<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2015/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Caelum</id>
	<title>Technologies and Politics of Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2015/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Caelum"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/Special:Contributions/Caelum"/>
	<updated>2026-04-04T05:27:51Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4390</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4390"/>
		<updated>2015-05-13T03:35:32Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;[http://www.extension.harvard.edu/course-evaluations HES course evaluations are now live. Please go here to fill it out.]&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Also, the course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in to the HES website] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Erika L Rich&lt;br /&gt;
&lt;br /&gt;
Title: Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board&lt;br /&gt;
&lt;br /&gt;
Link: [[File:LSTU_E120_Erika_Rich_FINAL_PAPER.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 21:51, 10 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name:  Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
Title: Final Project: Analyzing the Regulatory Constraints and Chilling Effects of YouTube’s Content ID Sweep through a Representative Survey of the Nintendo Let’s Play Community &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:52, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
Name: MattK&lt;br /&gt;
&lt;br /&gt;
Title: Does the Hammer Ring True?: Assessing John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:MattK_Assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 18:43, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Batjarks&lt;br /&gt;
&lt;br /&gt;
Title: Mobile Alliance for Maternal Action&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:BrookeTjarksFINAL.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 21:30, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Hernando Romero &amp;amp; Michelle Byrne&lt;br /&gt;
&lt;br /&gt;
Title: Privacy in Online Forum AfterSilence.org:  Balancing Privacy for Victims of Sexual Crimes with Opportunity for Support&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 12:42, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: ChanelRion&lt;br /&gt;
&lt;br /&gt;
Title: We The Judges: &amp;quot;SiteJabber&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Assignment4_Final_Draft.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 12:57, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Title: Buycott: Empowering Political Consumption Under A Veil of Political Neutrality&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly_Wilson_Final.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 13:50, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis&lt;br /&gt;
&lt;br /&gt;
Title: /r/TwoXChromosomes: The challenges of maintaining a female-centric space on Reddit&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Beccalew_assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 14:33, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Title: Exploring The Complexity of Rapidly Evolving Information in a bodybuilding, the Challenges of Quality Assurance &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Final_Project.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:17, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Title: BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Barstool_Politics_of_Control_FINAL.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 15:32, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei&lt;br /&gt;
&lt;br /&gt;
Title: Influence of Reddit on Kickstarter Campaigns&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Samaei1_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 16:18, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: JosefinS&lt;br /&gt;
&lt;br /&gt;
Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being an empowering environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinS_Kidzworld.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 16:21, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: AlexanderH&lt;br /&gt;
&lt;br /&gt;
Title: How Do You Regulate User Content?: Instagram and the 4th Trimester Bodies Project&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:AlexanderH_-_Final_Project.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 17:13, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: RMarkow&lt;br /&gt;
&lt;br /&gt;
Title: Analyzing three news sites with very different controls, on the same day as each of their respective communities engage in heated political debate on the same topic.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/R_Markow_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 20:19, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Caelum&lt;br /&gt;
&lt;br /&gt;
Title: &lt;br /&gt;
Reddit’s Constant Conflict between Freedom of Speech and their Censorship of Hate Speech and Personal Attacks in it’s Conspiracy Sub-category&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Caelum_Draft_Final.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 23:35, 12 May 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Caelum_Draft_Final.docx&amp;diff=4389</id>
		<title>File:Caelum Draft Final.docx</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Caelum_Draft_Final.docx&amp;diff=4389"/>
		<updated>2015-05-13T03:34:58Z</updated>

		<summary type="html">&lt;p&gt;Caelum: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Extra_Credit_Submissions&amp;diff=4342</id>
		<title>Extra Credit Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Extra_Credit_Submissions&amp;diff=4342"/>
		<updated>2015-05-05T23:35:12Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due on May 5th.&#039;&#039;&#039;  Students who submit extra credit projects will receive a one-point increase in their final project grade. If you are presenting in class on the 13th, but do not have material to upload, please indicate so on the section below.&lt;br /&gt;
&lt;br /&gt;
If you do plan on uploading a file, &#039;&#039;please name your file &amp;quot;wikiusername_extracredit,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a PowerPoint document your file should be named &amp;quot;jdoe_extracredit.ppt.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link to your extra credit below (either by [http://cyber.law.harvard.edu/is2015/Special:Upload uploading it to the wiki] or by linking to an external site) or indicate that you&#039;d like to present your final paper.  Please provide a short description of your project/the presentation you plan to give.  &lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: JosefinS&lt;br /&gt;
&lt;br /&gt;
Description: My presentation will explain what my project was about and what I found in my studies.&lt;br /&gt;
&lt;br /&gt;
Link to Assignment:	http://prezi.com/kdxxnoxomc2t/?utm_campaign=share&amp;amp;utm_medium=copy&amp;amp;rc=ex0share&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 09:05, 3 May 2015 (EDT)&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: ChanelRion&lt;br /&gt;
&lt;br /&gt;
Description: We the Judges: Sitejabber and Communities of User-Generated Reviews.&lt;br /&gt;
&lt;br /&gt;
Type of Submission: In class presentation on the 13th. &lt;br /&gt;
&lt;br /&gt;
Description: This presentation will be an overview of findings from my final project. This project surveys Sitejabber.com and explores by what mechanisms and architectures actors in the user-generated business-review community (like Yelp and Sitejabber) operate to determine the trustworthiness of unverifiable information/statements about businesses both on the ground and online. &lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 18:19, 3 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Mhoching&lt;br /&gt;
&lt;br /&gt;
Type of Presentation: May 13, 2015 in class presentation &lt;br /&gt;
&lt;br /&gt;
Description: My final project investigated social movements online with a focus on a particular hashtag on Twitter. The in class presentation will utilize a Twitter account to show findings of the final project while communicated in a powerpoint format.  The presentation will be of an account formed on Twitter to deliver the findings, surveys, and progression of the project while simultaneously showing how the Twitter platform operates. &lt;br /&gt;
&lt;br /&gt;
Link to assignment: https://twitter.com/LSTU15_mhoching&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 01:59, 5 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: HRomero and Chelly.Byrne&lt;br /&gt;
&lt;br /&gt;
Description:  This is a PowerPoint presentation of our paper, Privacy in Online Forum AfterSilence.org.  It is best viewed as SlideShow (from beginning) with speakers on - and it will run through automatically.   Good luck everyone!&lt;br /&gt;
&lt;br /&gt;
Link to Assignment:  http://cyber.law.harvard.edu/is2015/File:Privacy_in_Online_Forum_AfterSilence_-_FINAL.pptx#file&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 11:27, 5 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gia&lt;br /&gt;
&lt;br /&gt;
Description: This is a quick summary (PPTX) of the self regulation and internal control methods employed by 419Eater.com community.&lt;br /&gt;
&lt;br /&gt;
Link to Assignment:  http://cyber.law.harvard.edu/is2015/File:Gia_extracredit.pptx&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
______&lt;br /&gt;
&lt;br /&gt;
Name: Rhurls&lt;br /&gt;
&lt;br /&gt;
Description: My project was on the success of the Barstoolsports.com&#039;s comment section regulation as seen through the lens of Lessig and his four forces. &lt;br /&gt;
&lt;br /&gt;
Link: http://prezi.com/lefdbchubj2e/?utm_campaign=share&amp;amp;utm_medium=copy&amp;amp;rc=ex0share&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 12:40, 5 May 2015 (EDT)&lt;br /&gt;
____&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Batjarks&lt;br /&gt;
&lt;br /&gt;
Description: Powerpoint and oral presentation&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:MAMA.pptx&lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 16:28, 5 May 2015 (EDT)&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Caelum&lt;br /&gt;
&lt;br /&gt;
Description: Did a youtube video singing a parody of Lorde&#039;s song Royals. (Please don&#039;t expect too much haha, but it was fun)&lt;br /&gt;
&lt;br /&gt;
Link: https://youtu.be/Ru-jpJDc-f0&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 19:35, 5 May 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_4_Submissions&amp;diff=4303</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_4_Submissions&amp;diff=4303"/>
		<updated>2015-04-28T21:29:34Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due before class on April 28th.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment4,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment4.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Project title: &lt;br /&gt;
*Link to rough draft: (add your link here)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Erika L Rich&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; [[Media:LSTU_E120_Erika_Rich_Assignment_4.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 12:08, 28 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; MattK&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Does the Hammer Ring True? Assessing John Scalzi&#039;s Mallet of Loving Correction.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:MattK_Assignment4.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 20:31, 20 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Assignment 4: Draft- Analyzing the Regulatory Constraints and Chilling Effects of YouTube’s Content ID Sweep through a Representative Survey of the Nintendo Let’s Play Community &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_4.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 15:19, 21 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; HRomero and ChellyByrne&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Balancing Privacy for Victims of Sexual Crimes With Opportunity for Support in Online Forum AfterSilence.org&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Assignment4.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 14:31, 22 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: JosefinS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project title&#039;&#039;&#039;: A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2015/File:Assignment_4.pdf_Klar.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 08:45, 26 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samaei1&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project title&#039;&#039;&#039;: Influence of Reddit on Kickstarter Campaigns&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2015/File:InternetSocietyFinalDraft.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 13:20, 28 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Beccalew&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project title&#039;&#039;&#039;: /r/TwoXChromosomes: The challenges of maintaining a female-centric space on Reddit&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2015/File:Beccalew_Assignment4.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 14:40, 28 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Mishal R. Kennedy, Gia, Natasha Jalbut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Scam Baiting Within the 419Eater Community: The Challenge of Policing Information Quality &amp;amp; Preventing Abuse.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Assignment_4_%28Internet_Society_-_Technologies_and_Politics_of_Control%29.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:MishalRKennedy|MishalRKennedy]] ([[User talk:MishalRKennedy|talk]]) 4:25, 28 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project title&#039;&#039;&#039;: BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2015/File:Barstool_Politics_of_Control_Draft.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:48, 28 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Richard Markow&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Comparing and contrasting the ways in which the NYTimes.com, Huffington Post, and FoxNews.com govern their online communities and use technology, rules and the market to deal with unwanted behaviors and help to facilitate social norms that will promote lively debate.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Assignment_4_Draft_of_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:42, 28 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; “Rebels Without A Pause: How Buycott Empowers Political Consumption While Staying Above the Political Fray”&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Kelly.WilsonAssignment4.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 17:03, 28 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Eric Kwong&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; “Reddit’s Constant Conflict between Freedom of Speech and their Censorship of Hate Speech and Personal Attacks in it’s Conspiracy Sub-category&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment4.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 17:29, 28 April 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment4.pdf&amp;diff=4302</id>
		<title>File:Caelum Assignment4.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment4.pdf&amp;diff=4302"/>
