asking 8 separate authors to try to log in, until they find one person who can. However, exactly as Margo pointed out, &amp;quot;This may also serve as a better model for Peer Review (one day)&amp;quot;.&lt;br /&gt;
:::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I can see where this topic would make an interesting focal point for a review article or commentary on the exploitation opportunities, (legal and criminal) that open source software packages like these permit. As an administrator of several IT systems myself, reading your prospectus has made me curious to learn more about NESSUS and Metasploit, and perhaps use them to test out weaknesses in my own servers.&lt;br /&gt;
&lt;br /&gt;
::Let&#039;s continue along that thought...and say I will download and experiment with this software... I&#039;m using this scenario &amp;quot;hypothetically&amp;quot; in hopes that it may help you focus more on the key question(s) you are hoping to answer, and to also consider &amp;quot;from where&amp;quot; you will be able to make some observations to address that question. In other words, where might you be able to follow some online community activity over the next few weeks, and observe some interactions between the users, developers, and IT administrators who work with these software packages?&lt;br /&gt;
&lt;br /&gt;
::So, after just now learning of these open source packages, I want to download them on my Linux box and experiment. I want to see how others have installed, implemented, and customized the software to exploit a variety of possibilities. Is there an open community where I can lurk and maybe participate in a discussion to learn about various ways I can use this software to test out my servers for vulnerabilities and bugs? What kind of controls might I be subjected to within that community that may prevent me from discussing specifics about what known vulnerabilities have been discovered, and what security holes one can exploit? If I discover a major security flaw, can (or should) I document this within that online community? Are there normative, legal, and/or architectural controls that prevent or discourage divulging too much information within his community? I noticed a discussion forum at http://discussions.nessus.org/welcome, and https://community.rapid7.com/community/metasploit... would these be the communities you were considering?&lt;br /&gt;
&lt;br /&gt;
::Anyway, hoping this helps out. I just wanted to raise these questions as a way to help you identify the specific online community where some observable activity will occur, and focus in on what controls you hope to be able to see playing-out during the rest of the semester. You may already have that in mind, but it wasn&#039;t in the prospectus, so I thought I&#039;d raise the questions here. I think knowing the answer to these questions will help put the ideas into the context of the Final Project&#039;s objectives and should also help with the next task of building the outline in Assignment 3. [[User:Psl|Psl]] 14:25, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Somehow the uploaded RTF file had been converted to a CALC spreadsheet file, making some of the contents hard to read. [[User:Ichua|Ichua]] 15:08, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:: Hi Twood. I find your paper topic to be incredibly interesting and well-thought out. I wish I had constructive criticism to give you, but I find that you are on the right path. My only question at the moment: how do you plan on measuring the response of community members to the each sites&#039; control mechanisms? [[User:Lrsanchez|Lrsanchez]] 11:41, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Twood, I find this to be a very cool topic and being a musician myself, makes it even more so. I have never ever been a fan of sampling music outright and then adding a new beat and some remixing to make it one&#039;s own, just not my style. I like the prospect of you examining a smaller or less commercialized community musically (as compared to You tube). Again, as own who owns small studio at home and records pretty solidly, it is always great to see musicians recording and producing their own stuff from scratch with small home studio setups. I hope you show an example of a community catching someone in the act of stealing another&#039;s music or idea and what the outcome of that interaction will be - because as musicians we always borrow, modify or improves someone else&#039;s cord progression or guitar lick to make it our own. So, it would be great to see if you could hint about that distinction - as I am sure it comes up a lot in communities like this. But, overall really nice topic to concentrate on.[[User:Dancoron|Dancoron]] 19:42, 2 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Cheikh, I&#039;m looking forward to reading your paper. Online technology journalism is indeed a most interesting industry... after all, a tech journalist with sufficient influence can single-handedly kill an up and coming technology project with billions in R&amp;amp;D costs, and this is particularly worrying given how easy it is for a competing company with a sufficient budget to influence said journalists, as well as how often these journalists write reviews having used the product in questions for mere minutes, or without necessary expertise in the are where such product can be useful. That said, my suggestion to you is to narrow your topic to one single research question. At the moment, you paper risks going astray as you intend to cover a wide array of very different concerns. --[[User:Seifip|Seifip]] 12:06, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Emmanuelsurillo&lt;br /&gt;
*Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:You raise some great research questions to examine within these communities. You might want to narrow your focus more. Will you be talking about the legalities of “jail-breaking” and it’s effect on the Apple and Android market? Considering the topics we discussed in class, it might be interesting to develop your research to mention the view of major companies toward these forums and the rogue developers. Once an iphone is jail-broken, it losses its apple warranty coverage. This might be a topic you want to bring up with your research. Good luck! [[User:Lpereira|Lpereira]] 21:36, 3 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Emmanuel,&lt;br /&gt;
&lt;br /&gt;
You have selected a really “hot” topic. Mobile applications appear to be taking over actual web development these days. I’m in the process of creating a new site, for the general public, to locate assistance after they have been harmed by other entities. The developer of my site highly recommended that I create a mobile app at the same time.  He is correct and the only reason I do not plan to follow his suggestion is directly related to cost.&lt;br /&gt;
&lt;br /&gt;
I’m unclear of the real statistics, but Internet users seem to be using phones as their selected source of information more frequently than computers. Most people carry their phones (even to bed) but fewer seem to be in constant travel with their laptop.  &lt;br /&gt;
&lt;br /&gt;
I am not familiar with the sites you listed in your proposal since I am not a mobile application developer, but I am happy to learn there are forums to enhance applications through large communities. &lt;br /&gt;
&lt;br /&gt;
It appears many of our classmates are attempting to use a compare/contrast approach, which seems logical, if we want to identify how resourceful one community is versus another. Your research will be extremely useful to many, and I would like to pass your results onto my developer after you have completed all the hard work (smile). &lt;br /&gt;
&lt;br /&gt;
A few questions for you: &lt;br /&gt;
  &lt;br /&gt;
“I want to compare how useful and productive these web sites are to the users end for accomplishing these goals.”&lt;br /&gt;
&lt;br /&gt;
1.	How do you plan to compare and contrast the central 7-9 questions outlined in your proposal for the final project? In other words, will you be able to summarize the data from each research question in one succinct paragraph to meet the page requirements?&lt;br /&gt;
2.	Do you think it would be easier to select 2-3 questions presented in your proposal to dig a little deeper or perhaps ask a few others from the class to join you on a team to cover all the questions presented?&lt;br /&gt;
&lt;br /&gt;
I ask these questions, because I am struggling with these issues myself.  I believe if I ask enough people in our community who are using a similar approach, I will (eventually) determine a model that may be useful for my own research. &lt;br /&gt;
&lt;br /&gt;
Another suggestion: Could we potentially find a group of people in our research community (class) that are interested in using a similar approach, but still collectively analyze the communities we selected for personal purposes? In other words, I am certain most students have selected the entities of study for some reason, such as personal satisfaction or business achievement.  However, Andy has made it clear that he would entertain teams multiple times. In fact, the option has been posted on every page of our instructions for the main project.  In fact, the option has been posted so many times that I am beginning to think he may be giving us a subtle hint or clue: “This assignment will be more effective if you work collectively together and you may gain more valuable research by teaming”. I don’t read minds, but… &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
I am attempting to look at the effectiveness of two sites created to allegedly help people who have been taken advantage of by either an entity or a person. Section 203 under the Communication Decency Act assists people in their ability to say whatever they think, regardless if correct.&lt;br /&gt;
&lt;br /&gt;
You are comparing two mobile application sites to analyze how useful and productive the sites are for the users to include accuracy and validity.&lt;br /&gt;
&lt;br /&gt;
Marissa is researching the validity of airbnb.com, and looking at the controls put in place by the website to protect people.&lt;br /&gt;
&lt;br /&gt;
I still have many proposals to read today, but it does appear that many of us are running in a few general hypothetical areas of question:   &lt;br /&gt;
&lt;br /&gt;
Which site is more effective due to the controls implemented by the site itself? (Compare/Contrast)&lt;br /&gt;
&lt;br /&gt;
Can the data on these sites be considered valid? Is so, why or why not?&lt;br /&gt;
&lt;br /&gt;
Could we potentially work together on a research methodology for all three sites to compare and contrast if the model is effective in and of itself while measuring the data across the board for multiple communications? In summary, we could compare and contrast the model that we collectively created against the sites we personally selected.&lt;br /&gt;
&lt;br /&gt;
My biggest concern with many of our proposals is that they are too broad and we will not find the depth.  Most of our topics could be potential dissertations; unfortunately we are lacking 5 years of research time (smile).  I plan to look for commonality in proposals submitted-perhaps we can all make this better together. Could we potentially try to use our class community to research the depth of the Internet communities.?&lt;br /&gt;
&lt;br /&gt;
Just thoughts. &lt;br /&gt;
&lt;br /&gt;
Cheers!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 17:07, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Emmanuel,&lt;br /&gt;
&lt;br /&gt;
Great topic!!&lt;br /&gt;
I am not sure if you would like to go into that direction, but from my point of view, I would say there is a big difference in the active level between iphone users via Android users in forum.&lt;br /&gt;
Iphone users are usually not as active as Android users in forum. And I think this is a really interesting topic to look into.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I think it would be a good idea to narrow down your topic as there are 9 research questions that you are planning to coverin your paper. It would be difficult to talk about each question in depth with the words limit.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:42, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
::Hi [[User:Seifip|Seifip]]! Few bits of feedback for you. First of all, I like that you tied back to Lessig&#039;s regulators. Very strong prospectus overall. Second, I wonder how you define an &#039;&#039;effective way of shaping an online community&#039;&#039; ? I assume that you didn&#039;t define &#039;effective&#039; because of the 400-word limit for this assignment. My advice would be for you to perhaps draw specific comparisons between StackOverflow and another online developer support community. Alternatively (and perhaps more fun), you might change the phrasing of your research question to something like &#039;In what ways does X architectural element affect conversation on StackOverflow?&#039;. Overall though, I think this is a very strong topic for your final project, because developer communities are some of the most in-depth technical discussions on the web. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::: Thanks for your feedback, Erin! I&#039;ll consider narrowing down the research question to a single element. --[[User:Seifip|Seifip]] 10:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Art.Mescon&lt;br /&gt;
*Title: Do Etsy’s regulations aim to help buyers and/or sellers or are they primarily protective of the company itself, leaving third parties on their own to seek out reputable transaction partners? &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Art.Mescon_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
::You raise some great ideas in your prospectus that would make for an interesting research paper around Etsy. However, I wonder if it might be best to focus more on the controls for which you can already observe playing out within the Etsy community&#039;s online activities? In other words, the community norms and architecture controls within Etsy itself (user-&amp;quot;self-regulation&amp;quot; and Etsy&#039;s-&amp;quot;private-regulation&amp;quot;) might be the most reliable &amp;quot;observable data&amp;quot; that you will be able to anticipate over the next few weeks. The government level controls (public-regulation) you suggest may require moving outside this community, and I am not sure that a useful discussion (with observational data) will be possible within the page limit, nor would it be crucial to answering your research question.&lt;br /&gt;
&lt;br /&gt;
::I like the research question very much, and I think it couches the challenges you hope to observe within the methodology you propose. Also, I anticipate that the community interactions over the next couple of months should provide you with enough observational data to answer your question. One more tip on the question... What would you think about starting the question with &amp;quot;How&amp;quot; rather than &amp;quot;Do&amp;quot;...? Play around with the phrase of your question, and see how it feels. My thinking is that you will allow yourself some flexibility in what you will truly have to report on when it comes time to write up the results. The answer to a &amp;quot;Do&amp;quot; question requires one to choose a yes or no and your findings will likely challenge any &amp;quot;absolute&amp;quot; judgment call... So don&#039;t let yourself get cornered into having to make that choice (at least not at this early stage). By starting the question with &amp;quot;How do Etsy’s regulations...&amp;quot;, will allow you to have more flexibility to report on what the observations will show, and your can balance your discussion section on some good and not-so-good controls that play out over the next few weeks.&lt;br /&gt;
&lt;br /&gt;
::Last point. In your sentence &amp;quot;I intend to identify how Etsy controls, or fails to control content in a manner that is advantageous to their users.&amp;quot;, I wasn&#039;t sure if by &amp;quot;users&amp;quot; you meant the buyers, sellers, or both. My mind is interpreting that &amp;quot;user&amp;quot; is the buyer in this sentence’s context, and the word &amp;quot;content&amp;quot; is used to define both the items and community sellers that are being controlled. True? That distinction may be important to clarify as the full report gets written, because the Etsy controls and observations being gathered will (I suspect) impact buyers vs sellers vs content each a little differently.  On a similar note... To cut down on the need to follow every buyer, seller and thing in &amp;quot;Top Searches&amp;quot; for this community, do you think it would be helpful to focus on just one type of craft? I don&#039;t know enough about Etsy specifically to determine if that would work for this project, but it might be another way to find a sub-group/sub-community limit, and still provide you with enough observational data to draw some conclusions.&lt;br /&gt;
&lt;br /&gt;
::Hoping these comments are helpful! [[User:Psl|Psl]] 12:22, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Title: YouTube Comment Filtering and Other Cyberbullying Initiatives&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/File:Lpereira_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 16:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Might be interesting to determine whether and how Youtube encourages positive comments and discourage negative or hate comments.  Ultimately, it would be ideal if the character of misbehaving individuals could be improved.  Some ideas might be the use of &amp;quot;Like&amp;quot; and &amp;quot;Dislike&amp;quot; votes on these comments and/or the award/deduction of &amp;quot;attitude points&amp;quot;.  The individuals posting hate and aggressive comments could be prohibited from further postings if the attitude point reaches a certain limit. [[User:Ichua|Ichua]] 15:02, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like the focal point you will be observing, and you are quite right in pointing out that this &amp;quot;negativity&amp;quot; is becoming an unfortunate reality for many &amp;quot;open comment&amp;quot; sections within these online spaces. Even what can begin as constructive dialog and healthy debate, can quickly degenerate into blather, flames, and hate words when anonymity can be so effectively used as a shield. Interestingly, we can&#039;t always point our finger at just one &amp;quot;troll&amp;quot; injecting some deliberate provocation...because sometimes the breakdown occurs with the 3 or 4 community members who (hither to) we&#039;re exchanging words in a perfectly eloquent &amp;amp; respectful manner. But the hate, racism, and bullying that poison the dialog on these comment-boards are on a much more disturbing level, and one that certainly will make for an interesting study.&lt;br /&gt;
&lt;br /&gt;
::So, The broad question that I am hearing in your prospectus is &amp;quot;What are the most important controls that an online service provider can successfully implement to intercept and discourage cyberbullying, hate-speech, and irrelevant negativity? The sub-question then would be &amp;quot;How effective and/or constraining are those controls on the community&#039;s ability to engage with each other in a meaningful unbiased dialog about the content? (YouTube in this example)? &lt;br /&gt;
&lt;br /&gt;
::Have you given some thought to the subject matter that you will focus on, as a way to observe how these comments progress? It may be helpful to put your lens onto a consistent subject to observe the cycle of communication. From there you should be able to witness what prompts the conversation to begin in the first place; when do counter-points get introduced, how long is constructive dialog able to bridge back and fourth, what is the &amp;quot;poison-pill&amp;quot; that kills the conversation, and when do the controls kick-in?.  (Observing where the controls kick in would obviously be the essential part to report on, not so much each of those elements of the cycle of communication I itemized there.) &lt;br /&gt;
&lt;br /&gt;
::I’d be curious to also know if the observation shows that the cycle of communication is more (or less) positive throughout based on the type of subject that initiates the conversation? News stories on &amp;quot;hot button&amp;quot; topics or baseball contrasted with (say) a page dealing with baking fudge probably have different trajectories of &amp;quot;success&amp;quot; in remaining positive. (I am thinking about the inherent behavior of the potential community members themselves… one lends itself to polarized opinions with predictable “zealots” appearing in either camp, while the other community may be more welcoming of differing opinions and tastes).  SO for example, thinking of an individual wearing that New York Yankees hat in Fenway Park on game day....vs... a group of bakers talking about chocolate vs. peanut butter fudge recipes…The former is likely to risk some taunting, a black eye, a broken tooth, and perhaps a small riot... while those in the latter group, might, at worst, receive only a cavity.  Anyway, my point is that it might be interesting compare a couple of focused topics of conversation as a way of discovering a smaller sub-community that builds around a YouTube comment-board (With one engaging in  a &amp;quot;Hot button&amp;quot; topic.... While the other group is discussing something seemingly non-polarizing.)[[User:Psl|Psl]] 12:00, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Ben Harmatz&lt;br /&gt;
*Government Entities: Internet Surveillance and Censorship&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_NSA_1_draft_copy.doc&lt;br /&gt;
[[User:Benh|Benh]] 16:49, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Ben. While I think your prospectus brings up the interesting and very pertinent topic of government control, surveillance, and censorship, I think that it is simply far too broad of a topic. For the assignment, we are supposed to monitor the activities of users on a particular site or group of sites, but looking at the internet as a whole is far too much for an 8-10 page paper! Perhaps consider government control, surveillance, and censorship while observing a particular website that has been named as a victim (by the media) of NSA&#039;s surveillance and dig deeper there. [[User:Lrsanchez|Lrsanchez]] 13:02, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Patricia Byrnes&lt;br /&gt;
*Title: Are moderators effective for policing and protecting a site from illegal use?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Patricia_Byrnes_Assig._Two.doc&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 16:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Patricia, First off, love your idea, moderating internet speech, as well as your methodology: if what you want to measure is moderating behavior, norms, and free speech concerns, the “Politics &amp;amp; Leaders” forum is a fantastic place to do so since It appears that discussions there can turn from heated to vituperative in the blink of an eye! With respect to your research question, by specifying “effective,” I assume that you will quantify instances of behavior that violate the established rules of the site. This method is good since you give yourself a verifiable and quantifiable measure. You can then use Lessig’s and other scholars work to explain these data. Now, you say that you wish to &amp;quot;research the rules and regulations of the site,” which looks like it might be an insurmountable task. I visited the site’s “Super Editor handbook” and I see that it is quite extensive. Perhaps you might want to focus specifically on one type of violation, such as &amp;quot;3.4.1 Discouraged Ranking Themes - Personal Experience / Personal Preference Rankings” ? [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Vance.Puchalski&lt;br /&gt;
*Regulators and the Spread of (Mis)Information&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Puchalski-Assignment2.docx&lt;br /&gt;
[[User:Vance.puchalski|Vance.puchalski]] 17:17, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:As an extension student and a reader of both sites, I agree that extension student is often more accurate especially due to the required affiliation. You should consider when collecting your data that often information is not so black and white. A lot of people on these treads seek opinion, which is more of a personal thought rather than right or wrong. A lot on forums is opinion based, not fact based and so I think you should prepare for your data to be filled with a lot of gray areas, which you might already be expecting. The correlation between accuracy and monitoring is certainty an interesting topic. Anyway, great research topic and I’m interested to see your findings. Good luck! [[User:Lpereira|Lpereira]] 21:20, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A. Tom Anteus&lt;br /&gt;
*Cryptocurrency Uses in Conflict Zones Around the World&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Cryptocurrency_Uses_in_Conflict_Zones_Around_the_World.pdf&lt;br /&gt;
[[User:A. Tom Anteus|A. Tom Anteus]] 17:26, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Tom, intriguing topic! I&#039;m a keen follower of the Bitcoin revolution myself so have been naturally drawn to your prospectus and Daniel&#039;s as well. However I would say its quite difficult to follow your proposal. I&#039;m not quite sure how you intend to analyse and measure the use of cryptocurrency in conflict zones. Which conflict areas will you be targeting? Do you intend to follow forums or analyse chatter on various websites. If so, which ones?  [[User:Marissa1989|Marissa1989]] 07:36, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Julie Dubela&lt;br /&gt;
*Mapping Social Media Debate on the OHCHR Report on North Korea&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Julie_Assignment2.txt&lt;br /&gt;
[[User:Julie|Julie]] 18:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Julie, great prospectus. I find the whole North Korea situation appalling from a global response perspective. A lot of the articles, commentary and reactions from people around the world have been effectively muzzled. Your approach to analyse public reaction through social media is methodical and well thought through. Your plan to use specific tools to collect information from twitter hash tags, Google trends etc and follow up by analysing them to find common themes and trends is great. I look forward to reading the final report!  [[User:Marissa1989|Marissa1989]] 07:52, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Andrew Grant&lt;br /&gt;
*Quantified Self and Qualified Liability: Strava and Lessig&#039;s Four Forces&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Andrew_Grant_Assigmnment_Two_02252014.docx&lt;br /&gt;
[[User:AndrewGrant|Andrew Grant]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Andrew, your prospectus sounds fantastic. Lots of interesting questions being asked in light of Lessig&#039;s Four Forces and the Quantified Self movement. I think that you many be asking too many questions for an 8-10 page paper, if you are to go into sufficient depth for each one. Do you think that it&#039;s realistic to answer the five research questions in so short of a paper? Other than that, I think you are off to a great start and I am interested in hearing more about it. [[User:Lrsanchez|Lrsanchez]] 11:49, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In general, it might be helpful to state why your project is important and how the outcome of the research might help regulate/control or improve human behavior on the internet. [[User:Ichua|Ichua]] 19:58, 27 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1274</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1274"/>
		<updated>2014-03-04T17:06:37Z</updated>

		<summary type="html">&lt;p&gt;Seifip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jolie Ho - Wan Lap Ho&lt;br /&gt;
*Instagram vs Flickr&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Jolie_Assignment_2.docx&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 16:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How do you propose to collect data to answer the last question? [[User:Ichua|Ichua]] 15:22, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey Jolie! You picked a really fascinating topic to cover! Just a few thoughts I hope will help. How do you plan on pinpointing how all the users behave differently, just because there are so many registered accounts you might be able to find people who behave nearly the same or certain individuals who have accounts on both Instagram and Flickr. Just as a mere suggestion maybe you can find a niche that is unique to each site and compare them? Maybe Instagram has thousands of pictures of food and seflis while Flickr has more professional content? I hope this will help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:15, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like your topic to dive into why Instagram has been so successful compared to Flicker. It may be interesting to compare the age groups of each users. Instagram seems more accessible because it is a phone app that is simple and immediate to use, whereas Flicker users upload a batch of vacation photos, etc. I like Emmanuel&#039;s suggestion to compare the content between users. Another suggestion which relates to the selfies/food photos may be to compare the users themselves. I think older people tend to use Flickr and therefore may not post as much. However, younger people (who no long user facebook) posting to instagram all the time would provide a way for facebook to get back that market. ([[User:Margorm|Margorm]] 14:31, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
::Hi Jolie: This is a very interesting topic, with many possible areas focus on! (Also, a nice mix between the tech and creative worlds.) You mentioned that Instagram and Flickr diverge where mobile apps are concerned. This looked particularly interesting, especially following the Flickr app&#039;s overhaul. Anecdotally, via Twitter, it looked as though the Flickr update was a major talking point in both the Instagram and Flickr user groups. My thought was that it may be interesting to look at whether this major app update had any bearing on either of the two communities, as it may have impacted some of your research questions. Best! [[User:Twood|Twood]] 09:33, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How would this differ from other imaginary items of trade like currency/commodity derivatives and futures and virtual commodities like pork bellies?   [[User:Ichua|Ichua]] 15:17, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Daniel,&lt;br /&gt;
What an interesting topic! I was not even aware that state governments recognized these currencies. Would you be able to come up with more material if you focus on one or two countries and their reaction to the online currency? Also Ichua gave great advice; maybe one country’s reaction and policies to multiple online currencies would help in the scope of observation. Your idea of creating a website to report and share your findings is really novel! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: &lt;br /&gt;
Very interesting topic Daniel. Ive been following the progress of Bitcoin as a personal interest. Apart from the regulatory challenges Bitcoin poses for Governments, its also vulnerable to cyber attacks which can erode trust in using the currency. Whilst the actual Bitcoin itself is heavily encrypted, the Bitcoin exchanges are vulnerable to hacking and cyber theft as evidenced recently by the successful attacks on Mt Gox, one of the world&#039;s largest Bitcoin exchanges. It would be interesting to observe the effect (if any) this would have on the regulatory view of the currency by Governments. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Marissa1989&lt;br /&gt;
*Prospectus title: The rise of the collaborative consumption movement: Analyzing effective control of communication, structures of gaining trust &amp;amp; verification, and legal issues.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:Assignment_2_Barkey-2.pdf&lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 23:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hi, Marissa! I used AirBnB to rent out my apartment last summer and it actually resulted in me being robbed by the person to the tune of $10,000-- not including the rent for the summer, which he didn&#039;t pay (I didn&#039;t get any of it back, either, despite the insurance). It was a nasty situation. Anyways, from what I understand, the majority of communication on AirBnB is done privately. Without staging anything or intervening, how do you plan to observe enough to answer your question(s)? I think this is basically the same concern with one of the other treatments I read, regarding Facebook. I do think the security of platforms like AirBnB is of great concern and would be a very interesting subject to study in depth![[User:Castille|Castille]] 21:16, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Marissa,&lt;br /&gt;
I loved the idea for your prospectus! Just as a suggestion, would you consider comparing a few corresponding sites like 9flats, Couchsurfing International, or Hospitality Club? You could analyze how they handle different verifiability and security issues while also comparing how the sites are constructed to better “vet” their users. This may yield insight on how trustworthy their users are to each other. You might even want to inquire if one has had “major” legal issues in the past. I hope this helps! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:32, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Greetings Marissa!&lt;br /&gt;
&lt;br /&gt;
Your topic is very interesting and it appears we have a few of the same elements in the companies we have selected to research: Verification and trust. From what I understand, you are addressing issues of users on auction/garage sale platforms surrounding the tiers of user verifiability. In other words, who is protecting one user from being taken advantage of by another user.&lt;br /&gt;
&lt;br /&gt;
The comment you posted on the wiki under my topic in regards to the effectiveness of how the sites that I have selected deal with inaccurate comments made about companies by the general public are dealt with is of great importance-the public can ruin a business for no other reason than spite. In other words, who protects the companies from users. &lt;br /&gt;
&lt;br /&gt;
The proposal you submitted intrigues me in many ways. By studying the community of airbnb.com, it appears you will be analyzing the controls implemented to make the site successful (verification, quality feedback, security, payment, userability and collaboration). &lt;br /&gt;
&lt;br /&gt;
In summary, it appears we are both working on protection issues, and if the verification process is significant enough to gain consumer trust. &lt;br /&gt;
&lt;br /&gt;
Would you mind if I ask how you plan to analyze the user? I would be interested in your methodology, and we may even find each other’s approach helpful to each other. We may even be able to compare and contrast the communities with a similar approach and work together if you would be interested. &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 15:18, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Melissaluke|Melissaluke]] 18:36, 25 February 2014 (EST)&lt;br /&gt;
*Change.org vrs Ripp Off Report&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_Research_Paper-Final.docx&lt;br /&gt;
&lt;br /&gt;
Dear Melissa, &lt;br /&gt;
What a great topic and area of coverage!!! I’m hoping my comments and questions will be of help to you! Which site succumbs more readily to outside pressure and take down requests? Also you mentioned that a susceptible compliant to both is that they are accused of not “vetting” their sources. You could possible test to see which one (if either of them do) checks them more thoroughly. This might be, and I know nothing about it, accomplished by putting posts of your own and noting if they require any amount of proof, citation, source, or quote of any kind. I really hope this helps you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:35, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thank you so much Emmanuel! Your ideas are superb and very helpful!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Melissa, these sites can be a boon for consumers in helping to identify unscrupulous businesses and thus avoiding them. The issue that I find with these sites, that&#039;s never been effectively dealt with, is how do they identify and remove potentially inaccurate comments attacking a business as a result of say, a personal vendetta by a disgruntled employee or a customer who was unreasonable. Many small and medium size businesses rely on word of mouth for new customers. If the site allows the comments to remain, it may affect the business.  This in effect may lead to possible blackmail of businesses by threatening to post inaccurate information on these sites. I&#039;m also very interested in the sample groups and postings that you choose. Great topic! [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marissa, Excellent insight and the problems posed are valid. Your questions are helping to me and assist in narrowing the topic-which is clearly too broad at the moment.&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Melissa, Just a quick note, because I loved your prospectus so much (it&#039;s such a creative take on the assignment, but still seems to hit on all the prof&#039;s requirements, really amazing job). With your &#039;&#039;&#039;Q1&#039;&#039;&#039;, &#039;&#039;Why would one site be more popular?&#039;&#039;- I can;t help but wonder, does the fact that it has such a simple, perfect 1-word URL have any effect? Also, due to the time (2007) &amp;amp; place (USA) I automatically assumed this website was somehow related to Obama&#039;s election campaign- though from quick Google search there doesn&#039;t seem to be any direct link. Anyways, just wanted to say, I really like your prospectus. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:49, 3 March 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hey Mike, it would absolutely be my pleasure to provide feedback to you. I won&#039;t go too far before having the time to focus &amp;amp; read it completely- so my first feedback to you is: if you didn&#039;t pick such an interesting topic, I would have actually read the full prospectus. However after reading your first paragraph, I ended up watching TPP and reading its subreddit and forgot to finish reading your prospectus! hahaha. But this weekend I&#039;ll spend time focusing and try to provide you feedback, hopefully as good as the feedback you gave me (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 10:34, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Mike! After reading [[User:Jkelly|Jkelly]]&#039;s comments below, I&#039;m kinda worried about posting my comments, cus I think I understood your questions from a different point of view. &lt;br /&gt;
::*First of all, my question- how do you approach your 2nd qualitative question? I&#039;m not completely sure I understand what you mean by vulnerability.&lt;br /&gt;
::*Second, my advice, feel free to take it or leave it: to keep within scope of this project (2500 word paper seems so short!), I believe it may be easier to tackle Qualitative questions #1 &amp;amp; 3, and your second quantitative question (&#039;&#039;Has it helped or hurt the game to impose such controls?&#039;&#039;). I get the impression that these questions would be the ones that would be easiest to answer from following the community discussion on the subreddit. That being said, if we were writing 8000 word papers, it would be so much fun for you to really dive into the architecture &amp;amp; UX of the game itself, while paralleling it with the subreddit(!!!). Really awesome topic &amp;amp; prospectus.&lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:After reading your prospectus, I have a few questions based on your questions, or maybe some questions that combine the ones you already have. It seems clear from what you write in your prospectus that the user experience is absolutely vulnerable to the controls imposed by the game, but I&#039;m curious to know in what ways. Were users bumping up against controls they didn&#039;t like before there were changes, or was it only after the controls of the creator were made clear (he made himself known in an explicit way, rather than operating quietly in the background) that users began to find fault? (Another way of thinking about this might be- were a lot of users thinking about the controls imposed by the game before the creator&#039;s changes forced them to think about it?) If I understand the current set up correctly, it seems that users still have the option to have commands parsed as they go instead of waiting for them to be tallied and then implemented. So, were the controls only seen as problematic once users considered that there was one person making a decision that affected every user? Is the lack of democratic decision-making behind the scenes a bigger problem for users than the actual changes in user experience?&lt;br /&gt;
&lt;br /&gt;
:As far as your quantitative question goes, I&#039;m wondering if there&#039;s any way for you to know how many users stopped playing the game after the creator made changes? Do you have a means of seeing the changes over time? [[User:Jkelly|Jkelly]] 14:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
Dear Michael, &lt;br /&gt;
I find your prospective very interesting! I thought to give you these few suggestions. I hope they will help! You might want to see what percentage of Flickr users are a part of the Creative Commons community and whether it consists of a majority or a minority. Another area of research might be into the other forms of control that Flickr uses to protect copyrighted material, and then to compare them with Creative Commons to see if they are as effective, prevalent, or well known. Also, when there are infringements in copyright policy, do people respond to correction or do they just ignore and continue violating the rules? Lastly, how does the Creative Commons community handle repeat violators (if there are any)? Wish you the best! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:43, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Lucia, This is looks to be very interesting - I was wondering if you can be more specific on what types of data the initiative is exploring. Are they looking for statistical data mainly, do you vote on what subjects you are going to put on the website or research? It looks like a great example of policy control via the government. I would to know more about the website and its overall goals - something that helps define its missions parameters, as I visited the website main page and got an idea of what they were saying - I am just needing some more clarity that&#039;s all. But again, the subject looks like a great idea and should be very interesting...[[User:Dancoron|Dancoron]] 18:48, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Lucía! &lt;br /&gt;
I think your choice of study fits perfectly with the theme of the course! Perhaps you can also investigate to see if they are stifling public opinion or whether they are flooding the docs with pro-government voices to influence the theme towards their agenda?  Also as a suggestion, can you see if it is truly open to everyone? Maybe you would like to find another similar program that the government has tried in the past (assuming that they have tried). Do the number of participants fluxuate? Is there a trend in what the government sees as inappropriate? Or is it just random edits that are corrected by the government? I hope these comments can help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:13, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I&#039;d really like to read and comment on your prospectus, but it seems like the file didn&#039;t upload. Happy to respond to it once it&#039;s up!&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 20:57, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I second Jkelly&#039;s comment. This look very intriguing and I&#039;d like to learn more about your plans for the project! [[User:Twood|Twood]] 23:14, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Third. --[[User:Seifip|Seifip]] 11:58, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hello, Dan! Admittedly, I had never heard of “Anandtech.com” prior to reading your prospectus, but I’m glad that you told me about it. I really like their “Cable TVification” assessment of the internet in recent years. After reading your prospectus it seems to me that you are focusing on Lessig’s norms as regulators within the site’s forums, as well as “laws&amp;quot; instituted by the website. It is an interesting subject, because as you say, this particular forum is very successful in fostering an environment where users are likely to return. That said, I see that you qualify users of the site as “good,” and I’m curious to know how you will operationalize this term for your project. You mention words like “courteous” and “helpful,” but I’m wondering: what characteristics do you think you will look for when observing, in order to qualify a “good user.” For comparison, do you have an example of what behavior that “bad” users might entail? Lastly, I see that there are literally millions of post on the forum; you may wish to focus on a specific topic and/or date range in order to have a more manageable data set to observe. I’m interested to see what you’re project will entail, especially being that I am also observing forums for my project. [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Vance, thanks for taking the time to look at my prospectus - Basically, what I meant to convey is that these are the characteristics of a &amp;quot;good&amp;quot; website, a website that demonstrates use and activity to by the administrators and its members/users. What I will be focusing in on is, how is the site&#039;s control policy administered and conveyed to its members, both historically and presently, through the links in my prospectus – and to answer your question about bad behavior in online forums, yes I will, as I think that is a critical component regarding context – And this also goes out too Marissa as well, what I really wanted to focus in on was how does bad behavior and is control policies in its forums, effect a webite economically - as I think ths would even go further towards Lessig&#039;s FOUR norms of regulation on where the dot lands - but for obvious reasons, that could end up being too big. However, I still might toss something like that in - My goal is to pick out a couple of instances of the control poliy being implemented and see what the results were based on specific incident/instance was there a ban and how long was it for - what was the reason, what was the community&#039;s response to that action and so forth... - Again, thanks for the input and suggestions.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Dan, forums have proven very useful mediums for learning and troubleshooting. What would be interesting is how forums deal with covert advertising I.e. Forum posters who may be businesses, subtly advertising their own goods or services under the guise of responding to threads without paying for advertising rights. Would paid advertisers pose potential conflicts of interest to the neutrality of forums? I&#039;d also be interested in seeing how you compare the Anandtech&#039;s forum controls against others. Would you choose similar types of forums with respect to content type? [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marrisa, I tried to include your response with Vance&#039;s up top :O) [[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Dan!&lt;br /&gt;
If you are mainly comparing Anandtech’s forum site policies, maybe you could also compare past versions of the rules? Also, you might want to see if Anandtech has any unique features in toxicity control that would make it standout from other less successful forums. Overall the concept is fantastic! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Emmanuel, thanks for the feedback - ya, I am going to try and put some type of onus on Anandtech as well, and see if some of their reactions to their policies could be considered a little over zealous or a bit too far reaching. Most times, their admins/moderators are pretty decent, but again, like everyone else, there are times when a few of their admins/moderators could be having a bad day and maybe be a little too heavy handed - we&#039;ll see, stay tuned to find out. just a little humor :o) Thanks again for the input.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:First of all, GREAT TITLE!!! Second of all, this seems like an extremely interesting subject and I&#039;d love to read more about it. I do wonder whether you&#039;ll be able to get access to the material you might be looking for by doing &amp;quot;undercover investigation&amp;quot; and the other research methods you listed. It seems to me that the kind of exchanges you&#039;re discussing would be difficult to observe on Facebook as they likely wouldn&#039;t be out in the open. I may be completely mistaken, but I was also under the impression that the assignment encouraged examining a more open forum or something of the like where observation was more feasible. I know that there are public matchmaking sites and I would assume there are also forums geared towards those who wish to have illicit affairs, so that might be an area into which you may want to delve. [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:I also love the topic and find the subject very interesting! I share Castille&#039;s concerns above. It seems challenging to get access to the materials you will need to answer these questions. I wonder if there is an open forum somewhere in the internet where angry divorcees can go to vent about how social media ruined their marriage? It may be a biased site, but it may provide resources to other statistics or materials that may help? Or if there is a community you could observe and monitor the degree of online flirting? ([[User:Margorm|Margorm]] 14:48, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wow very cool subject - and one I am sure that deserves a lot of attention these days. With that said, it seems that this subject matter could be a thesis or dissertation as the material collected probably seems to be endless. I was wondering what specific community are you going to target on facebook, as this looks to be potentially a very large paper? I have to admit that I am fascinated to see what other statistics this might uncover, as I am sure we all have heard stories of spouses leaving their significant other for someone they met online. Yet maybe, you can focus on something more specific then a facebook community - as there might be other communities or even forums that have support groups for such instances or circumstances that you mentioned earlier. Maybe seeing how they interact with each other and what rules or policies can be observed and commented on. Overall the topic is really great and I am sure it will have some very interesting content that is fascinating.[[User:Dancoron|Dancoron]] 19:13, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Very interesting subject matter Amy!&lt;br /&gt;