		<updated>2015-04-28T21:28:45Z</updated>

		<summary type="html">&lt;p&gt;Caelum: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Copyright,_Day_2:_Copyright_Enforcement_and_Applications_to_New_Technology&amp;diff=4285</id>
		<title>Copyright, Day 2: Copyright Enforcement and Applications to New Technology</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Copyright,_Day_2:_Copyright_Enforcement_and_Applications_to_New_Technology&amp;diff=4285"/>
		<updated>2015-04-28T19:43:19Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 28&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To end the substance of the class, we return to a topic we studied a few weeks ago and look to how various efforts have attempted to control the Web in light of the issue. Digital technologies spawned the proliferation of media and music sharing, which has led to a number of controversial legal and technological strategies for control and copyright enforcement. “Controversial” may be putting it lightly; the ongoing fight between copyright owners and Internet evangelists is one of the most popularly debated fights surrounding Internet control. This class focuses on how copyright is enforced online, with particular emphasis on the &amp;quot;notice-and-takedown&amp;quot; provisions of the Digital Millennium Copyright Act, which allow Internet service providers to limit their liability for the copyright infringements of their users if the ISPs expeditiously remove material in response to complaints from copyright owners. The class will also look at a few other famous attempts to design within and around copyright’s regime, both with legislation and with new technologies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Assignment 4 ==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft|Assignment 4]] is due before class today. You can submit your assignment [[Assignment_4_Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The DMCA Notice-And-Takedown Process&lt;br /&gt;
&lt;br /&gt;
* Digital Media Law Project, [http://www.dmlp.org/legal-guide/copyright-claims-based-user-content Claims Based on User Content] and [http://www.dmlp.org/legal-guide/protecting-yourself-against-copyright-claims-based-user-content Protecting Yourself Against Copyright Claims Based on User Content]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/takedowns Electronic Frontier Foundation, Takedown Hall of Shame] (peruse)&lt;br /&gt;
&lt;br /&gt;
* Chilling Effects, [https://www.chillingeffects.org/pages/about About].&lt;br /&gt;
&lt;br /&gt;
* [http://paidcontent.org/2013/02/24/how-google-did-the-right-thing-with-the-nascar-crash-video-and-why-it-matters/ Matthew Ingram, Paid Content, How Google did the right thing with the NASCAR crash video, and why it matters]&lt;br /&gt;
&lt;br /&gt;
; Case Studies&lt;br /&gt;
&lt;br /&gt;
* [http://futureoftheinternet.org/reading-sopa Jonathan Zittrain, Kendra Albert, and Alicia Solow-Niederman, A Close Look at SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/01/15/mit-media-lab-opposes-sopa-pipa/ Ethan Zuckerman and Joi Ito, MIT Media Lab Opposes SOPA, PIPA]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/node/98767 Radio Berkman #216: The Internet – A Yearbook] (5:58-15:13 only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theguardian.com/us-news/2015/apr/21/walter-scott-video-footage-pr-firm-copyright Jon Swaine, Walter Scott: PR firm demands $10,000 from media outlets using shooting video]&lt;br /&gt;
&lt;br /&gt;
; The big picture&lt;br /&gt;
&lt;br /&gt;
* [http://torrentfreak.com/bittorrent-traffic-drops-in-america-grows-in-europe-131111/ Ernesto Van Der Sar, BitTorrent Traffic Drops in America, Grows in Europe]&lt;br /&gt;
&lt;br /&gt;
* [https://www.techdirt.com/blog/casestudies/articles/20120405/11221818390/perspective-complexities-copyright-creativity-victim-infringement.shtml Erin McKeown, A Perspective On the Complexities of Copyright and Creativity from a Victim of Infringement]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
; Case Study - ISP &amp;quot;Six Strikes&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* [http://www.onthemedia.org/2013/feb/01/copyright-alert-system-and-six-strikes/ Brooke Gladstone, Interview with Jill Lesser of Center for Copyright Information (&#039;&#039;On The Media&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.plagiarismtoday.com/2013/02/25/the-6-likely-impact-of-six-strikes/ Jonathan Bailey, Plagiarism Today, The 6 Likely Impact of Six Strikes]&lt;br /&gt;
&lt;br /&gt;
; Case Study - Operation In Our Sites&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1835604 Andy Sellars, Seized Sites: The In Rem Forfeiture of Copyright-Infringing Domain Names]&lt;br /&gt;
&lt;br /&gt;
* [http://wendy.seltzer.org/blog/archives/2011/02/02/super-bust-due-process-and-domain-name-seizure.html Wendy Seltzer, Super Bust: Due Process and Domain Name Seizure]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
As said in the introduction of this week’s wiki page is ”the ongoing fight between copyright owners and Internet evangelists is one of the most popularly debated fights surrounding Internet control.”. What the literature show us, is that it is very tricky to find a solution and an ending to the fight. One reason is that there are different interests and players when it comes to this issue. There is always going to be groups that aren´t happy with the legislation. Another reason is that it simply is hard to create effective laws (especially since the Internet is a global phenomena), which you can see several examples of in the literature.&lt;br /&gt;
&lt;br /&gt;
The blackout in 2012, that was a protest and a way of forming an opinion against SOPA among especially American citizens, is fascinating. It is a way of using Internet for activism. But it isn´t really created from a grass root level (which is what I usually think about when I hear the word ’activism’), but from Internet giants like Twitter and Wikipedia. It raises the question ”who has power in today’s society?” I would say that the people behind the largest Internet websites are in a very powerful position. &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 16:58, 26 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
It was interesting reading about the DMCA – or, as Matthew Ingram writes in Gigaom, how the DMCA “fosters bad behavior” – because I had rarely thought about the prominent role of the hosting platform in copyright takedowns before.  The article about NASCAR, as well as the Takedown Hall of Shame, showed how problematic the system is when sites like YouTube immediately bow to commercial powers making takedown requests.  I thought Ingram’s description was very compelling when he wrote that the NASCAR incident was “another case of a commercial entity taking advantage of copyright law to smother free speech.”  (On a related note, I was very sad to discover that Prince, one of my favorite artists, was awarded the Raspberry Beret Lifetime Aggrievement Award for “extraordinary abuses of the takedown process in the name of silencing speech.”)&lt;br /&gt;
&lt;br /&gt;
However, as much as the readings enlightened me about the role of the hosting platform, and the way copyright laws often smother the free speech of those using them, I also found myself wondering what it felt like to be on the other side, that is, to have your work be copied unfairly.  After all, these laws were put into place for a reason, even if they have serious flaws, and as much as I care about free speech, I also care about fair compensation for artists.  This is why Erin McKeown’s article was my favorite reading for the week.  I love that she talks with sincere emotion and compassion about these issues – she cares about compensation of her own work, but she also has empathy for those that seemingly copies it.  I love that she speaks about her ensuing advocacy as wanting to talk about scale, as well as “relationships and power structures.”  She shows that there are valid points on both sides and that while there will always be issues on both sides, an open dialogue could help diffuse a lot of otherwise contentious copyright issues.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 08:19, 27 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The copyright infringement and DMCA article is of particular interest to me.  In the fitness community there are always conversations about rightful uses of images.  I have an associate is a photographer that contracted the one use of an image for a magazine. As what has happened with many other photographers, this image is now being used on the person’s website and used for promotional materials. Looking into the Digital Millennium Copyright Act, what is interesting is that person or website in question must not “... have no actual or effective knowledge that the material in question is infringing.”  I researched quite a few large company websites and actually read through their terms and conditions to find their copyright policies. &lt;br /&gt;
&lt;br /&gt;
In this day and age of selfies, many people take photos and post them online without thinking about their use. I know of one athlete who has had three Facebook profiles created in her image and many of her photos posted on highly suggestive website. Although her images were not sexually suggestive, them being placed on said websites has created havoc on her professional career as she finishes her PhD. Involuntary posting of pictures has the person’s name with it. If your name is Jennifer, it is not as much as a problem as someone with the name Chipo. I wondered how this act would apply to someone’s images being used on a controversial website against their wishes and I came across this great article on how Reddit approaches similar copyright material: http://www.washingtonpost.com/news/the-intersect/wp/2014/09/08/how-copyright-became-the-best-defense-against-revenge-porn/. If there is question over copyright and since there is not a direct method to litigate this issue, it easy to see how Section 230 of the federal Communications Decency Act would protect the ‘free speech’ of the users of the internet community; additionally, images can be copied and reproduced. DMCA’s last point about embedded videos clearly demonstrates how this can be a difficult for victims as sites can potentially continue without recourse. &lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 14:08, 28 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After today’s class reading I can only say that no matter  how  deep you  go  in copyright online subject,  there are always going to be so many  unexplored  aspects left! I had not heard about the Walter Scott shooting video and  after  reading the  article, I realized  that an ordinary, everyday situation of making a video with a cell phone, could grow into a real copyright legal case. However I think the popularity of the case in question  is  coming  not from the  complexity of the IP legal issue but  from the shocking content of the video.  &lt;br /&gt;
&lt;br /&gt;
Although the legal aspects of the copyright  online are an important economical issue, the regulations put in place in order to solve the problems (regulations like SOPA) give the impression they  use the copyright just as an “excuse” and try to regulate “something  more”.  &lt;br /&gt;
&lt;br /&gt;
The NASCAR video case was  really  interesting  because it could be regarded as  a good  example how a copyright case  should be examined from all perspectives and measures  should be  taken  regarding the concrete  situation without prejudices. It should  not  be taken for granted  that  the copyright owners  are  always the “good guys”.&lt;br /&gt;
Regarding the  Bit torrent  websites , I  know  some  of them  are  applying the  “safe –harbor” provisions, stipulated  in the DMCA  by applying &amp;quot;notice-and-takedown&amp;quot; procedures. They remove  content once they are  signalized  by  the copyright owner but not otherwise. Beyond their business model  is  the idea that  big  Hollywood companies  would  not  spend time  and  efforts  chasing  torrent websites all over the net. Claiming they  do  not  know that  User123 is not the  copyright owner of the “Star Wars”, for  example they  would remove the movie from the  torrent website if  they are duly notified. I consider this is  too obvious violation but on the other  hand there is no exception in the  DMCA saying the “safe-harbor” provisions  can not  apply  to torrent websites. &lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The courts have, in the past, been fairly reluctant about taking sides about defining a “journalist” or what constitutes a “news outlet”—there have been instances where a journalist has been defined strictly as an individual who is paid by a news outlet for a significant portion of their yearly income; but then, the problem arises with the existence of fairly reliable or credible and totally freelance news writers who do not qualify as “journalists” under the salary definition attempts to operate under the protective laws that are granted to these more traditional journalists – granted, fair use is not exclusive to journalists, if it were a journalist who recorded the Nascar crash, Nascar would not have dared to take the video down (at least we should hope). &lt;br /&gt;
Google’s refusal to do so was a sound one, and hopefully,  the types of corporate control mentality as expressed in the Nascar “owns everything produced by the ticket holder to its events” is a mentality that will get a future track record of uselessness. In this day and age, we are indeed all witnesses – and sometimes journalists. It is the content and not the source that matters and I was glad to read learn about Google’s actions on the matter. &lt;br /&gt;
&lt;br /&gt;
As for controlling what publicity it has online, the best option for Nascar is not to “own everything ticket holders produce” but to either accept that everyone, at a moment’s notice can become the holder of fair use content, OR Nascar will have to just have all event goers hand over their digital and recording devices at the door. An unpopular track, surely and one they won’t be strange enough to take. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 28 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
Re: Fair use in Inbedded video. I think the measure of whether or not a cell phone video is fair use is if it was intended for commercial use or not. It&#039;s that simple. The video of Walter Scott was taken spontaneously without any profit motive, any one can prove that in court. The same with the NASCAR video, or for that matter the recent video of Freddy Gray in Baltimore. No one goes out with a cell phone in hand to document horrific events to document and sell to news outlets. Only news professionals do and they have a profit or news reporting motive.&lt;br /&gt;
&lt;br /&gt;
The case of the man who took the Walter Scott murder looks crass and opportunistic to try to get any money out of this unfortunate situation, specially the lawyers and the P.R firm they hired. They&#039;re not gonna get a dime from those videos and stills. Also, there comes a point when a video or a still photo become public domain. Once an image that resonates or illustrates a problem perfectly goes viral on the internet, no one can stop its replication or dissemination. What is the definition of public domain? Does it apply to viral videos, whether they are of kittens or gun violence? [[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 15:42, 28 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I really like what Electronic Frontier Foundation is doing. As we had read in previous articles, the big corps and powerful figures know that they would win in copyright lawsuits simply because they have deep pockets and the time to keep going at it. EFF clearly shows us that it is possible to defend the little guy against the bigger corporations with the lawyers and the financial power to back up those bullets. With the enforcement of copyright laws in the digital world (Ref 3), it also makes it consist of huge gray areas that are left for exploitation. EFF does it’s job to maintain individuals’ liberties. &lt;br /&gt;