&lt;br /&gt;
You may have selected one of the most controversial and highly emotional subjects out of all proposals presented.  I would agree with Dancoron. The questions outlined could lead to a doctoral dissertation. Additionally, Castille does bring a good point to light, in that we are encouraged to avoid any work as an “alias”. &lt;br /&gt;
&lt;br /&gt;
I think many of us are having trouble (to include myself) narrowing the research down to a tolerable amount of data collection for an in depth analysis.&lt;br /&gt;
&lt;br /&gt;
In your proposal, you suggested comparing and contrasting divorce rates. What sources would you be comparing and contrasting? Are you speaking to different communities in the United States or on a larger level?  Or, are you addressing the male/female divorce ratio? &lt;br /&gt;
&lt;br /&gt;
Secondly, will you be cross-examining two nations who have access to Facebook, in efforts to compare and contrast divorce ratios in direct correlation to Facebook usage? &lt;br /&gt;
&lt;br /&gt;
If your research goals are to use Facebook as the platform for study concerning divorce, it may be difficult to get access to this information unless you are accepted into a person’s profile, group or community. In efforts to stay objective, I don’t think you would want to study anyone that you personally know.  Pornography could be a difficult study, in direct correlation to pornography with the controls Facebook allows for each individual user. &lt;br /&gt;
&lt;br /&gt;
Would it be possible for you to follow a smaller, more open group that readily blogs/views pornography that is open to the public for data collection in a short period of time? &lt;br /&gt;
&lt;br /&gt;
Unfortunately this is completely out of my arena. I have never been married and I don’t view porn sites. But, your topic is fabulously interesting. &lt;br /&gt;
&lt;br /&gt;
Good luck with your research and I can’t wait to see your results.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hi [[User:Margorm|Margorm]]! I love your topic. Your prospectus, combined with our brief discussions in class have really made me wonder- if 23andme is part of the first iteration of DNA decoding tools for personal use, where will we be in 25 years (: Just my general thoughts on this great topic- my comments specifically regarding your prospectus are below:&lt;br /&gt;
::*I really like that you asked whether the FDA is the best agency to regulate DNA testing, especially your last sentence &#039;&#039;what regulatory bodies outside of the FDA should be paying attention to this personalized and identifiable database?&#039;&#039;. Throughout this class, I&#039;ve had similar types of questions many times.&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, however it seems that the data you will collect (assessing changes in attitudes of community members) will be more apt to answer your 2nd question (&#039;&#039;How has the ban on delivering health-related risk assessments to the 23andMe community impacted the consumer’s trust toward the product?&#039;&#039;), rather than the underlined question that I referred to in my previous bullet.&lt;br /&gt;
:Please note that I am most interested in your underlined question regarding the FDA! However my advice is that your second question regarding attitudes &amp;amp; trust may be easier to study with respect to your methodology.&lt;br /&gt;
:[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST) - updated 03 March 2014 ~11pm&lt;br /&gt;
&lt;br /&gt;
:It seems clear that although institutional positions and statements are mostly contrary to the patentability of human genes as such, however international patent offices (U.S., Europe, and Japan) have accepted the patenting of human DNA sequences if they meet the technical and legal requirements, including the “utility”. DNA occurs naturally in the human body and should not be patented by a single company that can then use its patents to limit scientific research and the free exchange of ideas. As said by Koepsell “Laws of patent are meant to be used to protect inventions — things that engineers are doing — not things that scientist discover” (Holman, 2007). A regulatory block of decoding tools for personal use would seem to be an exercise in economic control. I believe you&#039;ll find an ample supply of public opinion in regards to attitudes of community members.  [[User:VACYBER|VACYBER]] 10:28, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
::Castille, I think you have a really excellent topic here. My first thought is that it would probably be helpful to choose a particular self-harming behavior that&#039;s discussed on Tumblr to help narrow the scope of your work. Additionally, while these issues can and often are related, I imagine that the Tumblr communities that surround each issue probably have a distinct culture. This topic makes me think of the Jessica McKenzie piece, &amp;quot;Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag&amp;quot; we read in week four. I would be curious to know how many of the controversial hashtags are actually used in subversive ways. Some of the reactions to Tumblr&#039;s policy change seem to touch on this when users write that they use these tags to address their own struggle with self-harming behavior. After these policy changes got some press, did it shed enough light on these self-harm blogs to inspire users to use these potentially triggering hashtags in new and positive ways?&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 13:56, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thanks for your feedback! I&#039;m planning to narrow the scope to primarily center on pro-suicide blog postings, but I think I&#039;ll have to use some other examples such as cutting and possibly even pro-eating disorder blogs, as they all seem to interact with each other. It appears from my research thus far that the communities are intrinsically linked much more so than I expected. I agree, it would be interesting to see if things have changed-- though I&#039;m not quite sure how to gauge pre-policy versus post-policy changes. If you have any ideas, I&#039;d love to hear them! [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Castille, fantastic topic! I like your approach to analysing this topic and its a subject which is very controversial &amp;amp; personal. I agree, the main challenge for any Government is to try and regulate the numerous blogs and hashtags on sites like Tumblr, effectively putting a suicide watch on them. Would this be an effective use of tax payer funds and how many suicides could this prevent? What would be the process be if a potential suicide victim was identified? We have to be careful not to act in a knee-jerk reaction when there is a death and expect the Government to do something about it. I think there needs to be a balance of responsibility between these site operators and the Government. I&#039;m very interested in the outcome of your topic. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Watson!&lt;br /&gt;
&lt;br /&gt;
A few questions:&lt;br /&gt;
&lt;br /&gt;
How would you determine which distribution channel the Syrian opposition used the most?&lt;br /&gt;
&lt;br /&gt;
How would you be able to detect the limitations of public information if it has not been disclosed?&lt;br /&gt;
&lt;br /&gt;
If you were to select two media channels to compare/contrast,  would there be enough data available in those two communities to properly “diagnose”, or is the data withheld from the public?&lt;br /&gt;
&lt;br /&gt;
If you chart a paper on what capacitated the Syrian opposition groups to communicate their cause, will this information lead to a report or a true communal study on the Internet? &lt;br /&gt;
&lt;br /&gt;
Very interesting proposal and I wish you the best in your research!&lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:This is a very interesting topic. There is a lot to examine here, especially since a large part of the attacks and arguments happened online. An interesting topic would be to mention the Syrian Electronic Army and the many acts of online vandalism that they did. You can find more info here: https://en.wikipedia.org/wiki/Syrian_Electronic_Army The Internet was certainly a tool in the conflict. An interesting focus would be to investigate their motives and the impact this electronic army had on the Syrian conflict. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 21:01, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LRS_IS_prospectus.docx&lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Laura – Instagram is not only the biggest mobile photo sharing app, but is also now owned by Facebook, and thus a disproportionate amount of mobile peer to peer communication falls to the censorship whims of this company. This is an incredibly worthy area to research, if not lofty. Since Instagram now allows direct, private communication of photos, you have to wonder if there is a difference in how moderated these communications are versus a post intended for the public that uses hashtags (let us not forget that the hashtag’s original use was searchability, not irony). That said it might be very difficult monitor the differences in speed and effectiveness of what gets censored without interfering with the community you’re observing. One way may be to follow news events (such as this recent one: http://abclocal.go.com/wtvd/story?section=news/local&amp;amp;id=9448993) that show Instagram’s policy enforcement in action. The issue with that approach is that it is cherry picking the successful takedowns rather than observing uncensored posts that are breaking the terms of service.  Another option may be monitoring Instagram’s list of banned hashtags and searching synonyms or alternate hashtags, but again this is a difficult aspect of their policy to observe in action. &lt;br /&gt;
::I believe there is still strategizing to be done to design your observation of the community, above merely reporting their policy. I hope my take somehow helps you with this endeavor! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 09:55, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi, Laura! I think Instagram is a really great topic and will provide a massive amount of material, which I think can be beneficial and detrimental. It seems you might want to consider focusing on a specific aspect of censorship on Instagram, like nudity, drug references, or profanity (if any of those are prohibited-- I don&#039;t know their specific terms of use). What aspect of Instagram&#039;s censorship do you find to have the highest potential to become problematic? Is their choice as a company to disallow certain messages/images actually infringing on free speech, when they don&#039;t have any power over whether an individual chooses to express himself (IE he/she is still capable of posting the material on another site), they merely control/monitor the postings on their own site? [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
:Hi Jon- My first thoughts on your prospectus have to do with scope. In comparing these three different games, I think there might be too many factors to consider-- subscription-based vs. free, PC vs. iOS, etc. I wonder if it wouldn&#039;t be more manageable to tackle your research questions if you focused in on two games that were more similar so that you have fewer variables to contend with when you&#039;re thinking about your research questions. My instinct is that working with WoW and League of Legends would work since you can still attempt to tackle each of Lessig&#039;s four forces. I&#039;m not sure how much the law in the US varies from that in Finland, but removing Clash of Clans from the equation might help the narrow your scope in that sense as well. [[User:Jkelly|Jkelly]] 14:27, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Jane – It is a great idea to compare feminist discussion within the confines of a feminist-oriented website to discussion in a public space without this slant. The regulations on discussion are obviously going to be wildly different in each of these communities. You identify Facebook and Twitter as less thoughtful in their discussion for feminist topics - perhaps as a result of their differences in comment policy? I was interested in the comment policy of Bitch Media that you mentioned in the prospectus, so I looked it up. (For others: it can be found here: http://bitchmagazine.org/comments-policy) One line that stood out to me was the following: “As far as moderation of this space goes, guest bloggers moderate the comments on their respective posts, but website moderators will step in when necessary.” – Does this mean that each blog post is technically regulated in a different way? It is not a deal killer if so, because it sparked the following idea: Because FB and Twitter are big places, could you find a smaller community (that is not inherently feminist-oriented) that is discussing the same thing as mentioned in one or a few of the Bitch Media posts, and compare the discussions directly? Just a thought! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:54, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Does &#039;&#039;anyone else&#039;&#039; see the awesome irony of a woman named Jane writing about Bitch magazine? Am I the only one on here who was a teenage girl in the &#039;90s? I remember clear as day, reading [http://bitchmagazine.org/article/ten-things-hate-about-jane Bitch&#039;s criticisms of Jane] back in 1998. BTW [[User:Jkelly|Jkelly]] I hope you understand that as a very longtime fan of Bitch magazine I am in no way criticizing your project, I actually think it&#039;s &#039;&#039;&#039;such&#039;&#039;&#039; a cool topic. You &amp;amp; I would probably have been awesome friends as teenagers. p.s. This doesn&#039;t count as a comment on the prospectus!!! I hope. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:44, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Haha, thanks so much for sharing that Erin!! I haven&#039;t had a chance to read the whole thing, but when you see words and phrases like &amp;quot;fake, sanctimonious,&amp;quot; &amp;quot;self-obsessed,&amp;quot; &amp;quot;narcissism,&amp;quot; &amp;quot;blithe unconcern with which they suggest spending huge amounts of money on items of debatable utility,&amp;quot; and &amp;quot;overweening focus on the superficial, ersatz do-it-for-you tone, and fake individualism&amp;quot; in just a quick scan of the article, it&#039;s bound to be a fun read. Thanks! [[User:Jkelly|Jkelly]] 08:53, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
:: Erin - I think the comparison of two subreddits with different regulations is a solid method of studying the effect of regulation on political discussion. I also believe the two subreddits you have chosen make for a great comparison. The only reservation I have in your prospectus is the focus on word count of the regulations as indicative of the rigor of the moderation. For example, one subreddit may simply say &amp;quot;Discussion of Russia is forbidden&amp;quot; - which in five words hampers more conversation than either of the two sets of regulations do in actuality. I do not think the word count is a meaningful statistic. Apropos your question of whether those without internet access will be under-represented in our studies, I would say that because we are focusing on specific small communities to begin with, we are under-representing the reactions (to control) of everyone in the world who is not in that community. The vast majority of the world is not included. Our focus is on only those within the community itself that we can observe. Ultimately I believe your project is designed very well. Since I too am studying a subreddit for my project, I will be following your progress closely!&lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:23, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Hi [[User:MikeJohnson|MikeJohnson]]! Thank you very much for the feedback, very good point about the empirical data on the rules, hopefully I can expand when I have 2500 words to work with. BTW, I just wanted to comment- the question about people without Internet access was actually [[User:Ichua|Ichua]]&#039;s question. My understanding of the assignment is to study &#039;&#039;only&#039;&#039; online communities for this assignment (and not offline humans, which excludes anyone who doesn&#039;t or can&#039;t access the Internets). My question that [[User:Ichua|Ichua]] commented on is whether &#039;&#039;&amp;quot;users are intimidated by the effort or research required to post, thus limiting participation to a narrow audience&amp;quot;&#039;&#039;. Sidenote- &#039;&#039;&#039;Thank you&#039;&#039;&#039; very much for introducing us to the Twitch Plays Pokémon phenomenon in class. So freaking cool. My God do I ever love the Internet.-[[User:Deluxegourmet|Erin Saucke-Lacelle]]&lt;br /&gt;
&lt;br /&gt;
:::: Thanks Erin! I think it is absolutely amazing as well, and I&#039;ve never played Pokémon. If you would like to read my prospectus and help me think about potential research questions using their subreddit, I am all ears. [[User:MikeJohnson|MikeJohnson]] 11:34, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Ian, great topic and I like the innovative approach you&#039;re taking. I agree that social media is an important medium for Governments to gauge public mood or opinion. In fact, Australia&#039;s Prime Minister, Tony Abbott recently spent $4 million to analyse social media and gauge the public mood on certain policies he introduced. From my understanding, you&#039;re looking to build something like a mind map to organise the social media feedback and also meta tag it? This would effectively allow content to be searched and categorised similar to a knowledge base. Just a couple of questions though....How will you apply the cognitive map? Do you have a specific social media medium and Government in mind? Looking forward to reading the final outcome! [[User:Marissa1989|Marissa1989]] 07:42, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I was unaware of this community exits, and I think it will be a great place for graduate students and researchers to find which papers they should be reading. For example, if I need to utilize a method that is slightly outside of my field, this community will help identify the appropriate and esteemed papers. This may also serve as a better model for Peer Review (one day). Because PubMed is already an exclusive database primarily for biomedical researchers, I am interested to what you observe. I am worried that because only pubmed users (or people using a University IP address) have access to pubmed articles, open access will play a minimal role in which articles spark more conversation. Unfortunately, people tend to converse about papers in high-impact journals like Nature and Science, and I would expect these articles to compete with the open access ones. Perhaps an observation of which articles receive complaints about not being open-access for the curious science lover who is no longer in academia may be an interesting perspective.. ([[User:Margorm|Margorm]] 13:45, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
:::Hi Paul! Thank you for introducing me to PubMed Commons! I have to agree with [[User:Margorm|Margorm]]: people who are &#039;allowed&#039; to comment on PubMed articles often have access to most articles through their Universities or Institutions. That being said, since first reading your prospectus, I&#039;ve thought so much about the access to PubMed Commons. In order to be part of the community, the major factor is that you are an author of a paper appearing in PubMed. An author can &#039;invite themselves&#039; only if PubMed has your email address on file. For personal/professional interest of being a member of this site, I&#039;ve checked with 8 different people (who are all corresponding authors on separate PubMed articles) whether they could invite themselves, and only 1 of the 8 authors could gain access. I understand why it is important for PubMed to confirm identity, however I believe this factor will strongly limit the adoption of PubMed Commons. It should also be noted that I am not an average PubMed author- most scientists I talked to about this think &#039;social media is stupid&#039; or a waste of time. Very few will go through the trouble of asking 8 separate authors to try to log in, until they find one person who can. However, exactly as Margo pointed out, &amp;quot;This may also serve as a better model for Peer Review (one day)&amp;quot;.&lt;br /&gt;
:::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I can see where this topic would make an interesting focal point for a review article or commentary on the exploitation opportunities, (legal and criminal) that open source software packages like these permit. As an administrator of several IT systems myself, reading your prospectus has made me curious to learn more about NESSUS and Metasploit, and perhaps use them to test out weaknesses in my own servers.&lt;br /&gt;
&lt;br /&gt;
::Let&#039;s continue along that thought...and say I will download and experiment with this software... I&#039;m using this scenario &amp;quot;hypothetically&amp;quot; in hopes that it may help you focus more on the key question(s) you are hoping to answer, and to also consider &amp;quot;from where&amp;quot; you will be able to make some observations to address that question. In other words, where might you be able to follow some online community activity over the next few weeks, and observe some interactions between the users, developers, and IT administrators who work with these software packages?&lt;br /&gt;
&lt;br /&gt;
::So, after just now learning of these open source packages, I want to download them on my Linux box and experiment. I want to see how others have installed, implemented, and customized the software to exploit a variety of possibilities. Is there an open community where I can lurk and maybe participate in a discussion to learn about various ways I can use this software to test out my servers for vulnerabilities and bugs? What kind of controls might I be subjected to within that community that may prevent me from discussing specifics about what known vulnerabilities have been discovered, and what security holes one can exploit? If I discover a major security flaw, can (or should) I document this within that online community? Are there normative, legal, and/or architectural controls that prevent or discourage divulging too much information within his community? I noticed a discussion forum at http://discussions.nessus.org/welcome, and https://community.rapid7.com/community/metasploit... would these be the communities you were considering?&lt;br /&gt;
&lt;br /&gt;
::Anyway, hoping this helps out. I just wanted to raise these questions as a way to help you identify the specific online community where some observable activity will occur, and focus in on what controls you hope to be able to see playing-out during the rest of the semester. You may already have that in mind, but it wasn&#039;t in the prospectus, so I thought I&#039;d raise the questions here. I think knowing the answer to these questions will help put the ideas into the context of the Final Project&#039;s objectives and should also help with the next task of building the outline in Assignment 3. [[User:Psl|Psl]] 14:25, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Somehow the uploaded RTF file had been converted to a CALC spreadsheet file, making some of the contents hard to read. [[User:Ichua|Ichua]] 15:08, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:: Hi Twood. I find your paper topic to be incredibly interesting and well-thought out. I wish I had constructive criticism to give you, but I find that you are on the right path. My only question at the moment: how do you plan on measuring the response of community members to the each sites&#039; control mechanisms? [[User:Lrsanchez|Lrsanchez]] 11:41, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Twood, I find this to be a very cool topic and being a musician myself, makes it even more so. I have never ever been a fan of sampling music outright and then adding a new beat and some remixing to make it one&#039;s own, just not my style. I like the prospect of you examining a smaller or less commercialized community musically (as compared to You tube). Again, as own who owns small studio at home and records pretty solidly, it is always great to see musicians recording and producing their own stuff from scratch with small home studio setups. I hope you show an example of a community catching someone in the act of stealing another&#039;s music or idea and what the outcome of that interaction will be - because as musicians we always borrow, modify or improves someone else&#039;s cord progression or guitar lick to make it our own. So, it would be great to see if you could hint about that distinction - as I am sure it comes up a lot in communities like this. But, overall really nice topic to concentrate on.[[User:Dancoron|Dancoron]] 19:42, 2 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Cheikh, I&#039;m looking forward to reading your paper. Online technology journalism is indeed a most interesting industry... after all, a tech journalist with sufficient influence can single-handedly kill an up and coming technology project with billions in R&amp;amp;D costs, and this is particularly worrying given how easy it is for a competing company with a sufficient budget to influence said journalists, as well as how often these journalists write reviews having used the product in questions for mere minutes, or without necessary expertise in the are where such product can be useful. That said, my suggestion to you is to narrow your topic to one single research question. At the moment, you paper risks going astray as you intend to cover a wide array of very different concerns. --[[User:Seifip|Seifip]] 12:06, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Emmanuelsurillo&lt;br /&gt;
*Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:You raise some great research questions to examine within these communities. You might want to narrow your focus more. Will you be talking about the legalities of “jail-breaking” and it’s effect on the Apple and Android market? Considering the topics we discussed in class, it might be interesting to develop your research to mention the view of major companies toward these forums and the rogue developers. Once an iphone is jail-broken, it losses its apple warranty coverage. This might be a topic you want to bring up with your research. Good luck! [[User:Lpereira|Lpereira]] 21:36, 3 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Emmanuel,&lt;br /&gt;
&lt;br /&gt;
You have selected a really “hot” topic. Mobile applications appear to be taking over actual web development these days. I’m in the process of creating a new site, for the general public, to locate assistance after they have been harmed by other entities. The developer of my site highly recommended that I create a mobile app at the same time.  He is correct and the only reason I do not plan to follow his suggestion is directly related to cost.&lt;br /&gt;
&lt;br /&gt;
I’m unclear of the real statistics, but Internet users seem to be using phones as their selected source of information more frequently than computers. Most people carry their phones (even to bed) but fewer seem to be in constant travel with their laptop.  &lt;br /&gt;
&lt;br /&gt;
I am not familiar with the sites you listed in your proposal since I am not a mobile application developer, but I am happy to learn there are forums to enhance applications through large communities. &lt;br /&gt;
&lt;br /&gt;
It appears many of our classmates are attempting to use a compare/contrast approach, which seems logical, if we want to identify how resourceful one community is versus another. Your research will be extremely useful to many, and I would like to pass your results onto my developer after you have completed all the hard work (smile). &lt;br /&gt;
&lt;br /&gt;
A few questions for you: &lt;br /&gt;
  &lt;br /&gt;
“I want to compare how useful and productive these web sites are to the users end for accomplishing these goals.”&lt;br /&gt;
&lt;br /&gt;
1.	How do you plan to compare and contrast the central 7-9 questions outlined in your proposal for the final project? In other words, will you be able to summarize the data from each research question in one succinct paragraph to meet the page requirements?&lt;br /&gt;
2.	Do you think it would be easier to select 2-3 questions presented in your proposal to dig a little deeper or perhaps ask a few others from the class to join you on a team to cover all the questions presented?&lt;br /&gt;
&lt;br /&gt;
I ask these questions, because I am struggling with these issues myself.  I believe if I ask enough people in our community who are using a similar approach, I will (eventually) determine a model that may be useful for my own research. &lt;br /&gt;
&lt;br /&gt;
Another suggestion: Could we potentially find a group of people in our research community (class) that are interested in using a similar approach, but still collectively analyze the communities we selected for personal purposes? In other words, I am certain most students have selected the entities of study for some reason, such as personal satisfaction or business achievement.  However, Andy has made it clear that he would entertain teams multiple times. In fact, the option has been posted on every page of our instructions for the main project.  In fact, the option has been posted so many times that I am beginning to think he may be giving us a subtle hint or clue: “This assignment will be more effective if you work collectively together and you may gain more valuable research by teaming”. I don’t read minds, but… &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
I am attempting to look at the effectiveness of two sites created to allegedly help people who have been taken advantage of by either an entity or a person. Section 203 under the Communication Decency Act assists people in their ability to say whatever they think, regardless if correct.&lt;br /&gt;
&lt;br /&gt;
You are comparing two mobile application sites to analyze how useful and productive the sites are for the users to include accuracy and validity.&lt;br /&gt;
&lt;br /&gt;
Marissa is researching the validity of airbnb.com, and looking at the controls put in place by the website to protect people.&lt;br /&gt;
&lt;br /&gt;
I still have many proposals to read today, but it does appear that many of us are running in a few general hypothetical areas of question:   &lt;br /&gt;
&lt;br /&gt;
Which site is more effective due to the controls implemented by the site itself? (Compare/Contrast)&lt;br /&gt;
&lt;br /&gt;
Can the data on these sites be considered valid? Is so, why or why not?&lt;br /&gt;
&lt;br /&gt;
Could we potentially work together on a research methodology for all three sites to compare and contrast if the model is effective in and of itself while measuring the data across the board for multiple communications? In summary, we could compare and contrast the model that we collectively created against the sites we personally selected.&lt;br /&gt;
&lt;br /&gt;
My biggest concern with many of our proposals is that they are too broad and we will not find the depth.  Most of our topics could be potential dissertations; unfortunately we are lacking 5 years of research time (smile).  I plan to look for commonality in proposals submitted-perhaps we can all make this better together. Could we potentially try to use our class community to research the depth of the Internet communities.?&lt;br /&gt;
&lt;br /&gt;
Just thoughts. &lt;br /&gt;
&lt;br /&gt;
Cheers!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 17:07, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Emmanuel,&lt;br /&gt;
&lt;br /&gt;
Great topic!!&lt;br /&gt;
I am not sure if you would like to go into that direction, but from my point of view, I would say there is a big difference in the active level between iphone users via Android users in forum.&lt;br /&gt;
Iphone users are usually not as active as Android users in forum. And I think this is a really interesting topic to look into.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I think it would be a good idea to narrow down your topic as there are 9 research questions that you are planning to coverin your paper. It would be difficult to talk about each question in depth with the words limit.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:42, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
::Hi [[User:Seifip|Seifip]]! Few bits of feedback for you. First of all, I like that you tied back to Lessig&#039;s regulators. Very strong prospectus overall. Second, I wonder how you define an &#039;&#039;effective way of shaping an online community&#039;&#039; ? I assume that you didn&#039;t define &#039;effective&#039; because of the 400-word limit for this assignment. My advice would be for you to perhaps draw specific comparisons between StackOverflow and another online developer support community. Alternatively (and perhaps more fun), you might change the phrasing of your research question to something like &#039;In what ways does X architectural element affect conversation on StackOverflow?&#039;. Overall though, I think this is a very strong topic for your final project, because developer communities are some of the most in-depth technical discussions on the web. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::: Thanks for your feedback, Erin! I&#039;ll consider narrowing down the research question to a single element. --[[User:Seifip|Seifip]] 10:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Art.Mescon&lt;br /&gt;
*Title: Do Etsy’s regulations aim to help buyers and/or sellers or are they primarily protective of the company itself, leaving third parties on their own to seek out reputable transaction partners? &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Art.Mescon_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
::You raise some great ideas in your prospectus that would make for an interesting research paper around Etsy. However, I wonder if it might be best to focus more on the controls for which you can already observe playing out within the Etsy community&#039;s online activities? In other words, the community norms and architecture controls within Etsy itself (user-&amp;quot;self-regulation&amp;quot; and Etsy&#039;s-&amp;quot;private-regulation&amp;quot;) might be the most reliable &amp;quot;observable data&amp;quot; that you will be able to anticipate over the next few weeks. The government level controls (public-regulation) you suggest may require moving outside this community, and I am not sure that a useful discussion (with observational data) will be possible within the page limit, nor would it be crucial to answering your research question.&lt;br /&gt;
&lt;br /&gt;
::I like the research question very much, and I think it couches the challenges you hope to observe within the methodology you propose. Also, I anticipate that the community interactions over the next couple of months should provide you with enough observational data to answer your question. One more tip on the question... What would you think about starting the question with &amp;quot;How&amp;quot; rather than &amp;quot;Do&amp;quot;...? Play around with the phrase of your question, and see how it feels. My thinking is that you will allow yourself some flexibility in what you will truly have to report on when it comes time to write up the results. The answer to a &amp;quot;Do&amp;quot; question requires one to choose a yes or no and your findings will likely challenge any &amp;quot;absolute&amp;quot; judgment call... So don&#039;t let yourself get cornered into having to make that choice (at least not at this early stage). By starting the question with &amp;quot;How do Etsy’s regulations...&amp;quot;, will allow you to have more flexibility to report on what the observations will show, and your can balance your discussion section on some good and not-so-good controls that play out over the next few weeks.&lt;br /&gt;
&lt;br /&gt;
::Last point. In your sentence &amp;quot;I intend to identify how Etsy controls, or fails to control content in a manner that is advantageous to their users.&amp;quot;, I wasn&#039;t sure if by &amp;quot;users&amp;quot; you meant the buyers, sellers, or both. My mind is interpreting that &amp;quot;user&amp;quot; is the buyer in this sentence’s context, and the word &amp;quot;content&amp;quot; is used to define both the items and community sellers that are being controlled. True? That distinction may be important to clarify as the full report gets written, because the Etsy controls and observations being gathered will (I suspect) impact buyers vs sellers vs content each a little differently.  On a similar note... To cut down on the need to follow every buyer, seller and thing in &amp;quot;Top Searches&amp;quot; for this community, do you think it would be helpful to focus on just one type of craft? I don&#039;t know enough about Etsy specifically to determine if that would work for this project, but it might be another way to find a sub-group/sub-community limit, and still provide you with enough observational data to draw some conclusions.&lt;br /&gt;
&lt;br /&gt;
::Hoping these comments are helpful! [[User:Psl|Psl]] 12:22, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Title: YouTube Comment Filtering and Other Cyberbullying Initiatives&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/File:Lpereira_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 16:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Might be interesting to determine whether and how Youtube encourages positive comments and discourage negative or hate comments.  Ultimately, it would be ideal if the character of misbehaving individuals could be improved.  Some ideas might be the use of &amp;quot;Like&amp;quot; and &amp;quot;Dislike&amp;quot; votes on these comments and/or the award/deduction of &amp;quot;attitude points&amp;quot;.  The individuals posting hate and aggressive comments could be prohibited from further postings if the attitude point reaches a certain limit. [[User:Ichua|Ichua]] 15:02, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like the focal point you will be observing, and you are quite right in pointing out that this &amp;quot;negativity&amp;quot; is becoming an unfortunate reality for many &amp;quot;open comment&amp;quot; sections within these online spaces. Even what can begin as constructive dialog and healthy debate, can quickly degenerate into blather, flames, and hate words when anonymity can be so effectively used as a shield. Interestingly, we can&#039;t always point our finger at just one &amp;quot;troll&amp;quot; injecting some deliberate provocation...because sometimes the breakdown occurs with the 3 or 4 community members who (hither to) we&#039;re exchanging words in a perfectly eloquent &amp;amp; respectful manner. But the hate, racism, and bullying that poison the dialog on these comment-boards are on a much more disturbing level, and one that certainly will make for an interesting study.&lt;br /&gt;
&lt;br /&gt;
::So, The broad question that I am hearing in your prospectus is &amp;quot;What are the most important controls that an online service provider can successfully implement to intercept and discourage cyberbullying, hate-speech, and irrelevant negativity? The sub-question then would be &amp;quot;How effective and/or constraining are those controls on the community&#039;s ability to engage with each other in a meaningful unbiased dialog about the content? (YouTube in this example)? &lt;br /&gt;
&lt;br /&gt;
::Have you given some thought to the subject matter that you will focus on, as a way to observe how these comments progress? It may be helpful to put your lens onto a consistent subject to observe the cycle of communication. From there you should be able to witness what prompts the conversation to begin in the first place; when do counter-points get introduced, how long is constructive dialog able to bridge back and fourth, what is the &amp;quot;poison-pill&amp;quot; that kills the conversation, and when do the controls kick-in?.  (Observing where the controls kick in would obviously be the essential part to report on, not so much each of those elements of the cycle of communication I itemized there.) &lt;br /&gt;
&lt;br /&gt;
::I’d be curious to also know if the observation shows that the cycle of communication is more (or less) positive throughout based on the type of subject that initiates the conversation? News stories on &amp;quot;hot button&amp;quot; topics or baseball contrasted with (say) a page dealing with baking fudge probably have different trajectories of &amp;quot;success&amp;quot; in remaining positive. (I am thinking about the inherent behavior of the potential community members themselves… one lends itself to polarized opinions with predictable “zealots” appearing in either camp, while the other community may be more welcoming of differing opinions and tastes).  SO for example, thinking of an individual wearing that New York Yankees hat in Fenway Park on game day....vs... a group of bakers talking about chocolate vs. peanut butter fudge recipes…The former is likely to risk some taunting, a black eye, a broken tooth, and perhaps a small riot... while those in the latter group, might, at worst, receive only a cavity.  Anyway, my point is that it might be interesting compare a couple of focused topics of conversation as a way of discovering a smaller sub-community that builds around a YouTube comment-board (With one engaging in  a &amp;quot;Hot button&amp;quot; topic.... While the other group is discussing something seemingly non-polarizing.)[[User:Psl|Psl]] 12:00, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Ben Harmatz&lt;br /&gt;
*Government Entities: Internet Surveillance and Censorship&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_NSA_1_draft_copy.doc&lt;br /&gt;
[[User:Benh|Benh]] 16:49, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Ben. While I think your prospectus brings up the interesting and very pertinent topic of government control, surveillance, and censorship, I think that it is simply far too broad of a topic. For the assignment, we are supposed to monitor the activities of users on a particular site or group of sites, but looking at the internet as a whole is far too much for an 8-10 page paper! Perhaps consider government control, surveillance, and censorship while observing a particular website that has been named as a victim (by the media) of NSA&#039;s surveillance and dig deeper there. [[User:Lrsanchez|Lrsanchez]] 13:02, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Patricia Byrnes&lt;br /&gt;
*Title: Are moderators effective for policing and protecting a site from illegal use?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Patricia_Byrnes_Assig._Two.doc&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 16:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Patricia, First off, love your idea, moderating internet speech, as well as your methodology: if what you want to measure is moderating behavior, norms, and free speech concerns, the “Politics &amp;amp; Leaders” forum is a fantastic place to do so since It appears that discussions there can turn from heated to vituperative in the blink of an eye! With respect to your research question, by specifying “effective,” I assume that you will quantify instances of behavior that violate the established rules of the site. This method is good since you give yourself a verifiable and quantifiable measure. You can then use Lessig’s and other scholars work to explain these data. Now, you say that you wish to &amp;quot;research the rules and regulations of the site,” which looks like it might be an insurmountable task. I visited the site’s “Super Editor handbook” and I see that it is quite extensive. Perhaps you might want to focus specifically on one type of violation, such as &amp;quot;3.4.1 Discouraged Ranking Themes - Personal Experience / Personal Preference Rankings” ? [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Vance.Puchalski&lt;br /&gt;
*Regulators and the Spread of (Mis)Information&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Puchalski-Assignment2.docx&lt;br /&gt;
[[User:Vance.puchalski|Vance.puchalski]] 17:17, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:As an extension student and a reader of both sites, I agree that extension student is often more accurate especially due to the required affiliation. You should consider when collecting your data that often information is not so black and white. A lot of people on these treads seek opinion, which is more of a personal thought rather than right or wrong. A lot on forums is opinion based, not fact based and so I think you should prepare for your data to be filled with a lot of gray areas, which you might already be expecting. The correlation between accuracy and monitoring is certainty an interesting topic. Anyway, great research topic and I’m interested to see your findings. Good luck! [[User:Lpereira|Lpereira]] 21:20, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A. Tom Anteus&lt;br /&gt;
*Cryptocurrency Uses in Conflict Zones Around the World&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Cryptocurrency_Uses_in_Conflict_Zones_Around_the_World.pdf&lt;br /&gt;
[[User:A. Tom Anteus|A. Tom Anteus]] 17:26, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Tom, intriguing topic! I&#039;m a keen follower of the Bitcoin revolution myself so have been naturally drawn to your prospectus and Daniel&#039;s as well. However I would say its quite difficult to follow your proposal. I&#039;m not quite sure how you intend to analyse and measure the use of cryptocurrency in conflict zones. Which conflict areas will you be targeting? Do you intend to follow forums or analyse chatter on various websites. If so, which ones?  [[User:Marissa1989|Marissa1989]] 07:36, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Julie Dubela&lt;br /&gt;
*Mapping Social Media Debate on the OHCHR Report on North Korea&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Julie_Assignment2.txt&lt;br /&gt;
[[User:Julie|Julie]] 18:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Julie, great prospectus. I find the whole North Korea situation appalling from a global response perspective. A lot of the articles, commentary and reactions from people around the world have been effectively muzzled. Your approach to analyse public reaction through social media is methodical and well thought through. Your plan to use specific tools to collect information from twitter hash tags, Google trends etc and follow up by analysing them to find common themes and trends is great. I look forward to reading the final report!  [[User:Marissa1989|Marissa1989]] 07:52, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Andrew Grant&lt;br /&gt;
*Quantified Self and Qualified Liability: Strava and Lessig&#039;s Four Forces&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Andrew_Grant_Assigmnment_Two_02252014.docx&lt;br /&gt;
[[User:AndrewGrant|Andrew Grant]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Andrew, your prospectus sounds fantastic. Lots of interesting questions being asked in light of Lessig&#039;s Four Forces and the Quantified Self movement. I think that you many be asking too many questions for an 8-10 page paper, if you are to go into sufficient depth for each one. Do you think that it&#039;s realistic to answer the five research questions in so short of a paper? Other than that, I think you are off to a great start and I am interested in hearing more about it. [[User:Lrsanchez|Lrsanchez]] 11:49, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In general, it might be helpful to state why your project is important and how the outcome of the research might help regulate/control or improve human behavior on the internet. [[User:Ichua|Ichua]] 19:58, 27 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1273</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1273"/>
		<updated>2014-03-04T16:58:20Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jolie Ho - Wan Lap Ho&lt;br /&gt;
*Instagram vs Flickr&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Jolie_Assignment_2.docx&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 16:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How do you propose to collect data to answer the last question? [[User:Ichua|Ichua]] 15:22, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey Jolie! You picked a really fascinating topic to cover! Just a few thoughts I hope will help. How do you plan on pinpointing how all the users behave differently, just because there are so many registered accounts you might be able to find people who behave nearly the same or certain individuals who have accounts on both Instagram and Flickr. Just as a mere suggestion maybe you can find a niche that is unique to each site and compare them? Maybe Instagram has thousands of pictures of food and seflis while Flickr has more professional content? I hope this will help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:15, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like your topic to dive into why Instagram has been so successful compared to Flicker. It may be interesting to compare the age groups of each users. Instagram seems more accessible because it is a phone app that is simple and immediate to use, whereas Flicker users upload a batch of vacation photos, etc. I like Emmanuel&#039;s suggestion to compare the content between users. Another suggestion which relates to the selfies/food photos may be to compare the users themselves. I think older people tend to use Flickr and therefore may not post as much. However, younger people (who no long user facebook) posting to instagram all the time would provide a way for facebook to get back that market. ([[User:Margorm|Margorm]] 14:31, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