&lt;br /&gt;
	As stated in eff.org (Ref 4), it tells us of what it views of today’s issues. They are, as I personally also believe, is that the manipulation of copyright laws by big corps and take “away from the right to think and speak freely”. This becomes a huge infringement, not upon copyright and intellectual property, but the fundamental Constitutional right of Freedom of Speech. Where do we draw the line? It is hard to have an equilibrium when only one side has an army. EFF balances this equation to allow the laws on copyright to be closer to equilibrium. &lt;br /&gt;
&lt;br /&gt;
	I have therefore picked one example. I looked at Former Navy Chaplain and Colorado Assembly candidate Gordon Klingenschmitt’s attempt to shut down a YouTube account. (Ref 2) They knew the rules of Youtube, that if there were 3 takedown notices, then YouTube would shut down that channel. It was strategic, and it undermines Freedom of Speech. Equilibrium was only reached when EFF had assisted the case with a threat to take Klingenschmitt to court. &lt;br /&gt;
&lt;br /&gt;
	Despite all the classes and lectures, I still feel that there will be a constant struggle between Freedom of Speech, and the censorship of the internet, and the way big corporations would exploit intellectual property laws to their advantage. This still takes time, but I surely hope we get to some sort of maturity in law making on copyright and Freedom of Speech issues in the digital world. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 - https://www.eff.org/about&lt;br /&gt;
&lt;br /&gt;
Ref 2 - https://www.eff.org/takedowns/attempt-silence-political-speech-right-wing-watch&lt;br /&gt;
&lt;br /&gt;
Ref 3 - https://www.law.cornell.edu/uscode/text/17/512&lt;br /&gt;
&lt;br /&gt;
Ref 4 - https://www.eff.org/about/history&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:43, 28 April 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Peer_Production&amp;diff=4256</id>
		<title>Peer Production</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Peer_Production&amp;diff=4256"/>
		<updated>2015-04-21T19:53:57Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 21&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Although the point may seem obvious now, one of the Internet’s most powerful attributes is how it can facilitate the social production of information or computing. From the earliest experiments with dividing memory-intensive tasks amongst different computers, to modern efforts to crowdsource solutions to challenging or urgent problems, peer production is a major benefit from our networked world. And it raises some interesting questions of both Internet control and production theory: How much hierarchy and control is needed to produce? How good is the material that peer production creates? Are there types of things that should not be produced by the crowd? What are the risks to producers and society inherent to peer production?&lt;br /&gt;
&lt;br /&gt;
Joining us this week is Berkman Fellow [https://cyber.law.harvard.edu/people/sklein SJ Klein].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignments ==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_4:_Rough_Draft|Assignment 4]] is now due on April 28th, but they will be accepted if turned in today. You can submit your assignment [[Assignment_4_Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Development from the edges&lt;br /&gt;
&lt;br /&gt;
* [http://web.mit.edu/evhippel/www/democ1.htm Eric Von Hippel, &#039;&#039;Democratizing Innovation&#039;&#039;] (Chapter 1, focus on pages 1-3 and 13-15, skim rest)&lt;br /&gt;
&lt;br /&gt;
; Development as a crowd&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/events/luncheon/2013/12/hergueux Jerome Hergeaux, Cooperation in a Peer Production Economy: Experimental Evidence from Wikipedia] (video, watch from beginning to 47:50)&lt;br /&gt;
&lt;br /&gt;
* [http://video.mit.edu/watch/news-information-and-the-wealth-of-networks-9187/ Yochai Benkler, News, Information and the Wealth of Networks] (video, watch from 8:32 to 26:07)&lt;br /&gt;
&lt;br /&gt;
:* if you’re not familiar, you may want to spend a little time looking at Wikipedia’s entry on [https://en.wikipedia.org/wiki/Seti@home Seti@home].&lt;br /&gt;
&lt;br /&gt;
* [http://web.media.mit.edu/~cebrian/p78-tang.pdf John Tang et al, Reflecting on the DARPA Red Balloon Challenge (&#039;&#039;Communications of the ACM&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
; Crowd intelligence&lt;br /&gt;
&lt;br /&gt;
* [http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html James Surowiecki, &#039;&#039;The Wisdom of Crowds&#039;&#039;] (read excerpt)&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2006/11/30/cass-sunsteins-infotopia/ Ethan Zuckerman, Review of Cass Sunstein’s “Infotopia”]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2011/10/can-the-internet-bring-the-beginning-of-the-end-of-selfishness/246552/ Can the Internet Bring the Beginning of the End of Selfishness?]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Reliability_of_Wikipedia Wikipedia, Reliability of Wikipedia]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=1uJWwLVkKTU Jonathan Zittrain, Minds for Sale] (video, watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://rcmap.hatnote.com/#en Hatnote, Real Time Wikipedia Changes Map]&lt;br /&gt;
&lt;br /&gt;
* [http://time.com/3040483/congress-wikipedia/ Congress Gets Banned From Editing Wikipedia]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I usually prefer to attend class via the live streaming session because our conversations are brilliant and I learn a lot more, and can contribute much better in that interactive situation. The class has been brilliant.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;That said, I&#039;ve just had a work emergency come up which means I may not make the live portion.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
I wanted to post a memory about SETI@Home... I remember joining in 1999 and had the app running on my computer, 24/7, for YEARS! I always thought it was the coolest collaborative effort utilizing desktops across the globe. I didn&#039;t care whether it found anything or not, I was always mesmerized by the data scrolling across the screen. Yes, it didn&#039;t take much to bedazzle me back then... :)&lt;br /&gt;
&lt;br /&gt;
I started traveling more, and switched from a desktop to a laptop somewhere around 2002-2003 and that ended my SETI installation. I never got around to installing it again.&lt;br /&gt;
&lt;br /&gt;
Also.&lt;br /&gt;
&lt;br /&gt;
Speaking about innovation and technology, I think one of the biggest things to have hit the globe is 3D printing. While still a bit expensive, it still allows people to get into markets and innovate products and inventions almost immediately upon perception rather than struggling with finding someone to build their prototype, let alone finance it.&lt;br /&gt;
&lt;br /&gt;
Eric Von Hippel wrote about an example of how users want to modify their own products, which was spot on. I remember watching an episode of Shark Tank where an inventor had built an electrical connector and had even used 3D modeling to produce a prototype if I recall correctly. I thought that was just about the coolest thing ever. How far technology has come that anyone, anywhere, can create products and services from nothing but their imagination and problem solving.&lt;br /&gt;
&lt;br /&gt;
Another inventor created an auxilary handle for a snow shovel, again, using 3D technology to prototype it. This one I have a link for: http://blog.nextfab.com/join-the-shovelution-from-a-rapid-prototype-to-shark&lt;br /&gt;
&lt;br /&gt;
We have to love the era we are in right now.&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 12:20, 21 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hey all, I&#039;m screening the NYT at work this week and came across two articles that I thought would be relevant to share here: &lt;br /&gt;
&lt;br /&gt;
Fighting homelessness with smartphones (a case for why technology has become a basic need):&lt;br /&gt;
http://www.nytimes.com/2015/04/15/upshot/fighting-homelessness-one-smartphone-at-a-time.html?abt=0002&amp;amp;abg=1&lt;br /&gt;
&lt;br /&gt;
Europe formally challenges Google&#039;s dominance in web searches:&lt;br /&gt;
http://www.nytimes.com/2015/04/16/business/international/european-union-google-antitrust-case.html&lt;br /&gt;
&lt;br /&gt;
Enjoy!&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]])&lt;br /&gt;
&lt;br /&gt;
-----------&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Thumbs up for Zittrain Video&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
I usually post quite late, just before class, in case I think of something profound. Today I am posting early, firstly because experience has taught me profundity is unlikely in the hours remaining, and secondly to leave enough time that you might follow my thumbs-up for the [https://www.youtube.com/watch?v=1uJWwLVkKTU/ Jonathan Zittrain Minds for Sale Video] in the Optional Readings section of today’s assignment page. It is a little over 90 minutes, but I wish it were longer. It illuminates many of the questions I wrote in the margins of my notes on the other readings.  &lt;br /&gt;
&lt;br /&gt;
I was particularly interested in the discussion about the unusual world we are creating for ourselves as we begin to employ diverse human resources to perform tiny increments of work in return for pennies, points in a game, or nothing at all. Zittrain touches on the many imaginative ways that peer production, including the gamification of peer production, is employed.  He asks whether our children will spend their leisure time making a few more dollars on their phones, rather than being a part of real/live activities. It is a fascinating discussion, very well presented.&lt;br /&gt;
&lt;br /&gt;
I highly recommend venturing into this optional reading activity even if you don’t usually go there. If this subject area is at all interesting to you, Zittrain’s video is worthwhile.&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 20:14, 20 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
In honor of peer production I would like to mention that I was inspired by Gary Brown’s post.&lt;br /&gt;
&lt;br /&gt;
Gary, thank you so much for highlighting the “Minds for Sale” video. I agree that it does fill in the blanks and weave together themes from other reading. Zittrain offers a variety of examples of peer production in which communities work together under limited policies and control to benefit the public good. One of my favorite examples was the X Prize. I read about the X Prize in an advanced economics course at Pepperdine while working towards my MBA. Just like in Hergeaux’s Wikipedia experiment, or “Public Goods Game” individuals participating in the X Prize may forego their own financial gains in the event that their social image may be boosted. We can see also, just like in Creative Commons, individuals participating in the X Prize give up “right, title, and interest” to their work. Yet the potential benefit to both an individual company in charge of that specific X Prize, and public at large, can be monumental. &lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 14:18, 21 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While reading Eric Von Hippel’s Democratizing Innovation, particularly the passage about windsurfing, I was reminded of the first in-depth article I read about Twitter.  I started my own account in January of 2009, but I rarely used it until that summer when I read an in-depth article about it in Time magazine.  The article described how Twitter users – not the software team – developed the concept of the hashtag, as well as trending topics.  Since that time, these innovations have more or less come to define Twitter as we know it.  I specifically remember a quote likening Twitter’s use innovation to a group of people buying a toaster and transforming it into a microwave.  This article was directly responsible for my increased usage of Twitter.  At a time when Facebook was making sweeping changes to its platform, often to the dismay of its users, the idea of Twitter’s user-based innovation felt refreshing, democratic, and empowering.&lt;br /&gt;
&lt;br /&gt;
What I was feeling is similar to what Yochai Benkler described about Wikipedia: that it has given us &amp;quot;a way of looking at the world around us and seeing the possibility of effective human cooperation, on really complex, large projects, without relying on either market or government processes” (of course, Twitter itself relies on the market, but its users do not necessarily).  I was also struck by James Surowiecki’s arguments for the wisdom of crowds.  I often fall into a trap of thinking that large groups succumb to the lowest common denominator or develop a mob mentality.  However, the way Twitter users make use of hashtags should constantly be reminding me of the opposite.  Consistently over the past several years, users have redefined media narratives that have traditionally excluded certain voices.  For example, the #yesallwomen and #blacklivesmatter hashtags have given voices to women and African Americans and have launched conversations around gender and race in society in productive ways.  It seems like I constantly hear about how the Internet makes us secluded, narcissistic, and vapid, so it was encouraging to read about the ways large numbers of users contribute to the public good through peer production.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 12:05, 21 April 2015 (EDT)&lt;br /&gt;
---- &lt;br /&gt;
&lt;br /&gt;
While learning about peer production on the internet, twitter came to mind, but also you tube, specifically in regards to the latest cases of police brutality that have been posted on line through You Tube, Instagram and other outlets. Along with the hashtag #blacklives matter, videos of police brutality have been crowd sourced in a non coordinated fashion by individuals and activists groups for many years now, and after all the video-body of evidence has been brought out in the open, a national conversation has begun about police and community relations, as well as racial profiling, the use of force and in general the american criminal justice system.&lt;br /&gt;
&lt;br /&gt;
This is no small feat. No political organization could craft a message like this, no individual group could do it, no individual could ever do this on his own because the scope and complexity of the problem is beyond any one group or person to articulate, even less beginning a plan of action. And yet, comments from people who were not aware of this problem run the gamut of &#039;this country is becoming a police state&#039; to &#039;I never thought it was this bad&#039;. In reality, the problem has existed for the past 20-30 years, its just that now technology (video and phone cameras, plus access to the web)has made the evidence more visible to the general population. Let&#039;s not forget Rodney King&#039;s arrest was videotaped by somebody who happened to have one of those clunky video cameras the size of a briefcase, and the video went viral through the formal media outlets.&lt;br /&gt;