::Hi Jolie: This is a very interesting topic, with many possible areas focus on! (Also, a nice mix between the tech and creative worlds.) You mentioned that Instagram and Flickr diverge where mobile apps are concerned. This looked particularly interesting, especially following the Flickr app&#039;s overhaul. Anecdotally, via Twitter, it looked as though the Flickr update was a major talking point in both the Instagram and Flickr user groups. My thought was that it may be interesting to look at whether this major app update had any bearing on either of the two communities, as it may have impacted some of your research questions. Best! [[User:Twood|Twood]] 09:33, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How would this differ from other imaginary items of trade like currency/commodity derivatives and futures and virtual commodities like pork bellies?   [[User:Ichua|Ichua]] 15:17, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Daniel,&lt;br /&gt;
What an interesting topic! I was not even aware that state governments recognized these currencies. Would you be able to come up with more material if you focus on one or two countries and their reaction to the online currency? Also Ichua gave great advice; maybe one country’s reaction and policies to multiple online currencies would help in the scope of observation. Your idea of creating a website to report and share your findings is really novel! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: &lt;br /&gt;
Very interesting topic Daniel. Ive been following the progress of Bitcoin as a personal interest. Apart from the regulatory challenges Bitcoin poses for Governments, its also vulnerable to cyber attacks which can erode trust in using the currency. Whilst the actual Bitcoin itself is heavily encrypted, the Bitcoin exchanges are vulnerable to hacking and cyber theft as evidenced recently by the successful attacks on Mt Gox, one of the world&#039;s largest Bitcoin exchanges. It would be interesting to observe the effect (if any) this would have on the regulatory view of the currency by Governments. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Marissa1989&lt;br /&gt;
*Prospectus title: The rise of the collaborative consumption movement: Analyzing effective control of communication, structures of gaining trust &amp;amp; verification, and legal issues.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:Assignment_2_Barkey-2.pdf&lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 23:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hi, Marissa! I used AirBnB to rent out my apartment last summer and it actually resulted in me being robbed by the person to the tune of $10,000-- not including the rent for the summer, which he didn&#039;t pay (I didn&#039;t get any of it back, either, despite the insurance). It was a nasty situation. Anyways, from what I understand, the majority of communication on AirBnB is done privately. Without staging anything or intervening, how do you plan to observe enough to answer your question(s)? I think this is basically the same concern with one of the other treatments I read, regarding Facebook. I do think the security of platforms like AirBnB is of great concern and would be a very interesting subject to study in depth![[User:Castille|Castille]] 21:16, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Marissa,&lt;br /&gt;
I loved the idea for your prospectus! Just as a suggestion, would you consider comparing a few corresponding sites like 9flats, Couchsurfing International, or Hospitality Club? You could analyze how they handle different verifiability and security issues while also comparing how the sites are constructed to better “vet” their users. This may yield insight on how trustworthy their users are to each other. You might even want to inquire if one has had “major” legal issues in the past. I hope this helps! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:32, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Greetings Marissa!&lt;br /&gt;
&lt;br /&gt;
Your topic is very interesting and it appears we have a few of the same elements in the companies we have selected to research: Verification and trust. From what I understand, you are addressing issues of users on auction/garage sale platforms surrounding the tiers of user verifiability. In other words, who is protecting one user from being taken advantage of by another user.&lt;br /&gt;
&lt;br /&gt;
The comment you posted on the wiki under my topic in regards to the effectiveness of how the sites that I have selected deal with inaccurate comments made about companies by the general public are dealt with is of great importance-the public can ruin a business for no other reason than spite. In other words, who protects the companies from users. &lt;br /&gt;
&lt;br /&gt;
The proposal you submitted intrigues me in many ways. By studying the community of airbnb.com, it appears you will be analyzing the controls implemented to make the site successful (verification, quality feedback, security, payment, userability and collaboration). &lt;br /&gt;
&lt;br /&gt;
In summary, it appears we are both working on protection issues, and if the verification process is significant enough to gain consumer trust. &lt;br /&gt;
&lt;br /&gt;
Would you mind if I ask how you plan to analyze the user? I would be interested in your methodology, and we may even find each other’s approach helpful to each other. We may even be able to compare and contrast the communities with a similar approach and work together if you would be interested. &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 15:18, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Melissaluke|Melissaluke]] 18:36, 25 February 2014 (EST)&lt;br /&gt;
*Change.org vrs Ripp Off Report&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_Research_Paper-Final.docx&lt;br /&gt;
&lt;br /&gt;
Dear Melissa, &lt;br /&gt;
What a great topic and area of coverage!!! I’m hoping my comments and questions will be of help to you! Which site succumbs more readily to outside pressure and take down requests? Also you mentioned that a susceptible compliant to both is that they are accused of not “vetting” their sources. You could possible test to see which one (if either of them do) checks them more thoroughly. This might be, and I know nothing about it, accomplished by putting posts of your own and noting if they require any amount of proof, citation, source, or quote of any kind. I really hope this helps you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:35, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thank you so much Emmanuel! Your ideas are superb and very helpful!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Melissa, these sites can be a boon for consumers in helping to identify unscrupulous businesses and thus avoiding them. The issue that I find with these sites, that&#039;s never been effectively dealt with, is how do they identify and remove potentially inaccurate comments attacking a business as a result of say, a personal vendetta by a disgruntled employee or a customer who was unreasonable. Many small and medium size businesses rely on word of mouth for new customers. If the site allows the comments to remain, it may affect the business.  This in effect may lead to possible blackmail of businesses by threatening to post inaccurate information on these sites. I&#039;m also very interested in the sample groups and postings that you choose. Great topic! [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marissa, Excellent insight and the problems posed are valid. Your questions are helping to me and assist in narrowing the topic-which is clearly too broad at the moment.&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Melissa, Just a quick note, because I loved your prospectus so much (it&#039;s such a creative take on the assignment, but still seems to hit on all the prof&#039;s requirements, really amazing job). With your &#039;&#039;&#039;Q1&#039;&#039;&#039;, &#039;&#039;Why would one site be more popular?&#039;&#039;- I can;t help but wonder, does the fact that it has such a simple, perfect 1-word URL have any effect? Also, due to the time (2007) &amp;amp; place (USA) I automatically assumed this website was somehow related to Obama&#039;s election campaign- though from quick Google search there doesn&#039;t seem to be any direct link. Anyways, just wanted to say, I really like your prospectus. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:49, 3 March 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hey Mike, it would absolutely be my pleasure to provide feedback to you. I won&#039;t go too far before having the time to focus &amp;amp; read it completely- so my first feedback to you is: if you didn&#039;t pick such an interesting topic, I would have actually read the full prospectus. However after reading your first paragraph, I ended up watching TPP and reading its subreddit and forgot to finish reading your prospectus! hahaha. But this weekend I&#039;ll spend time focusing and try to provide you feedback, hopefully as good as the feedback you gave me (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 10:34, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Mike! After reading [[User:Jkelly|Jkelly]]&#039;s comments below, I&#039;m kinda worried about posting my comments, cus I think I understood your questions from a different point of view. &lt;br /&gt;
::*First of all, my question- how do you approach your 2nd qualitative question? I&#039;m not completely sure I understand what you mean by vulnerability.&lt;br /&gt;
::*Second, my advice, feel free to take it or leave it: to keep within scope of this project (2500 word paper seems so short!), I believe it may be easier to tackle Qualitative questions #1 &amp;amp; 3, and your second quantitative question (&#039;&#039;Has it helped or hurt the game to impose such controls?&#039;&#039;). I get the impression that these questions would be the ones that would be easiest to answer from following the community discussion on the subreddit. That being said, if we were writing 8000 word papers, it would be so much fun for you to really dive into the architecture &amp;amp; UX of the game itself, while paralleling it with the subreddit(!!!). Really awesome topic &amp;amp; prospectus.&lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:After reading your prospectus, I have a few questions based on your questions, or maybe some questions that combine the ones you already have. It seems clear from what you write in your prospectus that the user experience is absolutely vulnerable to the controls imposed by the game, but I&#039;m curious to know in what ways. Were users bumping up against controls they didn&#039;t like before there were changes, or was it only after the controls of the creator were made clear (he made himself known in an explicit way, rather than operating quietly in the background) that users began to find fault? (Another way of thinking about this might be- were a lot of users thinking about the controls imposed by the game before the creator&#039;s changes forced them to think about it?) If I understand the current set up correctly, it seems that users still have the option to have commands parsed as they go instead of waiting for them to be tallied and then implemented. So, were the controls only seen as problematic once users considered that there was one person making a decision that affected every user? Is the lack of democratic decision-making behind the scenes a bigger problem for users than the actual changes in user experience?&lt;br /&gt;
&lt;br /&gt;
:As far as your quantitative question goes, I&#039;m wondering if there&#039;s any way for you to know how many users stopped playing the game after the creator made changes? Do you have a means of seeing the changes over time? [[User:Jkelly|Jkelly]] 14:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
Dear Michael, &lt;br /&gt;
I find your prospective very interesting! I thought to give you these few suggestions. I hope they will help! You might want to see what percentage of Flickr users are a part of the Creative Commons community and whether it consists of a majority or a minority. Another area of research might be into the other forms of control that Flickr uses to protect copyrighted material, and then to compare them with Creative Commons to see if they are as effective, prevalent, or well known. Also, when there are infringements in copyright policy, do people respond to correction or do they just ignore and continue violating the rules? Lastly, how does the Creative Commons community handle repeat violators (if there are any)? Wish you the best! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:43, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Lucia, This is looks to be very interesting - I was wondering if you can be more specific on what types of data the initiative is exploring. Are they looking for statistical data mainly, do you vote on what subjects you are going to put on the website or research? It looks like a great example of policy control via the government. I would to know more about the website and its overall goals - something that helps define its missions parameters, as I visited the website main page and got an idea of what they were saying - I am just needing some more clarity that&#039;s all. But again, the subject looks like a great idea and should be very interesting...[[User:Dancoron|Dancoron]] 18:48, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Lucía! &lt;br /&gt;
I think your choice of study fits perfectly with the theme of the course! Perhaps you can also investigate to see if they are stifling public opinion or whether they are flooding the docs with pro-government voices to influence the theme towards their agenda?  Also as a suggestion, can you see if it is truly open to everyone? Maybe you would like to find another similar program that the government has tried in the past (assuming that they have tried). Do the number of participants fluxuate? Is there a trend in what the government sees as inappropriate? Or is it just random edits that are corrected by the government? I hope these comments can help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:13, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I&#039;d really like to read and comment on your prospectus, but it seems like the file didn&#039;t upload. Happy to respond to it once it&#039;s up!&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 20:57, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I second Jkelly&#039;s comment. This look very intriguing and I&#039;d like to learn more about your plans for the project! [[User:Twood|Twood]] 23:14, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Third. --[[User:Seifip|Seifip]] 11:58, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hello, Dan! Admittedly, I had never heard of “Anandtech.com” prior to reading your prospectus, but I’m glad that you told me about it. I really like their “Cable TVification” assessment of the internet in recent years. After reading your prospectus it seems to me that you are focusing on Lessig’s norms as regulators within the site’s forums, as well as “laws&amp;quot; instituted by the website. It is an interesting subject, because as you say, this particular forum is very successful in fostering an environment where users are likely to return. That said, I see that you qualify users of the site as “good,” and I’m curious to know how you will operationalize this term for your project. You mention words like “courteous” and “helpful,” but I’m wondering: what characteristics do you think you will look for when observing, in order to qualify a “good user.” For comparison, do you have an example of what behavior that “bad” users might entail? Lastly, I see that there are literally millions of post on the forum; you may wish to focus on a specific topic and/or date range in order to have a more manageable data set to observe. I’m interested to see what you’re project will entail, especially being that I am also observing forums for my project. [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Vance, thanks for taking the time to look at my prospectus - Basically, what I meant to convey is that these are the characteristics of a &amp;quot;good&amp;quot; website, a website that demonstrates use and activity to by the administrators and its members/users. What I will be focusing in on is, how is the site&#039;s control policy administered and conveyed to its members, both historically and presently, through the links in my prospectus – and to answer your question about bad behavior in online forums, yes I will, as I think that is a critical component regarding context – And this also goes out too Marissa as well, what I really wanted to focus in on was how does bad behavior and is control policies in its forums, effect a webite economically - as I think ths would even go further towards Lessig&#039;s FOUR norms of regulation on where the dot lands - but for obvious reasons, that could end up being too big. However, I still might toss something like that in - My goal is to pick out a couple of instances of the control poliy being implemented and see what the results were based on specific incident/instance was there a ban and how long was it for - what was the reason, what was the community&#039;s response to that action and so forth... - Again, thanks for the input and suggestions.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Dan, forums have proven very useful mediums for learning and troubleshooting. What would be interesting is how forums deal with covert advertising I.e. Forum posters who may be businesses, subtly advertising their own goods or services under the guise of responding to threads without paying for advertising rights. Would paid advertisers pose potential conflicts of interest to the neutrality of forums? I&#039;d also be interested in seeing how you compare the Anandtech&#039;s forum controls against others. Would you choose similar types of forums with respect to content type? [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marrisa, I tried to include your response with Vance&#039;s up top :O) [[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Dan!&lt;br /&gt;
If you are mainly comparing Anandtech’s forum site policies, maybe you could also compare past versions of the rules? Also, you might want to see if Anandtech has any unique features in toxicity control that would make it standout from other less successful forums. Overall the concept is fantastic! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Emmanuel, thanks for the feedback - ya, I am going to try and put some type of onus on Anandtech as well, and see if some of their reactions to their policies could be considered a little over zealous or a bit too far reaching. Most times, their admins/moderators are pretty decent, but again, like everyone else, there are times when a few of their admins/moderators could be having a bad day and maybe be a little too heavy handed - we&#039;ll see, stay tuned to find out. just a little humor :o) Thanks again for the input.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:First of all, GREAT TITLE!!! Second of all, this seems like an extremely interesting subject and I&#039;d love to read more about it. I do wonder whether you&#039;ll be able to get access to the material you might be looking for by doing &amp;quot;undercover investigation&amp;quot; and the other research methods you listed. It seems to me that the kind of exchanges you&#039;re discussing would be difficult to observe on Facebook as they likely wouldn&#039;t be out in the open. I may be completely mistaken, but I was also under the impression that the assignment encouraged examining a more open forum or something of the like where observation was more feasible. I know that there are public matchmaking sites and I would assume there are also forums geared towards those who wish to have illicit affairs, so that might be an area into which you may want to delve. [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:I also love the topic and find the subject very interesting! I share Castille&#039;s concerns above. It seems challenging to get access to the materials you will need to answer these questions. I wonder if there is an open forum somewhere in the internet where angry divorcees can go to vent about how social media ruined their marriage? It may be a biased site, but it may provide resources to other statistics or materials that may help? Or if there is a community you could observe and monitor the degree of online flirting? ([[User:Margorm|Margorm]] 14:48, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wow very cool subject - and one I am sure that deserves a lot of attention these days. With that said, it seems that this subject matter could be a thesis or dissertation as the material collected probably seems to be endless. I was wondering what specific community are you going to target on facebook, as this looks to be potentially a very large paper? I have to admit that I am fascinated to see what other statistics this might uncover, as I am sure we all have heard stories of spouses leaving their significant other for someone they met online. Yet maybe, you can focus on something more specific then a facebook community - as there might be other communities or even forums that have support groups for such instances or circumstances that you mentioned earlier. Maybe seeing how they interact with each other and what rules or policies can be observed and commented on. Overall the topic is really great and I am sure it will have some very interesting content that is fascinating.[[User:Dancoron|Dancoron]] 19:13, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Very interesting subject matter Amy!&lt;br /&gt;
&lt;br /&gt;
You may have selected one of the most controversial and highly emotional subjects out of all proposals presented.  I would agree with Dancoron. The questions outlined could lead to a doctoral dissertation. Additionally, Castille does bring a good point to light, in that we are encouraged to avoid any work as an “alias”. &lt;br /&gt;
&lt;br /&gt;
I think many of us are having trouble (to include myself) narrowing the research down to a tolerable amount of data collection for an in depth analysis.&lt;br /&gt;
&lt;br /&gt;
In your proposal, you suggested comparing and contrasting divorce rates. What sources would you be comparing and contrasting? Are you speaking to different communities in the United States or on a larger level?  Or, are you addressing the male/female divorce ratio? &lt;br /&gt;
&lt;br /&gt;
Secondly, will you be cross-examining two nations who have access to Facebook, in efforts to compare and contrast divorce ratios in direct correlation to Facebook usage? &lt;br /&gt;
&lt;br /&gt;
If your research goals are to use Facebook as the platform for study concerning divorce, it may be difficult to get access to this information unless you are accepted into a person’s profile, group or community. In efforts to stay objective, I don’t think you would want to study anyone that you personally know.  Pornography could be a difficult study, in direct correlation to pornography with the controls Facebook allows for each individual user. &lt;br /&gt;
&lt;br /&gt;
Would it be possible for you to follow a smaller, more open group that readily blogs/views pornography that is open to the public for data collection in a short period of time? &lt;br /&gt;
&lt;br /&gt;
Unfortunately this is completely out of my arena. I have never been married and I don’t view porn sites. But, your topic is fabulously interesting. &lt;br /&gt;
&lt;br /&gt;
Good luck with your research and I can’t wait to see your results.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hi [[User:Margorm|Margorm]]! I love your topic. Your prospectus, combined with our brief discussions in class have really made me wonder- if 23andme is part of the first iteration of DNA decoding tools for personal use, where will we be in 25 years (: Just my general thoughts on this great topic- my comments specifically regarding your prospectus are below:&lt;br /&gt;
::*I really like that you asked whether the FDA is the best agency to regulate DNA testing, especially your last sentence &#039;&#039;what regulatory bodies outside of the FDA should be paying attention to this personalized and identifiable database?&#039;&#039;. Throughout this class, I&#039;ve had similar types of questions many times.&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, however it seems that the data you will collect (assessing changes in attitudes of community members) will be more apt to answer your 2nd question (&#039;&#039;How has the ban on delivering health-related risk assessments to the 23andMe community impacted the consumer’s trust toward the product?&#039;&#039;), rather than the underlined question that I referred to in my previous bullet.&lt;br /&gt;
:Please note that I am most interested in your underlined question regarding the FDA! However my advice is that your second question regarding attitudes &amp;amp; trust may be easier to study with respect to your methodology.&lt;br /&gt;
:[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST) - updated 03 March 2014 ~11pm&lt;br /&gt;
&lt;br /&gt;
:It seems clear that although institutional positions and statements are mostly contrary to the patentability of human genes as such, however international patent offices (U.S., Europe, and Japan) have accepted the patenting of human DNA sequences if they meet the technical and legal requirements, including the “utility”. DNA occurs naturally in the human body and should not be patented by a single company that can then use its patents to limit scientific research and the free exchange of ideas. As said by Koepsell “Laws of patent are meant to be used to protect inventions — things that engineers are doing — not things that scientist discover” (Holman, 2007). A regulatory block of decoding tools for personal use would seem to be an exercise in economic control. I believe you&#039;ll find an ample supply of public opinion in regards to attitudes of community members.  [[User:VACYBER|VACYBER]] 10:28, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
::Castille, I think you have a really excellent topic here. My first thought is that it would probably be helpful to choose a particular self-harming behavior that&#039;s discussed on Tumblr to help narrow the scope of your work. Additionally, while these issues can and often are related, I imagine that the Tumblr communities that surround each issue probably have a distinct culture. This topic makes me think of the Jessica McKenzie piece, &amp;quot;Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag&amp;quot; we read in week four. I would be curious to know how many of the controversial hashtags are actually used in subversive ways. Some of the reactions to Tumblr&#039;s policy change seem to touch on this when users write that they use these tags to address their own struggle with self-harming behavior. After these policy changes got some press, did it shed enough light on these self-harm blogs to inspire users to use these potentially triggering hashtags in new and positive ways?&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 13:56, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thanks for your feedback! I&#039;m planning to narrow the scope to primarily center on pro-suicide blog postings, but I think I&#039;ll have to use some other examples such as cutting and possibly even pro-eating disorder blogs, as they all seem to interact with each other. It appears from my research thus far that the communities are intrinsically linked much more so than I expected. I agree, it would be interesting to see if things have changed-- though I&#039;m not quite sure how to gauge pre-policy versus post-policy changes. If you have any ideas, I&#039;d love to hear them! [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Castille, fantastic topic! I like your approach to analysing this topic and its a subject which is very controversial &amp;amp; personal. I agree, the main challenge for any Government is to try and regulate the numerous blogs and hashtags on sites like Tumblr, effectively putting a suicide watch on them. Would this be an effective use of tax payer funds and how many suicides could this prevent? What would be the process be if a potential suicide victim was identified? We have to be careful not to act in a knee-jerk reaction when there is a death and expect the Government to do something about it. I think there needs to be a balance of responsibility between these site operators and the Government. I&#039;m very interested in the outcome of your topic. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Watson!&lt;br /&gt;
&lt;br /&gt;
A few questions:&lt;br /&gt;
&lt;br /&gt;
How would you determine which distribution channel the Syrian opposition used the most?&lt;br /&gt;
&lt;br /&gt;
How would you be able to detect the limitations of public information if it has not been disclosed?&lt;br /&gt;
&lt;br /&gt;
If you were to select two media channels to compare/contrast,  would there be enough data available in those two communities to properly “diagnose”, or is the data withheld from the public?&lt;br /&gt;
&lt;br /&gt;
If you chart a paper on what capacitated the Syrian opposition groups to communicate their cause, will this information lead to a report or a true communal study on the Internet? &lt;br /&gt;
&lt;br /&gt;
Very interesting proposal and I wish you the best in your research!&lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:This is a very interesting topic. There is a lot to examine here, especially since a large part of the attacks and arguments happened online. An interesting topic would be to mention the Syrian Electronic Army and the many acts of online vandalism that they did. You can find more info here: https://en.wikipedia.org/wiki/Syrian_Electronic_Army The Internet was certainly a tool in the conflict. An interesting focus would be to investigate their motives and the impact this electronic army had on the Syrian conflict. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 21:01, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LRS_IS_prospectus.docx&lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Laura – Instagram is not only the biggest mobile photo sharing app, but is also now owned by Facebook, and thus a disproportionate amount of mobile peer to peer communication falls to the censorship whims of this company. This is an incredibly worthy area to research, if not lofty. Since Instagram now allows direct, private communication of photos, you have to wonder if there is a difference in how moderated these communications are versus a post intended for the public that uses hashtags (let us not forget that the hashtag’s original use was searchability, not irony). That said it might be very difficult monitor the differences in speed and effectiveness of what gets censored without interfering with the community you’re observing. One way may be to follow news events (such as this recent one: http://abclocal.go.com/wtvd/story?section=news/local&amp;amp;id=9448993) that show Instagram’s policy enforcement in action. The issue with that approach is that it is cherry picking the successful takedowns rather than observing uncensored posts that are breaking the terms of service.  Another option may be monitoring Instagram’s list of banned hashtags and searching synonyms or alternate hashtags, but again this is a difficult aspect of their policy to observe in action. &lt;br /&gt;
::I believe there is still strategizing to be done to design your observation of the community, above merely reporting their policy. I hope my take somehow helps you with this endeavor! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 09:55, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi, Laura! I think Instagram is a really great topic and will provide a massive amount of material, which I think can be beneficial and detrimental. It seems you might want to consider focusing on a specific aspect of censorship on Instagram, like nudity, drug references, or profanity (if any of those are prohibited-- I don&#039;t know their specific terms of use). What aspect of Instagram&#039;s censorship do you find to have the highest potential to become problematic? Is their choice as a company to disallow certain messages/images actually infringing on free speech, when they don&#039;t have any power over whether an individual chooses to express himself (IE he/she is still capable of posting the material on another site), they merely control/monitor the postings on their own site? [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
:Hi Jon- My first thoughts on your prospectus have to do with scope. In comparing these three different games, I think there might be too many factors to consider-- subscription-based vs. free, PC vs. iOS, etc. I wonder if it wouldn&#039;t be more manageable to tackle your research questions if you focused in on two games that were more similar so that you have fewer variables to contend with when you&#039;re thinking about your research questions. My instinct is that working with WoW and League of Legends would work since you can still attempt to tackle each of Lessig&#039;s four forces. I&#039;m not sure how much the law in the US varies from that in Finland, but removing Clash of Clans from the equation might help the narrow your scope in that sense as well. [[User:Jkelly|Jkelly]] 14:27, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Jane – It is a great idea to compare feminist discussion within the confines of a feminist-oriented website to discussion in a public space without this slant. The regulations on discussion are obviously going to be wildly different in each of these communities. You identify Facebook and Twitter as less thoughtful in their discussion for feminist topics - perhaps as a result of their differences in comment policy? I was interested in the comment policy of Bitch Media that you mentioned in the prospectus, so I looked it up. (For others: it can be found here: http://bitchmagazine.org/comments-policy) One line that stood out to me was the following: “As far as moderation of this space goes, guest bloggers moderate the comments on their respective posts, but website moderators will step in when necessary.” – Does this mean that each blog post is technically regulated in a different way? It is not a deal killer if so, because it sparked the following idea: Because FB and Twitter are big places, could you find a smaller community (that is not inherently feminist-oriented) that is discussing the same thing as mentioned in one or a few of the Bitch Media posts, and compare the discussions directly? Just a thought! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:54, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Does &#039;&#039;anyone else&#039;&#039; see the awesome irony of a woman named Jane writing about Bitch magazine? Am I the only one on here who was a teenage girl in the &#039;90s? I remember clear as day, reading [http://bitchmagazine.org/article/ten-things-hate-about-jane Bitch&#039;s criticisms of Jane] back in 1998. BTW [[User:Jkelly|Jkelly]] I hope you understand that as a very longtime fan of Bitch magazine I am in no way criticizing your project, I actually think it&#039;s &#039;&#039;&#039;such&#039;&#039;&#039; a cool topic. You &amp;amp; I would probably have been awesome friends as teenagers. p.s. This doesn&#039;t count as a comment on the prospectus!!! I hope. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:44, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Haha, thanks so much for sharing that Erin!! I haven&#039;t had a chance to read the whole thing, but when you see words and phrases like &amp;quot;fake, sanctimonious,&amp;quot; &amp;quot;self-obsessed,&amp;quot; &amp;quot;narcissism,&amp;quot; &amp;quot;blithe unconcern with which they suggest spending huge amounts of money on items of debatable utility,&amp;quot; and &amp;quot;overweening focus on the superficial, ersatz do-it-for-you tone, and fake individualism&amp;quot; in just a quick scan of the article, it&#039;s bound to be a fun read. Thanks! [[User:Jkelly|Jkelly]] 08:53, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
:: Erin - I think the comparison of two subreddits with different regulations is a solid method of studying the effect of regulation on political discussion. I also believe the two subreddits you have chosen make for a great comparison. The only reservation I have in your prospectus is the focus on word count of the regulations as indicative of the rigor of the moderation. For example, one subreddit may simply say &amp;quot;Discussion of Russia is forbidden&amp;quot; - which in five words hampers more conversation than either of the two sets of regulations do in actuality. I do not think the word count is a meaningful statistic. Apropos your question of whether those without internet access will be under-represented in our studies, I would say that because we are focusing on specific small communities to begin with, we are under-representing the reactions (to control) of everyone in the world who is not in that community. The vast majority of the world is not included. Our focus is on only those within the community itself that we can observe. Ultimately I believe your project is designed very well. Since I too am studying a subreddit for my project, I will be following your progress closely!&lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:23, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Hi [[User:MikeJohnson|MikeJohnson]]! Thank you very much for the feedback, very good point about the empirical data on the rules, hopefully I can expand when I have 2500 words to work with. BTW, I just wanted to comment- the question about people without Internet access was actually [[User:Ichua|Ichua]]&#039;s question. My understanding of the assignment is to study &#039;&#039;only&#039;&#039; online communities for this assignment (and not offline humans, which excludes anyone who doesn&#039;t or can&#039;t access the Internets). My question that [[User:Ichua|Ichua]] commented on is whether &#039;&#039;&amp;quot;users are intimidated by the effort or research required to post, thus limiting participation to a narrow audience&amp;quot;&#039;&#039;. Sidenote- &#039;&#039;&#039;Thank you&#039;&#039;&#039; very much for introducing us to the Twitch Plays Pokémon phenomenon in class. So freaking cool. My God do I ever love the Internet.-[[User:Deluxegourmet|Erin Saucke-Lacelle]]&lt;br /&gt;
&lt;br /&gt;
:::: Thanks Erin! I think it is absolutely amazing as well, and I&#039;ve never played Pokémon. If you would like to read my prospectus and help me think about potential research questions using their subreddit, I am all ears. [[User:MikeJohnson|MikeJohnson]] 11:34, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Ian, great topic and I like the innovative approach you&#039;re taking. I agree that social media is an important medium for Governments to gauge public mood or opinion. In fact, Australia&#039;s Prime Minister, Tony Abbott recently spent $4 million to analyse social media and gauge the public mood on certain policies he introduced. From my understanding, you&#039;re looking to build something like a mind map to organise the social media feedback and also meta tag it? This would effectively allow content to be searched and categorised similar to a knowledge base. Just a couple of questions though....How will you apply the cognitive map? Do you have a specific social media medium and Government in mind? Looking forward to reading the final outcome! [[User:Marissa1989|Marissa1989]] 07:42, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I was unaware of this community exits, and I think it will be a great place for graduate students and researchers to find which papers they should be reading. For example, if I need to utilize a method that is slightly outside of my field, this community will help identify the appropriate and esteemed papers. This may also serve as a better model for Peer Review (one day). Because PubMed is already an exclusive database primarily for biomedical researchers, I am interested to what you observe. I am worried that because only pubmed users (or people using a University IP address) have access to pubmed articles, open access will play a minimal role in which articles spark more conversation. Unfortunately, people tend to converse about papers in high-impact journals like Nature and Science, and I would expect these articles to compete with the open access ones. Perhaps an observation of which articles receive complaints about not being open-access for the curious science lover who is no longer in academia may be an interesting perspective.. ([[User:Margorm|Margorm]] 13:45, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
:::Hi Paul! Thank you for introducing me to PubMed Commons! I have to agree with [[User:Margorm|Margorm]]: people who are &#039;allowed&#039; to comment on PubMed articles often have access to most articles through their Universities or Institutions. That being said, since first reading your prospectus, I&#039;ve thought so much about the access to PubMed Commons. In order to be part of the community, the major factor is that you are an author of a paper appearing in PubMed. An author can &#039;invite themselves&#039; only if PubMed has your email address on file. For personal/professional interest of being a member of this site, I&#039;ve checked with 8 different people (who are all corresponding authors on separate PubMed articles) whether they could invite themselves, and only 1 of the 8 authors could gain access. I understand why it is important for PubMed to confirm identity, however I believe this factor will strongly limit the adoption of PubMed Commons. It should also be noted that I am not an average PubMed author- most scientists I talked to about this think &#039;social media is stupid&#039; or a waste of time. Very few will go through the trouble of asking 8 separate authors to try to log in, until they find one person who can. However, exactly as Margo pointed out, &amp;quot;This may also serve as a better model for Peer Review (one day)&amp;quot;.&lt;br /&gt;
:::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I can see where this topic would make an interesting focal point for a review article or commentary on the exploitation opportunities, (legal and criminal) that open source software packages like these permit. As an administrator of several IT systems myself, reading your prospectus has made me curious to learn more about NESSUS and Metasploit, and perhaps use them to test out weaknesses in my own servers.&lt;br /&gt;
&lt;br /&gt;
::Let&#039;s continue along that thought...and say I will download and experiment with this software... I&#039;m using this scenario &amp;quot;hypothetically&amp;quot; in hopes that it may help you focus more on the key question(s) you are hoping to answer, and to also consider &amp;quot;from where&amp;quot; you will be able to make some observations to address that question. In other words, where might you be able to follow some online community activity over the next few weeks, and observe some interactions between the users, developers, and IT administrators who work with these software packages?&lt;br /&gt;
&lt;br /&gt;
::So, after just now learning of these open source packages, I want to download them on my Linux box and experiment. I want to see how others have installed, implemented, and customized the software to exploit a variety of possibilities. Is there an open community where I can lurk and maybe participate in a discussion to learn about various ways I can use this software to test out my servers for vulnerabilities and bugs? What kind of controls might I be subjected to within that community that may prevent me from discussing specifics about what known vulnerabilities have been discovered, and what security holes one can exploit? If I discover a major security flaw, can (or should) I document this within that online community? Are there normative, legal, and/or architectural controls that prevent or discourage divulging too much information within his community? I noticed a discussion forum at http://discussions.nessus.org/welcome, and https://community.rapid7.com/community/metasploit... would these be the communities you were considering?&lt;br /&gt;
&lt;br /&gt;
::Anyway, hoping this helps out. I just wanted to raise these questions as a way to help you identify the specific online community where some observable activity will occur, and focus in on what controls you hope to be able to see playing-out during the rest of the semester. You may already have that in mind, but it wasn&#039;t in the prospectus, so I thought I&#039;d raise the questions here. I think knowing the answer to these questions will help put the ideas into the context of the Final Project&#039;s objectives and should also help with the next task of building the outline in Assignment 3. [[User:Psl|Psl]] 14:25, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Somehow the uploaded RTF file had been converted to a CALC spreadsheet file, making some of the contents hard to read. [[User:Ichua|Ichua]] 15:08, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:: Hi Twood. I find your paper topic to be incredibly interesting and well-thought out. I wish I had constructive criticism to give you, but I find that you are on the right path. My only question at the moment: how do you plan on measuring the response of community members to the each sites&#039; control mechanisms? [[User:Lrsanchez|Lrsanchez]] 11:41, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Twood, I find this to be a very cool topic and being a musician myself, makes it even more so. I have never ever been a fan of sampling music outright and then adding a new beat and some remixing to make it one&#039;s own, just not my style. I like the prospect of you examining a smaller or less commercialized community musically (as compared to You tube). Again, as own who owns small studio at home and records pretty solidly, it is always great to see musicians recording and producing their own stuff from scratch with small home studio setups. I hope you show an example of a community catching someone in the act of stealing another&#039;s music or idea and what the outcome of that interaction will be - because as musicians we always borrow, modify or improves someone else&#039;s cord progression or guitar lick to make it our own. So, it would be great to see if you could hint about that distinction - as I am sure it comes up a lot in communities like this. But, overall really nice topic to concentrate on.[[User:Dancoron|Dancoron]] 19:42, 2 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Emmanuelsurillo&lt;br /&gt;
*Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:You raise some great research questions to examine within these communities. You might want to narrow your focus more. Will you be talking about the legalities of “jail-breaking” and it’s effect on the Apple and Android market? Considering the topics we discussed in class, it might be interesting to develop your research to mention the view of major companies toward these forums and the rogue developers. Once an iphone is jail-broken, it losses its apple warranty coverage. This might be a topic you want to bring up with your research. Good luck! [[User:Lpereira|Lpereira]] 21:36, 3 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Emmanuel,&lt;br /&gt;
&lt;br /&gt;
You have selected a really “hot” topic. Mobile applications appear to be taking over actual web development these days. I’m in the process of creating a new site, for the general public, to locate assistance after they have been harmed by other entities. The developer of my site highly recommended that I create a mobile app at the same time.  He is correct and the only reason I do not plan to follow his suggestion is directly related to cost.&lt;br /&gt;
&lt;br /&gt;
I’m unclear of the real statistics, but Internet users seem to be using phones as their selected source of information more frequently than computers. Most people carry their phones (even to bed) but fewer seem to be in constant travel with their laptop.  &lt;br /&gt;
&lt;br /&gt;
I am not familiar with the sites you listed in your proposal since I am not a mobile application developer, but I am happy to learn there are forums to enhance applications through large communities. &lt;br /&gt;
&lt;br /&gt;
It appears many of our classmates are attempting to use a compare/contrast approach, which seems logical, if we want to identify how resourceful one community is versus another. Your research will be extremely useful to many, and I would like to pass your results onto my developer after you have completed all the hard work (smile). &lt;br /&gt;
&lt;br /&gt;
A few questions for you: &lt;br /&gt;
  &lt;br /&gt;
“I want to compare how useful and productive these web sites are to the users end for accomplishing these goals.”&lt;br /&gt;
&lt;br /&gt;
1.	How do you plan to compare and contrast the central 7-9 questions outlined in your proposal for the final project? In other words, will you be able to summarize the data from each research question in one succinct paragraph to meet the page requirements?&lt;br /&gt;
2.	Do you think it would be easier to select 2-3 questions presented in your proposal to dig a little deeper or perhaps ask a few others from the class to join you on a team to cover all the questions presented?&lt;br /&gt;
&lt;br /&gt;
I ask these questions, because I am struggling with these issues myself.  I believe if I ask enough people in our community who are using a similar approach, I will (eventually) determine a model that may be useful for my own research. &lt;br /&gt;
&lt;br /&gt;
Another suggestion: Could we potentially find a group of people in our research community (class) that are interested in using a similar approach, but still collectively analyze the communities we selected for personal purposes? In other words, I am certain most students have selected the entities of study for some reason, such as personal satisfaction or business achievement.  However, Andy has made it clear that he would entertain teams multiple times. In fact, the option has been posted on every page of our instructions for the main project.  In fact, the option has been posted so many times that I am beginning to think he may be giving us a subtle hint or clue: “This assignment will be more effective if you work collectively together and you may gain more valuable research by teaming”. I don’t read minds, but… &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
I am attempting to look at the effectiveness of two sites created to allegedly help people who have been taken advantage of by either an entity or a person. Section 203 under the Communication Decency Act assists people in their ability to say whatever they think, regardless if correct.&lt;br /&gt;
&lt;br /&gt;
You are comparing two mobile application sites to analyze how useful and productive the sites are for the users to include accuracy and validity.&lt;br /&gt;
&lt;br /&gt;