&lt;br /&gt;
This is a form of spontaneous crowd sourcing through an informal (generic) platform and the results have been very specific and focused on a particular problem. [[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 15:02, 21 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Motivations Behind Peer Productions? – Still Fundamentally Selfish&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
While the idea that the Internet will be—and has proven be—the great floodgate opener of magnanimity, global and community cooperation, is a pleasant one, and one that is not wrong, it still seems misguided to say that cooperation is not selfishly motivated – even, perhaps especially, for the Internet. What Benckler’s &#039;&#039;The Penguin and the Leviathan&#039;&#039; (Frick’s Atlantic article) calls the “end of selfishness” is a well-meaning idea that holds water but only to an extent. There is still an argument to be made that community cooperation is at its core, a selfish endeavor and is simply part of human nature. If we help it is either to make ourselves feel better about ourselves or to ease our current and future consciences, or simply to know that we have spent our time well on an effort we deem worthy. Selfishness has its good masks and its bad masks. And the mistake is to say that the Internet, from peer produced efforts, to creative commons, to free software, to Wikipedia, simply because it seems to not support the bad kind of selfishness (on the whole) doesn’t mean it is devoid of the positive selfishness. One might even argue that all this cooperation is still a mask of the most mass positive selfishness humanity has ever experienced. And we still have the Internet to thank.&lt;br /&gt;
&lt;br /&gt;
From what we can gather in Frick’s article, Benckler explores why people take the time and effort to, without monetary gain or recognition even, invest in such activities such as Wikipedia. Benckler explores the many reasons why it may be that we sit down before a screen with seemingly altruistic efforts at contributing to the global pool of knowledge and enlightenment. &lt;br /&gt;
&lt;br /&gt;
The positive selfishness argument can easily make a case that contributing to Wikipedia is an expression of our desire to a) confirm our understanding of a topic, or b) learn more about a topic ourselves.&lt;br /&gt;
&lt;br /&gt;
Take another peer produced community, like, say, a guitar chord community; a place where guitarists will go online and tabulate popular songs for the rest of the community – motivations I think, are largely driven by users who wanted to learn a song, and by participating in a forum like UltimateGuitar.com, they force themselves to not only learn the song they aimed for, but they also get feedback from other users. So these users are not altruistically motivated to contribute to the pool of lost guitarists. They are self motivated – in other words, goodly selfish.&lt;br /&gt;
&lt;br /&gt;
Drawing from my own experience in this class through our assignment editing Wikipedia pages -- something I was never interested in doing before and never understood why friends were so excited about doing it… it wasn’t until I started editing my article that I understood why it was actually FUN: I had chosen a topic I was interested in, but not necessarily an expert in – and even when I KNEW the information I was inputting into the article, I had to find reliable sources to back up my claims. &lt;br /&gt;
&lt;br /&gt;
In the process I learned more about the topic. I found myself enjoying the fact that I was:&lt;br /&gt;
&lt;br /&gt;
1) Confirming knowledge previously held, but most importantly, &lt;br /&gt;
&lt;br /&gt;
2) Furthering knowledge: Learning myself facts and details I didn’t previously know. The last consideration was merely an endorphinesque feeling one gets after an intense run:&lt;br /&gt;
&lt;br /&gt;
3) I was helping contribute to a worldwide web of knowledge about my topic. &lt;br /&gt;
&lt;br /&gt;
While this third consideration was an important one in my experience with the Wikipedia editing assignment, I certainly order it as THIRD behind the first two motivations for contributing anonymously and without compensation.&lt;br /&gt;
&lt;br /&gt;
I would be curious to read Benckler’s &#039;&#039;The Penguin and the Leviathan&#039;&#039; – but this week’s readings clarified ideas about Peer Produced motivations for me. Fundamentally, we are still selfishly motivated; it’s just a question of from what side of the tree we are being driven; the good side or the bad side.&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 15:37, 21 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-------&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The questions raised by Jonathan Zittrain in iLaw 2011: “Minds For Sale” and  in  in their lectures, like  who is standing behind a common achievement, the copyright issues, are particularly  interesting  especially  when adding up Internet.  As the  digital  world is giving almost unlimited possibilities  for anonymity a group work done online is making us ask ourselves to whom the achievements  should be attributed but also  who should be blamed in case of liability engaged?  &lt;br /&gt;
&lt;br /&gt;
James Surowiecki tell us  about experiments leading to the  conclusion that  crowd’s results in completing a task are undeniably better than the results of the cleverest individuals, meaning that  the majority is  always  right. The  philosophy of this postulate has  been largely  discussed both defended  and denied  during the years  and it is out  of the  scope  of today’s reading  to discuss it but what is  important is to  make a difference between  “crowd” and “team”. In the case of the DARPA project balloons  challenge, the  quest was  done  by team of  people  having  similar  way  of thinking, coming  from the same educational  background , trained to think and seek  solutions using similar  methods  and technics. When we talk about randomly assembled individuals acting without having the same  training to deal  with certain situation we could easily come across well-intentioned but chaotic results. Wikipedia project which has been mentioned several times  is  a great  example of group work  but also shows  that  such kind of  activity inevitably need  to  be organised  if  not centralised  and  all those  efforts  should be supervised. In the article  about  Wikipedia’s reliability the authors  have  quoted  the result of an IBM research in 2003 which found that &#039;&#039;&amp;quot;vandalism is usually repaired extremely quickly—so quickly that most users will never see its effects&amp;quot; and concluded that Wikipedia had &amp;quot;surprisingly effective self-healing capabilities&amp;quot;.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
There are areas like education and information, in which the more we  get  the better and  even in case  of misleading  information,  sources could  be cross checked  and  conclusions  could be  grounded differently. On the other  hand  there are  fields in which  using the potential of  the crowdsourcing to solve a problem could  bring  more problems  than  solutions  and than the  main issue of the anonymity in such will be standing  again.&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The best companies often work closely with their customers to uncover needs and wants that can be translated into new or improved product or service offerings. Companies using customer needs and preferences to modify current products into new and improved products and services; and how they are using social media for product innovation. Those using social media for product innovation are gaining business benefits, including more (and better) new product ideas or requirements, faster time to market, faster product adoption, lower product costs, and lower product development costs. According to Kenley and Poston (2015), more than 50% of the companies they surveyed were piloting their social media product innovations to some varying degrees. This has created product improvements, which creates increased market share and product revenue. Here is a link to their article: http://kalypso.com/downloads/insights/Kalypso_Social_Media_and_Product_Innovation_1.pdf. &lt;br /&gt;
&lt;br /&gt;
Reading Von Hippel’s article really illumined the development of products and services over time. Personally, I have seen how many of my peers’ feedback (quite a few engineers) have been incorporated into product development, by merely providing feedback on the product failure and a solution on improving the product. Additionally, it is fascinating how the ability to innovate has become so inexpensive that individuals are filling a product need with very little training. If you look at the current market for phone applications, quite a number are being developed by laypersons. The tools for crafting high-quality developments are now so economical and universally accessible that individuals can innovate for themselves. Here is a great article on how a 12 year old learning to code and developing 5 apps: http://venturebeat.com/2013/08/14/this-12-year-old-kid-learned-to-code-on-codecademy-built-5-apps-and-is-speaking-at-sxsw/&lt;br /&gt;
&lt;br /&gt;
Here is an interesting article writing about Uber and Airbnb as examples peer production (though not technologically) https://theumlaut.com/2014/04/09/how-uber-and-airbnb-resurrect-dead-capital/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:47, 21 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The peer production’s existence would not appear without the participation and acceptance of the people around them. This brings out the best in people. This in fact would contribute to the final product. Yet I do agree with Zuckerman (ref 1), that it could be a two edged sword. To guess a jar of beans, if we are all equally likely to guess it, then the higher the sample, the more likely the mean is close to the actual number. Yet it was also true for the reverse if the likelihood was less than 50%. So that gives the quick summary of the advantages and disadvantages of peer production. It could yield great production due to the contribution of everyone, but it could also encounter problems that makes things worse.&lt;br /&gt;
&lt;br /&gt;
Of course, when we focus on the optimistic; we could see that peer production does have its merits when done right. With peer production, a permission would not be required. More and more are accepting of it, such as the use of open source software that increases more collaboration on the internet. And as the video tells us (ref 2), after 5 years of Wikipedia’s creation, the accuracy of Britannia and Wikipedia were both considered “bad”; so in a way they were of the same level. Why then should peer production be excluded out then? It brings speedy information out which would be beneficial to news channels; such as obtaining photos, etc. I also like the idea of peer production for collaborations between teachers. I can’t exactly see what kind of strategies would be used; but I do see the value in this. &lt;br /&gt;
&lt;br /&gt;
I’d like to draw upon the following quote.&lt;br /&gt;
&lt;br /&gt;
“Social sharing and exchange emerge as a major modality of economic production” – Ref 2&lt;br /&gt;
&lt;br /&gt;
I believe this is an important part of the video. Social sharing would become a big part of economic production. This also brings us to wonder what kind of regime are we under. This does sound a little… socialism in a way. Social sharing? Providing a little input for the common goal of something? Yet aren’t we under a capitalistic structure? Or has this shaped to be a hybrid of some sort. The internet may provide the type of regime we may eventually see in the future. The purpose of social sharing, peer production has been expressed quite strongly. It’s benefits and advantages could be seen too. If it’s good enough for BBC, then it must have it’s value somewhere.&lt;br /&gt;
&lt;br /&gt;
Since I’m in finance, I’d like to talk about the collective evaluation of prices. As Hayek believes, it is the collective market’s participants that would derive in a just price for a product, it should also be the case for temperature, price of items, etc. I do understand and agree with Hayek that the market’s way of deriving in the correct price is always right. Afterall, the collective thoughts of millions must beat that of a few smart men. Though I do see the vulnerabilities of this. The advantages of this would only lie in things that could be quantified. Prices, weight, temperature, etc. It is, in my opinion, extremely faulty when dealing with ideas, ideals, thoughts, etc. Those issues cannot result in a mass deliberation that brings us closer to choosing the right regime, or some sort of universal justice we’ll all agree upon. In this sense, the greatest benefit of peer production would be formed on issues that could be quantified. Things that could not be quantified could achieve well if it were for a collective goal of producing something. If it were for some sort of deliberation, it would be extremely hard; and quite plausibly make us get further from the truth.&lt;br /&gt;
&lt;br /&gt;
If we were to look at current examples on the internet that was a form of peer production, I think we need not look further than Twitter. It is fast, efficient, and quickly sharable of information. Retweets also help make a tweet more important to be viewed by the masses. Though as I mentioned above, these could have draw backs as well. If a piece of news is faulty, that would become viral in minutes, but costly the victim quite a bit of embarrassment. This power of peer production has it’s advantages and disadvantages, but as of now, I do not believe there is any way to control this. I think I am more interested in looking at peer production more of a regime form… sort of a light rhyme to socialism if you may. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 - http://www.ethanzuckerman.com/blog/2006/11/30/cass-sunsteins-infotopia/&lt;br /&gt;
&lt;br /&gt;
Ref 2 - http://video.mit.edu/watch/news-information-and-the-wealth-of-networks-9187/&lt;br /&gt;
&lt;br /&gt;
Ref 3 - http://www.randomhouse.com/features/wisdomofcrowds/excerpt.html&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:53, 21 April 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Internet_Governance_and_Governments&amp;diff=4206</id>
		<title>Internet Governance and Governments</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Internet_Governance_and_Governments&amp;diff=4206"/>
		<updated>2015-04-14T18:19:35Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 14&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Today we revisit a topic that began in the first class day and has run throughout: who should control the Internet, and how. Three different powers have come to fill that role at the largest levels: governments, corporations, and multistakeholder organizations. Each will invariably have some role to play in how the Internet is run at various levels, but what is the right balance of power? What calibration of powers is most beneficial to the general public? Is one type of power more dangerous than another? Are there examples we can draw from other areas of complex governance to help us develop a plan for governance of the Internet? And what would be the harm if there were no controlling parties at all?&lt;br /&gt;