Marissa is researching the validity of airbnb.com, and looking at the controls put in place by the website to protect people.&lt;br /&gt;
&lt;br /&gt;
I still have many proposals to read today, but it does appear that many of us are running in a few general hypothetical areas of question:   &lt;br /&gt;
&lt;br /&gt;
Which site is more effective due to the controls implemented by the site itself? (Compare/Contrast)&lt;br /&gt;
&lt;br /&gt;
Can the data on these sites be considered valid? Is so, why or why not?&lt;br /&gt;
&lt;br /&gt;
Could we potentially work together on a research methodology for all three sites to compare and contrast if the model is effective in and of itself while measuring the data across the board for multiple communications? In summary, we could compare and contrast the model that we collectively created against the sites we personally selected.&lt;br /&gt;
&lt;br /&gt;
My biggest concern with many of our proposals is that they are too broad and we will not find the depth.  Most of our topics could be potential dissertations; unfortunately we are lacking 5 years of research time (smile).  I plan to look for commonality in proposals submitted-perhaps we can all make this better together. Could we potentially try to use our class community to research the depth of the Internet communities.?&lt;br /&gt;
&lt;br /&gt;
Just thoughts. &lt;br /&gt;
&lt;br /&gt;
Cheers!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 17:07, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Emmanuel,&lt;br /&gt;
&lt;br /&gt;
Great topic!!&lt;br /&gt;
I am not sure if you would like to go into that direction, but from my point of view, I would say there is a big difference in the active level between iphone users via Android users in forum.&lt;br /&gt;
Iphone users are usually not as active as Android users in forum. And I think this is a really interesting topic to look into.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I think it would be a good idea to narrow down your topic as there are 9 research questions that you are planning to coverin your paper. It would be difficult to talk about each question in depth with the words limit.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:42, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
::Hi [[User:Seifip|Seifip]]! Few bits of feedback for you. First of all, I like that you tied back to Lessig&#039;s regulators. Very strong prospectus overall. Second, I wonder how you define an &#039;&#039;effective way of shaping an online community&#039;&#039; ? I assume that you didn&#039;t define &#039;effective&#039; because of the 400-word limit for this assignment. My advice would be for you to perhaps draw specific comparisons between StackOverflow and another online developer support community. Alternatively (and perhaps more fun), you might change the phrasing of your research question to something like &#039;In what ways does X architectural element affect conversation on StackOverflow?&#039;. Overall though, I think this is a very strong topic for your final project, because developer communities are some of the most in-depth technical discussions on the web. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::: Thanks for your feedback, Erin! I&#039;ll consider narrowing down the research question to a single element. --[[User:Seifip|Seifip]] 10:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Art.Mescon&lt;br /&gt;
*Title: Do Etsy’s regulations aim to help buyers and/or sellers or are they primarily protective of the company itself, leaving third parties on their own to seek out reputable transaction partners? &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Art.Mescon_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
::You raise some great ideas in your prospectus that would make for an interesting research paper around Etsy. However, I wonder if it might be best to focus more on the controls for which you can already observe playing out within the Etsy community&#039;s online activities? In other words, the community norms and architecture controls within Etsy itself (user-&amp;quot;self-regulation&amp;quot; and Etsy&#039;s-&amp;quot;private-regulation&amp;quot;) might be the most reliable &amp;quot;observable data&amp;quot; that you will be able to anticipate over the next few weeks. The government level controls (public-regulation) you suggest may require moving outside this community, and I am not sure that a useful discussion (with observational data) will be possible within the page limit, nor would it be crucial to answering your research question.&lt;br /&gt;
&lt;br /&gt;
::I like the research question very much, and I think it couches the challenges you hope to observe within the methodology you propose. Also, I anticipate that the community interactions over the next couple of months should provide you with enough observational data to answer your question. One more tip on the question... What would you think about starting the question with &amp;quot;How&amp;quot; rather than &amp;quot;Do&amp;quot;...? Play around with the phrase of your question, and see how it feels. My thinking is that you will allow yourself some flexibility in what you will truly have to report on when it comes time to write up the results. The answer to a &amp;quot;Do&amp;quot; question requires one to choose a yes or no and your findings will likely challenge any &amp;quot;absolute&amp;quot; judgment call... So don&#039;t let yourself get cornered into having to make that choice (at least not at this early stage). By starting the question with &amp;quot;How do Etsy’s regulations...&amp;quot;, will allow you to have more flexibility to report on what the observations will show, and your can balance your discussion section on some good and not-so-good controls that play out over the next few weeks.&lt;br /&gt;
&lt;br /&gt;
::Last point. In your sentence &amp;quot;I intend to identify how Etsy controls, or fails to control content in a manner that is advantageous to their users.&amp;quot;, I wasn&#039;t sure if by &amp;quot;users&amp;quot; you meant the buyers, sellers, or both. My mind is interpreting that &amp;quot;user&amp;quot; is the buyer in this sentence’s context, and the word &amp;quot;content&amp;quot; is used to define both the items and community sellers that are being controlled. True? That distinction may be important to clarify as the full report gets written, because the Etsy controls and observations being gathered will (I suspect) impact buyers vs sellers vs content each a little differently.  On a similar note... To cut down on the need to follow every buyer, seller and thing in &amp;quot;Top Searches&amp;quot; for this community, do you think it would be helpful to focus on just one type of craft? I don&#039;t know enough about Etsy specifically to determine if that would work for this project, but it might be another way to find a sub-group/sub-community limit, and still provide you with enough observational data to draw some conclusions.&lt;br /&gt;
&lt;br /&gt;
::Hoping these comments are helpful! [[User:Psl|Psl]] 12:22, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Title: YouTube Comment Filtering and Other Cyberbullying Initiatives&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/File:Lpereira_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 16:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Might be interesting to determine whether and how Youtube encourages positive comments and discourage negative or hate comments.  Ultimately, it would be ideal if the character of misbehaving individuals could be improved.  Some ideas might be the use of &amp;quot;Like&amp;quot; and &amp;quot;Dislike&amp;quot; votes on these comments and/or the award/deduction of &amp;quot;attitude points&amp;quot;.  The individuals posting hate and aggressive comments could be prohibited from further postings if the attitude point reaches a certain limit. [[User:Ichua|Ichua]] 15:02, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like the focal point you will be observing, and you are quite right in pointing out that this &amp;quot;negativity&amp;quot; is becoming an unfortunate reality for many &amp;quot;open comment&amp;quot; sections within these online spaces. Even what can begin as constructive dialog and healthy debate, can quickly degenerate into blather, flames, and hate words when anonymity can be so effectively used as a shield. Interestingly, we can&#039;t always point our finger at just one &amp;quot;troll&amp;quot; injecting some deliberate provocation...because sometimes the breakdown occurs with the 3 or 4 community members who (hither to) we&#039;re exchanging words in a perfectly eloquent &amp;amp; respectful manner. But the hate, racism, and bullying that poison the dialog on these comment-boards are on a much more disturbing level, and one that certainly will make for an interesting study.&lt;br /&gt;
&lt;br /&gt;
::So, The broad question that I am hearing in your prospectus is &amp;quot;What are the most important controls that an online service provider can successfully implement to intercept and discourage cyberbullying, hate-speech, and irrelevant negativity? The sub-question then would be &amp;quot;How effective and/or constraining are those controls on the community&#039;s ability to engage with each other in a meaningful unbiased dialog about the content? (YouTube in this example)? &lt;br /&gt;
&lt;br /&gt;
::Have you given some thought to the subject matter that you will focus on, as a way to observe how these comments progress? It may be helpful to put your lens onto a consistent subject to observe the cycle of communication. From there you should be able to witness what prompts the conversation to begin in the first place; when do counter-points get introduced, how long is constructive dialog able to bridge back and fourth, what is the &amp;quot;poison-pill&amp;quot; that kills the conversation, and when do the controls kick-in?.  (Observing where the controls kick in would obviously be the essential part to report on, not so much each of those elements of the cycle of communication I itemized there.) &lt;br /&gt;
&lt;br /&gt;
::I’d be curious to also know if the observation shows that the cycle of communication is more (or less) positive throughout based on the type of subject that initiates the conversation? News stories on &amp;quot;hot button&amp;quot; topics or baseball contrasted with (say) a page dealing with baking fudge probably have different trajectories of &amp;quot;success&amp;quot; in remaining positive. (I am thinking about the inherent behavior of the potential community members themselves… one lends itself to polarized opinions with predictable “zealots” appearing in either camp, while the other community may be more welcoming of differing opinions and tastes).  SO for example, thinking of an individual wearing that New York Yankees hat in Fenway Park on game day....vs... a group of bakers talking about chocolate vs. peanut butter fudge recipes…The former is likely to risk some taunting, a black eye, a broken tooth, and perhaps a small riot... while those in the latter group, might, at worst, receive only a cavity.  Anyway, my point is that it might be interesting compare a couple of focused topics of conversation as a way of discovering a smaller sub-community that builds around a YouTube comment-board (With one engaging in  a &amp;quot;Hot button&amp;quot; topic.... While the other group is discussing something seemingly non-polarizing.)[[User:Psl|Psl]] 12:00, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Ben Harmatz&lt;br /&gt;
*Government Entities: Internet Surveillance and Censorship&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_NSA_1_draft_copy.doc&lt;br /&gt;
[[User:Benh|Benh]] 16:49, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Ben. While I think your prospectus brings up the interesting and very pertinent topic of government control, surveillance, and censorship, I think that it is simply far too broad of a topic. For the assignment, we are supposed to monitor the activities of users on a particular site or group of sites, but looking at the internet as a whole is far too much for an 8-10 page paper! Perhaps consider government control, surveillance, and censorship while observing a particular website that has been named as a victim (by the media) of NSA&#039;s surveillance and dig deeper there. [[User:Lrsanchez|Lrsanchez]] 13:02, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Patricia Byrnes&lt;br /&gt;
*Title: Are moderators effective for policing and protecting a site from illegal use?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Patricia_Byrnes_Assig._Two.doc&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 16:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Patricia, First off, love your idea, moderating internet speech, as well as your methodology: if what you want to measure is moderating behavior, norms, and free speech concerns, the “Politics &amp;amp; Leaders” forum is a fantastic place to do so since It appears that discussions there can turn from heated to vituperative in the blink of an eye! With respect to your research question, by specifying “effective,” I assume that you will quantify instances of behavior that violate the established rules of the site. This method is good since you give yourself a verifiable and quantifiable measure. You can then use Lessig’s and other scholars work to explain these data. Now, you say that you wish to &amp;quot;research the rules and regulations of the site,” which looks like it might be an insurmountable task. I visited the site’s “Super Editor handbook” and I see that it is quite extensive. Perhaps you might want to focus specifically on one type of violation, such as &amp;quot;3.4.1 Discouraged Ranking Themes - Personal Experience / Personal Preference Rankings” ? [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Vance.Puchalski&lt;br /&gt;
*Regulators and the Spread of (Mis)Information&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Puchalski-Assignment2.docx&lt;br /&gt;
[[User:Vance.puchalski|Vance.puchalski]] 17:17, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:As an extension student and a reader of both sites, I agree that extension student is often more accurate especially due to the required affiliation. You should consider when collecting your data that often information is not so black and white. A lot of people on these treads seek opinion, which is more of a personal thought rather than right or wrong. A lot on forums is opinion based, not fact based and so I think you should prepare for your data to be filled with a lot of gray areas, which you might already be expecting. The correlation between accuracy and monitoring is certainty an interesting topic. Anyway, great research topic and I’m interested to see your findings. Good luck! [[User:Lpereira|Lpereira]] 21:20, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A. Tom Anteus&lt;br /&gt;
*Cryptocurrency Uses in Conflict Zones Around the World&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Cryptocurrency_Uses_in_Conflict_Zones_Around_the_World.pdf&lt;br /&gt;
[[User:A. Tom Anteus|A. Tom Anteus]] 17:26, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Tom, intriguing topic! I&#039;m a keen follower of the Bitcoin revolution myself so have been naturally drawn to your prospectus and Daniel&#039;s as well. However I would say its quite difficult to follow your proposal. I&#039;m not quite sure how you intend to analyse and measure the use of cryptocurrency in conflict zones. Which conflict areas will you be targeting? Do you intend to follow forums or analyse chatter on various websites. If so, which ones?  [[User:Marissa1989|Marissa1989]] 07:36, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Julie Dubela&lt;br /&gt;
*Mapping Social Media Debate on the OHCHR Report on North Korea&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Julie_Assignment2.txt&lt;br /&gt;
[[User:Julie|Julie]] 18:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Julie, great prospectus. I find the whole North Korea situation appalling from a global response perspective. A lot of the articles, commentary and reactions from people around the world have been effectively muzzled. Your approach to analyse public reaction through social media is methodical and well thought through. Your plan to use specific tools to collect information from twitter hash tags, Google trends etc and follow up by analysing them to find common themes and trends is great. I look forward to reading the final report!  [[User:Marissa1989|Marissa1989]] 07:52, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Andrew Grant&lt;br /&gt;
*Quantified Self and Qualified Liability: Strava and Lessig&#039;s Four Forces&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Andrew_Grant_Assigmnment_Two_02252014.docx&lt;br /&gt;
[[User:AndrewGrant|Andrew Grant]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Andrew, your prospectus sounds fantastic. Lots of interesting questions being asked in light of Lessig&#039;s Four Forces and the Quantified Self movement. I think that you many be asking too many questions for an 8-10 page paper, if you are to go into sufficient depth for each one. Do you think that it&#039;s realistic to answer the five research questions in so short of a paper? Other than that, I think you are off to a great start and I am interested in hearing more about it. [[User:Lrsanchez|Lrsanchez]] 11:49, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In general, it might be helpful to state why your project is important and how the outcome of the research might help regulate/control or improve human behavior on the internet. [[User:Ichua|Ichua]] 19:58, 27 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1272</id>
		<title>Copyright Part 2: Enforcement and Balances</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1272"/>
		<updated>2014-03-04T16:50:22Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital technologies spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies for control and copyright enforcement. “Controversial” may be putting it lightly; the ongoing fight between copyright owners and Internet evangelists is one of the most popularly debated fights surrounding Internet control.&lt;br /&gt;
&lt;br /&gt;
This class focuses on how copyright is enforced online, with particular emphasis on the &amp;quot;notice-and-takedown&amp;quot; provisions of the Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;), which allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The class will also look to the now-famous fight concerning SOPA and PIPA, and other attempts to more strictly regulate against online piracy.&lt;br /&gt;
&lt;br /&gt;
Joining us will be [http://cyber.law.harvard.edu/people/aholland Adam Holland], who works here at Berkman on the [https://www.chillingeffects.org/ Chilling Effects] project.&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The second half of assignment 2 (commenting on prospectuses) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The DMCA Notice-And-Takedown Process&lt;br /&gt;
&lt;br /&gt;
* Digital Media Law Project, [http://www.dmlp.org/legal-guide/copyright-claims-based-user-content Claims Based on User Content] and [http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content Protecting Yourself Against Copyright Claims Based on User Content]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/takedowns Electronic Frontier Foundation, Takedown Hall of Shame] (peruse)&lt;br /&gt;
&lt;br /&gt;
* Chilling Effects, [http://www.chillingeffects.org/about About] and peruse the [http://www.chillingeffects.org/weather.cgi weather reports].&lt;br /&gt;
&lt;br /&gt;
* [http://paidcontent.org/2013/02/24/how-google-did-the-right-thing-with-the-nascar-crash-video-and-why-it-matters/ Matthew Ingram, Paid Content, How Google did the right thing with the NASCAR crash video, and why it matters]&lt;br /&gt;
&lt;br /&gt;
; Case Study - SOPA/PIPA&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/reading-sopa Jonathan Zittrain, Kendra Albert, and Alicia Solow-Niederman, A Close Look at SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/01/15/mit-media-lab-opposes-sopa-pipa/ Ethan Zuckerman and Joi Ito, MIT Media Lab Opposes SOPA, PIPA]&lt;br /&gt;
&lt;br /&gt;
; The big picture&lt;br /&gt;
&lt;br /&gt;
* [http://torrentfreak.com/bittorrent-traffic-drops-in-america-grows-in-europe-131111/ Ernesto Van Der Sar, BitTorrent Traffic Drops in America, Grows in Europe]&lt;br /&gt;
&lt;br /&gt;
* [https://www.techdirt.com/blog/casestudies/articles/20120405/11221818390/perspective-complexities-copyright-creativity-victim-infringement.shtml Erin McKeown, A Perspective On the Complexities of Copyright and Creativity from a Victim of Infringement]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
; Case Study - ISP &amp;quot;Six Strikes&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/2013/feb/01/copyright-alert-system-and-six-strikes/ Brooke Gladstone, Interview with Jill Lesser of Center for Copyright Information (&#039;&#039;On The Media&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.plagiarismtoday.com/2013/02/25/the-6-likely-impact-of-six-strikes/ Jonathan Bailey, Plagiarism Today, The 6 Likely Impact of Six Strikes]&lt;br /&gt;
&lt;br /&gt;
; Case Study - Operation In Our Sites&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1835604 Andy Sellars, Seized Sites: The In Rem Forfeiture of Copyright-Infringing Domain Names]&lt;br /&gt;
&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Wendy Seltzer, Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
With so much copyrighted material out in cyberspace it is helpful to have provisions like the DMCA takedown and notice provisions to help combat copyright infringement.  I think it is a reasonable approach to helping prevent abuses of copyright.  On the other hand, instances like the Akon takedown do appear to fall into abuse of the DMCA.  Nevertheless, I would argue that the DMCA actually worked in that instance because the material was taken down, but appealed and re-posted.  However, if the political satirist in the Akon incident did not have legal counsel, the takedown probably would have remained.  So there, I think is a flaw in the system, in that, companies with large pockets, and legal teams may be able to enforce their own form of censorship.  With the proliferation of user generated content like blogs, with bloggers commentating and re-mixing copyrighted content, what constitutes infringement is more difficult to see.  The good thing is that for the most part DMCA does not impose any prior restraint on expression.  Posters are allowed to post without restraint, and for the most part they are not liable as long as the material in question is taken down quickly (as least I think that last part is true?).&lt;br /&gt;
The class readings about chilling effects dig deeper into the problems that cease and desist letters, and DMCA takedowns have for expression on the Internet.  The Chilling Effects website talks about the harm that these C&amp;amp;D letters can have on expression.  Internet bloggers, satirists, and others may takedown their content on their own, causing a sort of self censorship for fear of prosecution from powerful adversaries.&lt;br /&gt;
SOPA, and PIPPA also would have caused a chilling effect, and probably out and out prior restraint on many users expression on the Internet. I think that a robust activist element from groups like the Berkman Center(shameless plug lol), the EFF, and Chilling Effects, help Internet users to know when new laws are being introduced to curb expression, and even help represent users who have had their material wrongfully censored or removed from the Internet. Yet, it concerns me a little bit that without such advocacy groups the little guys on the Internet would be at an even bigger disadvantage to the bigger fish on the internet. &lt;br /&gt;
One question I have was about the Bit torrent article, I didn&#039;t understand the importance of Bit torrents decline in use in the US. Was it that the decline might signify that users are avoiding bit torrent for some reason? Also, I saw that bit torrent and youtube, and netflix use disproportionate  amounts of space on the system. Is this sustainable? Is it fair that a few applications and companies use up so much of the space? Does that cause harm, or take from other uses that the space could be used for? I&#039;m not really sure how that &amp;quot;space&amp;quot; works. Is it unlimited?[[User:Mikewitwicki|Mikewitwicki]] 08:13, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Yet again, related to an earlier class, but another interesting write-up was just published on The Verge: [http://www.theverge.com/2014/2/25/5431382/the-internet-is-fucked The Internet Is Fucked (but we can fix it)] --[[User:Seifip|Seifip]] 19:05, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ditto, not related to Copyright, but the theme of the class in general, politics &amp;amp; control of the Internet. The Quebec government started [http://www.thestar.com/news/canada/2014/02/26/quebecs_language_watchdog_targets_stores_use_of_english_on_facebook.html fining businesses] for not writing in French on their Facebook pages. I&#039;ve never understood why Canada has such a stereotype of being &#039;nice&#039;. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:37, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Erin, thanks for sharing this. Seems like a really interesting example of the ways in which the Internet and digital technologies are a new place for old and ongoing debates to play out. With so much of our lives now taking place online, it makes sense that concerns about language, heritage, and culture have to be grappled with anew. I wonder if some of the push-back from business owners-- like the one in this article who says &amp;quot;Facebook has nothing to do with Quebec&amp;quot;-- stems from the idea that the Internet is a malleable and border-less place and confusion over what laws govern speech on a global forum run by a US-based company. And yes, I have heard some Quebecois friends get a little less than &amp;quot;nice&amp;quot; when it comes to discussing their francophone heritage... [[User:Jkelly|Jkelly]] 15:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Wow! That&#039;s crazy. Do you know what justification they have (or are using) to fine the businesses? Is it a case like the ADA, which prohibits discrimination against disabilities by such measures as requiring all public establishments to follow building codes to ensure disabled individuals are accommodated? By this I mean, is Quebec doing this so that French-speaking people are not excluded?[[User:Castille|Castille]] 15:51, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The highly controversial Section 512 of the DMCA, 17 U.S.C. § 512 provides a “safety zone”, where online service providers could operate shielded from liability charges on account of copyright infringement. Service providers function by allowing people to modify, post, and search content on their servers. By hosting foreign content that is not generated by the OSP or ISP, they were placing themselves into position of being held liable on infringement charges. This changed in 1998, because as long as roughly three essential steps were taken, an OSP could take advantage of the “safe-harbor” clause.  One of those steps is the “expeditious” removal of infringing content. On the other side, the alleged offender can send a counter-notice disputing the copyright holders claim. This might seem in favor of the public domain with an anti-copyright agenda, but it does not diminish the copyright holders privileges in any way. This provision also allows the first step of prosecution in the form of takedown notices. While these measures are beneficial for the public good and provide a degree of protection, they seem utterly inefficient in situations like Erin McKeown experienced. In an attempt to control infringers and pirates, the ICE has engaged in domain seizures, which resulted in tens of thousands of innocent websites being shut down. [[User:Emmanuelsurillo|Emmanuelsurillo]] 22:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
The Electronic Frontier Foundation’s Takedown Hall of Shame has excellent examples of cease and desist letter offenders, even citing unusual claims such as one over the copyright privileges of a monkey’s photos! That is where major companies should take and follow Google’s example of standing up for users rights. The Stop Online Piracy Act (SOPA) and the Protect IP Act (PIPA), MIT points out that to stop pirating has many dangerous side effects including but not limited to being unconstitutional in violating certain aspects of free speech. [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:06, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I was unable to find out anything about how many actions have been taken under the Copyright Alert System.  Are there any known statistics on how many of these notices have been sent out or how many consumers have been affected? (whether centrally managed, or done by a third-party watchdog like EFF?)&lt;br /&gt;
[[User:Jradoff|Jradoff]] 13:48, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: [http://thehill.com/blogs/hillicon-valley/technology/199124-six-strikes-thwarting-piracy-leader-says The Hill] reported that an annual report should be expected soon on Six Strikes. (It just passed its first anniversary since implementation.) We&#039;re still waiting to see if that will have a level of analysis like this. [[User:Andy|Andy]] 10:26, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I&#039;m in a creative industry where intellectual property is important (software / online games).  Yet I think that criminalization of intellectual property violations is ridiculous.&lt;br /&gt;
&lt;br /&gt;
I called all my U.S. senators and representatives back when SOPA/PIPA was in the legislative process--I found it highly offensive. It seems absurd to me that someone would be placed in jail for copyright infringement, or that we are making agencies of the U.S. government an arm of private industry by using them to enforce this (not to mention giving government broad control over shutting down content that some moneyed interest finds objectionable).&lt;br /&gt;
&lt;br /&gt;
The argument used by the industry is that copyright violation is equivalent to theft.  I agree that many cases of copyvio are totally wrong, but I don&#039;t see why it can&#039;t be handled entirely through civil systems.  The fact is that intellectual property violations *are* different from stealing a physical good, simply because in the former case we&#039;re dealing with a nonrival good (i.e., if you steal my car then I can&#039;t use it anymore; if you copy my software package, I&#039;ve lost some potential revenue from you but you haven&#039;t deprived my ability to sell it to others).  Furthermore, intellectual property violations are way more complex--these are cases that just aren&#039;t as clear-cut as showing that a theft actually occurred when you are caught with my stolen car.&lt;br /&gt;
&lt;br /&gt;
I listened to the songs mentioned in the &amp;quot;Touch the Sun&amp;quot; / &amp;quot;Slung-lo&amp;quot; controversy referred to in the reading materials.  I empathize with the creator of Slung-lo if they really feel their creation was improperly exploited, but I simply don&#039;t see the basis for their claim.  But upon my listening I found both songs to be different, and the lyrics were (as far as I could tell) totally different.  Billions of songs get made--lots will be similar.  I shudder to think that a large and well-funded copyright holder could use claims like this to abuse others with the threat of criminal enforcement.&lt;br /&gt;
[[User:Jradoff|Jradoff]] 13:58, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It seems that SOPA, PIPA, and the DCMA all seem to be working towards the same goal, that of eradicating copyright infringement/piracy. Why is the DCMA not sufficient? Internet piracy is a huge issue for the motion picture and music industries (and I&#039;m sure for plenty of other industries) as it is stealing. I agree with Jradoff that it&#039;s not &#039;&#039;quite&#039;&#039; as bad as actual theft of property and therefore might not warrant a jail sentence, but it is essentially the same thing. What is the difference between going into a Best Buy and stealing a DVD or CD and stealing it from home? It seems the primary difference is simply the ease of convenience for the thief. I think we have only been desensitized to this kind of theft because it is so prevalent in society. Anyways, if we agree that internet piracy is &amp;quot;wrong&amp;quot;, what can be done to curtail it further than the rules currently in place (i.e. the DCMA)? Have SOPA and/or PIPA been revised? In this article that I found on Forbes [http://www.forbes.com/sites/derekbroes/2012/01/20/why-should-you-fear-sopa-and-pipa/], author Derek Broes claims to have testified before Congress to propose &amp;quot;many solutions, none of which violate our First Amendment Right to Free Speech&amp;quot;, but he does not elaborate on any specific alternatives or amendments to SOPA/PIPA. What effective alternatives are there, which would go above and beyond what is already in place, but wouldn&#039;t be as &amp;quot;harmful&amp;quot; as SOPA/PIPA? Is there still talk of a new iteration of the legislature? I would imagine that with the onslaught of backlash from the initial bills, they would have to call them something different to mitigate any potential hate...[[User:Castille|Castille]] 15:51, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The former government in Australia tried for many years to implement a voluntary scheme to crack down on piracy through a series of discussions with ISPs, instead of having the government legislating enforcement of copyright. The meetings stopped happening, as the representatives from iiNet (large Australian ISP), would often get up and walk out of the meetings. &lt;br /&gt;
&lt;br /&gt;
About 18 months ago, Australian Attorney-General George Brandis made a case against iiNet which attempted to hold them liable for their users on BitTorrent for piracy purposes, which was taken to the High Court. The entertainment industry was attempting to hold the ISP&#039;s liable because it is obviously not economically viable, (even if it is in fact possible) to prosecute each piracy user individually. iiNet was successful in their defense to which the High Court unanimously ruled the ISP is not liable for the acts of their users. &lt;br /&gt;
&lt;br /&gt;
iiNet’s routine business of providing access to the internet will not, by itself, mean that they authorise their customers&#039; acts of copyright infringement.  At the same time, iiNet is not obliged to contact customers or terminate their accounts in response to notices from copyright owners.  Although users are liable for copyright infringement, it is hardly enforced at all in Australia. Australia is needing legislative reform in regard to copyright laws, as their attempts to enforce it have been futile. [[User:Marissa1989|Marissa1989]] 20:41, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
I should also note that this is very low on the government&#039;s agenda. Most of the pirated entertainment comes from the USA. There’s no motive or benefit for the Australian Government to fight against illegal downloading on behalf of the American entertainment industry. In addition, most websites used by Australians to pirate, like BitTorrent and Pirates Bay, are American-based websites, which adds another disincentive for them. Unfortunately, a lot of piracy goes on here all too easily without intervention or blocking; almost makes me wonder if (per capita), more piracy happens here. Unless it becomes a political issue or the Australian government loses money over it, they’ll remain reluctant to spend the time or energy to fix it.  [[User:Marissa1989|Marissa1989]] 00:03, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Exciting-- I was just searching Google for an episode of Girls that I accidentally deleted from my DVR and found the following notification at the bottom of the search page:&lt;br /&gt;
In response to a complaint we received under the US Digital Millennium Copyright Act, we have removed 1 result(s) from this page. If you wish, you may read the DMCA complaint that caused the removal(s) at ChillingEffects.org. [[User:Castille|Castille]] 00:22, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
It was interesting to read more on DMCA. I&#039;ve never been too familiar with the specifics of the law but have faced it&#039;s effects constantly on YouTube as so many videos are removed over copyright claims. Reading more on it, I found this article very interesting: http://www.wired.com/threatlevel/2008/10/ten-years-later/ It portrays DMCA in a positive light, going as far as saying it &amp;quot;saved the web.&amp;quot; I don&#039;t completely agree with the article, but I do think that content creators should have some safety net to ensure that their content cannot be used without proper credit or consent. And so, some safety net needs to be present but a filter that is too large is very concerning. The list of Takedown Hall of Shame is an alerting example of filtering gone wrong for the wrong reasons. It would interesting to see the solutions we come up with in the future. Will greater efforts of copyright regulation always be followed by an internet protest as large as the SOPA/PIPA one?&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 20:45, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Piracy is a major issue in Australia. The copyright laws are more loose than compared with other countries such as the US and it is relatively easy to download content illegally. Before watching a movie, an advertisement airs with the line “You wouldn’t steal a car, you wouldn’t steal a handbag, you wouldn’t steal a movie. Downloading pirated films is stealing. Piracy - it’s a crime!”. I understand this commercial has a moral angle in hopes to minimise illegal downloading. However,  If someone steals a car, handbag or wallet, a physical object that belongs to someone else has been removed without permission or payment. That would be theft. In one sense, if you download something illegally, it is a digital copy that changes hands. (‘Copy’ being the operative word). With piracy, nobody is physically deprived of anything, which is why I think most Australians don’t have a moral conflict when downloading illegally, which makes the advertisement’s suggestion that you are ‘stealing’ seem ludicrous.&lt;br /&gt;
&lt;br /&gt;
Of course, this pirate ‘thief’ can make the work available to anyone for profit. However, not all online piracy is done for profit. Those profiting from piracy are the people selling copied films and CDs out of the back of their car, and people selling software ‘compilation’ disks. &lt;br /&gt;
&lt;br /&gt;
Which brings me to the point, while the original creator might not be deprived of something, they ARE missing potential earnings. This is the difficult problem to solve. The past 10-odd years, we have seen a large value transfer from studios and publishers to those who will illegally download. However, I question whether or not the aspect of lost income from the entertainment industry is accurate. How is this measured? Are these estimated numbers exaggerated, or is this an honest reflection of loss for the entertainment industry?&lt;br /&gt;
&lt;br /&gt;
One of the main objectives of the Copyright Alert System is to return the earnings to the entertainment industry and original owners of content. But in the end, will this system end up throttling the internet and the principles associated, i.e. free speech, that we believe the internet should stand for? &lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 00:24, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Marissa --&lt;br /&gt;
&lt;br /&gt;
:What a wonderful post! I think you excellently encapsulate the problem both in terms of in terms of monetary quandaries when dealing with the entertainment industry online (assessing profit lost) and the moral dilemma both the user and publisher must confront.  With iTunes charging $1.29 per song and most people having at least a few hundred songs on their iPod, the temptation is high to illegally download - especially amongst college student communities. iTunes has increased their prices probably to offset the lost profit from illegally downloading.  &lt;br /&gt;
&lt;br /&gt;
:Prominent musicians have also responded in conflicted ways with some actually embracing the idea.  Artist Shakira is a known supporter of illegally downloading and has stated so in several interviews. Likewise, Beatles legend, John Lennon once said, “Music is everybody’s possession. It’s only the publishers who think that people own it&amp;quot; (Vignos 2012).  On the other hand, Stevie Wonder fears that illegally downloading will lead to music being treated like &amp;quot;garbage&amp;quot; in the streets.  The music industry has drastically changed with big business taking over as evidenced from the history of &amp;quot;Motown&amp;quot; music and the rise and fall of the father of Motown records, Berry Gordy.&lt;br /&gt;
&lt;br /&gt;
:As Marissa, notes the term &amp;quot;stealing&amp;quot; is perhaps not the appropriate verb for the act because you are not physically depriving someone of something; however, it is the actual profit lost that is at stake.  The problem is how this would-be profit would be calculated.  How many people would have actually bought the song instead of downloading?  I would guess the number would be much lower that those who went ahead and downloaded.  Clearly, illegally downloading and copying music is immoral but how can we prevent this widespread practice most effectively?  As it stands, very seldom are people prosecuted.  Perhaps this is because the crime is not taken as seriously as other types of theft or is not as despised or looked down upon in our society.  On the other hand, it might be just too difficult to catch all of the downloaders and trace their activity to a point where it would hold up in court with reasonable cause.  &lt;br /&gt;
&lt;br /&gt;
:http://www.michigandaily.com/opinion/viewpoint-illegal-downloads-music-industry&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 10:50, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::You guys are hitting on some great points! The question of whether to call infringement &amp;quot;theft&amp;quot; or &amp;quot;stealing&amp;quot; is about as controversial as they come. On the one hand, and to borrow from [http://press-pubs.uchicago.edu/founders/documents/a1_8_8s12.html Jefferson], sharing an idea/expression/discovery is by its inherent nature nonrivalrous - I can share with you an idea without diminishing my possession of the same idea. On the other hand, if I give you something in lieu of you buying it yourself, I may not be diminishing my own possession, but I may be interfering with the author&#039;s income, and thus risking their incentive to create in the first place. But on the other, other, hand, the studies that have looked at piracy&#039;s effect on sales are wildly divergent as to whether a download can be translated to a lost sale - some, including [http://www.unc.edu/~cigar/papers/FileSharing_March2004.pdf Felix Oberholzer-Gee and Koleman Strumpf] have found that there is actually no correlation between downloads and lost sales. That sounds totally insane at first, but when you consider the possibility that a large margin of people download music they would never buy (if required to obtain the music in that way), it is much more plausible. (The study still has many other critics, of course.) [[User:Andy|Andy]] 11:01, 4 March 2014 (EST)&lt;br /&gt;
      &lt;br /&gt;
 &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The recent Federal Appeals Court ruling ordering Google to remove the inflammatory film &amp;quot;The Innocence of Muslims&amp;quot; from YouTube.com, appears to stretch the copyright interpretation. The ruling certainly sets a precedent for both basic copyright law, eectronic distribution and the First Amendment. Not being a lawyer, Kozinski&#039;s ruling appears troubling. In reading the copyright interpretation, I get the impression we&#039;ve exceed copyright law and entered in to some troubling precedents. Any thought?[[User:VACYBER|VACYBER]] 10:12, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:We&#039;ll be talking about the Garcia v. Google case for a while in the second half of class today. Stay tuned! [[User:Andy|Andy]] 10:26, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thanks for sharing this, Vacyber.  I find this to be a dangerous, unconstitutional precedent and appalling ruling!  If anyone has seen the video, it did not incite violence of any kind.  Simply because someone interpreted a video to be insulting does not warrant its removal.  If everything posted online that someone (or some group) deemed offense were to be removed, the court would never have a day off and the internet as we know it may cease to exist (at least in terms of its vast information-sharing capabilities).  By catering to one group and limiting freedom of speech, we are not doing anyone any favors and are only foolishly destructing our own liberties.  It will be interesting to see how future cases will be handled and I look forward to the class discussion!&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 11:01, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Erin McKeown&#039;s article rises a very important point that is common too most of the legal system, not just copyright: Most laws claim that they intent to protect those most in need, but in fact favour the big and powerful, usually rich as opposed to poor, and groups and corporations as opposed to individuals. Now, I&#039;m not one of the people who believe poor individuals intrinsically deserve more that rich corporations, but I do believe they deserve to have equal protection in our legal system, and not just on paper. The problem is, the way copyright law, and many other laws work, it is usually not viable for individuals to sue infringers because it takes too much time, money, knowledge (for starters, the knowledge that you &#039;&#039;can&#039;&#039; sue at all) and other resources. Especially given that most individuals do not have the knowledge or a legal team behind them who could provide them with the knowledge related to copyright law, they are much less likely to benefit from it as they cannot easily estimate whether any action will be worth the investment. This is a major problem that that needs to be resolved, lest the copyright law benefits more those who infringe, than their victims. --[[User:Seifip|Seifip]] 11:50, 4 March 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1267</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1267"/>
		<updated>2014-03-04T15:57:38Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Jolie Ho - Wan Lap Ho&lt;br /&gt;
*Instagram vs Flickr&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Jolie_Assignment_2.docx&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 16:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How do you propose to collect data to answer the last question? [[User:Ichua|Ichua]] 15:22, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey Jolie! You picked a really fascinating topic to cover! Just a few thoughts I hope will help. How do you plan on pinpointing how all the users behave differently, just because there are so many registered accounts you might be able to find people who behave nearly the same or certain individuals who have accounts on both Instagram and Flickr. Just as a mere suggestion maybe you can find a niche that is unique to each site and compare them? Maybe Instagram has thousands of pictures of food and seflis while Flickr has more professional content? I hope this will help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:15, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like your topic to dive into why Instagram has been so successful compared to Flicker. It may be interesting to compare the age groups of each users. Instagram seems more accessible because it is a phone app that is simple and immediate to use, whereas Flicker users upload a batch of vacation photos, etc. I like Emmanuel&#039;s suggestion to compare the content between users. Another suggestion which relates to the selfies/food photos may be to compare the users themselves. I think older people tend to use Flickr and therefore may not post as much. However, younger people (who no long user facebook) posting to instagram all the time would provide a way for facebook to get back that market. ([[User:Margorm|Margorm]] 14:31, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
::Hi Jolie: This is a very interesting topic, with many possible areas focus on! (Also, a nice mix between the tech and creative worlds.) You mentioned that Instagram and Flickr diverge where mobile apps are concerned. This looked particularly interesting, especially following the Flickr app&#039;s overhaul. Anecdotally, via Twitter, it looked as though the Flickr update was a major talking point in both the Instagram and Flickr user groups. My thought was that it may be interesting to look at whether this major app update had any bearing on either of the two communities, as it may have impacted some of your research questions. Best! [[User:Twood|Twood]] 09:33, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: How would this differ from other imaginary items of trade like currency/commodity derivatives and futures and virtual commodities like pork bellies?   [[User:Ichua|Ichua]] 15:17, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Daniel,&lt;br /&gt;
What an interesting topic! I was not even aware that state governments recognized these currencies. Would you be able to come up with more material if you focus on one or two countries and their reaction to the online currency? Also Ichua gave great advice; maybe one country’s reaction and policies to multiple online currencies would help in the scope of observation. Your idea of creating a website to report and share your findings is really novel! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:26, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: &lt;br /&gt;
Very interesting topic Daniel. Ive been following the progress of Bitcoin as a personal interest. Apart from the regulatory challenges Bitcoin poses for Governments, its also vulnerable to cyber attacks which can erode trust in using the currency. Whilst the actual Bitcoin itself is heavily encrypted, the Bitcoin exchanges are vulnerable to hacking and cyber theft as evidenced recently by the successful attacks on Mt Gox, one of the world&#039;s largest Bitcoin exchanges. It would be interesting to observe the effect (if any) this would have on the regulatory view of the currency by Governments. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Pseudonym: Marissa1989&lt;br /&gt;
*Prospectus title: The rise of the collaborative consumption movement: Analyzing effective control of communication, structures of gaining trust &amp;amp; verification, and legal issues.&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:Assignment_2_Barkey-2.pdf&lt;br /&gt;
[[User:Marissa1989|Marissa1989]] 23:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hi, Marissa! I used AirBnB to rent out my apartment last summer and it actually resulted in me being robbed by the person to the tune of $10,000-- not including the rent for the summer, which he didn&#039;t pay (I didn&#039;t get any of it back, either, despite the insurance). It was a nasty situation. Anyways, from what I understand, the majority of communication on AirBnB is done privately. Without staging anything or intervening, how do you plan to observe enough to answer your question(s)? I think this is basically the same concern with one of the other treatments I read, regarding Facebook. I do think the security of platforms like AirBnB is of great concern and would be a very interesting subject to study in depth![[User:Castille|Castille]] 21:16, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Dear Marissa,&lt;br /&gt;
I loved the idea for your prospectus! Just as a suggestion, would you consider comparing a few corresponding sites like 9flats, Couchsurfing International, or Hospitality Club? You could analyze how they handle different verifiability and security issues while also comparing how the sites are constructed to better “vet” their users. This may yield insight on how trustworthy their users are to each other. You might even want to inquire if one has had “major” legal issues in the past. I hope this helps! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:32, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Greetings Marissa!&lt;br /&gt;
&lt;br /&gt;
Your topic is very interesting and it appears we have a few of the same elements in the companies we have selected to research: Verification and trust. From what I understand, you are addressing issues of users on auction/garage sale platforms surrounding the tiers of user verifiability. In other words, who is protecting one user from being taken advantage of by another user.&lt;br /&gt;
&lt;br /&gt;
The comment you posted on the wiki under my topic in regards to the effectiveness of how the sites that I have selected deal with inaccurate comments made about companies by the general public are dealt with is of great importance-the public can ruin a business for no other reason than spite. In other words, who protects the companies from users. &lt;br /&gt;
&lt;br /&gt;
The proposal you submitted intrigues me in many ways. By studying the community of airbnb.com, it appears you will be analyzing the controls implemented to make the site successful (verification, quality feedback, security, payment, userability and collaboration). &lt;br /&gt;
&lt;br /&gt;
In summary, it appears we are both working on protection issues, and if the verification process is significant enough to gain consumer trust. &lt;br /&gt;
&lt;br /&gt;
Would you mind if I ask how you plan to analyze the user? I would be interested in your methodology, and we may even find each other’s approach helpful to each other. We may even be able to compare and contrast the communities with a similar approach and work together if you would be interested. &lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 15:18, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Melissaluke|Melissaluke]] 18:36, 25 February 2014 (EST)&lt;br /&gt;
*Change.org vrs Ripp Off Report&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_Research_Paper-Final.docx&lt;br /&gt;
&lt;br /&gt;
Dear Melissa, &lt;br /&gt;
What a great topic and area of coverage!!! I’m hoping my comments and questions will be of help to you! Which site succumbs more readily to outside pressure and take down requests? Also you mentioned that a susceptible compliant to both is that they are accused of not “vetting” their sources. You could possible test to see which one (if either of them do) checks them more thoroughly. This might be, and I know nothing about it, accomplished by putting posts of your own and noting if they require any amount of proof, citation, source, or quote of any kind. I really hope this helps you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:35, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Thank you so much Emmanuel! Your ideas are superb and very helpful!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Melissa, these sites can be a boon for consumers in helping to identify unscrupulous businesses and thus avoiding them. The issue that I find with these sites, that&#039;s never been effectively dealt with, is how do they identify and remove potentially inaccurate comments attacking a business as a result of say, a personal vendetta by a disgruntled employee or a customer who was unreasonable. Many small and medium size businesses rely on word of mouth for new customers. If the site allows the comments to remain, it may affect the business.  This in effect may lead to possible blackmail of businesses by threatening to post inaccurate information on these sites. I&#039;m also very interested in the sample groups and postings that you choose. Great topic! [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marissa, Excellent insight and the problems posed are valid. Your questions are helping to me and assist in narrowing the topic-which is clearly too broad at the moment.&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 13:17, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Melissa, Just a quick note, because I loved your prospectus so much (it&#039;s such a creative take on the assignment, but still seems to hit on all the prof&#039;s requirements, really amazing job). With your &#039;&#039;&#039;Q1&#039;&#039;&#039;, &#039;&#039;Why would one site be more popular?&#039;&#039;- I can;t help but wonder, does the fact that it has such a simple, perfect 1-word URL have any effect? Also, due to the time (2007) &amp;amp; place (USA) I automatically assumed this website was somehow related to Obama&#039;s election campaign- though from quick Google search there doesn&#039;t seem to be any direct link. Anyways, just wanted to say, I really like your prospectus. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:49, 3 March 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hey Mike, it would absolutely be my pleasure to provide feedback to you. I won&#039;t go too far before having the time to focus &amp;amp; read it completely- so my first feedback to you is: if you didn&#039;t pick such an interesting topic, I would have actually read the full prospectus. However after reading your first paragraph, I ended up watching TPP and reading its subreddit and forgot to finish reading your prospectus! hahaha. But this weekend I&#039;ll spend time focusing and try to provide you feedback, hopefully as good as the feedback you gave me (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 10:34, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Mike! After reading [[User:Jkelly|Jkelly]]&#039;s comments below, I&#039;m kinda worried about posting my comments, cus I think I understood your questions from a different point of view. &lt;br /&gt;
::*First of all, my question- how do you approach your 2nd qualitative question? I&#039;m not completely sure I understand what you mean by vulnerability.&lt;br /&gt;
::*Second, my advice, feel free to take it or leave it: to keep within scope of this project (2500 word paper seems so short!), I believe it may be easier to tackle Qualitative questions #1 &amp;amp; 3, and your second quantitative question (&#039;&#039;Has it helped or hurt the game to impose such controls?&#039;&#039;). I get the impression that these questions would be the ones that would be easiest to answer from following the community discussion on the subreddit. That being said, if we were writing 8000 word papers, it would be so much fun for you to really dive into the architecture &amp;amp; UX of the game itself, while paralleling it with the subreddit(!!!). Really awesome topic &amp;amp; prospectus.&lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 22:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:After reading your prospectus, I have a few questions based on your questions, or maybe some questions that combine the ones you already have. It seems clear from what you write in your prospectus that the user experience is absolutely vulnerable to the controls imposed by the game, but I&#039;m curious to know in what ways. Were users bumping up against controls they didn&#039;t like before there were changes, or was it only after the controls of the creator were made clear (he made himself known in an explicit way, rather than operating quietly in the background) that users began to find fault? (Another way of thinking about this might be- were a lot of users thinking about the controls imposed by the game before the creator&#039;s changes forced them to think about it?) If I understand the current set up correctly, it seems that users still have the option to have commands parsed as they go instead of waiting for them to be tallied and then implemented. So, were the controls only seen as problematic once users considered that there was one person making a decision that affected every user? Is the lack of democratic decision-making behind the scenes a bigger problem for users than the actual changes in user experience?&lt;br /&gt;
&lt;br /&gt;
:As far as your quantitative question goes, I&#039;m wondering if there&#039;s any way for you to know how many users stopped playing the game after the creator made changes? Do you have a means of seeing the changes over time? [[User:Jkelly|Jkelly]] 14:16, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
Dear Michael, &lt;br /&gt;
I find your prospective very interesting! I thought to give you these few suggestions. I hope they will help! You might want to see what percentage of Flickr users are a part of the Creative Commons community and whether it consists of a majority or a minority. Another area of research might be into the other forms of control that Flickr uses to protect copyrighted material, and then to compare them with Creative Commons to see if they are as effective, prevalent, or well known. Also, when there are infringements in copyright policy, do people respond to correction or do they just ignore and continue violating the rules? Lastly, how does the Creative Commons community handle repeat violators (if there are any)? Wish you the best! [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:43, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Lucia, This is looks to be very interesting - I was wondering if you can be more specific on what types of data the initiative is exploring. Are they looking for statistical data mainly, do you vote on what subjects you are going to put on the website or research? It looks like a great example of policy control via the government. I would to know more about the website and its overall goals - something that helps define its missions parameters, as I visited the website main page and got an idea of what they were saying - I am just needing some more clarity that&#039;s all. But again, the subject looks like a great idea and should be very interesting...[[User:Dancoron|Dancoron]] 18:48, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Lucía! &lt;br /&gt;
I think your choice of study fits perfectly with the theme of the course! Perhaps you can also investigate to see if they are stifling public opinion or whether they are flooding the docs with pro-government voices to influence the theme towards their agenda?  Also as a suggestion, can you see if it is truly open to everyone? Maybe you would like to find another similar program that the government has tried in the past (assuming that they have tried). Do the number of participants fluxuate? Is there a trend in what the government sees as inappropriate? Or is it just random edits that are corrected by the government? I hope these comments can help you! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:13, 3 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I&#039;d really like to read and comment on your prospectus, but it seems like the file didn&#039;t upload. Happy to respond to it once it&#039;s up!&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 20:57, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I second Jkelly&#039;s comment. This look very intriguing and I&#039;d like to learn more about your plans for the project! [[User:Twood|Twood]] 23:14, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Hello, Dan! Admittedly, I had never heard of “Anandtech.com” prior to reading your prospectus, but I’m glad that you told me about it. I really like their “Cable TVification” assessment of the internet in recent years. After reading your prospectus it seems to me that you are focusing on Lessig’s norms as regulators within the site’s forums, as well as “laws&amp;quot; instituted by the website. It is an interesting subject, because as you say, this particular forum is very successful in fostering an environment where users are likely to return. That said, I see that you qualify users of the site as “good,” and I’m curious to know how you will operationalize this term for your project. You mention words like “courteous” and “helpful,” but I’m wondering: what characteristics do you think you will look for when observing, in order to qualify a “good user.” For comparison, do you have an example of what behavior that “bad” users might entail? Lastly, I see that there are literally millions of post on the forum; you may wish to focus on a specific topic and/or date range in order to have a more manageable data set to observe. I’m interested to see what you’re project will entail, especially being that I am also observing forums for my project. [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
: Hi Vance, thanks for taking the time to look at my prospectus - Basically, what I meant to convey is that these are the characteristics of a &amp;quot;good&amp;quot; website, a website that demonstrates use and activity to by the administrators and its members/users. What I will be focusing in on is, how is the site&#039;s control policy administered and conveyed to its members, both historically and presently, through the links in my prospectus – and to answer your question about bad behavior in online forums, yes I will, as I think that is a critical component regarding context – And this also goes out too Marissa as well, what I really wanted to focus in on was how does bad behavior and is control policies in its forums, effect a webite economically - as I think ths would even go further towards Lessig&#039;s FOUR norms of regulation on where the dot lands - but for obvious reasons, that could end up being too big. However, I still might toss something like that in - My goal is to pick out a couple of instances of the control poliy being implemented and see what the results were based on specific incident/instance was there a ban and how long was it for - what was the reason, what was the community&#039;s response to that action and so forth... - Again, thanks for the input and suggestions.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi Dan, forums have proven very useful mediums for learning and troubleshooting. What would be interesting is how forums deal with covert advertising I.e. Forum posters who may be businesses, subtly advertising their own goods or services under the guise of responding to threads without paying for advertising rights. Would paid advertisers pose potential conflicts of interest to the neutrality of forums? I&#039;d also be interested in seeing how you compare the Anandtech&#039;s forum controls against others. Would you choose similar types of forums with respect to content type? [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Marrisa, I tried to include your response with Vance&#039;s up top :O) [[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hey Dan!&lt;br /&gt;
If you are mainly comparing Anandtech’s forum site policies, maybe you could also compare past versions of the rules? Also, you might want to see if Anandtech has any unique features in toxicity control that would make it standout from other less successful forums. Overall the concept is fantastic! [[User:Emmanuelsurillo|Emmanuelsurillo]] 00:16, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Emmanuel, thanks for the feedback - ya, I am going to try and put some type of onus on Anandtech as well, and see if some of their reactions to their policies could be considered a little over zealous or a bit too far reaching. Most times, their admins/moderators are pretty decent, but again, like everyone else, there are times when a few of their admins/moderators could be having a bad day and maybe be a little too heavy handed - we&#039;ll see, stay tuned to find out. just a little humor :o) Thanks again for the input.[[User:Dancoron|Dancoron]] 09:59, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:First of all, GREAT TITLE!!! Second of all, this seems like an extremely interesting subject and I&#039;d love to read more about it. I do wonder whether you&#039;ll be able to get access to the material you might be looking for by doing &amp;quot;undercover investigation&amp;quot; and the other research methods you listed. It seems to me that the kind of exchanges you&#039;re discussing would be difficult to observe on Facebook as they likely wouldn&#039;t be out in the open. I may be completely mistaken, but I was also under the impression that the assignment encouraged examining a more open forum or something of the like where observation was more feasible. I know that there are public matchmaking sites and I would assume there are also forums geared towards those who wish to have illicit affairs, so that might be an area into which you may want to delve. [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:I also love the topic and find the subject very interesting! I share Castille&#039;s concerns above. It seems challenging to get access to the materials you will need to answer these questions. I wonder if there is an open forum somewhere in the internet where angry divorcees can go to vent about how social media ruined their marriage? It may be a biased site, but it may provide resources to other statistics or materials that may help? Or if there is a community you could observe and monitor the degree of online flirting? ([[User:Margorm|Margorm]] 14:48, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wow very cool subject - and one I am sure that deserves a lot of attention these days. With that said, it seems that this subject matter could be a thesis or dissertation as the material collected probably seems to be endless. I was wondering what specific community are you going to target on facebook, as this looks to be potentially a very large paper? I have to admit that I am fascinated to see what other statistics this might uncover, as I am sure we all have heard stories of spouses leaving their significant other for someone they met online. Yet maybe, you can focus on something more specific then a facebook community - as there might be other communities or even forums that have support groups for such instances or circumstances that you mentioned earlier. Maybe seeing how they interact with each other and what rules or policies can be observed and commented on. Overall the topic is really great and I am sure it will have some very interesting content that is fascinating.[[User:Dancoron|Dancoron]] 19:13, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Very interesting subject matter Amy!&lt;br /&gt;
&lt;br /&gt;
You may have selected one of the most controversial and highly emotional subjects out of all proposals presented.  I would agree with Dancoron. The questions outlined could lead to a doctoral dissertation. Additionally, Castille does bring a good point to light, in that we are encouraged to avoid any work as an “alias”. &lt;br /&gt;
&lt;br /&gt;
I think many of us are having trouble (to include myself) narrowing the research down to a tolerable amount of data collection for an in depth analysis.&lt;br /&gt;
&lt;br /&gt;
In your proposal, you suggested comparing and contrasting divorce rates. What sources would you be comparing and contrasting? Are you speaking to different communities in the United States or on a larger level?  Or, are you addressing the male/female divorce ratio? &lt;br /&gt;
&lt;br /&gt;
Secondly, will you be cross-examining two nations who have access to Facebook, in efforts to compare and contrast divorce ratios in direct correlation to Facebook usage? &lt;br /&gt;
&lt;br /&gt;
If your research goals are to use Facebook as the platform for study concerning divorce, it may be difficult to get access to this information unless you are accepted into a person’s profile, group or community. In efforts to stay objective, I don’t think you would want to study anyone that you personally know.  Pornography could be a difficult study, in direct correlation to pornography with the controls Facebook allows for each individual user. &lt;br /&gt;
&lt;br /&gt;
Would it be possible for you to follow a smaller, more open group that readily blogs/views pornography that is open to the public for data collection in a short period of time? &lt;br /&gt;
&lt;br /&gt;
Unfortunately this is completely out of my arena. I have never been married and I don’t view porn sites. But, your topic is fabulously interesting. &lt;br /&gt;
&lt;br /&gt;
Good luck with your research and I can’t wait to see your results.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Hi [[User:Margorm|Margorm]]! I love your topic. Your prospectus, combined with our brief discussions in class have really made me wonder- if 23andme is part of the first iteration of DNA decoding tools for personal use, where will we be in 25 years (: Just my general thoughts on this great topic- my comments specifically regarding your prospectus are below:&lt;br /&gt;
::*I really like that you asked whether the FDA is the best agency to regulate DNA testing, especially your last sentence &#039;&#039;what regulatory bodies outside of the FDA should be paying attention to this personalized and identifiable database?&#039;&#039;. Throughout this class, I&#039;ve had similar types of questions many times.&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, however it seems that the data you will collect (assessing changes in attitudes of community members) will be more apt to answer your 2nd question (&#039;&#039;How has the ban on delivering health-related risk assessments to the 23andMe community impacted the consumer’s trust toward the product?&#039;&#039;), rather than the underlined question that I referred to in my previous bullet.&lt;br /&gt;
:Please note that I am most interested in your underlined question regarding the FDA! However my advice is that your second question regarding attitudes &amp;amp; trust may be easier to study with respect to your methodology.&lt;br /&gt;
:[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST) - updated 03 March 2014 ~11pm&lt;br /&gt;
&lt;br /&gt;
:It seems clear that although institutional positions and statements are mostly contrary to the patentability of human genes as such, however international patent offices (U.S., Europe, and Japan) have accepted the patenting of human DNA sequences if they meet the technical and legal requirements, including the “utility”. DNA occurs naturally in the human body and should not be patented by a single company that can then use its patents to limit scientific research and the free exchange of ideas. As said by Koepsell “Laws of patent are meant to be used to protect inventions — things that engineers are doing — not things that scientist discover” (Holman, 2007). A regulatory block of decoding tools for personal use would seem to be an exercise in economic control. I believe you&#039;ll find an ample supply of public opinion in regards to attitudes of community members.  [[User:VACYBER|VACYBER]] 10:28, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
::Castille, I think you have a really excellent topic here. My first thought is that it would probably be helpful to choose a particular self-harming behavior that&#039;s discussed on Tumblr to help narrow the scope of your work. Additionally, while these issues can and often are related, I imagine that the Tumblr communities that surround each issue probably have a distinct culture. This topic makes me think of the Jessica McKenzie piece, &amp;quot;Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag&amp;quot; we read in week four. I would be curious to know how many of the controversial hashtags are actually used in subversive ways. Some of the reactions to Tumblr&#039;s policy change seem to touch on this when users write that they use these tags to address their own struggle with self-harming behavior. After these policy changes got some press, did it shed enough light on these self-harm blogs to inspire users to use these potentially triggering hashtags in new and positive ways?&lt;br /&gt;
::[[User:Jkelly|Jkelly]] 13:56, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thanks for your feedback! I&#039;m planning to narrow the scope to primarily center on pro-suicide blog postings, but I think I&#039;ll have to use some other examples such as cutting and possibly even pro-eating disorder blogs, as they all seem to interact with each other. It appears from my research thus far that the communities are intrinsically linked much more so than I expected. I agree, it would be interesting to see if things have changed-- though I&#039;m not quite sure how to gauge pre-policy versus post-policy changes. If you have any ideas, I&#039;d love to hear them! [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Castille, fantastic topic! I like your approach to analysing this topic and its a subject which is very controversial &amp;amp; personal. I agree, the main challenge for any Government is to try and regulate the numerous blogs and hashtags on sites like Tumblr, effectively putting a suicide watch on them. Would this be an effective use of tax payer funds and how many suicides could this prevent? What would be the process be if a potential suicide victim was identified? We have to be careful not to act in a knee-jerk reaction when there is a death and expect the Government to do something about it. I think there needs to be a balance of responsibility between these site operators and the Government. I&#039;m very interested in the outcome of your topic. [[User:Marissa1989|Marissa1989]] 07:47, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Watson!&lt;br /&gt;
&lt;br /&gt;
A few questions:&lt;br /&gt;
&lt;br /&gt;
How would you determine which distribution channel the Syrian opposition used the most?&lt;br /&gt;
&lt;br /&gt;
How would you be able to detect the limitations of public information if it has not been disclosed?&lt;br /&gt;
&lt;br /&gt;
If you were to select two media channels to compare/contrast,  would there be enough data available in those two communities to properly “diagnose”, or is the data withheld from the public?&lt;br /&gt;
&lt;br /&gt;
If you chart a paper on what capacitated the Syrian opposition groups to communicate their cause, will this information lead to a report or a true communal study on the Internet? &lt;br /&gt;
&lt;br /&gt;
Very interesting proposal and I wish you the best in your research!&lt;br /&gt;
&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 20:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:This is a very interesting topic. There is a lot to examine here, especially since a large part of the attacks and arguments happened online. An interesting topic would be to mention the Syrian Electronic Army and the many acts of online vandalism that they did. You can find more info here: https://en.wikipedia.org/wiki/Syrian_Electronic_Army The Internet was certainly a tool in the conflict. An interesting focus would be to investigate their motives and the impact this electronic army had on the Syrian conflict. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 21:01, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LRS_IS_prospectus.docx&lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Laura – Instagram is not only the biggest mobile photo sharing app, but is also now owned by Facebook, and thus a disproportionate amount of mobile peer to peer communication falls to the censorship whims of this company. This is an incredibly worthy area to research, if not lofty. Since Instagram now allows direct, private communication of photos, you have to wonder if there is a difference in how moderated these communications are versus a post intended for the public that uses hashtags (let us not forget that the hashtag’s original use was searchability, not irony). That said it might be very difficult monitor the differences in speed and effectiveness of what gets censored without interfering with the community you’re observing. One way may be to follow news events (such as this recent one: http://abclocal.go.com/wtvd/story?section=news/local&amp;amp;id=9448993) that show Instagram’s policy enforcement in action. The issue with that approach is that it is cherry picking the successful takedowns rather than observing uncensored posts that are breaking the terms of service.  Another option may be monitoring Instagram’s list of banned hashtags and searching synonyms or alternate hashtags, but again this is a difficult aspect of their policy to observe in action. &lt;br /&gt;
::I believe there is still strategizing to be done to design your observation of the community, above merely reporting their policy. I hope my take somehow helps you with this endeavor! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 09:55, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Hi, Laura! I think Instagram is a really great topic and will provide a massive amount of material, which I think can be beneficial and detrimental. It seems you might want to consider focusing on a specific aspect of censorship on Instagram, like nudity, drug references, or profanity (if any of those are prohibited-- I don&#039;t know their specific terms of use). What aspect of Instagram&#039;s censorship do you find to have the highest potential to become problematic? Is their choice as a company to disallow certain messages/images actually infringing on free speech, when they don&#039;t have any power over whether an individual chooses to express himself (IE he/she is still capable of posting the material on another site), they merely control/monitor the postings on their own site? [[User:Castille|Castille]] 02:19, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
:Hi Jon- My first thoughts on your prospectus have to do with scope. In comparing these three different games, I think there might be too many factors to consider-- subscription-based vs. free, PC vs. iOS, etc. I wonder if it wouldn&#039;t be more manageable to tackle your research questions if you focused in on two games that were more similar so that you have fewer variables to contend with when you&#039;re thinking about your research questions. My instinct is that working with WoW and League of Legends would work since you can still attempt to tackle each of Lessig&#039;s four forces. I&#039;m not sure how much the law in the US varies from that in Finland, but removing Clash of Clans from the equation might help the narrow your scope in that sense as well. [[User:Jkelly|Jkelly]] 14:27, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Jane – It is a great idea to compare feminist discussion within the confines of a feminist-oriented website to discussion in a public space without this slant. The regulations on discussion are obviously going to be wildly different in each of these communities. You identify Facebook and Twitter as less thoughtful in their discussion for feminist topics - perhaps as a result of their differences in comment policy? I was interested in the comment policy of Bitch Media that you mentioned in the prospectus, so I looked it up. (For others: it can be found here: http://bitchmagazine.org/comments-policy) One line that stood out to me was the following: “As far as moderation of this space goes, guest bloggers moderate the comments on their respective posts, but website moderators will step in when necessary.” – Does this mean that each blog post is technically regulated in a different way? It is not a deal killer if so, because it sparked the following idea: Because FB and Twitter are big places, could you find a smaller community (that is not inherently feminist-oriented) that is discussing the same thing as mentioned in one or a few of the Bitch Media posts, and compare the discussions directly? Just a thought! &lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:54, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Does &#039;&#039;anyone else&#039;&#039; see the awesome irony of a woman named Jane writing about Bitch magazine? Am I the only one on here who was a teenage girl in the &#039;90s? I remember clear as day, reading [http://bitchmagazine.org/article/ten-things-hate-about-jane Bitch&#039;s criticisms of Jane] back in 1998. BTW [[User:Jkelly|Jkelly]] I hope you understand that as a very longtime fan of Bitch magazine I am in no way criticizing your project, I actually think it&#039;s &#039;&#039;&#039;such&#039;&#039;&#039; a cool topic. You &amp;amp; I would probably have been awesome friends as teenagers. p.s. This doesn&#039;t count as a comment on the prospectus!!! I hope. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 21:44, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Haha, thanks so much for sharing that Erin!! I haven&#039;t had a chance to read the whole thing, but when you see words and phrases like &amp;quot;fake, sanctimonious,&amp;quot; &amp;quot;self-obsessed,&amp;quot; &amp;quot;narcissism,&amp;quot; &amp;quot;blithe unconcern with which they suggest spending huge amounts of money on items of debatable utility,&amp;quot; and &amp;quot;overweening focus on the superficial, ersatz do-it-for-you tone, and fake individualism&amp;quot; in just a quick scan of the article, it&#039;s bound to be a fun read. Thanks! [[User:Jkelly|Jkelly]] 08:53, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
:: Erin - I think the comparison of two subreddits with different regulations is a solid method of studying the effect of regulation on political discussion. I also believe the two subreddits you have chosen make for a great comparison. The only reservation I have in your prospectus is the focus on word count of the regulations as indicative of the rigor of the moderation. For example, one subreddit may simply say &amp;quot;Discussion of Russia is forbidden&amp;quot; - which in five words hampers more conversation than either of the two sets of regulations do in actuality. I do not think the word count is a meaningful statistic. Apropos your question of whether those without internet access will be under-represented in our studies, I would say that because we are focusing on specific small communities to begin with, we are under-representing the reactions (to control) of everyone in the world who is not in that community. The vast majority of the world is not included. Our focus is on only those within the community itself that we can observe. Ultimately I believe your project is designed very well. Since I too am studying a subreddit for my project, I will be following your progress closely!&lt;br /&gt;
::[[User:MikeJohnson|MikeJohnson]] 11:23, 26 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Hi [[User:MikeJohnson|MikeJohnson]]! Thank you very much for the feedback, very good point about the empirical data on the rules, hopefully I can expand when I have 2500 words to work with. BTW, I just wanted to comment- the question about people without Internet access was actually [[User:Ichua|Ichua]]&#039;s question. My understanding of the assignment is to study &#039;&#039;only&#039;&#039; online communities for this assignment (and not offline humans, which excludes anyone who doesn&#039;t or can&#039;t access the Internets). My question that [[User:Ichua|Ichua]] commented on is whether &#039;&#039;&amp;quot;users are intimidated by the effort or research required to post, thus limiting participation to a narrow audience&amp;quot;&#039;&#039;. Sidenote- &#039;&#039;&#039;Thank you&#039;&#039;&#039; very much for introducing us to the Twitch Plays Pokémon phenomenon in class. So freaking cool. My God do I ever love the Internet.-[[User:Deluxegourmet|Erin Saucke-Lacelle]]&lt;br /&gt;
&lt;br /&gt;
:::: Thanks Erin! I think it is absolutely amazing as well, and I&#039;ve never played Pokémon. If you would like to read my prospectus and help me think about potential research questions using their subreddit, I am all ears. [[User:MikeJohnson|MikeJohnson]] 11:34, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: Hi Ian, great topic and I like the innovative approach you&#039;re taking. I agree that social media is an important medium for Governments to gauge public mood or opinion. In fact, Australia&#039;s Prime Minister, Tony Abbott recently spent $4 million to analyse social media and gauge the public mood on certain policies he introduced. From my understanding, you&#039;re looking to build something like a mind map to organise the social media feedback and also meta tag it? This would effectively allow content to be searched and categorised similar to a knowledge base. Just a couple of questions though....How will you apply the cognitive map? Do you have a specific social media medium and Government in mind? Looking forward to reading the final outcome! [[User:Marissa1989|Marissa1989]] 07:42, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I was unaware of this community exits, and I think it will be a great place for graduate students and researchers to find which papers they should be reading. For example, if I need to utilize a method that is slightly outside of my field, this community will help identify the appropriate and esteemed papers. This may also serve as a better model for Peer Review (one day). Because PubMed is already an exclusive database primarily for biomedical researchers, I am interested to what you observe. I am worried that because only pubmed users (or people using a University IP address) have access to pubmed articles, open access will play a minimal role in which articles spark more conversation. Unfortunately, people tend to converse about papers in high-impact journals like Nature and Science, and I would expect these articles to compete with the open access ones. Perhaps an observation of which articles receive complaints about not being open-access for the curious science lover who is no longer in academia may be an interesting perspective.. ([[User:Margorm|Margorm]] 13:45, 2 March 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
:::Hi Paul! Thank you for introducing me to PubMed Commons! I have to agree with [[User:Margorm|Margorm]]: people who are &#039;allowed&#039; to comment on PubMed articles often have access to most articles through their Universities or Institutions. That being said, since first reading your prospectus, I&#039;ve thought so much about the access to PubMed Commons. In order to be part of the community, the major factor is that you are an author of a paper appearing in PubMed. An author can &#039;invite themselves&#039; only if PubMed has your email address on file. For personal/professional interest of being a member of this site, I&#039;ve checked with 8 different people (who are all corresponding authors on separate PubMed articles) whether they could invite themselves, and only 1 of the 8 authors could gain access. I understand why it is important for PubMed to confirm identity, however I believe this factor will strongly limit the adoption of PubMed Commons. It should also be noted that I am not an average PubMed author- most scientists I talked to about this think &#039;social media is stupid&#039; or a waste of time. Very few will go through the trouble of asking 8 separate authors to try to log in, until they find one person who can. However, exactly as Margo pointed out, &amp;quot;This may also serve as a better model for Peer Review (one day)&amp;quot;.&lt;br /&gt;
:::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:29, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I can see where this topic would make an interesting focal point for a review article or commentary on the exploitation opportunities, (legal and criminal) that open source software packages like these permit. As an administrator of several IT systems myself, reading your prospectus has made me curious to learn more about NESSUS and Metasploit, and perhaps use them to test out weaknesses in my own servers.&lt;br /&gt;
&lt;br /&gt;
::Let&#039;s continue along that thought...and say I will download and experiment with this software... I&#039;m using this scenario &amp;quot;hypothetically&amp;quot; in hopes that it may help you focus more on the key question(s) you are hoping to answer, and to also consider &amp;quot;from where&amp;quot; you will be able to make some observations to address that question. In other words, where might you be able to follow some online community activity over the next few weeks, and observe some interactions between the users, developers, and IT administrators who work with these software packages?&lt;br /&gt;
&lt;br /&gt;
::So, after just now learning of these open source packages, I want to download them on my Linux box and experiment. I want to see how others have installed, implemented, and customized the software to exploit a variety of possibilities. Is there an open community where I can lurk and maybe participate in a discussion to learn about various ways I can use this software to test out my servers for vulnerabilities and bugs? What kind of controls might I be subjected to within that community that may prevent me from discussing specifics about what known vulnerabilities have been discovered, and what security holes one can exploit? If I discover a major security flaw, can (or should) I document this within that online community? Are there normative, legal, and/or architectural controls that prevent or discourage divulging too much information within his community? I noticed a discussion forum at http://discussions.nessus.org/welcome, and https://community.rapid7.com/community/metasploit... would these be the communities you were considering?&lt;br /&gt;
&lt;br /&gt;
::Anyway, hoping this helps out. I just wanted to raise these questions as a way to help you identify the specific online community where some observable activity will occur, and focus in on what controls you hope to be able to see playing-out during the rest of the semester. You may already have that in mind, but it wasn&#039;t in the prospectus, so I thought I&#039;d raise the questions here. I think knowing the answer to these questions will help put the ideas into the context of the Final Project&#039;s objectives and should also help with the next task of building the outline in Assignment 3. [[User:Psl|Psl]] 14:25, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Somehow the uploaded RTF file had been converted to a CALC spreadsheet file, making some of the contents hard to read. [[User:Ichua|Ichua]] 15:08, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:: Hi Twood. I find your paper topic to be incredibly interesting and well-thought out. I wish I had constructive criticism to give you, but I find that you are on the right path. My only question at the moment: how do you plan on measuring the response of community members to the each sites&#039; control mechanisms? [[User:Lrsanchez|Lrsanchez]] 11:41, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Twood, I find this to be a very cool topic and being a musician myself, makes it even more so. I have never ever been a fan of sampling music outright and then adding a new beat and some remixing to make it one&#039;s own, just not my style. I like the prospect of you examining a smaller or less commercialized community musically (as compared to You tube). Again, as own who owns small studio at home and records pretty solidly, it is always great to see musicians recording and producing their own stuff from scratch with small home studio setups. I hope you show an example of a community catching someone in the act of stealing another&#039;s music or idea and what the outcome of that interaction will be - because as musicians we always borrow, modify or improves someone else&#039;s cord progression or guitar lick to make it our own. So, it would be great to see if you could hint about that distinction - as I am sure it comes up a lot in communities like this. But, overall really nice topic to concentrate on.[[User:Dancoron|Dancoron]] 19:42, 2 March 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Emmanuelsurillo&lt;br /&gt;
*Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:You raise some great research questions to examine within these communities. You might want to narrow your focus more. Will you be talking about the legalities of “jail-breaking” and it’s effect on the Apple and Android market? Considering the topics we discussed in class, it might be interesting to develop your research to mention the view of major companies toward these forums and the rogue developers. Once an iphone is jail-broken, it losses its apple warranty coverage. This might be a topic you want to bring up with your research. Good luck! [[User:Lpereira|Lpereira]] 21:36, 3 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Emmanuel,&lt;br /&gt;
&lt;br /&gt;
You have selected a really “hot” topic. Mobile applications appear to be taking over actual web development these days. I’m in the process of creating a new site, for the general public, to locate assistance after they have been harmed by other entities. The developer of my site highly recommended that I create a mobile app at the same time.  He is correct and the only reason I do not plan to follow his suggestion is directly related to cost.&lt;br /&gt;
&lt;br /&gt;
I’m unclear of the real statistics, but Internet users seem to be using phones as their selected source of information more frequently than computers. Most people carry their phones (even to bed) but fewer seem to be in constant travel with their laptop.  &lt;br /&gt;
&lt;br /&gt;
I am not familiar with the sites you listed in your proposal since I am not a mobile application developer, but I am happy to learn there are forums to enhance applications through large communities. &lt;br /&gt;
&lt;br /&gt;
It appears many of our classmates are attempting to use a compare/contrast approach, which seems logical, if we want to identify how resourceful one community is versus another. Your research will be extremely useful to many, and I would like to pass your results onto my developer after you have completed all the hard work (smile). &lt;br /&gt;
&lt;br /&gt;
A few questions for you: &lt;br /&gt;
  &lt;br /&gt;
“I want to compare how useful and productive these web sites are to the users end for accomplishing these goals.”&lt;br /&gt;
&lt;br /&gt;
1.	How do you plan to compare and contrast the central 7-9 questions outlined in your proposal for the final project? In other words, will you be able to summarize the data from each research question in one succinct paragraph to meet the page requirements?&lt;br /&gt;
2.	Do you think it would be easier to select 2-3 questions presented in your proposal to dig a little deeper or perhaps ask a few others from the class to join you on a team to cover all the questions presented?&lt;br /&gt;
&lt;br /&gt;
I ask these questions, because I am struggling with these issues myself.  I believe if I ask enough people in our community who are using a similar approach, I will (eventually) determine a model that may be useful for my own research. &lt;br /&gt;
&lt;br /&gt;
Another suggestion: Could we potentially find a group of people in our research community (class) that are interested in using a similar approach, but still collectively analyze the communities we selected for personal purposes? In other words, I am certain most students have selected the entities of study for some reason, such as personal satisfaction or business achievement.  However, Andy has made it clear that he would entertain teams multiple times. In fact, the option has been posted on every page of our instructions for the main project.  In fact, the option has been posted so many times that I am beginning to think he may be giving us a subtle hint or clue: “This assignment will be more effective if you work collectively together and you may gain more valuable research by teaming”. I don’t read minds, but… &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Example:&lt;br /&gt;
&lt;br /&gt;
I am attempting to look at the effectiveness of two sites created to allegedly help people who have been taken advantage of by either an entity or a person. Section 203 under the Communication Decency Act assists people in their ability to say whatever they think, regardless if correct.&lt;br /&gt;
&lt;br /&gt;
You are comparing two mobile application sites to analyze how useful and productive the sites are for the users to include accuracy and validity.&lt;br /&gt;
&lt;br /&gt;
Marissa is researching the validity of airbnb.com, and looking at the controls put in place by the website to protect people.&lt;br /&gt;
&lt;br /&gt;
I still have many proposals to read today, but it does appear that many of us are running in a few general hypothetical areas of question:   &lt;br /&gt;
&lt;br /&gt;
Which site is more effective due to the controls implemented by the site itself? (Compare/Contrast)&lt;br /&gt;
&lt;br /&gt;
Can the data on these sites be considered valid? Is so, why or why not?&lt;br /&gt;
&lt;br /&gt;
Could we potentially work together on a research methodology for all three sites to compare and contrast if the model is effective in and of itself while measuring the data across the board for multiple communications? In summary, we could compare and contrast the model that we collectively created against the sites we personally selected.&lt;br /&gt;
&lt;br /&gt;
My biggest concern with many of our proposals is that they are too broad and we will not find the depth.  Most of our topics could be potential dissertations; unfortunately we are lacking 5 years of research time (smile).  I plan to look for commonality in proposals submitted-perhaps we can all make this better together. Could we potentially try to use our class community to research the depth of the Internet communities.?&lt;br /&gt;
&lt;br /&gt;
Just thoughts. &lt;br /&gt;
&lt;br /&gt;