&lt;br /&gt;
Leading the conversation today will be our own [http://cyber.law.harvard.edu/people/rbudish Ryan Budish].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2549270 The Global Multistakeholder Meeting on the Future of Internet Governance in &#039;Multistakeholder as Governance Groups: Observations from Case Studies&#039; ] (case study on p. 214-237)&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Global_Multistakeholder_Meeting_on_the_Future_of_Internet_Governance NETmundial, Wikipedia]&lt;br /&gt;
&lt;br /&gt;
* [http://www.apnic.net/community/iana-transition/IANA-Factsheet.pdf Explained: The IANA Transition]&lt;br /&gt;
&lt;br /&gt;
* [http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf Milton Mueller and Brenden Kuerbis, Roadmap for globalizing IANA: Four principles and a proposal for reform]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=SyfpPJo2gnA Jonathan Zittrain and L. Gordon Crovitz Debate the Future of Internet Governance]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf NETmundial Output Document and Principles]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hey class, I just read this op-ed by David Brooks on his stance on cop-cams. Though he&#039;s ultimately for cop cams he makes an eloquent case for privacy and the harms that could come from arming police with cameras. I thought it was a nice compliment to our own discussions around online privacy. Take a look --&amp;gt; http://www.nytimes.com/2015/04/14/opinion/david-brooks-the-lost-language-of-privacy.html&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 09:49, 14 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-------------&lt;br /&gt;
&lt;br /&gt;
Conversation about who controls the Internet - mainly governments or corporations - in the United States is extremely challenging in its own right, but when the discussion extends globally, we have a real mess on our hands. Different countries have such a vast range of the concept of censorship, and therefor both policy and legislation differ dramatically on the global scale. The various mentions of China versus California state law in the Zittrain and Crovitz debate caught my attention because of my own experience with the country and the state of California. I first studied China during economics and business courses in my undergrad while living in California. At the time I became a huge proponent of privatization and of course corporate control (better, faster, cheaper! competition!). I decided to go to China when I graduated expecting to hate it after studying it, but I really enjoyed myself. Despite the phenomenal government, economic, and humanitarian issues in China… the country was in a much better position that I expected. And having since visited, I have made friends with a few girls who grew up in China. Despite the very obvious censorship that we are aware of and I saw myself - from television to newspapers to Internet - the people I met have a surprisingly accurate view of their government and the world. The Internet and digital communication are the main sources of up to date and uncolored information in countries whose government policies favor censorship. One of the points that really resonated with me in this video we watched was that American values are being spread through the Internet to countries that do not have them. The fact that ICANN can have a global reach and still follow California state law supports that. Now that ICANN has moved into international control, the debate against this organization pushing US imperialism will subside. I believe that we are moving in the right direction, with walls of censorship being taken down even in Russia, Iran, and India, specifically on the Internet. Ultimately, however, the two main problems going forward as I see them are that ICANN platforms presented by individual countries (outside of the United States) will reflect their government policy, which does not always reflect the best interest of their people and that whatever agreements are made within ICANN (such as Internet Bill of Rights) will be difficult to enforce, especially in sophisticated and wealthy authoritarian governments.&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 12:57, 14 April 2015 (EDT)&lt;br /&gt;
------------&lt;br /&gt;
&lt;br /&gt;
I actually found this week´s reading quite difficult to understand, so I´m looking forward to class. It was a lot of technical talk that was hard to grasp, for example exactly what the possible solutions are, even though I understood parts of it.&lt;br /&gt;
&lt;br /&gt;
What I perceived was that the U.S. has power over ICANN (until this fall) and that it is problematic, since the Internet should be independent from any specific government. &lt;br /&gt;
&lt;br /&gt;
I also begun to reflect about lobbyists and their power over the Internet. We´ve seen how lobbying earlier have been successful in other issues about the Internet, such as net neutrality. I wonder how powerful lobbyists are when it comes to these matters? The following quote about the meeting in Brazil is interesting since it also is about giving/not giving power to different groups: ”Other efforts were also made to treat contributions from a diverse range of stakeholders equitably. There were four microphones, labeled with construction paper and color-coded for governments, corporations, academics, and advocacy groups”. &lt;br /&gt;
&lt;br /&gt;
That sounds fair, since the labeling of the microphones makes it difficult to hide where your interest are. However, there is always someone setting the agenda for the meeting and deciding who is welcome and not (in this case the smaller Executive Multistakeholder Committee). That someone (a person or a group, in this case a group) has consequently a lot of power. There are always informal power structures at meetings, which affect who is listened to. We sometimes think about the Internet as a free space, independent from governments and the market and without anyone who really governs it. In reality, that is not the case. The Internet is in many ways affected by powerful groups, both formally and informally.&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 13:16, 14 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Today’s readings and especially the debate between Jonathan Zittrain and Gordon Crovitz, were very useful in order to answer myself what part of Internet is actually controlled and what impact this  control has  over the Internet final users. &lt;br /&gt;
&lt;br /&gt;
I also asked myself the same question, many people are asking, should it continue the same way and in what direction things need to be changed and see diferent points of view on this. Gordon Crovittz says that he sees more potential problems than positive results if US government gives up the control over ICANN in order to have multi governments control but the reality is that many other countries wants to have their part in it. A very nice explanation of the actual influence of the US government has been given by Milton Mueller and Brenden Kuerbis which answers the question why IANA is actually subject to U.S. jurisdiction and provides America with greater political influence over ICANN. &lt;br /&gt;
&lt;br /&gt;
Events like the NETmundial are a sign that many governments have already realized the importance and power of the Internet governance and feel they have been “left behind”. This is the reason international conferences and initiatives like NETmundial, have been organized. But we are still talking about the influence over ICANN, meaning over he domain names, in certain way. The position Jonathan Zittrain is defending, saying that we should not forget domain names do not equal Internet and actually ICANN is not the one who is deciding what is going to happen in the Internet generally, should be taken into account. The fact that this organization is having authority over the domain names but not over the content or the application of the net neutrality, should  not be neglected. I agree that the conditions under which mass surveillance may be permitted, as well as the role of the search engines, which stayed out of the final text of the NETmundial’s final document, seems to be far more crucial than the management and the control over the  domain names. &lt;br /&gt;
In order to establish a new order in the Internet governance many players and interests will be mixed up. The fact that the requirement for the Internet search companies to establish local data centers, was not included in the Brazilian Civil Rights Framework for the Internet as originally envisioned, due to effective lobbying by Internet companies, shows us  that a many  long and difficult battles  are going to be led.&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Indeed, from what others on the forum are posting, this was a short reading list but not one to speed through for non-techies… Zittrain’s article on New Republic discussing ICANN put it so well in summing up the rudderless discussion about the great “unowned technology” that is the Internet: it’s confusing. There’s “[n]othing to see here, but Internet governance matters, so go on and get involved.” But for the less optimistic advocates of human nature, for a voice to say there’s nothing to see instantly means something is hiding – and in this case,  somewhere in the great and tangled mass that is domain names, ISPs, owned and unowned technologies, and a baffling array of systems that the layman grows cross-eyed trying to understand. &lt;br /&gt;
&lt;br /&gt;
Ultimately, given a choice, this latest move to put everything in the hands of ICANN doesn’t to my layman’s eyes, seem outright egregious… given the two evils I’d rather have a corporation, motivated by success and money, to maintain these kinds of controls instead of the State, operating in bureaucratic stasis and power-intrigues. I found Zittrain’s article, if not a little uncomfortably flippant about potential threats that the March 14 handover has brought about, overall very illuminating.  “The Internet is a collective hallucination, one of the best humanity has ever generated.” Only this hallucination is confusingly real. And hallucinations are only “owned” by the eyes of the beholder – in turn, perhaps this principle applies to these policy “decisions” made by various states over a (mostly) stateless entity. &lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:16, 14 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I’m going to start off by giving some of my personal thoughts on the issue of “who should control the internet”. I believe this fundamental issue could be traced to the regime we have, the basic “rights” that we instilled into our population. (assuming its all about US) Lets start off by looking at who controls the flow of information. Without the internet, it appears to me that information is mostly controlled by the government. I mean, we do see the general public transferring information around, but they are restricted by their geographical location. Even with the creation of telegrams and telephones, the reliability of long distance information transfer was still minimal, and this transfer of information was pricy, as well as the target audience would likely be the recipient that the caller knows. &lt;br /&gt;
&lt;br /&gt;
The next form of communication prior to the internet was news agencies. They would spread the information of recent happenings in the form of newspapers. It is a more efficient means of transferring information, but that too is dependent on the source they have. For example, a news agency’s news is only as accurate as the information they get, and where they get it. If their source does not release any information, then they get nothing. These sources would consider twice before releasing sensitive material, as the information releasing market isn’t very efficient, it would be easier to trace who did it; thus it’s easier for the government to pinpoint the traitor (if necessary). &lt;br /&gt;
&lt;br /&gt;
So if you ask me who controls information prior to the internet? I believe it is the government. Or at least a big chunk of it would be controlled by the government. The government dictates laws and regulations on news corporations. The limitations of information transfer due to technology meant that the small players (individual citizens) were taken out of the equation to have the “power” to control data flow. The real “meat” of the information we “hope” to be transparent was under the control of the government, and the government has their control over what gets released. If a traitor plans to release data, I believe the efficiency of it would be very low, and it would be easy to trace this individual, thus preventing potential traitors.&lt;br /&gt;
&lt;br /&gt;
We need not look too far away. Edward Snowden was a classic example of something that would only happen with the invention of the internet. Without the internet, he would need to think twice before releasing information. Furthermore, the news agency that he would have leaked it to, would also think twice before releasing it. So it makes it more difficult to do this. With the internet, it was simply a click of the button, and everyone would be public. &lt;br /&gt;
&lt;br /&gt;
I like the idea of NetMundial Initiative. (Ref 1) The internet has boomed and developed so quickly that regulations could not go at the same pace. There is no universal governing of the internet. This sort of rings a bell about currencies. That too has no world central bank or something, and thus we always see these violent and volatile movements in the forex market. I believe that the internet is similar as that. It needs some sort of universal regulation or standard to unify things. Though ofcourse it does not always satisfy all parties during the meeting. &lt;br /&gt;
&lt;br /&gt;
Even though NetMundial was a good thing to do, it was going to be hard to make all parties agree with each other’s philosophies. The issue on net neutrality was not addressed either. It went from supporting it, to saying it requires more discussion. (Ref 3) I believe net neutrality will always be a tricky one. It’s hard to agree on this entirely. It also depends deeply on the regime of that country and their core fundamental beliefs. For example, America has very different beliefs than China does. America is a democracy after all with constitutional beliefs for freedom of speech. China is a one party country that may consider too much freedom of speech to be dangerous; not only to the party’s strength, but other reasons too. &lt;br /&gt;
&lt;br /&gt;
The other interesting point I’d like to point out is the issue on surveillance. There is not real “limit” to the surveillance that governments can use. I believe this too also has aligned interests from all governments. All governments have the incentive to have as much information as possible. This would make it easy to agree with one another. The phrase “necessary and proportionate” is too broad and is subject to interpretation; thus a limit is not identified. (Ref 3)&lt;br /&gt;
&lt;br /&gt;
I particularly like the Root zone management where it “align incentives to ensure the accuracy and security of root zone maintenance”. I’m a big believer that when people have aligned interests, things get done much more efficiently. Such as to win a game, all players want to help each other achieve this goal. (ref 2)&lt;br /&gt;
&lt;br /&gt;