Cheers!&lt;br /&gt;
--[[User:Melissaluke|Melissaluke]] 17:07, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Emmanuel,&lt;br /&gt;
&lt;br /&gt;
Great topic!!&lt;br /&gt;
I am not sure if you would like to go into that direction, but from my point of view, I would say there is a big difference in the active level between iphone users via Android users in forum.&lt;br /&gt;
Iphone users are usually not as active as Android users in forum. And I think this is a really interesting topic to look into.&lt;br /&gt;
&lt;br /&gt;
On the other hand, I think it would be a good idea to narrow down your topic as there are 9 research questions that you are planning to coverin your paper. It would be difficult to talk about each question in depth with the words limit.&lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:42, 4 March 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
::Hi [[User:Seifip|Seifip]]! Few bits of feedback for you. First of all, I like that you tied back to Lessig&#039;s regulators. Very strong prospectus overall. Second, I wonder how you define an &#039;&#039;effective way of shaping an online community&#039;&#039; ? I assume that you didn&#039;t define &#039;effective&#039; because of the 400-word limit for this assignment. My advice would be for you to perhaps draw specific comparisons between StackOverflow and another online developer support community. Alternatively (and perhaps more fun), you might change the phrasing of your research question to something like &#039;In what ways does X architectural element affect conversation on StackOverflow?&#039;. Overall though, I think this is a very strong topic for your final project, because developer communities are some of the most in-depth technical discussions on the web. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:47, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::: Thanks for your feedback, Erin! I&#039;ll consider narrowing down the research question to a single element. --[[User:Seifip|Seifip]] 10:57, 4 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name: Art.Mescon&lt;br /&gt;
*Title: Do Etsy’s regulations aim to help buyers and/or sellers or are they primarily protective of the company itself, leaving third parties on their own to seek out reputable transaction partners? &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Art.Mescon_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
::You raise some great ideas in your prospectus that would make for an interesting research paper around Etsy. However, I wonder if it might be best to focus more on the controls for which you can already observe playing out within the Etsy community&#039;s online activities? In other words, the community norms and architecture controls within Etsy itself (user-&amp;quot;self-regulation&amp;quot; and Etsy&#039;s-&amp;quot;private-regulation&amp;quot;) might be the most reliable &amp;quot;observable data&amp;quot; that you will be able to anticipate over the next few weeks. The government level controls (public-regulation) you suggest may require moving outside this community, and I am not sure that a useful discussion (with observational data) will be possible within the page limit, nor would it be crucial to answering your research question.&lt;br /&gt;
&lt;br /&gt;
::I like the research question very much, and I think it couches the challenges you hope to observe within the methodology you propose. Also, I anticipate that the community interactions over the next couple of months should provide you with enough observational data to answer your question. One more tip on the question... What would you think about starting the question with &amp;quot;How&amp;quot; rather than &amp;quot;Do&amp;quot;...? Play around with the phrase of your question, and see how it feels. My thinking is that you will allow yourself some flexibility in what you will truly have to report on when it comes time to write up the results. The answer to a &amp;quot;Do&amp;quot; question requires one to choose a yes or no and your findings will likely challenge any &amp;quot;absolute&amp;quot; judgment call... So don&#039;t let yourself get cornered into having to make that choice (at least not at this early stage). By starting the question with &amp;quot;How do Etsy’s regulations...&amp;quot;, will allow you to have more flexibility to report on what the observations will show, and your can balance your discussion section on some good and not-so-good controls that play out over the next few weeks.&lt;br /&gt;
&lt;br /&gt;
::Last point. In your sentence &amp;quot;I intend to identify how Etsy controls, or fails to control content in a manner that is advantageous to their users.&amp;quot;, I wasn&#039;t sure if by &amp;quot;users&amp;quot; you meant the buyers, sellers, or both. My mind is interpreting that &amp;quot;user&amp;quot; is the buyer in this sentence’s context, and the word &amp;quot;content&amp;quot; is used to define both the items and community sellers that are being controlled. True? That distinction may be important to clarify as the full report gets written, because the Etsy controls and observations being gathered will (I suspect) impact buyers vs sellers vs content each a little differently.  On a similar note... To cut down on the need to follow every buyer, seller and thing in &amp;quot;Top Searches&amp;quot; for this community, do you think it would be helpful to focus on just one type of craft? I don&#039;t know enough about Etsy specifically to determine if that would work for this project, but it might be another way to find a sub-group/sub-community limit, and still provide you with enough observational data to draw some conclusions.&lt;br /&gt;
&lt;br /&gt;
::Hoping these comments are helpful! [[User:Psl|Psl]] 12:22, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Title: YouTube Comment Filtering and Other Cyberbullying Initiatives&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2014/File:Lpereira_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 16:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Might be interesting to determine whether and how Youtube encourages positive comments and discourage negative or hate comments.  Ultimately, it would be ideal if the character of misbehaving individuals could be improved.  Some ideas might be the use of &amp;quot;Like&amp;quot; and &amp;quot;Dislike&amp;quot; votes on these comments and/or the award/deduction of &amp;quot;attitude points&amp;quot;.  The individuals posting hate and aggressive comments could be prohibited from further postings if the attitude point reaches a certain limit. [[User:Ichua|Ichua]] 15:02, 27 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::I really like the focal point you will be observing, and you are quite right in pointing out that this &amp;quot;negativity&amp;quot; is becoming an unfortunate reality for many &amp;quot;open comment&amp;quot; sections within these online spaces. Even what can begin as constructive dialog and healthy debate, can quickly degenerate into blather, flames, and hate words when anonymity can be so effectively used as a shield. Interestingly, we can&#039;t always point our finger at just one &amp;quot;troll&amp;quot; injecting some deliberate provocation...because sometimes the breakdown occurs with the 3 or 4 community members who (hither to) we&#039;re exchanging words in a perfectly eloquent &amp;amp; respectful manner. But the hate, racism, and bullying that poison the dialog on these comment-boards are on a much more disturbing level, and one that certainly will make for an interesting study.&lt;br /&gt;
&lt;br /&gt;
::So, The broad question that I am hearing in your prospectus is &amp;quot;What are the most important controls that an online service provider can successfully implement to intercept and discourage cyberbullying, hate-speech, and irrelevant negativity? The sub-question then would be &amp;quot;How effective and/or constraining are those controls on the community&#039;s ability to engage with each other in a meaningful unbiased dialog about the content? (YouTube in this example)? &lt;br /&gt;
&lt;br /&gt;
::Have you given some thought to the subject matter that you will focus on, as a way to observe how these comments progress? It may be helpful to put your lens onto a consistent subject to observe the cycle of communication. From there you should be able to witness what prompts the conversation to begin in the first place; when do counter-points get introduced, how long is constructive dialog able to bridge back and fourth, what is the &amp;quot;poison-pill&amp;quot; that kills the conversation, and when do the controls kick-in?.  (Observing where the controls kick in would obviously be the essential part to report on, not so much each of those elements of the cycle of communication I itemized there.) &lt;br /&gt;
&lt;br /&gt;
::I’d be curious to also know if the observation shows that the cycle of communication is more (or less) positive throughout based on the type of subject that initiates the conversation? News stories on &amp;quot;hot button&amp;quot; topics or baseball contrasted with (say) a page dealing with baking fudge probably have different trajectories of &amp;quot;success&amp;quot; in remaining positive. (I am thinking about the inherent behavior of the potential community members themselves… one lends itself to polarized opinions with predictable “zealots” appearing in either camp, while the other community may be more welcoming of differing opinions and tastes).  SO for example, thinking of an individual wearing that New York Yankees hat in Fenway Park on game day....vs... a group of bakers talking about chocolate vs. peanut butter fudge recipes…The former is likely to risk some taunting, a black eye, a broken tooth, and perhaps a small riot... while those in the latter group, might, at worst, receive only a cavity.  Anyway, my point is that it might be interesting compare a couple of focused topics of conversation as a way of discovering a smaller sub-community that builds around a YouTube comment-board (With one engaging in  a &amp;quot;Hot button&amp;quot; topic.... While the other group is discussing something seemingly non-polarizing.)[[User:Psl|Psl]] 12:00, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Ben Harmatz&lt;br /&gt;
*Government Entities: Internet Surveillance and Censorship&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Harvard_NSA_1_draft_copy.doc&lt;br /&gt;
[[User:Benh|Benh]] 16:49, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:: Hi Ben. While I think your prospectus brings up the interesting and very pertinent topic of government control, surveillance, and censorship, I think that it is simply far too broad of a topic. For the assignment, we are supposed to monitor the activities of users on a particular site or group of sites, but looking at the internet as a whole is far too much for an 8-10 page paper! Perhaps consider government control, surveillance, and censorship while observing a particular website that has been named as a victim (by the media) of NSA&#039;s surveillance and dig deeper there. [[User:Lrsanchez|Lrsanchez]] 13:02, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Patricia Byrnes&lt;br /&gt;
*Title: Are moderators effective for policing and protecting a site from illegal use?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Patricia_Byrnes_Assig._Two.doc&lt;br /&gt;
[[User:TriciaBy|TriciaBy]] 16:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Patricia, First off, love your idea, moderating internet speech, as well as your methodology: if what you want to measure is moderating behavior, norms, and free speech concerns, the “Politics &amp;amp; Leaders” forum is a fantastic place to do so since It appears that discussions there can turn from heated to vituperative in the blink of an eye! With respect to your research question, by specifying “effective,” I assume that you will quantify instances of behavior that violate the established rules of the site. This method is good since you give yourself a verifiable and quantifiable measure. You can then use Lessig’s and other scholars work to explain these data. Now, you say that you wish to &amp;quot;research the rules and regulations of the site,” which looks like it might be an insurmountable task. I visited the site’s “Super Editor handbook” and I see that it is quite extensive. Perhaps you might want to focus specifically on one type of violation, such as &amp;quot;3.4.1 Discouraged Ranking Themes - Personal Experience / Personal Preference Rankings” ? [[User:Vance.puchalski|Vance.puchalski]] 23:00, 1 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: Vance.Puchalski&lt;br /&gt;
*Regulators and the Spread of (Mis)Information&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Puchalski-Assignment2.docx&lt;br /&gt;
[[User:Vance.puchalski|Vance.puchalski]] 17:17, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:As an extension student and a reader of both sites, I agree that extension student is often more accurate especially due to the required affiliation. You should consider when collecting your data that often information is not so black and white. A lot of people on these treads seek opinion, which is more of a personal thought rather than right or wrong. A lot on forums is opinion based, not fact based and so I think you should prepare for your data to be filled with a lot of gray areas, which you might already be expecting. The correlation between accuracy and monitoring is certainty an interesting topic. Anyway, great research topic and I’m interested to see your findings. Good luck! [[User:Lpereira|Lpereira]] 21:20, 3 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*A. Tom Anteus&lt;br /&gt;
*Cryptocurrency Uses in Conflict Zones Around the World&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Cryptocurrency_Uses_in_Conflict_Zones_Around_the_World.pdf&lt;br /&gt;
[[User:A. Tom Anteus|A. Tom Anteus]] 17:26, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Tom, intriguing topic! I&#039;m a keen follower of the Bitcoin revolution myself so have been naturally drawn to your prospectus and Daniel&#039;s as well. However I would say its quite difficult to follow your proposal. I&#039;m not quite sure how you intend to analyse and measure the use of cryptocurrency in conflict zones. Which conflict areas will you be targeting? Do you intend to follow forums or analyse chatter on various websites. If so, which ones?  [[User:Marissa1989|Marissa1989]] 07:36, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Julie Dubela&lt;br /&gt;
*Mapping Social Media Debate on the OHCHR Report on North Korea&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Julie_Assignment2.txt&lt;br /&gt;
[[User:Julie|Julie]] 18:37, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
Hi Julie, great prospectus. I find the whole North Korea situation appalling from a global response perspective. A lot of the articles, commentary and reactions from people around the world have been effectively muzzled. Your approach to analyse public reaction through social media is methodical and well thought through. Your plan to use specific tools to collect information from twitter hash tags, Google trends etc and follow up by analysing them to find common themes and trends is great. I look forward to reading the final report!  [[User:Marissa1989|Marissa1989]] 07:52, 2 March 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Andrew Grant&lt;br /&gt;
*Quantified Self and Qualified Liability: Strava and Lessig&#039;s Four Forces&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Andrew_Grant_Assigmnment_Two_02252014.docx&lt;br /&gt;
[[User:AndrewGrant|Andrew Grant]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Andrew, your prospectus sounds fantastic. Lots of interesting questions being asked in light of Lessig&#039;s Four Forces and the Quantified Self movement. I think that you many be asking too many questions for an 8-10 page paper, if you are to go into sufficient depth for each one. Do you think that it&#039;s realistic to answer the five research questions in so short of a paper? Other than that, I think you are off to a great start and I am interested in hearing more about it. [[User:Lrsanchez|Lrsanchez]] 11:49, 28 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In general, it might be helpful to state why your project is important and how the outcome of the research might help regulate/control or improve human behavior on the internet. [[User:Ichua|Ichua]] 19:58, 27 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1150</id>
		<title>Copyright Part 2: Enforcement and Balances</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Copyright_Part_2:_Enforcement_and_Balances&amp;diff=1150"/>
		<updated>2014-02-27T00:05:37Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 4&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Digital technologies spawned the proliferation of sharing of media and music, which has led to a number of controversial legal and technological strategies for control and copyright enforcement. “Controversial” may be putting it lightly; the ongoing fight between copyright owners and Internet evangelists is one of the most popularly debated fights surrounding Internet control.&lt;br /&gt;
&lt;br /&gt;
This class focuses on how copyright is enforced online, with particular emphasis on the &amp;quot;notice-and-takedown&amp;quot; provisions of the Digital Millennium Copyright Act (&amp;quot;DMCA&amp;quot;), which allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The class will also look to the now-famous fight concerning SOPA and PIPA, and other attempts to more strictly regulate against online piracy.&lt;br /&gt;
&lt;br /&gt;
Joining us will be [http://cyber.law.harvard.edu/people/aholland Adam Holland], who works here at Berkman on the [https://www.chillingeffects.org/ Chilling Effects] project.&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The second half of assignment 2 (commenting on prospectuses) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The DMCA Notice-And-Takedown Process&lt;br /&gt;
&lt;br /&gt;
* Digital Media Law Project, [http://www.dmlp.org/legal-guide/copyright-claims-based-user-content Claims Based on User Content] and [http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content Protecting Yourself Against Copyright Claims Based on User Content]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/takedowns Electronic Frontier Foundation, Takedown Hall of Shame] (peruse)&lt;br /&gt;
&lt;br /&gt;
* Chilling Effects, [http://www.chillingeffects.org/about About] and peruse the [http://www.chillingeffects.org/weather.cgi weather reports].&lt;br /&gt;
&lt;br /&gt;
* [http://paidcontent.org/2013/02/24/how-google-did-the-right-thing-with-the-nascar-crash-video-and-why-it-matters/ Matthew Ingram, Paid Content, How Google did the right thing with the NASCAR crash video, and why it matters]&lt;br /&gt;
&lt;br /&gt;
; Case Study - SOPA/PIPA&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/reading-sopa Jonathan Zittrain, Kendra Albert, and Alicia Solow-Niederman, A Close Look at SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/01/15/mit-media-lab-opposes-sopa-pipa/ Ethan Zuckerman and Joi Ito, MIT Media Lab Opposes SOPA, PIPA]&lt;br /&gt;
&lt;br /&gt;
; The big picture&lt;br /&gt;
&lt;br /&gt;
* [http://torrentfreak.com/bittorrent-traffic-drops-in-america-grows-in-europe-131111/ Ernesto Van Der Sar, BitTorrent Traffic Drops in America, Grows in Europe]&lt;br /&gt;
&lt;br /&gt;
* [https://www.techdirt.com/blog/casestudies/articles/20120405/11221818390/perspective-complexities-copyright-creativity-victim-infringement.shtml Erin McKeown, A Perspective On the Complexities of Copyright and Creativity from a Victim of Infringement]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
; Case Study - ISP &amp;quot;Six Strikes&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/2013/feb/01/copyright-alert-system-and-six-strikes/ Brooke Gladstone, Interview with Jill Lesser of Center for Copyright Information (&#039;&#039;On The Media&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.plagiarismtoday.com/2013/02/25/the-6-likely-impact-of-six-strikes/ Jonathan Bailey, Plagiarism Today, The 6 Likely Impact of Six Strikes]&lt;br /&gt;
&lt;br /&gt;
; Case Study - Operation In Our Sites&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1835604 Andy Sellars, Seized Sites: The In Rem Forfeiture of Copyright-Infringing Domain Names]&lt;br /&gt;
&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Wendy Seltzer, Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Yet again, related to an earlier class, but another interesting write-up was just published on The Verge: [http://www.theverge.com/2014/2/25/5431382/the-internet-is-fucked The Internet Is Fucked (but we can fix it)] --[[User:Seifip|Seifip]] 19:05, 26 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=1102</id>
		<title>Copyright Part 1: Guiding Principles and Online Application</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=1102"/>
		<updated>2014-02-25T20:52:52Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost. The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to recut, reframe, and recycle previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain.&lt;br /&gt;
&lt;br /&gt;
Over the next two classes, this course will take up the some of the issues related to copyright protection and enforcement online. Today’s class will focus on the legal regime of copyright: what it protects, what it doesn’t protect, and how the doctrine has transformed in light of digital reproduction and distribution.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]]. Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The mechanics of copyright law&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Copyright_Clause Wikipedia, Copyright Clause]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Circular 1: Copyright Basics] (read only Who Can Claim Copyright?, What Works Are Protected?, What is Not Protected by Copyright?, How to Secure a Copyright, and How Long Copyright Protection Endures)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/text/17/107 17 U.S.C. § 107 - Limitations on Exclusive Rights: Fair Use]&lt;br /&gt;
&lt;br /&gt;
; Digital applications and new challenges&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688 Lawrence Lessig, It is About Time: Getting Our Values around Copyright] (watch first 6 minutes)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2012/08/why-johnny-cant-stream-how-video-copyright-went-insane/ James Grimmelmann, Why Johnny Can’t Stream: How Video Copyright Went Insane]&lt;br /&gt;
&lt;br /&gt;
; Copyright solutions&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=1DKm96Ftfko Creative Commons, A Shared Culture] (video, watch all) and [http://wiki.creativecommons.org/Spectrumofrights_Comic1 Spectrum of Rights]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyhype.com/2012/08/there-is-no-magic-bullet/ Terry Hart, There is No Magic Bullet]&lt;br /&gt;
&lt;br /&gt;
* [http://www.uspto.gov/news/publications/copyrightgreenpaper.pdf U.S. Department of Commerce: Internet Policy Task Force, Copyright Policy, Creativity, and Innovation in the Digital Economy] (Executive summary only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/docs/next_great_copyright_act.pdf Maria Pallante, The Next Great Copyright Act] (skim Section II (323-339) only)&lt;br /&gt;
&lt;br /&gt;
:* Maria Pallante is the [https://en.wikipedia.org/wiki/Register_of_Copyrights Register of Copyrights] for the United States.&lt;br /&gt;
&lt;br /&gt;
== Recommended Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=2HQVBmKsVhI Lewis Hyde, Common As Air: Revolution, Art, and Ownership] (video, watch from 2:12 to 24:37)&lt;br /&gt;
&lt;br /&gt;
* [http://www-personal.umich.edu/~jdlitman/papers/read.htm Jessica Litman, The Exclusive Right to Read] (introduction and Sections I and II only)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2008/10/dodgy-digits-behind-the-war-on-piracy/ Julian Sanchez, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bloomsburyacademic.com/view/Remix_9781849662505/chapter-ba-9781849662505-chapter-0001.xml Lawrence Lessig, &#039;&#039;Remix: Making Art and Culture Thrive in the Hybrid Economy&#039;&#039;] (Introduction only)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is related to an earlier class, but a great article on Wikipedia&#039;s bots has just been published on The Verge... [http://www.theverge.com/2014/2/18/5412636/this-machine-kills-trolls-how-wikipedia-robots-snuff-out-vandalism This machine kills trolls: How Wikipedia’s robots and cyborgs snuff out vandalism] --[[User:Seifip|Seifip]] 17:53, 19 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:What an interesting article! It seems rather shocking to me that users would protest the implementation of bots to patrol vandalism on Wikipedia. One comment cited in the article is that &amp;quot;Editing bots are wrong for Wikipedia, and if they allow it they are letting go of their vision of community participation in favor of the visions (or delusions) of grand technological solutions&amp;quot;. This seems like an argument made on principle rather than for practicality&#039;s sake. Surely we benefit from these anti-vandalism bots, as Wikipedia would be worthless if people were allowed to make whatever edits they pleased, due to the proliferation of internet trolls. [[User:Castille|Castille]] 16:01, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Regarding Copyright laws, it seems that there are many ambiguities and potential loopholes inherent in the system. How is it acceptable for musicians to freely perform &amp;quot;covers&amp;quot; of popular songs-- oftentimes to the extent that their entire act is merely covers, such as at weddings, corporate events, restaurants, etc.-- yet plays cannot be performed live without the consent of the author/copyright holder? It is not altogether uncommon in these situations for an artist to be paid to perform someone else&#039;s work, for the purpose of entertainment. What is the difference, then, between these situations? Based on Grimmelmann&#039;s article &amp;quot;Why Johnny can&#039;t stream&amp;quot;, it appears that there are is an endless string of individuals and companies finding new ways to circumvent the laws, so that new laws must be implemented. Where does this stop? Is this due to rebellion against unfair copyright restrictions, companies merely trying to exploit artists and capitalize on their work, or individuals trying to be greedy or subversive?&lt;br /&gt;
&lt;br /&gt;
By the way, has anyone heard about Aereo&#039;s progress, and/or where it currently stands in the legal system? I looked it up online and it seems to be taking on members who want to pre-register for the service, though the article was written in August of 2012, so you would think it would be out by now. &lt;br /&gt;
[[User:Castille|Castille]] 13:08, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I was also curious about where the Aereo case(s) were currently... and happened upon this update published last week (also in arstechnica) &amp;quot;Aereo loses copyright fight, gets banned in 6 states&amp;quot;  http://arstechnica.com/tech-policy/2014/02/aereo-loses-copyright-fight-to-tv-networks-in-utah/ and as Comcast/NBC &amp;quot;cuts a deal with Netflix&amp;quot;...as well as potentially merging with Time-Warner, just how &amp;quot;lovely&amp;quot; is that?  http://www.forbes.com/sites/petercohan/2014/02/24/does-netflixcomcast-deal-remove-obstacle-to-twc-merger/  [[User:Psl|Psl]] 11:35, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Great comments! As to &amp;quot;covers&amp;quot; of popular songs, those are not usually free uses, but instead uses that are licensed in ways that most of us don&#039;t normally see. As to covers of live music, those are usually handled by blanket licenses from performance rights organizations (ASCAP, BMI, and SESAC) through either the venue or the artist. For recorded covers, there is actually a statutory license in the law which allows the covering band to do this without permission, provided they pay a particular fee per copy sold. (These days most of that is administered through a corporation called the Harry Fox Agency.) And as for Aereo, [http://www.scotusblog.com/case-files/cases/american-broadcasting-companies-inc-v-aereo-inc/ the Supreme Court has agreed to hear] the appeal from the Second Circuit&#039;s case (one of many, as Psl points out), which will in all likelihood set the standard for Aereo&#039;s legality nationwide. So we will see! [[User:Andy|Andy]] 16:48, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
COPYRIGHT OF TEXTBOOKS&lt;br /&gt;
&lt;br /&gt;
Based on the readings, how is it possible for new math textbooks for elementary and high school to claim copyrights when the content has not changed for decades?  Perhaps examples and illustrations and format of presentation used across different textbooks may differ, but the content and concepts taught are essentially the same. &lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 18:19, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:This question drives right to the heart of what is protected vs. unprotected under copyright. We&#039;re going to tackle that in some depth tonight. [[User:Andy|Andy]] 12:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
NPOV AND COPYRIGHT IN WIKIPEDIA&lt;br /&gt;
&lt;br /&gt;
Because of NPOV, all content in Wikipedia need to be copied....and referenced.  If one copies everything or extensively from a single source, would it still be legal?  And if one copies from many sources, it is called a work of research?  [[User:Ichua|Ichua]] 19:51, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 19:51, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:While the question of &amp;quot;is that research&amp;quot; is a complicated one, the particular copyright licenses offered over Wikipedia content are [https://en.wikipedia.org/wiki/Wikipedia:Copyrights here]. It&#039;s a bit complicated and depends on the particular media in question, but most adhere to the [https://en.wikipedia.org/wiki/Wikipedia:Text_of_Creative_Commons_Attribution-ShareAlike_3.0_Unported_License Creative Commons CC-BY-SA] license for content, which allows use with attribution back to Wikipedia, provided what you use it for is also licensed under this same open term. We&#039;ll talk more about this tonight. [[User:Andy|Andy]] 12:31, 25 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:I almost forgot what i wanted to say about Creative Commons.  As online content developer, sometimes we do indeed want certain content to be copied freely for marketing purposes or we felt it should be offered free to certain people, but people dare not distribute such content for us because of copyright infringement.  [[User:Ichua|Ichua]] 13:02, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The article, There is no Magic Bullet, was an interesting read. He talks about the idea of combatting piracy as often being boiled down to: “make piracy harder, make legal options easier&amp;quot; which is problematic. The availability of technology is making piracy a lot easier these days. While, legal options are usually a long and expensive option in most cases. This leaves us at a problem. The emergence of easy and paid websites, like amazon and netflix, worked as a legal alternative instead of piracy but it has not been successful in a world-wide scale so far. I think as long as there is a easy, free alternative, it will often be the first choice for most people, even it is illegal. It doesn&#039;t always have to be bad, especially as it relates to creative content like music. Free sharing is often a great opportunity for growth and marketing. &lt;br /&gt;
I&#039;m interested to see how copyright laws and creative content will develop with the advancement of the internet. I wonder if making piracy harder is a viable option at this point without infringing on personal content. &lt;br /&gt;
&lt;br /&gt;
[[User:Lpereira|Lpereira]] 20:56, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:It&#039;s a great question, and one that we&#039;re still trying to explore and understand. The anecdotal evidence we have suggests that countries that offer legal alternatives to piracy have experienced a drop in BitTorrent traffic since those have been made available, but it&#039;s near impossible to draw further conclusions off of that single point of data. [[User:Andy|Andy]] 12:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
Reading the Grimmelmann &amp;quot;Why Johnny Can&#039;t Stream&amp;quot; article I&#039;m reminded of how the music industry fought so hard against services like Napster, while simultaneously it was the emergence of technology like iTunes--and the consequent unbundling of music tracks from albums--that spelled the end of their industry as they knew it. Similarly, &amp;quot;broadcast&amp;quot; and the gatekeeper model of media distribution is at an end.  While the broadcasters fight services like Aero, the whole idea of DVR (whether in your living room, or in the cloud) is not going to be relevnt in the future: services like Netflix&#039;s original content (e.g., House of Cards) and HBO Go, where content will be made available by the content owner itself, disintermediating the cable networks, will be the norm.  In this environment, we won&#039;t need a DVR and cable companies won&#039;t be relevant.  It seems to me that part of the strategy with services like Netflix original content or HBO Go is twofold: to eliminate their dependence on distribution networks, while also rendering DVRs (and their consequent copyright issues) obsolete. After all, I&#039;d be buying my content by-the-drink from the creator rather than from a distribution network where I have a legitimate reason to copy it and watch at different types or with commercials removed.&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 20:58, 24 February 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
A separate question: why did the framers consider copyrights/patents important enough to mention in the Constitution?  Why not just leave it to Congress to worry about as part of regulating interstate commerce?  As Lessig noted in his video, intellectual property law was a very minor concern for anyone prior to the 20th century. The Internet Policy Task Force doc claims that &amp;quot;the Framers intended copyright itself to be the engine of free expression” but that&#039;s stated as an assertion (quoting the Supreme Court) without any explanation.  I&#039;m interested in understanding the historical context and what the framers were concerned about.  Thoughts?&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 21:00, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:We&#039;ll be talking about that in class today, but the Lewis Hyde lecture in the recommended reading (and his book, &#039;&#039;Common As Air&#039;&#039; tackle that at considerable length). [[User:Andy|Andy]] 12:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
WHY COPYRIGHT ISN&#039;T AN ISSUE FOR ONLINE LEARNING:  &lt;br /&gt;
&lt;br /&gt;
Simply replicating textbooks into digital format for online accessibility is not good enough for online learning.&lt;br /&gt;
Otherwise, all students should be getting A&#039;s for math and science just from reading textbooks.  When my staff develops online resources for math, a lot of attention goes into how to engage the student online through interactivity, choreography, and animation.  We also bear in mind how these resources might be used in the classroom.  We incorporate multiple modalities of teaching, learning and self-assessments.  And the skills required for creating an online learning resource are very different from just producing a textbook.  We need the teacher or content expert to be able to think like a script-writer, a movie producer, a choreographer, a programmer and an animator, all rolled into one.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 02:44, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
PLAGIARISM AND ONLINE APPLICATION OF COPYRIGHT&lt;br /&gt;
&lt;br /&gt;
It is very common to see several websites replicating the same information word-for-word.  This makes internet searches very inefficient and frustrates internet users trying to do research on the web.  Search robots should be used to warn website owners to remove such content. &lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 11:38, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
HOW ONE COUNTRY CIRCUMVENTS THE COPYRIGHT PROBLEM IN DISTRIBUTION OF KNOWLEDGE TO THE POOR&lt;br /&gt;
&lt;br /&gt;
The copyright protects the earnings of the author and publisher and ensures that each copy of the book contributes a return to their investment.  But the poor has no money.  How can a country distribute knowledge to the poor?  The Indian Ministry of Education seems to have authored their own content and made these academic content available online for free.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Smartphones have also helped citizens in being able to access the internet without a broadband home internet connection.  Estimates claim that 56% of Americans now have smartphones and this has helped to significantly bridge the gap domestically.  &lt;br /&gt;
&lt;br /&gt;
http://techland.time.com/2013/08/26/for-some-without-home-broadband-smartphones-bridge-the-gap/  &lt;br /&gt;
      &lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 13:25, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
CUSTOMIZABLE ROYALTY FREE SOUNDRACKS&lt;br /&gt;
&lt;br /&gt;
This is a cool software which I started to use a decade ago:  http://www.smartsound.com&lt;br /&gt;
You can specify the duration of the desired type of music and it will auto-generate the royalty-free soundtrack.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 12:22, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
NEW SOFTWARE WHICH ENHANCES CREATIVITY AND REDUCES INFRINGEMENT OF COPYRIGHT&lt;br /&gt;
&lt;br /&gt;
New versions of software such as PhotoShop, Maya, and CrazyTalk, are now more powerful, user friendly and cost much less than a decade ago which enables the user to quickly create high quality original images, textures, scenes, and animations.  This gives artists more incentives to exercise their own creativity and avoid copying from other sources.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 12:44, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Everyday millions of videos are uploaded to the servers of YouTube and responsible for assessing whether or not they are in accordance with the rules of copyright is the ContentID. The tool was created by Google to analyze the productions in search of pieces of audiovisual works protected by copyright. The record labels and movie studios send copies of their original works and the system compares numerous excerpts with what is being shared on the network to find illegal copies on site. When the system finds a similarity between the video posted by a user with videos available in a database registered in the ContentID , the rights holders are notified and must decide what will be done. Some options are: block the video, leave it mute or unavailable; monetize by displaying ads and inserting the video link to the original owner of the content , or even track it views with the statistics being computed only on who Analytics own the copyright on the work. http://www.youtube.com/my_videos_copyright gisellebatista&lt;br /&gt;
&lt;br /&gt;
::Great point, Giselle! We&#039;re going to talk about the &amp;quot;private ordering&amp;quot; around copyright (and the issues that come up there) with Adam Holland from Chilling Effects next week. [[User:Andy|Andy]] 14:53, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Outside of doubling down on the penalties for copyright infringement, we seem to gather very little cooperation for addressing the challenges of digital copyright. Any solution proposed with direct enforcement appears to cut corners with due process. Let&#039;s have the ISP&#039;s monitor and throttle back activity. However, ISPs lack the skill set and capability to interpret copyright law and adjudicate penalties. Increased inspection and examination of content brings about a level of surveillance that most users are uncomfortable with in their digital travels. &lt;br /&gt;
[[User:VACYBER|VACYBER]] 13:12, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Some of these hard questions between enforcement and other values will be tackled next week when we discuss the DMCA, SOPA, Six Strikes, and some of the other enforcement ideas floated over the past decade or so. As I&#039;ve said a few times in this class so far, there are no easy answers here, but I hope we can explore the values at stake. [[User:Andy|Andy]] 13:59, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Copyright infringement in many countries is still not resolved. As a result of infringement the music, films, videos, books and other information can be freely downloaded by users without the appropriate permission of copyright owners. A lot of people event don&#039;t know the difference between legal and illegal dissemination of information. This situation also impacts government (for example, tax issues) From my point of view, the reason is that the current legislation in many coutnrties is not enough for internet as it doesn&#039;t incorporate the characteristics of Internet. The new methods of protection of copyright should be established with close cooperation of internet providers (for example, blocking th user from access to certain website for several days in cases of infringement of copyrights or financial means as penalties). Aysel Ibayeva ([[User:Aysel|Aysel]] 14:57, 25 February 2014 (EST))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
It seems as though copyright as a whole is (and must) follow down the same path as online streaming did -- adapt or being adapted by the circumstances. Free online streaming is now legitimatized by the Crackles, etc. of the world. The industry adapted. Of course, that industry issue was based in copyright issues. But it now looks like other forms of copyright issues may have to follow down the same road. I&#039;m thinking in particular of indie artist sampling and uploading material illegally (the control of this was main focus of my prospectus.) [[User:Twood|Twood]] 15:14, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
First of all, I would say the article written by James Grimmelmann has opened my eyesight. &lt;br /&gt;
Copyright is a really interesting topic that I would love to look into, especially the copyright on derivative work, in the other words, re-creation. In Hong Kong, the Government has been trying to ban derivative work by enacting a law to restrict people from re-creating. &lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 15:18, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Copyright based laws seemed be to pretty much straight forward until the Internet came along. Actions of recording and copying in cases such as Sony’s debated whether it was legal to record with a VCR and view it later, a process known as &amp;quot;time-shifting&amp;quot;. This was protected under a provision of 17 U.S. Code § 107 fair use. But a major problem came with Internet piracy, cited in Terry Harts article, There is No Magic Bullet. He has a simple solution: “make piracy harder, make legal options easier”, but it is not so easy to put into practice. It is an impossible task to scourer the billions upon billions of transactions happening online everyday. It seems that copyright laws have became bogged down by too many technical work-arounds that should be illegal but are technically not. These &amp;quot;protections&amp;quot; ultimately just make the law way more confusing. A large problem is because the laws are not national, Aereo is not legal in New Jersey, but what happens if someone hacks Aereos account from a remote site? Can Aereos still be sued for copyright violation? [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:21, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
From a global perspective, I think that copyright infringement is a bigger problem in developing countries than here in the US. Take, for instance, a country such as Senegal where there are artists, authors, and content creators of kinds. The problem of copyright infringement had become such a serious issue for musicians that they are now turning to the internet (most specifically Google&#039;s YouTube) for help. What an irony, right?! The internet used to be and still is the place where a lot of copyright infringements happen due to its hard nature to regulate. However, in countries such as Senegal where musicians are finding it harder and harder to rightfully monetize their work, their &amp;quot;Ministry of Culture,&amp;quot; whose head was also a musician, is now encouraging artist to partner with Google in order to distribute and monetize their entire albums on YouTube. As Andy has already mentioned and explained YouTube&#039;s copyright tool called &amp;quot;ContentID,&amp;quot; more and more artists in West African countries where the YouTube partner program has launched are now relying on &amp;quot;ContentID&amp;quot; and uploading their entire works on YouTube. Therefore I believe that, generally speaking, internet companies and organizations such as Google, Facebook, Wikipedia, and others should continue to help build tools that will fight this phenomenon. It will benefit internet users worldwide as well as their respective companies.&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:48, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I&#039;ve been truly impressed by Lawrence Lessig&#039;s presentation and couldn&#039;t stop watching till the end. He rose some very important questions, in a very pertinent way, and it is by far the best presentation I&#039;ve seen so far on why copyright has to be rethought from the ground up, but not abolished. I think the point that we can&#039;t kill the technology, only criminalize it, is especially important for everyone to finally realize. --[[User:Seifip|Seifip]] 15:52, 25 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1096</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1096"/>
		<updated>2014-02-25T20:42:58Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
*Name: Drogowski - Daniel Rogowski&lt;br /&gt;
*Regulating Digital Currencies: The Bitcoin Conundrum &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Regulating_Digital_Currencies-_The_Bitcoin_Conundrum_Daniel_Rogowski.docx&lt;br /&gt;
[[User:Drogowski|Drogowski]] 14:58, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*[[User:MikeJohnson|MikeJohnson]] 14:32, 25 February 2014 (EST)&lt;br /&gt;
*Twitch Plays Pokémon – How Mediating Gameplay Changes the Game&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/MikeJohnson_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*[[User:Mikewitwicki|Mikewitwicki]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
*How does the online Flickr community operate within the Creative Commons feature? How do they share their work, and work together?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus_for_final_paper_Michael_Thomas.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
[[User:Luciagamboaso|Luciagamboaso]] 10:42, 25 February 2014 (EST)&lt;br /&gt;
*Framework of control in government run collaborative platform&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Assignment_2_LGS.docx‎&lt;br /&gt;
&lt;br /&gt;
: Hi Lucia, are there specified rules of engagement so that government effort to filter or modify inappropriate inputs are minimized?  [[User:Ichua|Ichua]] 13:32, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
*Gendered Online Communities: Targeted Harassment and Successful Interventions &lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:akk22_assignment2.docx&lt;br /&gt;
*[[User:akk22|akk22]] 10:23, 25 February 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Assignment 2:&lt;br /&gt;
&lt;br /&gt;
*Can websites with online forums, control the behavior of its members for the sake of growth?&lt;br /&gt;
&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Dan_Coronado_assignmen_2b.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Dancoron|Dancoron]] 09:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::&#039;&#039;For Assignment 2-b, I would love to comment on this prospectus! Very interesting topic, excellent questions and the FDA is the US gov&#039;t organization with which I am most familiar. I will begin now, but please don&#039;t take my comments as complete until deadline of Assm&#039;t 2-b.&#039;&#039;&lt;br /&gt;
::*I&#039;m not sure what this sentence means (and would like to know, in order to be sure I am understanding current situation of 23andme: &#039;&#039;December 5, 2013, 23andMe resumed selling its genetic data only related to ancestry-related results&#039;&#039;&lt;br /&gt;
::*It is &#039;&#039;&#039;very&#039;&#039;&#039; cool that you are taking an empirical approach to the community discussion, and I will have to read your prospectus again later to refine this comment, but I want to be confident that the data you collect will contribute to answering your question, which I believe to be &amp;quot;Is the FDA indeed fit to regulate genomic tests/databases&amp;quot;. &lt;br /&gt;
::[[User:Deluxegourmet|Erin Saucke-Lacelle]] 12:07, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
*Assignment 2 &lt;br /&gt;
* Instagram: a public space for free expression? &lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:LauraSanchez_IS_prospectus &lt;br /&gt;
[[User:Lrsanchez|Lrsanchez]] 21:42, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* [[User:Jradoff|Jradoff]] 21:56, 24 February 2014 (EST)&lt;br /&gt;
* Comparing Regulation of Free Expression in Online Game Forums&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/sites/is2014/images/Prospectus-Radoff.txt Prospectus Text]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* jkelly&lt;br /&gt;
* Does &amp;quot;toxic&amp;quot; online culture stifle feminist discourse?&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment_2.odt&lt;br /&gt;
[[User:Jkelly|Jkelly]] 22:15, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Erin Saucke-Lacelle&lt;br /&gt;
*Prospectus title: Effect of rules &amp;amp; regulations on political discussion&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/ErinSaucke-Lacelle-Assignment2.pdf&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 23:33, 24 February 2014 (EST)&lt;br /&gt;
 &lt;br /&gt;
:: Hi Erin, I agree with your hypothesis about alienation.  For example the weak and poor citizens do not have access to the internet and will be left out of the discussion.  Their needs are often under-represented or not represented at all.  [[User:Ichua|Ichua]] 08:04, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::Thank you for the feedback [[User:Ichua|Ichua]]! Your comment makes me wonder though- for this project, we are assigned to studying an online community. Wouldn&#039;t the nature of the assignment therefore assume that all students completing this assignment will be leaving out the interest and opinions of people who do not have access to the Internet? Also, I am curious what you mean when you refer to &#039;weak&#039; citizens? Again, thanks so much for the feedback! [[User:Deluxegourmet|Erin Saucke-Lacelle]] 11:47, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:::&amp;quot;Weak&amp;quot; = &amp;quot;Not powerful&amp;quot;, have no voice or influence in government discussions and policy-making.  Some politicians even believe these people should not participate in voting.  Typically viewed as a country&#039;s liability rather than an asset. In a country like the Philippines with a total population of 90 million, a great economic revolution can happen if the 40 million in poverty and unemployed are mobilized. [[User:Ichua|Ichua]] 13:49, 25 February 2014 (EST) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Ian Chua&lt;br /&gt;
*Prospectus title: Resolving National Issues With Online Collaborative And Interactive Cognitive Mapping&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTU-E120_Assignment2_IanChua.pdf&lt;br /&gt;
[[User:Ichua|Ichua]] 06:31, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: I learned from Erin that a project of this nature has its limitations.  Government leaders or concerned individuals need to go to Ground Zero and observe for themselves the problems of the poor and weak citizenry.  And if democratic rule has failed to eliminate poverty, why not consider compassionate rule?&lt;br /&gt;
&lt;br /&gt;
::@[[User:Ichua|Ichua]] you know, I might be wrong!!! Not sure yet, I guess, til we hear back from more students, or the prof/TAs (: [[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:40, 25 February 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: P. Scott Lapinski&lt;br /&gt;
*Prospectus title: “Crowd Control”. Content and community controls which impact scholarly communication within the PubMed Commons scientific forum&lt;br /&gt;
*Link to prospectus: http://cyber.law.harvard.edu/is2014/sites/is2014/images/PSL_Assignment2.rtf&lt;br /&gt;
[[User:Psl|Psl]] 11:57, 25 February 2014 (EST)&lt;br /&gt;
::&#039;&#039;For Assignment 2-b, I would love to comment on this prospectus- I will begin now, but please don&#039;t take my comments as complete until deadline of Assm&#039;t 2-b.&#039;&#039;&lt;br /&gt;
::Not sure if this will count for feedback for assignment 2-b, but I thought I might share. After reading about how exclusive PubMed Commons is, of course I really wanted to join. As an author of a PubMed article, I &#039;&#039;should&#039;&#039; theoretically have access, if I understand the rules correctly. However PubMed doesn&#039;t have my current email address on file (and I can&#039;t guess which former email they would have). I think this might be an ineffective means of control, as only 1 in 6 authors on my publication have submitted their email addresses when submitting the article- the rest of us just signed a waiver allowing publication. I sent a request to HelpDesk, and will let you know what they say... (: BTW, for what it&#039;s worth, I think you did a very good job at following assignment guidelines. [[User:Deluxegourmet|Erin Saucke-Lacelle]] 13:38, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: VACYBER&lt;br /&gt;
*Prospectus title: Regulatory steps for hacking tools in light of the tremendous potential for fiscal and data loss &lt;br /&gt;
*Link to prospectus:http://cyber.law.harvard.edu/is2014/File:VACYBER_Assignment2.docx&lt;br /&gt;
[[User:VACYBER|VACYBER]] 12:46, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Name: Twood&lt;br /&gt;
*Prospectus Title: Online Independent Music Communities: The Mechanisms and Effects of Copyright Control&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Twood_Assignment2.rtf&lt;br /&gt;
[[User:Twood|Twood]] 14:03, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
*Name: Cheikh Mbacke&lt;br /&gt;
*Prospectus Title: Re/Code: A Neutral Endorser of Disruptive Technology Companies&lt;br /&gt;
*Link: http://cyber.law.harvard.edu/is2014/File:Cheikh_Mbacke_Assignment_2.txt&lt;br /&gt;
[[User:cheikhmbacke|cheikhmbacke]] 15:15, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
▪Name: Emmanuelsurillo&lt;br /&gt;
▪Prospectus title: &amp;quot;emmanuelsurillo_Assignment2.doc.&amp;quot;&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2014/File:%22emmanuelsurillo_Assignment2.doc.%22.docx [[User:Emmanuelsurillo|Emmanuelsurillo]] 15:41, 25 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*[[User:Seifip|Seifip]] 15:42, 25 February 2014 (EST)&lt;br /&gt;
*Architectural choices for a better Q&amp;amp;A community (StackOverflow)&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/sites/is2014/images/LSTUE-120Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1002</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_2_Submissions&amp;diff=1002"/>
		<updated>2014-02-25T00:28:38Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on February 25.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 5 so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
&lt;br /&gt;
*A Web of Lies and Licentious Lure: Temptation, Divorce, and the Internet&lt;br /&gt;
&lt;br /&gt;
* http://cyber.law.harvard.edu/is2014/File:Divorce_and_the_Internet_Harvard_Project.docx&lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 17:24, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*Who has the right to control our personal genetic information?&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Monroe_Assignment_Two.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Margorm|Margorm]] 18:30, 23 February 2014 (EST)&lt;br /&gt;
: Hi Margo, I&#039;m not sure if you&#039;ll ever read this, but if you do, would you by any chance be interested in working on your project in a group? I&#039;m highly interested in this topic (in part because I&#039;m considering founding my next startup in this field), and I&#039;ve been following it both from a distance as an observer, and from the inside as a customer of 23andMe. I&#039;d love to dig deeper and work with you on this project. Cheers, Philip Seyfi --[[User:Seifip|Seifip]] 19:28, 24 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
[[User:Castille|Castille]] 18:58, 22 February 2014 (EST)&lt;br /&gt;
*Assignment Two:&lt;br /&gt;
*LESS IS MORE?; Tumblr&#039;s Policies Against Self-Harm&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_TWO.doc&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*Watson&lt;br /&gt;
*To Publish Or Not: Social Media and the Syrian Conflict&lt;br /&gt;
*http://cyber.law.harvard.edu/is2014/File:Watson_Assignment2.docx&lt;br /&gt;
[[User:Watson|Watson]] 23:33, 23 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=960</id>
		<title>Copyright Part 1: Guiding Principles and Online Application</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=960"/>
		<updated>2014-02-19T22:53:26Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost. The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to recut, reframe, and recycle previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain.&lt;br /&gt;
&lt;br /&gt;
Over the next two classes, this course will take up the some of the issues related to copyright protection and enforcement online. Today’s class will focus on the legal regime of copyright: what it protects, what it doesn’t protect, and how the doctrine has transformed in light of digital reproduction and distribution.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The mechanics of copyright law&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Copyright_Clause Wikipedia, Copyright Clause]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Circular 1: Copyright Basics] (read only Who Can Claim Copyright?, What Works Are Protected?, What is Not Protected by Copyright?, How to Secure a Copyright, and How Long Copyright Protection Endures)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/text/17/107 17 U.S.C. § 107 - Limitations on Exclusive Rights: Fair Use]&lt;br /&gt;
&lt;br /&gt;
; Digital applications and new challenges&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688 Lawrence Lessig, It is About Time: Getting Our Values around Copyright] (watch first 6 minutes)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2012/08/why-johnny-cant-stream-how-video-copyright-went-insane/ James Grimmelmann, Why Johnny Can’t Stream: How Video Copyright Went Insane]&lt;br /&gt;
&lt;br /&gt;
; Copyright solutions&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=1DKm96Ftfko Creative Commons, A Shared Culture] (video, watch all) and [http://wiki.creativecommons.org/Spectrumofrights_Comic1 Spectrum of Rights]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyhype.com/2012/08/there-is-no-magic-bullet/ Terry Hart, There is No Magic Bullet]&lt;br /&gt;
&lt;br /&gt;
* [http://www.uspto.gov/news/publications/copyrightgreenpaper.pdf U.S. Department of Commerce: Internet Policy Task Force, Copyright Policy, Creativity, and Innovation in the Digital Economy] (Executive summary only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/docs/next_great_copyright_act.pdf Maria Pallante, The Next Great Copyright Act] (skim Section II (323-339) only)&lt;br /&gt;
&lt;br /&gt;
:* Maria Pallante is the [https://en.wikipedia.org/wiki/Register_of_Copyrights Register of Copyrights] for the United States.&lt;br /&gt;
&lt;br /&gt;
== Recommended Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=2HQVBmKsVhI Lewis Hyde, Common As Air: Revolution, Art, and Ownership] (video, watch from 2:12 to 24:37)&lt;br /&gt;
&lt;br /&gt;
* [http://www-personal.umich.edu/~jdlitman/papers/read.htm Jessica Litman, The Exclusive Right to Read] (introduction and Sections I and II only)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2008/10/dodgy-digits-behind-the-war-on-piracy/ Julian Sanchez, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bloomsburyacademic.com/view/Remix_9781849662505/chapter-ba-9781849662505-chapter-0001.xml Lawrence Lessig, &#039;&#039;Remix: Making Art and Culture Thrive in the Hybrid Economy&#039;&#039;] (Introduction only)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is related to an earlier class, but a great article on Wikipedia&#039;s bots has just been published on The Verge... [http://www.theverge.com/2014/2/18/5412636/this-machine-kills-trolls-how-wikipedia-robots-snuff-out-vandalism This machine kills trolls: How Wikipedia’s robots and cyborgs snuff out vandalism] --[[User:Seifip|Seifip]] 17:53, 19 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=959</id>
		<title>Copyright Part 1: Guiding Principles and Online Application</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Copyright_Part_1:_Guiding_Principles_and_Online_Application&amp;diff=959"/>
		<updated>2014-02-19T22:53:13Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 25&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost. The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to recut, reframe, and recycle previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain.&lt;br /&gt;
&lt;br /&gt;
Over the next two classes, this course will take up the some of the issues related to copyright protection and enforcement online. Today’s class will focus on the legal regime of copyright: what it protects, what it doesn’t protect, and how the doctrine has transformed in light of digital reproduction and distribution.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due &#039;&#039;before class&#039;&#039; today. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The mechanics of copyright law&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Copyright_Clause Wikipedia, Copyright Clause]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Circular 1: Copyright Basics] (read only Who Can Claim Copyright?, What Works Are Protected?, What is Not Protected by Copyright?, How to Secure a Copyright, and How Long Copyright Protection Endures)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/text/17/107 17 U.S.C. § 107 - Limitations on Exclusive Rights: Fair Use]&lt;br /&gt;
&lt;br /&gt;
; Digital applications and new challenges&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688 Lawrence Lessig, It is About Time: Getting Our Values around Copyright] (watch first 6 minutes)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2012/08/why-johnny-cant-stream-how-video-copyright-went-insane/ James Grimmelmann, Why Johnny Can’t Stream: How Video Copyright Went Insane]&lt;br /&gt;
&lt;br /&gt;
; Copyright solutions&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=1DKm96Ftfko Creative Commons, A Shared Culture] (video, watch all) and [http://wiki.creativecommons.org/Spectrumofrights_Comic1 Spectrum of Rights]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyhype.com/2012/08/there-is-no-magic-bullet/ Terry Hart, There is No Magic Bullet]&lt;br /&gt;
&lt;br /&gt;
* [http://www.uspto.gov/news/publications/copyrightgreenpaper.pdf U.S. Department of Commerce: Internet Policy Task Force, Copyright Policy, Creativity, and Innovation in the Digital Economy] (Executive summary only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/docs/next_great_copyright_act.pdf Maria Pallante, The Next Great Copyright Act] (skim Section II (323-339) only)&lt;br /&gt;
&lt;br /&gt;
:* Maria Pallante is the [https://en.wikipedia.org/wiki/Register_of_Copyrights Register of Copyrights] for the United States.&lt;br /&gt;
&lt;br /&gt;
== Recommended Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=2HQVBmKsVhI Lewis Hyde, Common As Air: Revolution, Art, and Ownership] (video, watch from 2:12 to 24:37)&lt;br /&gt;
&lt;br /&gt;
* [http://www-personal.umich.edu/~jdlitman/papers/read.htm Jessica Litman, The Exclusive Right to Read] (introduction and Sections I and II only)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2008/10/dodgy-digits-behind-the-war-on-piracy/ Julian Sanchez, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bloomsburyacademic.com/view/Remix_9781849662505/chapter-ba-9781849662505-chapter-0001.xml Lawrence Lessig, &#039;&#039;Remix: Making Art and Culture Thrive in the Hybrid Economy&#039;&#039;] (Introduction only)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This is related to an earlier class, but a great article on Wikipedia&#039;s bots has just been published on The Verge... [http://www.theverge.com/2014/2/18/5412636/this-machine-kills-trolls-how-wikipedia-robots-snuff-out-vandalism This machine kills trolls: How Wikipedia’s robots and cyborgs snuff out vandalism] --[[User:Seifip|Seifip]] 17:53, 19 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=915</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=915"/>
		<updated>2014-02-18T17:16:07Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Rosen&#039;s article sheds a lot of light on what has become very important content control force in digitally-mediated discussions. For me, the most interesting and troubling aspect of this is the time they take to decide these things. Rosen claims the content review groups at Facebook have on average 20 seconds to evaluate a claim before acting upon it. It is nearly impossible to internalize in such a short period of time the complicated elements Susan Benesch flags to separate the dangerous from the tasteless but far less dangerous - the context, the speaker, the audience, etc. How can they be expected to do in 20 seconds what scholars and courts spend years (and many trees of paper) contemplating in other contexts? (Oh, and to your next post - book recommendations are always welcome!) [[User:Andy|Andy]] 21:40, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t). --[[User:Seifip|Seifip]] 17:39, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you for the note Seifip!!! Makes sense, maybe i can play around with Chrome settings &amp;amp; see if I can set it so outside links always open in new tab... Not that I&#039;m too lazy to press the cmd/ctrl key for each link... (well I guess a bit) but my keyboards are all in different languages which confuses the crap out of my typing muscle memory, so I love it when browsers already know which links I want in a new tab (:&lt;br /&gt;
&lt;br /&gt;
::: [https://chrome.google.com/webstore/detail/linkclump/lfpjkncokllnfokkgpkobnkbkmelfefj?hl=en Linkclump] extension is your friend :) --[[User:Seifip|Seifip]] 07:58, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As I was considering the intersections of this week’s readings, several articles reminded me of a case that occurred back in 2000, although not within the realm of the Internet or something like the Flickr or Picasa most of us are very familiar with today, the parallels and concerns will seem obvious.&lt;br /&gt;
&lt;br /&gt;
When we think about the amount of daily photographic content that now goes up on Facebook, Flickr, Picasa, etc. and consider the roles of these “Deciders” (as defined in one of the reading), the case as it occurred for an Oberlin, Ohio family back in 2000, seems like it could play out over and over again if individual states received the powers of prosecution to the extent that the State Attorneys General are requesting in their letter to congress on July 23, 2013.&lt;br /&gt;
&lt;br /&gt;
Some may remember the case I’m referring to, in an overly distilled summary, it involved an amateur photographer who was chronicling her daughter’s life in still photography. Some photographs included her (then 8yr old) daughter bathing.  When the photos were developed by the local film-processing lab, a clerk reported this to the police as an incident of “child pornography”. The local police agreed, and the mother was arrested and the case garnered national attention at the time with the ACLU coming to the defense of the mother.&lt;br /&gt;
http://www.oberlin.edu/alummag/oamcurrent/oam_spring_00/atissue.html&lt;br /&gt;
[Later the subject of an entire book looking more closely at the issues] &lt;br /&gt;
http://www.pbs.org/newshour/art/questions-of-photographic-propriety-in-framing-innocence/&lt;br /&gt;
&lt;br /&gt;
The letter by the 49 Attorneys General certainly strikes at a horror that anyone with a human heart will become equally enraged towards - the tragedy of child abuse, sex trafficking, and exploitation. While it seems odd that the word “The State” is omitted from the current language of the CDA,  I wonder if by including “The State” in CDA language, we will end up introduce a sliding scale of laws that become defined by “the standards of any small community” enforcing crimes that THEY define a “Obscenity” and/or “child pornography”.&lt;br /&gt;
&lt;br /&gt;
What is viewed as unprotected speech and deemed as “obscenity” (or “child pornography”) in Lorain County Ohio, may not result in the same definition in (say) San Francisco. With the addition of “The State” in the CDA, could the State of Ohio prosecute a photographer in San Francisco for posting an “obscene” picture to a Flickr account which is accessible to users in Ohio?  If the definition of “obscenity” is based on the Miller’s test (below), then What are the “community standards” that define obscenity in a case where one state wishes to prosecute someone in another “community”?? &lt;br /&gt;
&lt;br /&gt;
The Miller test for obscenity includes the following criteria&lt;br /&gt;
&lt;br /&gt;
(1) whether ‘the average person, applying contemporary community standards’ would find that the work, ‘taken as a whole,’ appeals to ‘prurient interest’ &lt;br /&gt;
&lt;br /&gt;
(2) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law, and &lt;br /&gt;
&lt;br /&gt;
(3) whether the work, ‘taken as a whole,’ lacks serious literary, artistic, political, or scientific value.&lt;br /&gt;
&lt;br /&gt;
[[User:Psl|Psl]] 17:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for contributing! Just to clarify, the constitutional definition of actionable obscenity under &#039;&#039;Miller&#039;&#039; has the geographic element to it, which tailors the more general [http://www.law.cornell.edu/uscode/text/18/part-I/chapter-71 criminal statute], but in the realm of child pornography neither the [http://www.law.cornell.edu/uscode/text/18/2252 criminal statute] nor the [https://en.wikipedia.org/wiki/New_York_v._Ferber First Amendment doctrine] base liability on community standards. So while obscenity can very state to state, child pornography does not. (And both are illegal at the federal level.) [[User:Andy|Andy]] 18:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have a greater appreciation for the issues involved in online free speech after this week&#039;s article.  I somewhat disagree with Zuckerman&#039;s conclusion that private limitations to speech in private spaces is &amp;quot;Dangerous for a public society,&amp;quot; in that I believe that private companies need to be able to define what is or isn&#039;t acceptable communication within their own environments--we&#039;re guests in these areas, and it&#039;s up to companies owning the spaces to decide what sort of environment their guests are going to experience.  On the other hand, I don&#039;t think it can be the government that defines what&#039;s acceptable--it needs to be up to the individual owners of these spaces.  I&#039;m concerned about any encroachment on an individual or private enterprise&#039;s ability to decide what rules are appropriate for itself.  While I find the content of, say, a site like Stormfront (a white separatist website) to be totally repugnant, I would defend their right to publish what they do--if anything, it simply exposes their nonsense to public scrutiny and criticism.&lt;br /&gt;
&lt;br /&gt;
I am sympathetic to Benesch&#039;s thinking about &amp;quot;dangerous speech,&amp;quot; and in particular it does make sense that the context (speaker, political environment, proximity to sensitive events, lack of competition/criticism) can make hate speech turn into something more insidious.  Nevertheless, I&#039;m unable to think of a good solution that doesn&#039;t actually make things worse.  She claims to defend freedom of expression yet is able to make a distinction between expression and freedom of the press (dissemination).  I find myself unable to disentangle the two.  When one considers the international aspects, and the potential for international lawsuits (such as the French cases we&#039;ve discussed) it seems like it would be unusually hard to apply her test to speech and protect the right of companies in places such as the United States to publish things that someone might claim to be &amp;quot;dangerous&amp;quot; elsewhere.  For example, would the Chinese government find it to be &amp;quot;dangerous&amp;quot; if the customers of Twitter posted content about how there should be an end to single-party rule?  Where do we draw the line?  It&#039;s clear that not only are there the interests of certain governments at stake (and their authoritarian approaches to speech) but also the simple fact that some countries (such as the Rwanda example) may not have the institutions or cultural heritage to handle US-style free speech; yet it is it fair to force US companies to account for all of these cross-border and cross-cultural differences?&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 20:08, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I also found myself somewhat sympathetic to Bensech&#039;s concern about dangerous speech.  However, it is unfair and implausible to make US companies responsible for such cross-border/cultural differences.  It is bad for business and generally not a policy I would deem logical.  The way I see it, should a company be held liable for slander that someone says while in their establishment or be punished for someone who spray paints a hate message on the company&#039;s door? Although businesses can take precautions to try to prevent such occurrences, to do so over the internet is a much more painstaking task.  Furthermore, I think the bounds of what constitutes &amp;quot;hate speech&amp;quot; is being stretched to some degree.  Constitutionally and as many Supreme court cases have favored, freedom of speech is protected so long as it does not &amp;quot;incite violent action&amp;quot;.  For example, to instruct people to harm someone of a certain race would be considered unlawful. In my mind, that is where the line must be drawn.  &lt;br /&gt;
&lt;br /&gt;
Though, as others have mentioned, internet bullying is becoming more widespread and has resulted in teen suicides and possibly contributed to the uptick in school shootings as some have theorized.  Still, to what degree should we be prosecuting internet hacklers for this behavior?  As Professor mentioned in class, once an incident occurs Congress tends to look for an immediate remedy via legislation when it may not necessarily be the answer.  Of course I find it horrible and morally repugnant that someone would bully an innocent person online but does this mean that every bit of our speech should now be scrutinized and if we, for example, call someone fat online we should be given a misdemeanor? If our society deems legal recourse for online bullying, it will become quite convoluted in staking out the levels and appropriate punishments for each offense.  Should a few &amp;quot;bad apples&amp;quot; online ruin or impede the benefits of free internet speech for the masses of good people in society who thrive off of our shared knowledge?  Should McDonald&#039;s cheeseburgers be illegal to protect those who struggle from obesity?  No matter how you frame it, more restrictions will eventually equate to more inhibition for companies and citizens alike.  Such inhibition, I argue, thwarts a society&#039;s economic and intellectual growth.  &lt;br /&gt;
&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 10:34, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:I&#039;m really glad you brought up the issue of bullying! This is an area where the Berkman Center&#039;s Youth and Media Lab have been doing [http://cyber.law.harvard.edu/publications/2012/kbw_bulling_in_a_networked_era some great research] around framing, understanding, and assessing efficacy of solutions to bullying. [[User:Andy|Andy]] 11:15, 18 February 2014 (EST)              &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While I find Susan Benesch&#039;s pursuit of a more nuanced definition of free speech quite commendable, I find that her definition of dangerous speech is prone to subjective assessment and can lead to excessive censorship. Some of the factors, such as the charisma of the speaker, are difficult to assess and are shared between speakers for bad and good causes. Other factors, such as historical context, are equally less than ideal as history is not a constant, a fact, but rather something defined by the state and current generation based on its limited knowledge of the past and current view of the events. The way we see and interpret history changes virtually every decade, and it would be nice if the view of what constitutes dangerous speech was not tied to such an uncertain factor. --[[User:Seifip|Seifip]] 08:11, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Great points, [[User:Seifip|Seifip]], and I suspect Susan would agree with you that there is still a gap between what factors should and shouldn&#039;t matter, and how that translates to policies, procedures, and rules for monitoring against dangerous speech. The tie between the substantive and procedural issues around freedom of expression is a fascinating place to explore at some depth. [[User:Andy|Andy]] 11:15, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the reading this week really interesting as I am from the country that pioneered Internet censorship, China.  To be exact, I am from Hong Kong, one of the Special Administrative Regions of China. For those who are not familiar with the history of Hong Kong, it used to be a colony of Britain and China resumed sovereignty in 1997. Hong Kong is under the principle of “One County, Two Systems”, which means that it has a different political, legal and economical system from China and will be maintained that way for at least 50 years. &lt;br /&gt;
&lt;br /&gt;
Facebook, Twitter, New York Times have been on the blocked websites list in China because they are “politically sensitive”. Instead, they created their own social networking tools, Weibo. There are a couple different Weibo that launched by different companies, but all of them are in cooperation of the Internet Censorship in the People’s Republic of China.&lt;br /&gt;
&lt;br /&gt;
WeChat,a popular messaging app for smart phone which is similar to WhatsApp, Line, Facebook Messenger etc, is also under censorship. Messages that contain some keywords will be filtered and blocked. Users who send those messages will receive a message saying” The message you sent contains restricted works. Please try again”. &lt;br /&gt;
&lt;br /&gt;
In September last year, The Chinese Government finally allows a small selection of people to access those banned websites including Facebook and Twitter. However, the small selection of people means people that live in that specific 17 square mile area of Shanghai. Many say this is a great start of the revolution, but I am not as optimistic as the rest. I do acknowledge the changes that have been made in years, however, I believe this incident is only a one-time exception that the government made. &lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:13, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WHY WE CANNOT TRUST EVERYTHING ON THE SOCIAL MEDIA:  OF FREE SPEECH AND LIES&lt;br /&gt;
&lt;br /&gt;
http://news.asiaone.com/news/singapore/pm-lee-untruths-spread-through-social-media-hard-correctE&lt;br /&gt;
&lt;br /&gt;
But rather than other people or web robots doing the filtering, we should be teaching our young people how to filter good and reliable information from bad ones, especially on social media.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 11:53, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Following up on Andy and Castille&#039;s comments regarding content review and concern over the speed of content removal, I found Rachel Whetstone&#039;s entry about Google&#039;s policy regarding free expression and regulating speech particularly interesting. Whetstone emphasizes the importance of community, and the relative speed and accuracy of hate speech/ inappropriate content regulation by the millions of google users who self-police their given online communities. She acknowledges the potentially problematic dynamic of subjective judgment of what is deemed inappropriate, but I strongly agree that the majority of users- especially those who actively and regularly engage in any number of online communities- will agree about what is acceptable and what is offensive. Castille brought up concerns over cyber bullying and parental supervision/ intervention-- I would hope that the majority of parents would have similar responses to what is deemed unacceptable content when they encounter it. Though the ability to consider, deliberate and process each case of potential content regulation or removal is indeed limited when the average content review period on platforms such as Facebook is 20 seconds (referenced by Andy), I still would trust the ability of a community of regularly engaged and informed reviewers to regulate appropriate content. &lt;br /&gt;
[[User:akk22|akk22]] 11:50, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
NEW IDEA - ONLINE SOFTWARE FOR BUILDING THE COUNTRY FROM COLLABORATIVE FREE SPEECH&lt;br /&gt;
&lt;br /&gt;
I am thinking of Soft Systems approaches used in operations research such as the use of &amp;quot;cognitive maps&amp;quot; describe by Colin Eden (UK).  If there is an issue of national interest, we could have every interested person contribute to an interactive online cognitive map which has a &amp;quot;revert-to-earlier-version&amp;quot; function like in Wikipedia.  That way whoever contributes would have a sense of ownership of the map.  Positive or negative influence of one factor on another can be indicated by &amp;quot;+&amp;quot; and &amp;quot;-&amp;quot; signs and strength of relationship can be  shown with line thickness of the arrows.  The contributor&#039;s name and his reasons or evidence for the added link could be displayed by clicking on the connecting arrow.  Well, this idea is not really new as Colin Eden had developed a software for his called COPE...but this will need to be enhanced with the additional features suggested. &lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 12:15, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In related news... [http://www.bbc.com/sport/0/winter-olympics/26223586 Team GB want social media protection] --[[User:Seifip|Seifip]] 12:16, 18 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=906</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=906"/>
		<updated>2014-02-18T13:12:20Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I found the reading this week really interesting as I am from the country that pioneered Internet censorship, China.  To be exact, I am from Hong Kong, one of the Special Administrative Regions of China. For those who are not familiar with the history of Hong Kong, it used to be a colony of Britain and China resumed sovereignty in 1997. Hong Kong is under the principle of “One County, Two Systems”, which means that it has a different political, legal and economical system from China and will be maintained that way for at least 50 years. &lt;br /&gt;
&lt;br /&gt;
Facebook, Twitter, New York Times have been on the blocked websites list in China because they are “politically sensitive”. Instead, they created their own social networking tools, Weibo. There are a couple different Weibo that launched by different companies, but all of them are in cooperation of the Internet Censorship in the People’s Republic of China.&lt;br /&gt;
&lt;br /&gt;
WeChat,a popular messaging app for smart phone which is similar to WhatsApp, Line, Facebook Messenger etc, is also under censorship. Messages that contain some keywords will be filtered and blocked. Users who send those messages will receive a message saying” The message you sent contains restricted works. Please try again”. &lt;br /&gt;
&lt;br /&gt;
In September last year, The Chinese Government finally allows a small selection of people to access those banned websites including Facebook and Twitter. However, the small selection of people means people that live in that specific 17 square mile area of Shanghai. Many say this is a great start of the revolution, but I am not as optimistic as the rest. I do acknowledge the changes that have been made in years, however, I believe this incident is only a one-time exception that the government made. &lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:13, 18 February 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Rosen&#039;s article sheds a lot of light on what has become very important content control force in digitally-mediated discussions. For me, the most interesting and troubling aspect of this is the time they take to decide these things. Rosen claims the content review groups at Facebook have on average 20 seconds to evaluate a claim before acting upon it. It is nearly impossible to internalize in such a short period of time the complicated elements Susan Benesch flags to separate the dangerous from the tasteless but far less dangerous - the context, the speaker, the audience, etc. How can they be expected to do in 20 seconds what scholars and courts spend years (and many trees of paper) contemplating in other contexts? (Oh, and to your next post - book recommendations are always welcome!) [[User:Andy|Andy]] 21:40, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t). --[[User:Seifip|Seifip]] 17:39, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you for the note Seifip!!! Makes sense, maybe i can play around with Chrome settings &amp;amp; see if I can set it so outside links always open in new tab... Not that I&#039;m too lazy to press the cmd/ctrl key for each link... (well I guess a bit) but my keyboards are all in different languages which confuses the crap out of my typing muscle memory, so I love it when browsers already know which links I want in a new tab (:&lt;br /&gt;
&lt;br /&gt;
::: [https://chrome.google.com/webstore/detail/linkclump/lfpjkncokllnfokkgpkobnkbkmelfefj?hl=en Linkclump] extension is your friend :) --[[User:Seifip|Seifip]] 07:58, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As I was considering the intersections of this week’s readings, several articles reminded me of a case that occurred back in 2000, although not within the realm of the Internet or something like the Flickr or Picasa most of us are very familiar with today, the parallels and concerns will seem obvious.&lt;br /&gt;
&lt;br /&gt;
When we think about the amount of daily photographic content that now goes up on Facebook, Flickr, Picasa, etc. and consider the roles of these “Deciders” (as defined in one of the reading), the case as it occurred for an Oberlin, Ohio family back in 2000, seems like it could play out over and over again if individual states received the powers of prosecution to the extent that the State Attorneys General are requesting in their letter to congress on July 23, 2013.&lt;br /&gt;
&lt;br /&gt;
Some may remember the case I’m referring to, in an overly distilled summary, it involved an amateur photographer who was chronicling her daughter’s life in still photography. Some photographs included her (then 8yr old) daughter bathing.  When the photos were developed by the local film-processing lab, a clerk reported this to the police as an incident of “child pornography”. The local police agreed, and the mother was arrested and the case garnered national attention at the time with the ACLU coming to the defense of the mother.&lt;br /&gt;
http://www.oberlin.edu/alummag/oamcurrent/oam_spring_00/atissue.html&lt;br /&gt;
[Later the subject of an entire book looking more closely at the issues] &lt;br /&gt;
http://www.pbs.org/newshour/art/questions-of-photographic-propriety-in-framing-innocence/&lt;br /&gt;
&lt;br /&gt;
The letter by the 49 Attorneys General certainly strikes at a horror that anyone with a human heart will become equally enraged towards - the tragedy of child abuse, sex trafficking, and exploitation. While it seems odd that the word “The State” is omitted from the current language of the CDA,  I wonder if by including “The State” in CDA language, we will end up introduce a sliding scale of laws that become defined by “the standards of any small community” enforcing crimes that THEY define a “Obscenity” and/or “child pornography”.&lt;br /&gt;
&lt;br /&gt;
What is viewed as unprotected speech and deemed as “obscenity” (or “child pornography”) in Lorain County Ohio, may not result in the same definition in (say) San Francisco. With the addition of “The State” in the CDA, could the State of Ohio prosecute a photographer in San Francisco for posting an “obscene” picture to a Flickr account which is accessible to users in Ohio?  If the definition of “obscenity” is based on the Miller’s test (below), then What are the “community standards” that define obscenity in a case where one state wishes to prosecute someone in another “community”?? &lt;br /&gt;
&lt;br /&gt;
The Miller test for obscenity includes the following criteria&lt;br /&gt;
&lt;br /&gt;
(1) whether ‘the average person, applying contemporary community standards’ would find that the work, ‘taken as a whole,’ appeals to ‘prurient interest’ &lt;br /&gt;
&lt;br /&gt;
(2) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law, and &lt;br /&gt;
&lt;br /&gt;
(3) whether the work, ‘taken as a whole,’ lacks serious literary, artistic, political, or scientific value.&lt;br /&gt;
&lt;br /&gt;
[[User:Psl|Psl]] 17:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for contributing! Just to clarify, the constitutional definition of actionable obscenity under &#039;&#039;Miller&#039;&#039; has the geographic element to it, which tailors the more general [http://www.law.cornell.edu/uscode/text/18/part-I/chapter-71 criminal statute], but in the realm of child pornography neither the [http://www.law.cornell.edu/uscode/text/18/2252 criminal statute] nor the [https://en.wikipedia.org/wiki/New_York_v._Ferber First Amendment doctrine] base liability on community standards. So while obscenity can very state to state, child pornography does not. (And both are illegal at the federal level.) [[User:Andy|Andy]] 18:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have a greater appreciation for the issues involved in online free speech after this week&#039;s article.  I somewhat disagree with Zuckerman&#039;s conclusion that private limitations to speech in private spaces is &amp;quot;Dangerous for a public society,&amp;quot; in that I believe that private companies need to be able to define what is or isn&#039;t acceptable communication within their own environments--we&#039;re guests in these areas, and it&#039;s up to companies owning the spaces to decide what sort of environment their guests are going to experience.  On the other hand, I don&#039;t think it can be the government that defines what&#039;s acceptable--it needs to be up to the individual owners of these spaces.  I&#039;m concerned about any encroachment on an individual or private enterprise&#039;s ability to decide what rules are appropriate for itself.  While I find the content of, say, a site like Stormfront (a white separatist website) to be totally repugnant, I would defend their right to publish what they do--if anything, it simply exposes their nonsense to public scrutiny and criticism.&lt;br /&gt;
&lt;br /&gt;
I am sympathetic to Benesch&#039;s thinking about &amp;quot;dangerous speech,&amp;quot; and in particular it does make sense that the context (speaker, political environment, proximity to sensitive events, lack of competition/criticism) can make hate speech turn into something more insidious.  Nevertheless, I&#039;m unable to think of a good solution that doesn&#039;t actually make things worse.  She claims to defend freedom of expression yet is able to make a distinction between expression and freedom of the press (dissemination).  I find myself unable to disentangle the two.  When one considers the international aspects, and the potential for international lawsuits (such as the French cases we&#039;ve discussed) it seems like it would be unusually hard to apply her test to speech and protect the right of companies in places such as the United States to publish things that someone might claim to be &amp;quot;dangerous&amp;quot; elsewhere.  For example, would the Chinese government find it to be &amp;quot;dangerous&amp;quot; if the customers of Twitter posted content about how there should be an end to single-party rule?  Where do we draw the line?  It&#039;s clear that not only are there the interests of certain governments at stake (and their authoritarian approaches to speech) but also the simple fact that some countries (such as the Rwanda example) may not have the institutions or cultural heritage to handle US-style free speech; yet it is it fair to force US companies to account for all of these cross-border and cross-cultural differences?&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 20:08, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While I find Susan Benesch&#039;s pursuit of a more nuanced definition of free speech quite commendable, I find that her definition of dangerous speech is prone to subjective assessment and can lead to excessive censorship. Some of the factors, such as the charisma of the speaker, are difficult to assess and are shared between speakers for bad and good causes. Other factors, such as historical context, are equally less than ideal as history is not a constant, a fact, but rather something defined by the state and current generation based on its limited knowledge of the past and current view of the events. The way we see and interpret history changes virtually every decade, and it would be nice if the view of what constitutes dangerous speech was not tied to such an uncertain factor. --[[User:Seifip|Seifip]] 08:11, 18 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=905</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=905"/>
		<updated>2014-02-18T13:11:22Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I found the reading this week really interesting as I am from the country that pioneered Internet censorship, China.  To be exact, I am from Hong Kong, one of the Special Administrative Regions of China. For those who are not familiar with the history of Hong Kong, it used to be a colony of Britain and China resumed sovereignty in 1997. Hong Kong is under the principle of “One County, Two Systems”, which means that it has a different political, legal and economical system from China and will be maintained that way for at least 50 years. &lt;br /&gt;
&lt;br /&gt;
Facebook, Twitter, New York Times have been on the blocked websites list in China because they are “politically sensitive”. Instead, they created their own social networking tools, Weibo. There are a couple different Weibo that launched by different companies, but all of them are in cooperation of the Internet Censorship in the People’s Republic of China.&lt;br /&gt;
&lt;br /&gt;
WeChat,a popular messaging app for smart phone which is similar to WhatsApp, Line, Facebook Messenger etc, is also under censorship. Messages that contain some keywords will be filtered and blocked. Users who send those messages will receive a message saying” The message you sent contains restricted works. Please try again”. &lt;br /&gt;
&lt;br /&gt;
In September last year, The Chinese Government finally allows a small selection of people to access those banned websites including Facebook and Twitter. However, the small selection of people means people that live in that specific 17 square mile area of Shanghai. Many say this is a great start of the revolution, but I am not as optimistic as the rest. I do acknowledge the changes that have been made in years, however, I believe this incident is only a one-time exception that the government made. &lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:13, 18 February 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Rosen&#039;s article sheds a lot of light on what has become very important content control force in digitally-mediated discussions. For me, the most interesting and troubling aspect of this is the time they take to decide these things. Rosen claims the content review groups at Facebook have on average 20 seconds to evaluate a claim before acting upon it. It is nearly impossible to internalize in such a short period of time the complicated elements Susan Benesch flags to separate the dangerous from the tasteless but far less dangerous - the context, the speaker, the audience, etc. How can they be expected to do in 20 seconds what scholars and courts spend years (and many trees of paper) contemplating in other contexts? (Oh, and to your next post - book recommendations are always welcome!) [[User:Andy|Andy]] 21:40, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t). --[[User:Seifip|Seifip]] 17:39, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you for the note Seifip!!! Makes sense, maybe i can play around with Chrome settings &amp;amp; see if I can set it so outside links always open in new tab... Not that I&#039;m too lazy to press the cmd/ctrl key for each link... (well I guess a bit) but my keyboards are all in different languages which confuses the crap out of my typing muscle memory, so I love it when browsers already know which links I want in a new tab (:&lt;br /&gt;
&lt;br /&gt;
::: [https://chrome.google.com/webstore/detail/linkclump/lfpjkncokllnfokkgpkobnkbkmelfefj?hl=en Linkclump] extension is your friend :) --[[User:Seifip|Seifip]] 07:58, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As I was considering the intersections of this week’s readings, several articles reminded me of a case that occurred back in 2000, although not within the realm of the Internet or something like the Flickr or Picasa most of us are very familiar with today, the parallels and concerns will seem obvious.&lt;br /&gt;
&lt;br /&gt;
When we think about the amount of daily photographic content that now goes up on Facebook, Flickr, Picasa, etc. and consider the roles of these “Deciders” (as defined in one of the reading), the case as it occurred for an Oberlin, Ohio family back in 2000, seems like it could play out over and over again if individual states received the powers of prosecution to the extent that the State Attorneys General are requesting in their letter to congress on July 23, 2013.&lt;br /&gt;
&lt;br /&gt;
Some may remember the case I’m referring to, in an overly distilled summary, it involved an amateur photographer who was chronicling her daughter’s life in still photography. Some photographs included her (then 8yr old) daughter bathing.  When the photos were developed by the local film-processing lab, a clerk reported this to the police as an incident of “child pornography”. The local police agreed, and the mother was arrested and the case garnered national attention at the time with the ACLU coming to the defense of the mother.&lt;br /&gt;
http://www.oberlin.edu/alummag/oamcurrent/oam_spring_00/atissue.html&lt;br /&gt;
[Later the subject of an entire book looking more closely at the issues] &lt;br /&gt;
http://www.pbs.org/newshour/art/questions-of-photographic-propriety-in-framing-innocence/&lt;br /&gt;
&lt;br /&gt;
The letter by the 49 Attorneys General certainly strikes at a horror that anyone with a human heart will become equally enraged towards - the tragedy of child abuse, sex trafficking, and exploitation. While it seems odd that the word “The State” is omitted from the current language of the CDA,  I wonder if by including “The State” in CDA language, we will end up introduce a sliding scale of laws that become defined by “the standards of any small community” enforcing crimes that THEY define a “Obscenity” and/or “child pornography”.&lt;br /&gt;
&lt;br /&gt;
What is viewed as unprotected speech and deemed as “obscenity” (or “child pornography”) in Lorain County Ohio, may not result in the same definition in (say) San Francisco. With the addition of “The State” in the CDA, could the State of Ohio prosecute a photographer in San Francisco for posting an “obscene” picture to a Flickr account which is accessible to users in Ohio?  If the definition of “obscenity” is based on the Miller’s test (below), then What are the “community standards” that define obscenity in a case where one state wishes to prosecute someone in another “community”?? &lt;br /&gt;
&lt;br /&gt;
The Miller test for obscenity includes the following criteria&lt;br /&gt;
&lt;br /&gt;
(1) whether ‘the average person, applying contemporary community standards’ would find that the work, ‘taken as a whole,’ appeals to ‘prurient interest’ &lt;br /&gt;