“A better method would be to put IANA functions in the hands of actors with a strong self-interest in ensuring timely service, security and accuracy.” (ref 2)&lt;br /&gt;
&lt;br /&gt;
This explains how it could be done to align the interests. I agree with it too. (ref 2) &lt;br /&gt;
&lt;br /&gt;
So after much consideration, I do believe that government surveillance, monitoring, and censorship will be inevitable. There is no way around it. They will do it for sure. As long as we have government, they’d assume they know what’s best for us, and would like to keep tabs on our activities. We may get more transparency due to the freedom to write and share what we like and to receive data quickly from multiple sources, but at the end of the day, the government will monitor (as much as possible) on the types of data that is being shared. Though an internet with no government is rather scary as well. It will be open to hackers, and similar to capitalism; it is susceptible to monopoly. The internet could also be susceptible to hackers dominating the system and controlling data flow to only distribute what they want it to be. Of course all these scenarios are a little extreme; but if we use the assumption of capitalism and monopolies, it does make sense. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 - http://en.wikipedia.org/wiki/NetMundial_Initiative&lt;br /&gt;
&lt;br /&gt;
Ref 2 - http://www.internetgovernance.org/wordpress/wp-content/uploads/ICANNreformglobalizingIANAfinal.pdf&lt;br /&gt;
&lt;br /&gt;
Ref 3 - http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2549270&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 14:19, 14 April 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Copyright,_Day_1:_Guiding_Principles_and_the_Special_Case_of_Anti-Circumvention&amp;diff=4189</id>
		<title>Copyright, Day 1: Guiding Principles and the Special Case of Anti-Circumvention</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Copyright,_Day_1:_Guiding_Principles_and_the_Special_Case_of_Anti-Circumvention&amp;diff=4189"/>
		<updated>2015-04-07T19:57:35Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 7&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost. The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to recut, reframe, and recycle previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. Over the next two classes, this course will take up the some of the issues related to copyright protection and enforcement online. This class will focus on the legal regime of copyright: what it protects, what it doesn’t protect, and how the doctrine has transformed in light of digital reproduction and distribution. It will also explore a subset of copyright law known as “anti-circumvention,” a very controversial solution to the problem of digital piracy.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/aenriquez Ana Enriquez], who work&#039;s on Berkman&#039;s [http://cyber.law.harvard.edu/teaching/copyrightx CopyrightX] project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The mechanics of copyright law&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Copyright_Clause Wikipedia, Copyright Clause]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Circular 1: Copyright Basics] (read only Who Can Claim Copyright?, What Works Are Protected?, What is Not Protected by Copyright?, How to Secure a Copyright, and How Long Copyright Protection Endures)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/text/17/107 17 U.S.C. § 107 - Limitations on Exclusive Rights: Fair Use]&lt;br /&gt;
&lt;br /&gt;
; Digital applications and new challenges&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688 Lawrence Lessig, It is About Time: Getting Our Values around Copyright] (watch first 6 minutes)&lt;br /&gt;
&lt;br /&gt;
; Copyright solutions&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=1DKm96Ftfko Creative Commons, A Shared Culture] (video, watch all) and [http://wiki.creativecommons.org/Spectrumofrights_Comic1 Spectrum of Rights]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyhype.com/2012/08/there-is-no-magic-bullet/ Terry Hart, There is No Magic Bullet]&lt;br /&gt;
&lt;br /&gt;
* [http://www.uspto.gov/news/publications/copyrightgreenpaper.pdf U.S. Department of Commerce: Internet Policy Task Force, Copyright Policy, Creativity, and Innovation in the Digital Economy] (Executive summary only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/docs/next_great_copyright_act.pdf Maria Pallante, The Next Great Copyright Act] (skim Section II (323-339) only)&lt;br /&gt;
&lt;br /&gt;
:* Maria Pallante is the [https://en.wikipedia.org/wiki/Register_of_Copyrights Register of Copyrights] for the United States.&lt;br /&gt;
&lt;br /&gt;
; Case Study&lt;br /&gt;
&lt;br /&gt;
* [http://www.cakewrecks.com/home/2012/11/9/ways-to-play-it-safe.html Cake Wrecks, Ways to Play it Safe]&lt;br /&gt;
&lt;br /&gt;
; Anti-Circumvention&lt;br /&gt;
&lt;br /&gt;
* [https://www.chillingeffects.org/topics/12 Chilling Effects, Anticircumention (DMCA)] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/legal-guide/circumventing-copyright-controls Digital Media Law Project, Circumventing Copyright Controls]&lt;br /&gt;
&lt;br /&gt;
* [http://cyberlawclinic.berkman.harvard.edu/2015/02/10/defending-research-into-medical-devices/ Cyberlaw Clinic, Defending Research into Medical Devices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=2HQVBmKsVhI Lewis Hyde, Common As Air: Revolution, Art, and Ownership] (video, watch from 2:12 to 24:37)&lt;br /&gt;
&lt;br /&gt;
* [http://www-personal.umich.edu/~jdlitman/papers/read.htm Jessica Litman, The Exclusive Right to Read] (introduction and Sections I and II only)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2008/10/dodgy-digits-behind-the-war-on-piracy/ Julian Sanchez, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bloomsburyacademic.com/view/Remix_9781849662505/chapter-ba-9781849662505-chapter-0001.xml Lawrence Lessig, &#039;&#039;Remix: Making Art and Culture Thrive in the Hybrid Economy&#039;&#039;] (Introduction only)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Pharrell Williams - Marvin Gaye - Copyright Kerkuffle. In a court decision last week in Los Angeles, musicians=producers Robin Thicke and Pharell williams were ordered to pay 7.3 million dollars for copyright infringement to the family of Marvin Gaye for the publication of the song &amp;quot;Blurred Lines&amp;quot;. It alleges that Williams/Thike plagarized Marvin Gayes 1970&#039;s hit &amp;quot;Got to Give it Up&amp;quot;, (awesome groove)and the previous standard of 30 bars of identical notes and rythm was pretty much blown out.&lt;br /&gt;
http://www.rollingstone.com/music/news/robin-thicke-and-pharrell-lose-blurred-lines-lawsuit-20150310&lt;br /&gt;
&lt;br /&gt;
Apparently the lawyers for the musicians did a terrible job, beginning with the jury selection Did the people sitting on that jury have any idea of where rap came from? Or that the blues is made of eight basic drumbeats? Or that the essence of folk art is repetition, imitation and variations on a theme. &lt;br /&gt;
https://onpoint.wbur.org/2015/03/17/blurred-lines-copyright-robin-thicke-marvin-gaye-pharell&lt;br /&gt;
&lt;br /&gt;
Pharell/Thicke should appeal the ruling and set the record straight. Likeness is not plagiarism. It has to be an exact copy. Besides, has any one heard the two songs, back to back, (Blurred lines, Give it Up) they may have the same drum groove, bu there is no way they are the same song. The bass line is totally different for starters.&lt;br /&gt;
&lt;br /&gt;
Of course, it didn&#039;t help  Mr. Thicke and Mr. Williams, admitting that they were drunk and on drugs in the studio when they were recording the song and didn&#039;t remember exactly how the song was composed. But the repercussions for copyright law, if this ruling goes unchallenged,is that pretty much any one can sue another person for copyright infringement in the music biz.&lt;br /&gt;
&lt;br /&gt;
I&#039;m with the camp that the ruling stifles creativity and will swamp the industry with lawsuits. I&#039;m not so interested in the big acts, but more in the independent musician/DJ/producer who can be blindsided with a law suit from someone he has never heard of.  What do you all think? &lt;br /&gt;
&lt;br /&gt;
http://www.theguardian.com/music/2015/mar/20/pharrell-blurred-lines-copyright-lawsuit-stifle-creativity&lt;br /&gt;
&lt;br /&gt;
[[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 22:01, 6 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----- &lt;br /&gt;
&lt;br /&gt;
Hromero here, wanted to add some assigned reading references to the issue of copyright in music. The Pharrell Williams-Margin Gaye copyright issue also affects royalties. When it comes to sampling bits of songs and other sound recordings, the current system is too complex, too burdensome and more work that is really worth. For example, Pnadora pays performance royalties to new artists on the range of .007 cents per play, meaning a song has to be played 700 times to earn 70 cents. What&#039;s the point? Exposure? Artist can get half the exposure on another medium and make three times more money. Re: Internet Policy Task force. Just the outlines of those regulations in regards to original and derivative work, performance and broadcast royalties can be mind numbing. It doesn&#039;t need to be that complex. I agree with Maria Pallante that there needs to be a new copyright law that fits better with the internet. It was fine in the old days when you could follow a paper trail and the speed of the transactions was relatively slow. That is not the case today.&lt;br /&gt;
&lt;br /&gt;
Also, about creativity being stiffled, that is not a huge deal. Artists are coming up against limitations day in and day out and they produce art no matter what. For some the limitation may be money, for other it may be time. Notice that the only one who have a hard time producing work, (writers block, spending one month recording a song) are those artists with unlimited resources and time. [[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 08:41, 7 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Copyright law is complex. It protects the inventor or creator but can sometimes be negative for the audience or society as a whole. Copyright law has become more and more important and plays a much greater part now than it has done in the past, which is a result of the evolution of technology.&lt;br /&gt;
&lt;br /&gt;
Copyright law is essential when it comes to protecting the creators. Without the law, others would be able to make money on other people´s work, which in my opinion isn´t fair. However, as with almost every other law, it isn´t perfect. One example is when it comes to inventions that could be improved but isn´t because of obstacles created by copyright law. Also, we have the example of Creative Commons, a forum for creators to legally share their work since they see copyright law as an obstacle to do that in other ways. &lt;br /&gt;
&lt;br /&gt;
I would say that I nowadays mostly hear about copyright law when it comes to piracy, eg. sharing and accessing copyright protected material online. One of the texts in the readings of this week talks about Pirate Parties, parties that are pro free information. The first Pirate Party was founded in 2006, and since then has this type of party been established in several countries across the globe. The reason for why I bring this up is that I see it as a sign of how much the significance and effect of copyright law has changed in recent years. Just a decade ago, we weren´t able to access and spread for example music the way we are today. If you wanted to hear a specific song, you either bought the CD, you listened to it in the (physical) store, or you waited for it to be played on the radio. As we all know, that is not what we do today. If I want to hear a song, I listen to spotify. And if it isn´t accessible there, I search for it on youtube. This has changed the whole entertainment industry (along with several other creative industries) and that is why an improved copyright law (if that means greater or weaker protection for the creator can be debated) is of great importance. &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 04:18, 7 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I have always been interested in how technology affects art and visa versa.  For example, as a movie geek, it’s fascinating to observe how an entire new art form was born based on technologic innovations in the late 19th century, and how subsequent innovations have shaped it.  I have also been interested in the way the Internet has shaped movies, tv shows, and even home videos.  However, it wasn’t until this week’s readings that I thought about how much copyright around these works plays a part in my consumption on online media and how it even shapes the production of the content itself.  &lt;br /&gt;
&lt;br /&gt;
Terry Hart’s idea “mark piracy harder, make legal options easier” resonated with me, since in my personal experience, I often to defer to consuming media through the easiest legal option.  Much like the example he outlined, I am often willing to pay for content on Amazon.com because of how easy it is to access. Amazon has an extremely diverse library, it is a trusted source, and it even stores my payment information, which improves ease of use.  On the other hand, certain pieces of content (older episodes of Saturday Night Live come to mind) take great pains to keep themselves off of sites like YouTube, but also are not accessible on Amazon.com.  In this case, they seem to be making legal options as difficult as possible, and I would imagine it leads to increased piracy of this content.&lt;br /&gt;
&lt;br /&gt;
This reminds me of a related debate currently happening around music content and streaming services.  The recent press event promoting the Tidal music streaming service was interesting to me for this reason.  It is hard to disagree with the artist claims that they deserve more money from their music than services like Spotify provide.  But it also seems like Tidal is asking people to do the “right” thing, rather than the “easy” thing, especially because it costs almost twice as much as its competitors.  Recently, artists have started releasing “Tidal exclusives” which seems like a step in the right direction if it wants to get people on board, but I’m still dubious about how much the service can prove it is the easiest option.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 10:24, 7 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
&lt;br /&gt;
Beccalew, you bring up some interesting points. Asking people to do the right thing is not the most efficient marketing tool, that&#039;s almost like asking customers to &#039;pay what you can&#039;. The better model would be to make music recordings as accessible as amazon.com is for books. But here we run into another problem. Music has been brought into the copyright protection the same way that books by authors were. The difference is that while music can be replicated and performed limitless times, books can&#039;t be performed by others, as easily as music is. Maria Pallante in the &#039;The next great copyright act&amp;quot; brings up this point that musicians are at a distinct disadvantage in current copyright law, because no one pays for performance rights. But even if there was a law to enforce payments on performance of music, it would be unenforceable because people perform others music in countless of ways at bars, living rooms, country fairs and such without ever paying any performance royalties. &lt;br /&gt;
&lt;br /&gt;
Another point on Maria Pallante&#039;s article that sticks out is that the only venue available for authors of creative content to enforce copyright infringement is a Federal Court. That is way too intimidating for a new or unknown artist to bring up a complaint, and the stakes are too high for both sides, so if you don&#039;t have the money to hire a lawyer, you&#039;re at a disadvantage.&lt;br /&gt;
&lt;br /&gt;
There ought to be a streamlined process to deal with copyright infringement in claims of less than $ 500 because a new or unknown artist should be able to hold on to his or her copyright, the reason being that the protected work may be profitable many years afterward. [[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 15:21, 7 April 2015 (EDT) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Michael Smith essentially argues that it is the market that will ultimately eliminate the problem of piracy – not only that, other non-market factors will also help resolve key issues in anti-piracy legislation; ease of access, variety, pricing, reliability, quality… that the general public, if a product is cheap enough and easier to get by legal means vs. free, illegal, and cumbersome to attain, the value of “free” becomes significantly diminished and obeying the law is very common-sensibly incentivized. &lt;br /&gt;
&lt;br /&gt;
That said, there will always be that group, that slice in society that on principle alone, will continue to cumbersomely work around the laws in order to undermine the system. It is a lifestyle for some, an identity for others, and, from Coleman’s video from last week on Anonymous, an image and persona that is increasingly glamorized and on the edges of the novel.&lt;br /&gt;
&lt;br /&gt;
Boston’s own history is somewhat of a testament to the allegory that pure economics can sometimes fail… Consider the parallel of the Sugar Act: American smugglers found it eminently more profitable to smuggle sugar by bypassing the taxes demanded by Mother England; consumers bought cheaper, smuggled sugar. No one stopped it. The law was weakly enforced; but when this weak-enforcement suddenly changed and taxes were being collected by British tax collectors and smuggling was clamped down, the smugglers upped their game; they made even greater profits. England, realizing a losing battle, changed everything again, through the market by adjusting the tax so that the LEGAL means was even cheaper than the SMUGGLER’S means. So the American people were expected to follow the law just under the sheer principle of pricing – legal sugar was cheaper sugar. The backlash from the smugglers ultimately resulted in societal upendings and a fundamental shift in the political landscape. Americans bought from Americans out of sheer principle. The details of this particular history are far more fascinating than I can surmise in this comment box, and certainly there are details overlooked. But the spirit of the thing is the very same spirit we face with this discussion of market based incentives for fighting piracy. &lt;br /&gt;
&lt;br /&gt;
For the most part, I agree with the Smith line of arguing. Make the product cheaper, more reliable, more accessible, and just all around easier to use, and the basic incentive to gymnastically seek out the illegal means to attain low quality digital media for free are quite effectively tampered out. But the other side, the “whack a mole” perspective about Internet piracy are also right. Just not to the extent that they think that legal/market resolutions are impracticable; they are right to the extent that the CULTURE of piracy is never going to quite go away. Diminished, disempowered, waysided, but, not annihilated. For, humanity will always have a sliver of its kind who possess perverse and inseparable attractions to rebelling societal norms.&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:23, 7 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
Beccalew, when I came across the readings this week, I immediately thought about the new streaming service, Tidal.  For those who are not aware, here is an article that give an overview on how this service is different from others: http://www.theguardian.com/music/2015/apr/05/tidal-10-things-you-need-to-know-jay-z-madonna-music-streaming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Approximately a decade ago, I wanted began to study law in England because I was interested in international intellectual property; more specifically, the rights of athletes’ image in the domestic US and abroad. Historically, the NCAA required all athletes to sign releases, which would allow for their images to be managed in order to endorse NCAA events.  For about over a decade the NCAA has made millions of dollars on the images of college athletes through television broadcasting, merchandising and advertising. The legality regarding the licensing of their images gained traction as athletes began to question copyright entitlements and initiated a lawsuit against the NCAA.  &lt;br /&gt;
&lt;br /&gt;
Here is a wonderful timeline about the NCAA lawsuit: http://www.ncaa.org/about/resources/media-center/press-releases/student-athlete-likeness-lawsuit-timeline. As stated in the timeline, athletes wanted the NCAA and institutions to allow athletes the opportunity to profit from the revenue. Due to recent lawsuits, the NCAA dropped the requirement of athletes signing image releases; although at the conference level (SEC, PAC 12, BIG 12 etc) athletes are often still required to sign waivers that give up their publicity rights without compensation. Where my main position of advocacy for athletes is for the gaps in college expenses and funding.  If you think across all three divisions, very few athletes are fortunate to receive full funding that cover tuition, fees, books, room and board. Given their practice and schedules, most athletes would like to work in a manner that optimizes their income with very little time required; but NCAA athletes did not have the ability to use their image for gain, this includes modeling, public speaking or having a funded blog.  &lt;br /&gt;
&lt;br /&gt;
In August 2014, Federal Judge Claudia Wilken concluded that the NCAA could not prohibit schools from giving football and men’s basketball players a share of licensing revenue; but it would have to manifest in the form of a stipend that reimburses expenses not covered by scholarships and a $5,000 a year trust fund once students graduate.  Here is a link that outlines the full ruling: https://ia601404.us.archive.org/35/items/gov.uscourts.cand.218079/gov.uscourts.cand.218079.291.0.pdf. &lt;br /&gt;
Although the court made a remedy addressing the antitrust breaches by eliminating some practices, it still does not address the copyright issues pertaining to the monopoly over college athlete images. How does this ruling benefit athletes outside of large revenue generating football and men’s basketball athletic programs of Division I schools? How does this ruling benefit the gymnasts, track and field athletes, and women’s basketball players with established financial need? &lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 14:26, 7 April 2015 (EDT)&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
The  Copyright in Internet  seams  to  be the Pandora’s box.  Everyone, starting from Lawrence Lessig in his beautiful lecture, seams to agree that copyright today “touches everyone and everything”, quoting Jessica Litman.  It is very much true  that because of the  platform we use to access  creations  we can not escape the collision with the  copyright law. Exactly because of this  what should be better developed both in the legislation and  in the practical use  should  be  the  “fair  use” as well as the “customised copyright” the Creative Commons is offering. What is done by CC team is a simple and easy way to express your own opinion about how  you want  your work to be treated. I truly believe that  if  more  people were aware of the CC idea  and principle and mostly of the fact that by using  CC license  they would not  “give up” their  rights , more people  would use  it. The possibility given to authors and creators by  CC to choose  between different  options and “levels” of  protection, I think is the  key  to its success. &lt;br /&gt;
&lt;br /&gt;
The article written by Terry Hart is a  very interesting analyses and the perfect prove why copyright is truly a Pandora’s box issue. His article  could be perfectly synthesised  by the phrase “make piracy harder, make legal options easier”. The solution can not be making  half of the  population (even more  maybe) criminals and skyrocketing sentences and penalties for  copyright infringement. I believe users  and mostly  Internet  users, who are particularly freedom-loving, should be convinced not to make copyright infringement. Тhey should  be led and guided to the  right  choice of not  doing this. Exactly  like Terry Hart says: “Make piracy harder, make legal options easier”. On the other hand I dare to disagree with him saying that  it is “insane” to think that copyright  protection legal measures could lead to  too much surveillance  and personal freedom restrictions. I  consider this  a real  danger , which  should be taken into consideration.&lt;br /&gt;
&lt;br /&gt;
I really enjoyed  reading about the “Cake Wrecks” case. In a situation when a customer  buys,  a cake , pays  for  it and than makes  a photo, could the case  be regulated  under the provisions of Section 101 of the copyright law defines a “work made for hire” (U.S. Copyright Office, Circular 1: Copyright Basics)?&lt;br /&gt;
And last but not least , I think that  when we  talk about copyright, people are mostly associating  it  with movie and musical industries but there are a lot of other types  of “original works of authorship” which should be considered as well. In the  U.S. Copyright Office, Circular 1: Copyright Basics I did not saw how  are treated  mathematical theorems, for  example. Such kind of a work was not situated neither in the “What Works Are Protected?” Section, nor in the “What Is Not Protected by Copyright” Section?&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;How Can a Dissertaion Paper Be Hazardous Material?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This week’s readings hit home with me more than most of those past.  The point is made in several of the works presented: in the past copyright was not a matter for daily life, but now, as Lessig notes, copyright “touches everyone and everything” and just about all digital uses are copies.  Couple this fact with the narrow limitations of fair use, and the anti-circumvention laws, and I see my daily work, particularly researching a paper for class as a hazard rather than an opportunity.  &lt;br /&gt;
&lt;br /&gt;
Recently I downloaded an MIT Masters Candidates’ paper (Trepte, Kai and Narayanaswarmy. “Forecasting Consumer Products Using Prediction Markets” MIT. Jun 2009.) through Harvard Library.  When I opened the PDF file and began reading in Adobe Acrobat®, I discovered that I could not highlight text.  So, I thought I would just select text and copy it to my notes; I could not copy text either.  Okay, I decided to print it out, all 106 pages, mark it with a highlighter and write my notes in the margins; I could not print it. I also could not add my own comments to the document or change the document in any way.  &lt;br /&gt;
&lt;br /&gt;
Using the tools available in Acrobat, I looked at the document’s security properties and found that it was password protected. Just about everything was restricted: “printing, changing the document, document assembly, content copying, page extraction, commenting….”  So, even though I could access the document, and could not use it in a normal and reasonable way as I had expected to be able to do.&lt;br /&gt;
&lt;br /&gt;
This weekend I read on the DMLP website that if I were to download a program (a circumvention tool) and use it to remove the password, thereby circumventing both copy and perhaps some level of access protection, I could be violating federal copyright laws, i.e., 17 U.S.C. § 1201(a)(1), and the owners of the website that sell the program would also be violating the law by offering and providing the tools to me. &lt;br /&gt;
&lt;br /&gt;
Even though I just want to highlight some of the text to make finding relevant portions more accessible, or copy an excerpt to fairly use in my paper, I find that doing so could be a federal crime, a felony, with a possible fine of $500,000 and five years in a federal prison, or a $1 million fine and ten years if I wanted to highlight another dissertation.  “Fair use,” I say.  Fair use is not a defense says the law.&lt;br /&gt;
&lt;br /&gt;
So, is it homework or hazard to do research? I ask you.&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:51, 7 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This copyright issue is pretty interesting. I’d start off by talking about the video by Lessig. It gives a nice summary about what copyright is and how it was in the past compared with now. Thanks to the internet, everything we touch now is going to be related to copyright. (Ref 1) Whether we like it or not, there will likely be some connection. Prior to the internet, we had unregulated and regulated issues; such as the example of books having different uses and whether it touches upon copyright issues due to it being part of the unregulated or regulated area. This becomes increasingly tricky with the internet. This platform creates – as the video says – a “copy” of everything that it transmits. This touches all parts of the unregulated vs. regulated issue. How exactly do we define copyright then? Does it violate copyright? I think these are all interesting issues. (Ref 1) This is probably a good starting point to explain why the internet has experienced so many copyright issues since its birth. Perhaps next we can use a quote from reference 2 – copyright green paper – below. &lt;br /&gt;
&lt;br /&gt;
“Some would argue that copyright protection and the free flow of information are inextricably at odds”&lt;br /&gt;
&lt;br /&gt;
Is that statement /quote valid above? Does copyright protection and free flow of information always at odds with one another? The internet created a platform for transferring data and information between multiple parties. It would inevitably create versions of each product. This is just the nature of the internet. If we look back at the unregulated vs. regulated laws of copyright, then it would seem that the existence of the internet is to be at odds with copyright. If the purpose and function of the internet is the “free flow of information”, as it dramatically excels; then copyright is precisely limiting this ability of the internet. So there are some truths to copyright and the internet being at odds. I shall talk further about creative commons below. (I do find it an interesting direction of where copyright should go) Let me first continue by quoting another part of the reading as well. &lt;br /&gt;
&lt;br /&gt;
The ultimate goal is to find, as then-Secretary of Commerce Gary Locke explained, “the sweet spot on Internet policy – one that ensures the Internet remains an engine of creativity and innovation; and a place where we do a better job protecting against piracy of copyrighted works.” – Ref 2&lt;br /&gt;
&lt;br /&gt;