&lt;br /&gt;
(2) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law, and &lt;br /&gt;
&lt;br /&gt;
(3) whether the work, ‘taken as a whole,’ lacks serious literary, artistic, political, or scientific value.&lt;br /&gt;
&lt;br /&gt;
[[User:Psl|Psl]] 17:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for contributing! Just to clarify, the constitutional definition of actionable obscenity under &#039;&#039;Miller&#039;&#039; has the geographic element to it, which tailors the more general [http://www.law.cornell.edu/uscode/text/18/part-I/chapter-71 criminal statute], but in the realm of child pornography neither the [http://www.law.cornell.edu/uscode/text/18/2252 criminal statute] nor the [https://en.wikipedia.org/wiki/New_York_v._Ferber First Amendment doctrine] base liability on community standards. So while obscenity can very state to state, child pornography does not. (And both are illegal at the federal level.) [[User:Andy|Andy]] 18:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have a greater appreciation for the issues involved in online free speech after this week&#039;s article.  I somewhat disagree with Zuckerman&#039;s conclusion that private limitations to speech in private spaces is &amp;quot;Dangerous for a public society,&amp;quot; in that I believe that private companies need to be able to define what is or isn&#039;t acceptable communication within their own environments--we&#039;re guests in these areas, and it&#039;s up to companies owning the spaces to decide what sort of environment their guests are going to experience.  On the other hand, I don&#039;t think it can be the government that defines what&#039;s acceptable--it needs to be up to the individual owners of these spaces.  I&#039;m concerned about any encroachment on an individual or private enterprise&#039;s ability to decide what rules are appropriate for itself.  While I find the content of, say, a site like Stormfront (a white separatist website) to be totally repugnant, I would defend their right to publish what they do--if anything, it simply exposes their nonsense to public scrutiny and criticism.&lt;br /&gt;
&lt;br /&gt;
I am sympathetic to Benesch&#039;s thinking about &amp;quot;dangerous speech,&amp;quot; and in particular it does make sense that the context (speaker, political environment, proximity to sensitive events, lack of competition/criticism) can make hate speech turn into something more insidious.  Nevertheless, I&#039;m unable to think of a good solution that doesn&#039;t actually make things worse.  She claims to defend freedom of expression yet is able to make a distinction between expression and freedom of the press (dissemination).  I find myself unable to disentangle the two.  When one considers the international aspects, and the potential for international lawsuits (such as the French cases we&#039;ve discussed) it seems like it would be unusually hard to apply her test to speech and protect the right of companies in places such as the United States to publish things that someone might claim to be &amp;quot;dangerous&amp;quot; elsewhere.  For example, would the Chinese government find it to be &amp;quot;dangerous&amp;quot; if the customers of Twitter posted content about how there should be an end to single-party rule?  Where do we draw the line?  It&#039;s clear that not only are there the interests of certain governments at stake (and their authoritarian approaches to speech) but also the simple fact that some countries (such as the Rwanda example) may not have the institutions or cultural heritage to handle US-style free speech; yet it is it fair to force US companies to account for all of these cross-border and cross-cultural differences?&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 20:08, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While I find Susan Benesch&#039;s pursuit of a more nuanced definition of free speech quite commendable, I find that her definition of dangerous speech is prone to subjective assessment and can lead to excessive censorship. Some of the factors, such as the charisma of the speaker, are difficult to assess and are shared between speakers for bad and good causes. Other factors, such as historical context, are equally less than ideal as history is not a constant, a fact, but rather something defined by the state and current generation based on its limited knowledge of the past and current view of the events. The way we see and interpret history changes virtually every decade, and it would be nice if the view of what constitutes dangerous speech was not tied to such an uncertain factor. --[[User:Seifip|Seifip]] 08:11, 18 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=904</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=904"/>
		<updated>2014-02-18T12:58:47Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I found the reading this week really interesting as I am from the country that pioneered Internet censorship, China.  To be exact, I am from Hong Kong, one of the Special Administrative Regions of China. For those who are not familiar with the history of Hong Kong, it used to be a colony of Britain and China resumed sovereignty in 1997. Hong Kong is under the principle of “One County, Two Systems”, which means that it has a different political, legal and economical system from China and will be maintained that way for at least 50 years. &lt;br /&gt;
&lt;br /&gt;
Facebook, Twitter, New York Times have been on the blocked websites list in China because they are “politically sensitive”. Instead, they created their own social networking tools, Weibo. There are a couple different Weibo that launched by different companies, but all of them are in cooperation of the Internet Censorship in the People’s Republic of China.&lt;br /&gt;
&lt;br /&gt;
WeChat,a popular messaging app for smart phone which is similar to WhatsApp, Line, Facebook Messenger etc, is also under censorship. Messages that contain some keywords will be filtered and blocked. Users who send those messages will receive a message saying” The message you sent contains restricted works. Please try again”. &lt;br /&gt;
&lt;br /&gt;
In September last year, The Chinese Government finally allows a small selection of people to access those banned websites including Facebook and Twitter. However, the small selection of people means people that live in that specific 17 square mile area of Shanghai. Many say this is a great start of the revolution, but I am not as optimistic as the rest. I do acknowledge the changes that have been made in years, however, I believe this incident is only a one-time exception that the government made. &lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:13, 18 February 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Rosen&#039;s article sheds a lot of light on what has become very important content control force in digitally-mediated discussions. For me, the most interesting and troubling aspect of this is the time they take to decide these things. Rosen claims the content review groups at Facebook have on average 20 seconds to evaluate a claim before acting upon it. It is nearly impossible to internalize in such a short period of time the complicated elements Susan Benesch flags to separate the dangerous from the tasteless but far less dangerous - the context, the speaker, the audience, etc. How can they be expected to do in 20 seconds what scholars and courts spend years (and many trees of paper) contemplating in other contexts? (Oh, and to your next post - book recommendations are always welcome!) [[User:Andy|Andy]] 21:40, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t). --[[User:Seifip|Seifip]] 17:39, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you for the note Seifip!!! Makes sense, maybe i can play around with Chrome settings &amp;amp; see if I can set it so outside links always open in new tab... Not that I&#039;m too lazy to press the cmd/ctrl key for each link... (well I guess a bit) but my keyboards are all in different languages which confuses the crap out of my typing muscle memory, so I love it when browsers already know which links I want in a new tab (:&lt;br /&gt;
&lt;br /&gt;
::: [https://chrome.google.com/webstore/detail/linkclump/lfpjkncokllnfokkgpkobnkbkmelfefj?hl=en Linkclump] extension is your friend :) --[[User:Seifip|Seifip]] 07:58, 18 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As I was considering the intersections of this week’s readings, several articles reminded me of a case that occurred back in 2000, although not within the realm of the Internet or something like the Flickr or Picasa most of us are very familiar with today, the parallels and concerns will seem obvious.&lt;br /&gt;
&lt;br /&gt;
When we think about the amount of daily photographic content that now goes up on Facebook, Flickr, Picasa, etc. and consider the roles of these “Deciders” (as defined in one of the reading), the case as it occurred for an Oberlin, Ohio family back in 2000, seems like it could play out over and over again if individual states received the powers of prosecution to the extent that the State Attorneys General are requesting in their letter to congress on July 23, 2013.&lt;br /&gt;
&lt;br /&gt;
Some may remember the case I’m referring to, in an overly distilled summary, it involved an amateur photographer who was chronicling her daughter’s life in still photography. Some photographs included her (then 8yr old) daughter bathing.  When the photos were developed by the local film-processing lab, a clerk reported this to the police as an incident of “child pornography”. The local police agreed, and the mother was arrested and the case garnered national attention at the time with the ACLU coming to the defense of the mother.&lt;br /&gt;
http://www.oberlin.edu/alummag/oamcurrent/oam_spring_00/atissue.html&lt;br /&gt;
[Later the subject of an entire book looking more closely at the issues] &lt;br /&gt;
http://www.pbs.org/newshour/art/questions-of-photographic-propriety-in-framing-innocence/&lt;br /&gt;
&lt;br /&gt;
The letter by the 49 Attorneys General certainly strikes at a horror that anyone with a human heart will become equally enraged towards - the tragedy of child abuse, sex trafficking, and exploitation. While it seems odd that the word “The State” is omitted from the current language of the CDA,  I wonder if by including “The State” in CDA language, we will end up introduce a sliding scale of laws that become defined by “the standards of any small community” enforcing crimes that THEY define a “Obscenity” and/or “child pornography”.&lt;br /&gt;
&lt;br /&gt;
What is viewed as unprotected speech and deemed as “obscenity” (or “child pornography”) in Lorain County Ohio, may not result in the same definition in (say) San Francisco. With the addition of “The State” in the CDA, could the State of Ohio prosecute a photographer in San Francisco for posting an “obscene” picture to a Flickr account which is accessible to users in Ohio?  If the definition of “obscenity” is based on the Miller’s test (below), then What are the “community standards” that define obscenity in a case where one state wishes to prosecute someone in another “community”?? &lt;br /&gt;
&lt;br /&gt;
The Miller test for obscenity includes the following criteria&lt;br /&gt;
&lt;br /&gt;
(1) whether ‘the average person, applying contemporary community standards’ would find that the work, ‘taken as a whole,’ appeals to ‘prurient interest’ &lt;br /&gt;
&lt;br /&gt;
(2) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law, and &lt;br /&gt;
&lt;br /&gt;
(3) whether the work, ‘taken as a whole,’ lacks serious literary, artistic, political, or scientific value.&lt;br /&gt;
&lt;br /&gt;
[[User:Psl|Psl]] 17:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for contributing! Just to clarify, the constitutional definition of actionable obscenity under &#039;&#039;Miller&#039;&#039; has the geographic element to it, which tailors the more general [http://www.law.cornell.edu/uscode/text/18/part-I/chapter-71 criminal statute], but in the realm of child pornography neither the [http://www.law.cornell.edu/uscode/text/18/2252 criminal statute] nor the [https://en.wikipedia.org/wiki/New_York_v._Ferber First Amendment doctrine] base liability on community standards. So while obscenity can very state to state, child pornography does not. (And both are illegal at the federal level.) [[User:Andy|Andy]] 18:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have a greater appreciation for the issues involved in online free speech after this week&#039;s article.  I somewhat disagree with Zuckerman&#039;s conclusion that private limitations to speech in private spaces is &amp;quot;Dangerous for a public society,&amp;quot; in that I believe that private companies need to be able to define what is or isn&#039;t acceptable communication within their own environments--we&#039;re guests in these areas, and it&#039;s up to companies owning the spaces to decide what sort of environment their guests are going to experience.  On the other hand, I don&#039;t think it can be the government that defines what&#039;s acceptable--it needs to be up to the individual owners of these spaces.  I&#039;m concerned about any encroachment on an individual or private enterprise&#039;s ability to decide what rules are appropriate for itself.  While I find the content of, say, a site like Stormfront (a white separatist website) to be totally repugnant, I would defend their right to publish what they do--if anything, it simply exposes their nonsense to public scrutiny and criticism.&lt;br /&gt;
&lt;br /&gt;
I am sympathetic to Benesch&#039;s thinking about &amp;quot;dangerous speech,&amp;quot; and in particular it does make sense that the context (speaker, political environment, proximity to sensitive events, lack of competition/criticism) can make hate speech turn into something more insidious.  Nevertheless, I&#039;m unable to think of a good solution that doesn&#039;t actually make things worse.  She claims to defend freedom of expression yet is able to make a distinction between expression and freedom of the press (dissemination).  I find myself unable to disentangle the two.  When one considers the international aspects, and the potential for international lawsuits (such as the French cases we&#039;ve discussed) it seems like it would be unusually hard to apply her test to speech and protect the right of companies in places such as the United States to publish things that someone might claim to be &amp;quot;dangerous&amp;quot; elsewhere.  For example, would the Chinese government find it to be &amp;quot;dangerous&amp;quot; if the customers of Twitter posted content about how there should be an end to single-party rule?  Where do we draw the line?  It&#039;s clear that not only are there the interests of certain governments at stake (and their authoritarian approaches to speech) but also the simple fact that some countries (such as the Rwanda example) may not have the institutions or cultural heritage to handle US-style free speech; yet it is it fair to force US companies to account for all of these cross-border and cross-cultural differences?&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 20:08, 17 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=903</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=903"/>
		<updated>2014-02-18T12:58:08Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I found the reading this week really interesting as I am from the country that pioneered Internet censorship, China.  To be exact, I am from Hong Kong, one of the Special Administrative Regions of China. For those who are not familiar with the history of Hong Kong, it used to be a colony of Britain and China resumed sovereignty in 1997. Hong Kong is under the principle of “One County, Two Systems”, which means that it has a different political, legal and economical system from China and will be maintained that way for at least 50 years. &lt;br /&gt;
&lt;br /&gt;
Facebook, Twitter, New York Times have been on the blocked websites list in China because they are “politically sensitive”. Instead, they created their own social networking tools, Weibo. There are a couple different Weibo that launched by different companies, but all of them are in cooperation of the Internet Censorship in the People’s Republic of China.&lt;br /&gt;
&lt;br /&gt;
WeChat,a popular messaging app for smart phone which is similar to WhatsApp, Line, Facebook Messenger etc, is also under censorship. Messages that contain some keywords will be filtered and blocked. Users who send those messages will receive a message saying” The message you sent contains restricted works. Please try again”. &lt;br /&gt;
&lt;br /&gt;
In September last year, The Chinese Government finally allows a small selection of people to access those banned websites including Facebook and Twitter. However, the small selection of people means people that live in that specific 17 square mile area of Shanghai. Many say this is a great start of the revolution, but I am not as optimistic as the rest. I do acknowledge the changes that have been made in years, however, I believe this incident is only a one-time exception that the government made. &lt;br /&gt;
&lt;br /&gt;
[[User:Jolietheone|Jolietheone]] 03:13, 18 February 2014 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Rosen&#039;s article sheds a lot of light on what has become very important content control force in digitally-mediated discussions. For me, the most interesting and troubling aspect of this is the time they take to decide these things. Rosen claims the content review groups at Facebook have on average 20 seconds to evaluate a claim before acting upon it. It is nearly impossible to internalize in such a short period of time the complicated elements Susan Benesch flags to separate the dangerous from the tasteless but far less dangerous - the context, the speaker, the audience, etc. How can they be expected to do in 20 seconds what scholars and courts spend years (and many trees of paper) contemplating in other contexts? (Oh, and to your next post - book recommendations are always welcome!) [[User:Andy|Andy]] 21:40, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t). --[[User:Seifip|Seifip]] 17:39, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
::Thank you for the note Seifip!!! Makes sense, maybe i can play around with Chrome settings &amp;amp; see if I can set it so outside links always open in new tab... Not that I&#039;m too lazy to press the cmd/ctrl key for each link... (well I guess a bit) but my keyboards are all in different languages which confuses the crap out of my typing muscle memory, so I love it when browsers already know which links I want in a new tab (:&lt;br /&gt;
&lt;br /&gt;
::: [https://chrome.google.com/webstore/detail/linkclump/lfpjkncokllnfokkgpkobnkbkmelfefj?hl=en Linkclump] extension is your friend :)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As I was considering the intersections of this week’s readings, several articles reminded me of a case that occurred back in 2000, although not within the realm of the Internet or something like the Flickr or Picasa most of us are very familiar with today, the parallels and concerns will seem obvious.&lt;br /&gt;
&lt;br /&gt;
When we think about the amount of daily photographic content that now goes up on Facebook, Flickr, Picasa, etc. and consider the roles of these “Deciders” (as defined in one of the reading), the case as it occurred for an Oberlin, Ohio family back in 2000, seems like it could play out over and over again if individual states received the powers of prosecution to the extent that the State Attorneys General are requesting in their letter to congress on July 23, 2013.&lt;br /&gt;
&lt;br /&gt;
Some may remember the case I’m referring to, in an overly distilled summary, it involved an amateur photographer who was chronicling her daughter’s life in still photography. Some photographs included her (then 8yr old) daughter bathing.  When the photos were developed by the local film-processing lab, a clerk reported this to the police as an incident of “child pornography”. The local police agreed, and the mother was arrested and the case garnered national attention at the time with the ACLU coming to the defense of the mother.&lt;br /&gt;
http://www.oberlin.edu/alummag/oamcurrent/oam_spring_00/atissue.html&lt;br /&gt;
[Later the subject of an entire book looking more closely at the issues] &lt;br /&gt;
http://www.pbs.org/newshour/art/questions-of-photographic-propriety-in-framing-innocence/&lt;br /&gt;
&lt;br /&gt;
The letter by the 49 Attorneys General certainly strikes at a horror that anyone with a human heart will become equally enraged towards - the tragedy of child abuse, sex trafficking, and exploitation. While it seems odd that the word “The State” is omitted from the current language of the CDA,  I wonder if by including “The State” in CDA language, we will end up introduce a sliding scale of laws that become defined by “the standards of any small community” enforcing crimes that THEY define a “Obscenity” and/or “child pornography”.&lt;br /&gt;
&lt;br /&gt;
What is viewed as unprotected speech and deemed as “obscenity” (or “child pornography”) in Lorain County Ohio, may not result in the same definition in (say) San Francisco. With the addition of “The State” in the CDA, could the State of Ohio prosecute a photographer in San Francisco for posting an “obscene” picture to a Flickr account which is accessible to users in Ohio?  If the definition of “obscenity” is based on the Miller’s test (below), then What are the “community standards” that define obscenity in a case where one state wishes to prosecute someone in another “community”?? &lt;br /&gt;
&lt;br /&gt;
The Miller test for obscenity includes the following criteria&lt;br /&gt;
&lt;br /&gt;
(1) whether ‘the average person, applying contemporary community standards’ would find that the work, ‘taken as a whole,’ appeals to ‘prurient interest’ &lt;br /&gt;
&lt;br /&gt;
(2) whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law, and &lt;br /&gt;
&lt;br /&gt;
(3) whether the work, ‘taken as a whole,’ lacks serious literary, artistic, political, or scientific value.&lt;br /&gt;
&lt;br /&gt;
[[User:Psl|Psl]] 17:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
:Thanks for contributing! Just to clarify, the constitutional definition of actionable obscenity under &#039;&#039;Miller&#039;&#039; has the geographic element to it, which tailors the more general [http://www.law.cornell.edu/uscode/text/18/part-I/chapter-71 criminal statute], but in the realm of child pornography neither the [http://www.law.cornell.edu/uscode/text/18/2252 criminal statute] nor the [https://en.wikipedia.org/wiki/New_York_v._Ferber First Amendment doctrine] base liability on community standards. So while obscenity can very state to state, child pornography does not. (And both are illegal at the federal level.) [[User:Andy|Andy]] 18:47, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I have a greater appreciation for the issues involved in online free speech after this week&#039;s article.  I somewhat disagree with Zuckerman&#039;s conclusion that private limitations to speech in private spaces is &amp;quot;Dangerous for a public society,&amp;quot; in that I believe that private companies need to be able to define what is or isn&#039;t acceptable communication within their own environments--we&#039;re guests in these areas, and it&#039;s up to companies owning the spaces to decide what sort of environment their guests are going to experience.  On the other hand, I don&#039;t think it can be the government that defines what&#039;s acceptable--it needs to be up to the individual owners of these spaces.  I&#039;m concerned about any encroachment on an individual or private enterprise&#039;s ability to decide what rules are appropriate for itself.  While I find the content of, say, a site like Stormfront (a white separatist website) to be totally repugnant, I would defend their right to publish what they do--if anything, it simply exposes their nonsense to public scrutiny and criticism.&lt;br /&gt;
&lt;br /&gt;
I am sympathetic to Benesch&#039;s thinking about &amp;quot;dangerous speech,&amp;quot; and in particular it does make sense that the context (speaker, political environment, proximity to sensitive events, lack of competition/criticism) can make hate speech turn into something more insidious.  Nevertheless, I&#039;m unable to think of a good solution that doesn&#039;t actually make things worse.  She claims to defend freedom of expression yet is able to make a distinction between expression and freedom of the press (dissemination).  I find myself unable to disentangle the two.  When one considers the international aspects, and the potential for international lawsuits (such as the French cases we&#039;ve discussed) it seems like it would be unusually hard to apply her test to speech and protect the right of companies in places such as the United States to publish things that someone might claim to be &amp;quot;dangerous&amp;quot; elsewhere.  For example, would the Chinese government find it to be &amp;quot;dangerous&amp;quot; if the customers of Twitter posted content about how there should be an end to single-party rule?  Where do we draw the line?  It&#039;s clear that not only are there the interests of certain governments at stake (and their authoritarian approaches to speech) but also the simple fact that some countries (such as the Rwanda example) may not have the institutions or cultural heritage to handle US-style free speech; yet it is it fair to force US companies to account for all of these cross-border and cross-cultural differences?&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 20:08, 17 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=886</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=886"/>
		<updated>2014-02-17T22:40:17Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t). --[[User:Seifip|Seifip]] 17:39, 17 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=885</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=885"/>
		<updated>2014-02-17T22:39:55Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use the target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t). --[[User:Seifip|Seifip]] 17:39, 17 February 2014 (EST)&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=884</id>
		<title>Regulating Speech Online</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Regulating_Speech_Online&amp;diff=884"/>
		<updated>2014-02-17T22:39:41Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 18&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can, in the words of the Supreme Court, “become a town crier with a voice that resonates farther than it could from any soapbox.” (Reno v. ACLU). Internet speakers can reach vast audiences of readers, viewers, researchers, and buyers that stretch across real space borders, or they can concentrate on niche audiences that share a common interest or geographical location. What&#039;s more, speech on the Internet has truly become a conversation, with different voices and viewpoints mingling together to create a single &amp;quot;work.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? How can a society balance the rights of speakers with the interests in safeguarding minors from offensive content? When different countries take different approaches on speech, whose values should take precedence? When a user of a website says something defamatory, when should we punish the user and when should we punish the website?&lt;br /&gt;
&lt;br /&gt;
In this class, we will look at how law and social norms are struggling to adapt to this new electronic terrain.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/jhermes Jeff Hermes], Director of the [http://www.dmlp.org/ Digital Media Law Project].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
The first half of assignment 2 (posting your prospectus) is due before class &#039;&#039;next week (Feb. 25th)&#039;&#039;. Information on the assignment can be found [[Assignments#Assignment_2:_Prospectus|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Private and public control of speech online&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
; Speech laws and liabilities in the United States&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
; Cross-border concerns&lt;br /&gt;
&lt;br /&gt;
* [http://freespeechdebate.com/en/media/susan-benesch-on-dangerous-speech-2/ Susan Benesch, Dangerous Speech] (audio interview, about 9 mins., listen to all)&lt;br /&gt;
&lt;br /&gt;
* [http://techpresident.com/news/wegov/24189/twitter-hands-over-data-unbonjuif-authors-french-authorities Jessica McKenzie, Obeying French Courts, Twitter Hands Over Identities of Users Who Employed Anti-Semitic Hashtag (TechPresident)]&lt;br /&gt;
&lt;br /&gt;
* [http://edition.cnn.com/2012/09/14/opinion/york-libya-youtube/index.html Jillian York, Should Google Censor an Anti-Islam Video?]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/news/2009/03/a-friendly-exchange-about-the-future-of-online-liability.ars John Palfrey &amp;amp; Adam Thierer, &amp;quot;Dialogue:  The Future of Online Obscenity and Social Networks&amp;quot; (Ars Technica)]&lt;br /&gt;
&lt;br /&gt;
* [http://scholar.google.com/scholar_case?case=1557224836887427725&amp;amp;q=reno+v+aclu&amp;amp;hl=en&amp;amp;as_sdt=2,22 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Evolving_Landscape_of_Internet_Control_3.pdf Hal Roberts et al., The Evolving Landscape of Internet Control]&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accessdenied-chapter-5.pdf Jonathan Zittrain and John Palfrey, Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet (from &#039;&#039;Access Denied&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/international/archive/2011/09/adapting-us-policy-in-a-changing-international-system/245307/ Anne-Marie Slaughter, Adapting U.S. Policy in a Changing International System]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The spread of information networks (the internet) is forming a new nervous system for our planet&amp;quot; - Hilary Clinton.&lt;br /&gt;
&lt;br /&gt;
See:  https://www.youtube.com/watch?v=ccGzOJHE1rw&lt;br /&gt;
&lt;br /&gt;
For governments to react expeditiously to help individuals or communities in distress, there must be freedom of speech online.&lt;br /&gt;
But for this to be effective, the process need to be organized and formalized.  Individuals need to ensure they are not sending noises and gibberish but useful information so that either the government or other able individuals, NGO&#039;s, or even private corporations can come to the rescue.&lt;br /&gt;
&lt;br /&gt;
[[User:Ichua|Ichua]] 06:57, 12 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I have to say, I found &amp;quot;The Delete Squad&amp;quot; article by Jeffrey Rosen to be extremely interesting. While I find hate speech despicable, I agree with the conclusion at which &amp;quot;The Deciders&amp;quot; arrived, to intervene only in rare cases in which resulting violence appeared imminent. In this age of prolific internet bullying, I can see how many people (particularly parents) might be inclined to argue that regulations must be implemented, but to me the solution seems to lie more so in the individual&#039;s own usage of the internet. By this I mean to say that a person should be responsible for restricting his or her (or his or her child&#039;s) internet usage so that he or she is not actively involved in sites which might be problematic. [[User:Castille|Castille]] 02:26, 15 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This might be a little off-topic, so I apologize in advance if it&#039;s &amp;quot;inappropriate&amp;quot;, but I was wondering if anyone has read &#039;&#039;The Circle&#039;&#039; by Dave Eggers? These readings-- and my exchange with Ichua on last week&#039;s discussion board-- have really made me consider the thoughts posed in that book. Basically, the book is about a company (a la Facebook) which seeks to &amp;quot;complete the circle&amp;quot; of internet usage and identity. It functions as a sort of government in and of itself, as well as a full-fledged community/world. Everything is consolidated on their system, so that people have basically no anonymity online as we do now; the internet is no longer removed from reality, but is instead a virtual reality in the most literal sense. All of their information is stored within the system, including their medical records, family history, purchase history, job details and tasks, and essentially all communication is conducted through the site. There is also a security camera system which is set up and controlled by the users, but has become so prolific that essentially every area of the globe is under surveillance. While the situation posed in the novel is drastic and even scary, there are a lot of positives to certain aspects. I think the biggest concern is not necessarily the loss of privacy, but the question of who controls (or should control) such a system. Certainly controls should exist, but surely corporations should not have that much power or intimate knowledge and it seems that even a government would not suffice for such a job. Should there be another authority? If so, what sort of entity would be qualified to do such a job? I&#039;d love to hear other peoples&#039; perspectives, whether you&#039;ve read it or not.[[User:Castille|Castille]] 12:55, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;NOTE 1&#039;&#039;&#039; While reading this week&#039;s articles, I took a break from homework to scroll down my Facebook newsfeed. I came across a post by a friend in Quebec, about a website that satirizes Snapchat. When I clicked the link, it gave me an error message. I messaged my friend, she was able to open the link with no problem from Quebec. From the comments on her post, it seems as though the only questionable content were some dirty pictures on the site, but nothing I understand to be limited in the USA. That was a bit weird/scary...&lt;br /&gt;
*&#039;&#039;&#039;NOTE 2&#039;&#039;&#039; Now that I am done reading this week&#039;s articles, I am more nervous to post my honest response to some of the articles than I used to be!&lt;br /&gt;
*&#039;&#039;&#039;QUESTION&#039;&#039;&#039; Does anyone know the Wiki Markdown version of &amp;lt;code&amp;gt;target=&amp;quot;_blank&amp;quot;&amp;lt;/code&amp;gt;? I&#039;d be happy to add the markup to the class readings if anyone knows what the code is (I&#039;ve tried Googling it... no luck...)&lt;br /&gt;
[[User:Deluxegourmet|Erin Saucke-Lacelle]] 15:27, 17 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
: It is generally considered bad practice in web development to use the target=&amp;quot;_blank&amp;quot; outside of very specific, exceptional cases. The reason is simple: If the link has no target attribute, the behaviour is defined by user&#039;s settings and by user&#039;s action as they can either click the link or right click and open in another tab/window/etc., some browsers offering other options such us click&amp;amp;drag, middle click, etc. If the link has a target=&amp;quot;_blank&amp;quot; attribute, on the other hand, the user is forced to open the link in a separate tab/window - his actions are thus limited by the developer, for no good reason (even if the developer might think he has a good reason, it usually isn&#039;t).&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_1_Submissions&amp;diff=767</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_1_Submissions&amp;diff=767"/>
		<updated>2014-02-11T15:07:36Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This section of the website is crawled by search engines. If you do not want your name to appear in a search connected with your writing, use your class wiki username.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 12, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
Please post your link to your report below, in the following format:&lt;br /&gt;
&lt;br /&gt;
* AmyAnn0644&lt;br /&gt;
&lt;br /&gt;
* Rule Chosen: Verifiability -- https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
* Wiki Edited:  Marwari Yuva Manch -- https://en.wikipedia.org/wiki/Marwari_Yuva_Manch&lt;br /&gt;
&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:AmyAnn0644_Assignment1.docx&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 16:39, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
[[User:Andy|Andy]] 19:58, 14 November 2013 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* margorm (class wiki), marengo5 (Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:VERIFY]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Biosensor - Revamped the section on Interferometric Reflectance Imaging Sensor]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Assignment1_Monroe.rtf Verifibility Report by Margo Monroe]&lt;br /&gt;
&lt;br /&gt;
([[User:Margorm|Margorm]] 19:19, 10 February 2014 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*AKK22 (on this wiki, and Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability Verifiability]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Sprout_(TV_network) Sprout]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Kauth_Assignment1.pdf Report PDF]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Jradoff (on this wiki), Tarinth (on Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:V]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Generative_systems Generative systems]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Assignment1Radoff.txt Report Text]&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 12:21, 8 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Dancoron (in the class wiki), DCorona501st (is my name on Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:VERIFY]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Roland_Corp - My addition Roland JV-80 Synthesizer &amp;amp; ROland SR-JV80 Expansion boards]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Dancoron_assignment1.doc My report of Verifiability]&lt;br /&gt;
[[User:Dancoron|Dancoron]] 15:33, 8 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* Castille (on class Wiki), Stille1002 (on Wikipedia)&lt;br /&gt;
* [RULE: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view]&lt;br /&gt;
* [ARTICLE: https://en.wikipedia.org/wiki/Workers%27_compensation]&lt;br /&gt;
* [REPORT: http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_ONE.doc] &lt;br /&gt;
[[User:Castille|Castille]] 12:30, 9 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* jkelly (class wiki). jkelly88 (Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability Verifiability]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/The_Sunset_Tree The Sunset Tree]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment1.doc Assignment 1]&lt;br /&gt;
[[User:Jkelly|Jkelly]] 21:36, 9 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* ichua (class wiki);  iyhchua (Wikipedia)&lt;br /&gt;
* [RULE: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view]&lt;br /&gt;
* [ARTICLE: https://en.wikipedia.org/wiki/Posterior_compartment_of_leg]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:LSTU-E120_Assignment1_IanChua.pdf Assignment 1]&lt;br /&gt;
[[User:Ichua|Ichua]] 13:11, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Watson&lt;br /&gt;
* Rule chosen: NPOV -- https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
* Wiki Edited: Silk Road(marketplace) -- http://en.wikipedia.org/wiki/Silk_Road_(marketplace)&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:Watson_Assignment1.docx&lt;br /&gt;
--[[User:Watson|Watson]] 23:22, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Drogowski (on this Wiki) drogowski (on Wikipedia)&lt;br /&gt;
&lt;br /&gt;
* Rule Chosen: Verifiability -- https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
* Wiki Edited:  Uniform Investment Adviser Law Exam -- https://en.wikipedia.org/wiki/Uniform_Investment_Adviser_Law_Exam&lt;br /&gt;
&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:Daniel_Rogowski_LSTU_Project_1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym: Philip Seyfi ([[User:Seifip|Seifip]])&lt;br /&gt;
* Link to rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
* Link to article: https://en.wikipedia.org/wiki/University_of_Oxford&lt;br /&gt;
* Link to report: http://cyber.law.harvard.edu/is2014/sites/is2014/images/Seyfi%2C_Philip_-_Assignment_1.pdf&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_1_Submissions&amp;diff=766</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_1_Submissions&amp;diff=766"/>
		<updated>2014-02-11T15:06:59Z</updated>

		<summary type="html">&lt;p&gt;Seifip: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This section of the website is crawled by search engines. If you do not want your name to appear in a search connected with your writing, use your class wiki username.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 12, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
Please post your link to your report below, in the following format:&lt;br /&gt;
&lt;br /&gt;
* AmyAnn0644&lt;br /&gt;
&lt;br /&gt;
* Rule Chosen: Verifiability -- https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
* Wiki Edited:  Marwari Yuva Manch -- https://en.wikipedia.org/wiki/Marwari_Yuva_Manch&lt;br /&gt;
&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:AmyAnn0644_Assignment1.docx&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 16:39, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
[[User:Andy|Andy]] 19:58, 14 November 2013 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* margorm (class wiki), marengo5 (Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:VERIFY]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Biosensor - Revamped the section on Interferometric Reflectance Imaging Sensor]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Assignment1_Monroe.rtf Verifibility Report by Margo Monroe]&lt;br /&gt;
&lt;br /&gt;
([[User:Margorm|Margorm]] 19:19, 10 February 2014 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*AKK22 (on this wiki, and Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability Verifiability]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Sprout_(TV_network) Sprout]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Kauth_Assignment1.pdf Report PDF]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Jradoff (on this wiki), Tarinth (on Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:V]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Generative_systems Generative systems]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Assignment1Radoff.txt Report Text]&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 12:21, 8 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Dancoron (in the class wiki), DCorona501st (is my name on Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:VERIFY]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Roland_Corp - My addition Roland JV-80 Synthesizer &amp;amp; ROland SR-JV80 Expansion boards]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Dancoron_assignment1.doc My report of Verifiability]&lt;br /&gt;
[[User:Dancoron|Dancoron]] 15:33, 8 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* Castille (on class Wiki), Stille1002 (on Wikipedia)&lt;br /&gt;
* [RULE: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view]&lt;br /&gt;
* [ARTICLE: https://en.wikipedia.org/wiki/Workers%27_compensation]&lt;br /&gt;
* [REPORT: http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_ONE.doc] &lt;br /&gt;
[[User:Castille|Castille]] 12:30, 9 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* jkelly (class wiki). jkelly88 (Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability Verifiability]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/The_Sunset_Tree The Sunset Tree]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment1.doc Assignment 1]&lt;br /&gt;
[[User:Jkelly|Jkelly]] 21:36, 9 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* ichua (class wiki);  iyhchua (Wikipedia)&lt;br /&gt;
* [RULE: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view]&lt;br /&gt;
* [ARTICLE: https://en.wikipedia.org/wiki/Posterior_compartment_of_leg]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:LSTU-E120_Assignment1_IanChua.pdf Assignment 1]&lt;br /&gt;
[[User:Ichua|Ichua]] 13:11, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Watson&lt;br /&gt;
* Rule chosen: NPOV -- https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
* Wiki Edited: Silk Road(marketplace) -- http://en.wikipedia.org/wiki/Silk_Road_(marketplace)&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:Watson_Assignment1.docx&lt;br /&gt;
--[[User:Watson|Watson]] 23:22, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Drogowski (on this Wiki) drogowski (on Wikipedia)&lt;br /&gt;
&lt;br /&gt;
* Rule Chosen: Verifiability -- https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
* Wiki Edited:  Uniform Investment Adviser Law Exam -- https://en.wikipedia.org/wiki/Uniform_Investment_Adviser_Law_Exam&lt;br /&gt;
&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:Daniel_Rogowski_LSTU_Project_1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym: Philip Seyfi ([[User:Seifip|Seifip]])&lt;br /&gt;
* Link to rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
* Link to article: https://en.wikipedia.org/wiki/University_of_Oxford&lt;br /&gt;
* Link to report: http://cyber.law.harvard.edu/is2014/sites/is2014/images/Seyfi%2C_Philip_-_Assignment_1.pdf&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2014/?title=Assignment_1_Submissions&amp;diff=765</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2014/?title=Assignment_1_Submissions&amp;diff=765"/>
		<updated>2014-02-11T15:06:22Z</updated>

		<summary type="html">&lt;p&gt;Seifip: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This section of the website is crawled by search engines. If you do not want your name to appear in a search connected with your writing, use your class wiki username.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 12, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2014/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2013/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
===Submissions===&lt;br /&gt;
Please post your link to your report below, in the following format:&lt;br /&gt;
&lt;br /&gt;
* AmyAnn0644&lt;br /&gt;
&lt;br /&gt;
* Rule Chosen: Verifiability -- https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
* Wiki Edited:  Marwari Yuva Manch -- https://en.wikipedia.org/wiki/Marwari_Yuva_Manch&lt;br /&gt;
&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:AmyAnn0644_Assignment1.docx&lt;br /&gt;
--[[User:AmyAnn0644|AmyAnn0644]] 16:39, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
[[User:Andy|Andy]] 19:58, 14 November 2013 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* margorm (class wiki), marengo5 (Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:VERIFY]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Biosensor - Revamped the section on Interferometric Reflectance Imaging Sensor]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Assignment1_Monroe.rtf Verifibility Report by Margo Monroe]&lt;br /&gt;
&lt;br /&gt;
([[User:Margorm|Margorm]] 19:19, 10 February 2014 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*AKK22 (on this wiki, and Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability Verifiability]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Sprout_(TV_network) Sprout]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Kauth_Assignment1.pdf Report PDF]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Jradoff (on this wiki), Tarinth (on Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:V]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Generative_systems Generative systems]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Assignment1Radoff.txt Report Text]&lt;br /&gt;
&lt;br /&gt;
[[User:Jradoff|Jradoff]] 12:21, 8 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Dancoron (in the class wiki), DCorona501st (is my name on Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability WP:VERIFY]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Roland_Corp - My addition Roland JV-80 Synthesizer &amp;amp; ROland SR-JV80 Expansion boards]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Dancoron_assignment1.doc My report of Verifiability]&lt;br /&gt;
[[User:Dancoron|Dancoron]] 15:33, 8 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* Castille (on class Wiki), Stille1002 (on Wikipedia)&lt;br /&gt;
* [RULE: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view]&lt;br /&gt;
* [ARTICLE: https://en.wikipedia.org/wiki/Workers%27_compensation]&lt;br /&gt;
* [REPORT: http://cyber.law.harvard.edu/is2014/File:CastilleRath_ASSIGNMENT_ONE.doc] &lt;br /&gt;
[[User:Castille|Castille]] 12:30, 9 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* jkelly (class wiki). jkelly88 (Wikipedia)&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Wikipedia:Verifiability Verifiability]&lt;br /&gt;
* [https://en.wikipedia.org/wiki/The_Sunset_Tree The Sunset Tree]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:Jkelly_Assignment1.doc Assignment 1]&lt;br /&gt;
[[User:Jkelly|Jkelly]] 21:36, 9 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* ichua (class wiki);  iyhchua (Wikipedia)&lt;br /&gt;
* [RULE: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view]&lt;br /&gt;
* [ARTICLE: https://en.wikipedia.org/wiki/Posterior_compartment_of_leg]&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2014/File:LSTU-E120_Assignment1_IanChua.pdf Assignment 1]&lt;br /&gt;
[[User:Ichua|Ichua]] 13:11, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Watson&lt;br /&gt;
* Rule chosen: NPOV -- https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
* Wiki Edited: Silk Road(marketplace) -- http://en.wikipedia.org/wiki/Silk_Road_(marketplace)&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:Watson_Assignment1.docx&lt;br /&gt;
--[[User:Watson|Watson]] 23:22, 10 February 2014 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
* Drogowski (on this Wiki) drogowski (on Wikipedia)&lt;br /&gt;
&lt;br /&gt;
* Rule Chosen: Verifiability -- https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
* Wiki Edited:  Uniform Investment Adviser Law Exam -- https://en.wikipedia.org/wiki/Uniform_Investment_Adviser_Law_Exam&lt;br /&gt;
&lt;br /&gt;
* Posted Link to Assignment Submission: http://cyber.law.harvard.edu/is2014/File:Daniel_Rogowski_LSTU_Project_1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Your Name or Chosen Pseudonym: --[[User:Seifip|Seifip]] 10:06, 11 February 2014 (EST)&lt;br /&gt;
Link to rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
Link to article: https://en.wikipedia.org/wiki/University_of_Oxford&lt;br /&gt;
Link to report: http://cyber.law.harvard.edu/is2014/sites/is2014/images/Seyfi%2C_Philip_-_Assignment_1.pdf&lt;/div&gt;</summary>
		<author><name>Seifip</name></author>
	</entry>
</feed>