This is what Locke truly believes in. He believes that a “sweet spot” could be achieved on the internet. As of now, to be honest, I do not know if it exists. As long as our definition of copyright is built upon those unregulated vs. regulated issues as mentioned above, I do not see it working. Though there is a plausibility that if the definition of copyright is different, such as the duration of holding said material. Or better yet, have a way to know when these materials are used or downloaded by the client, and charge them for it. Reference 3 gets exactly into this. We have cheaper alternatives, but most people would end up going back to Amazon, or big websites. Copyright is limiting the reach and reliability of those websites that breach copyright. Plus in my personal opinion, I believe people like convenience. If convenience is not an issue, then we would gladly fork out a couple of dollars for whatever the product is. We just like neatly organized things presented to us. So along this train of thought, it seems that copyright needs to be redefined, and reevaluated for it to suit the internet. The internet is a new platform, and its existence is a violation of the old copyright laws. (Ref 4) I shall once again quote two more quotes below. &lt;br /&gt;
&lt;br /&gt;
“the next great copyright act must be forward thinking but flexible, and, no matter what, it must serve the public interest.” – Ref 5&lt;br /&gt;
&lt;br /&gt;
“Thus, Congress has a central equation to consider today: what does and does not belong under a copyright owner’s control?” – Ref 5&lt;br /&gt;
&lt;br /&gt;
The first quote lets us know that many understand that “something” needs to be done. Something that is “forward thinking but flexible”, which is exactly what I said above. We need something new to define copyright, not the old stuff that is old of sync with current matters. So we could say, people understand something needs to be done, but we don’t know “what” needs to be done. Or “how” it must be done. This is definitely a hard one as the physical world could simplify and assist our logic of how copyright would be infringed upon. Digital society makes it a lot harder. Are we to base upon possession of things like the physical world? But wait, if we do it that way, it isn’t right because that’s not even how to digital world runs; it runs in binary, and it inevitably will create a copy of it. It’s just how the machines are run. So if we have laws to regulate the physical world, why are we trying to regulate the digital world based upon the laws of the physical world? Should we in fact make something “new”? I understand all of this is just talk, but it is extremely hard to pinpoint that “new” thing that should be created. If I knew exactly what to do, I won’t be here. &lt;br /&gt;
&lt;br /&gt;
I guess what my thought process is, is to lead towards the direction of creative commons. It is… an interesting concept. Though I am not sure if that tackles the issue entirely. My pain concern does come with why we should govern the digital world with physical world’s laws. The underlying issue and formation isn’t even the same. We need to evaluate how the digital world operates in order for the correct copyright laws to be passed. My thinking goes a bit like this; if the physical world – being constrained by geography, and the inability for a product (say a book) be at two places at once – is confined by the rules of physics, the act of infringement upon copyright would depend on the regulated laws mentioned in Lessig’s video. This makes sense because we can relate to it and picture it rationally of how interactions occur in real life. Digital world on the other hand are bits being passed through tubes from one side of the world to another. Let’s ignore the fact that they are far away geographically, but simply that it is an exchange of information. By it’s world’s rules, it creates a copy of the product before sending. After all, even if this product is “de-referenced” – meaning that the pointer no longer remembers the location of where it saved the information, thus assumes it as being deleted – it can theoretically be found again if some algorithm was created. Therefore we need laws that either…&lt;br /&gt;
&lt;br /&gt;
1. Regulate the transfer of these “data” in a systematic way. The downside though would be surveillance. &lt;br /&gt;
&lt;br /&gt;
2. Automatically assume people would share it, and charge some universal fee for the data before hand. This is plausible because with economies of scale, and the scalability of the internet, it may only cost each user a very small amount. &lt;br /&gt;
&lt;br /&gt;
Personally I am not sure where creative commons is going, but it appears that they have the understanding that regulation means suppressing creativity. If they could sort out copyright somehow, it would give people less fear and more power to use their creativity to generate more masterpieces. Personally I am more inclined for my 2nd suggested solution. Not sure if it’ll work, but I guess it’s a start. I look at how a lot of subscription websites operate, it seems very plausible. People get loads of songs on Spotify, or a lot of movies from Netflix, etc, etc. It appears that this efficiency and speed of the internet may be the way copyright could evolve for the internet. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 -  http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688&lt;br /&gt;
&lt;br /&gt;
Ref 2 - http://www.uspto.gov/sites/default/files/news/publications/copyrightgreenpaper.pdf&lt;br /&gt;
&lt;br /&gt;
Ref 3 - http://www.copyhype.com/2012/08/there-is-no-magic-bullet/&lt;br /&gt;
&lt;br /&gt;
Ref 4 - https://en.wikipedia.org/wiki/Copyright_Clause&lt;br /&gt;
&lt;br /&gt;
Ref 5 - http://www.copyright.gov/docs/next_great_copyright_act.pdf&lt;br /&gt;
&lt;br /&gt;
Ref 6 - https://www.youtube.com/watch?v=1DKm96Ftfko&lt;br /&gt;
&lt;br /&gt;
Ref 7 - https://www.law.cornell.edu/uscode/text/17/107&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:56, 7 April 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Copyright,_Day_1:_Guiding_Principles_and_the_Special_Case_of_Anti-Circumvention&amp;diff=4188</id>
		<title>Copyright, Day 1: Guiding Principles and the Special Case of Anti-Circumvention</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Copyright,_Day_1:_Guiding_Principles_and_the_Special_Case_of_Anti-Circumvention&amp;diff=4188"/>
		<updated>2015-04-07T19:56:57Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;April 7&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has enabled individuals to become involved in the production of media and to distribute their contributions widely at a very low cost. The former bastion of the entertainment industry is opening up to what many are calling a democratization of culture. The copyright doctrine of fair use seemingly bolsters the right to recut, reframe, and recycle previous works, but the protection fair use gives to those re-purposing copyrighted material is notoriously uncertain. Over the next two classes, this course will take up the some of the issues related to copyright protection and enforcement online. This class will focus on the legal regime of copyright: what it protects, what it doesn’t protect, and how the doctrine has transformed in light of digital reproduction and distribution. It will also explore a subset of copyright law known as “anti-circumvention,” a very controversial solution to the problem of digital piracy.&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/aenriquez Ana Enriquez], who work&#039;s on Berkman&#039;s [http://cyber.law.harvard.edu/teaching/copyrightx CopyrightX] project.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; The mechanics of copyright law&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Copyright_Clause Wikipedia, Copyright Clause]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/circs/circ01.pdf U.S. Copyright Office, Circular 1: Copyright Basics] (read only Who Can Claim Copyright?, What Works Are Protected?, What is Not Protected by Copyright?, How to Secure a Copyright, and How Long Copyright Protection Endures)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.cornell.edu/uscode/text/17/107 17 U.S.C. § 107 - Limitations on Exclusive Rights: Fair Use]&lt;br /&gt;
&lt;br /&gt;
; Digital applications and new challenges&lt;br /&gt;
&lt;br /&gt;
* [http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688 Lawrence Lessig, It is About Time: Getting Our Values around Copyright] (watch first 6 minutes)&lt;br /&gt;
&lt;br /&gt;
; Copyright solutions&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=1DKm96Ftfko Creative Commons, A Shared Culture] (video, watch all) and [http://wiki.creativecommons.org/Spectrumofrights_Comic1 Spectrum of Rights]&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyhype.com/2012/08/there-is-no-magic-bullet/ Terry Hart, There is No Magic Bullet]&lt;br /&gt;
&lt;br /&gt;
* [http://www.uspto.gov/news/publications/copyrightgreenpaper.pdf U.S. Department of Commerce: Internet Policy Task Force, Copyright Policy, Creativity, and Innovation in the Digital Economy] (Executive summary only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.copyright.gov/docs/next_great_copyright_act.pdf Maria Pallante, The Next Great Copyright Act] (skim Section II (323-339) only)&lt;br /&gt;
&lt;br /&gt;
:* Maria Pallante is the [https://en.wikipedia.org/wiki/Register_of_Copyrights Register of Copyrights] for the United States.&lt;br /&gt;
&lt;br /&gt;
; Case Study&lt;br /&gt;
&lt;br /&gt;
* [http://www.cakewrecks.com/home/2012/11/9/ways-to-play-it-safe.html Cake Wrecks, Ways to Play it Safe]&lt;br /&gt;
&lt;br /&gt;
; Anti-Circumvention&lt;br /&gt;
&lt;br /&gt;
* [https://www.chillingeffects.org/topics/12 Chilling Effects, Anticircumention (DMCA)] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/legal-guide/circumventing-copyright-controls Digital Media Law Project, Circumventing Copyright Controls]&lt;br /&gt;
&lt;br /&gt;
* [http://cyberlawclinic.berkman.harvard.edu/2015/02/10/defending-research-into-medical-devices/ Cyberlaw Clinic, Defending Research into Medical Devices]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=2HQVBmKsVhI Lewis Hyde, Common As Air: Revolution, Art, and Ownership] (video, watch from 2:12 to 24:37)&lt;br /&gt;
&lt;br /&gt;
* [http://www-personal.umich.edu/~jdlitman/papers/read.htm Jessica Litman, The Exclusive Right to Read] (introduction and Sections I and II only)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2008/10/dodgy-digits-behind-the-war-on-piracy/ Julian Sanchez, Ars Technica, 750,000 Lost Jobs? The Dodgy Digits Behind the War on Piracy]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bloomsburyacademic.com/view/Remix_9781849662505/chapter-ba-9781849662505-chapter-0001.xml Lawrence Lessig, &#039;&#039;Remix: Making Art and Culture Thrive in the Hybrid Economy&#039;&#039;] (Introduction only)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Pharrell Williams - Marvin Gaye - Copyright Kerkuffle. In a court decision last week in Los Angeles, musicians=producers Robin Thicke and Pharell williams were ordered to pay 7.3 million dollars for copyright infringement to the family of Marvin Gaye for the publication of the song &amp;quot;Blurred Lines&amp;quot;. It alleges that Williams/Thike plagarized Marvin Gayes 1970&#039;s hit &amp;quot;Got to Give it Up&amp;quot;, (awesome groove)and the previous standard of 30 bars of identical notes and rythm was pretty much blown out.&lt;br /&gt;
http://www.rollingstone.com/music/news/robin-thicke-and-pharrell-lose-blurred-lines-lawsuit-20150310&lt;br /&gt;
&lt;br /&gt;
Apparently the lawyers for the musicians did a terrible job, beginning with the jury selection Did the people sitting on that jury have any idea of where rap came from? Or that the blues is made of eight basic drumbeats? Or that the essence of folk art is repetition, imitation and variations on a theme. &lt;br /&gt;
https://onpoint.wbur.org/2015/03/17/blurred-lines-copyright-robin-thicke-marvin-gaye-pharell&lt;br /&gt;
&lt;br /&gt;
Pharell/Thicke should appeal the ruling and set the record straight. Likeness is not plagiarism. It has to be an exact copy. Besides, has any one heard the two songs, back to back, (Blurred lines, Give it Up) they may have the same drum groove, bu there is no way they are the same song. The bass line is totally different for starters.&lt;br /&gt;
&lt;br /&gt;
Of course, it didn&#039;t help  Mr. Thicke and Mr. Williams, admitting that they were drunk and on drugs in the studio when they were recording the song and didn&#039;t remember exactly how the song was composed. But the repercussions for copyright law, if this ruling goes unchallenged,is that pretty much any one can sue another person for copyright infringement in the music biz.&lt;br /&gt;
&lt;br /&gt;
I&#039;m with the camp that the ruling stifles creativity and will swamp the industry with lawsuits. I&#039;m not so interested in the big acts, but more in the independent musician/DJ/producer who can be blindsided with a law suit from someone he has never heard of.  What do you all think? &lt;br /&gt;
&lt;br /&gt;
http://www.theguardian.com/music/2015/mar/20/pharrell-blurred-lines-copyright-lawsuit-stifle-creativity&lt;br /&gt;
&lt;br /&gt;
[[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 22:01, 6 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----- &lt;br /&gt;
&lt;br /&gt;
Hromero here, wanted to add some assigned reading references to the issue of copyright in music. The Pharrell Williams-Margin Gaye copyright issue also affects royalties. When it comes to sampling bits of songs and other sound recordings, the current system is too complex, too burdensome and more work that is really worth. For example, Pnadora pays performance royalties to new artists on the range of .007 cents per play, meaning a song has to be played 700 times to earn 70 cents. What&#039;s the point? Exposure? Artist can get half the exposure on another medium and make three times more money. Re: Internet Policy Task force. Just the outlines of those regulations in regards to original and derivative work, performance and broadcast royalties can be mind numbing. It doesn&#039;t need to be that complex. I agree with Maria Pallante that there needs to be a new copyright law that fits better with the internet. It was fine in the old days when you could follow a paper trail and the speed of the transactions was relatively slow. That is not the case today.&lt;br /&gt;
&lt;br /&gt;
Also, about creativity being stiffled, that is not a huge deal. Artists are coming up against limitations day in and day out and they produce art no matter what. For some the limitation may be money, for other it may be time. Notice that the only one who have a hard time producing work, (writers block, spending one month recording a song) are those artists with unlimited resources and time. [[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 08:41, 7 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Copyright law is complex. It protects the inventor or creator but can sometimes be negative for the audience or society as a whole. Copyright law has become more and more important and plays a much greater part now than it has done in the past, which is a result of the evolution of technology.&lt;br /&gt;
&lt;br /&gt;
Copyright law is essential when it comes to protecting the creators. Without the law, others would be able to make money on other people´s work, which in my opinion isn´t fair. However, as with almost every other law, it isn´t perfect. One example is when it comes to inventions that could be improved but isn´t because of obstacles created by copyright law. Also, we have the example of Creative Commons, a forum for creators to legally share their work since they see copyright law as an obstacle to do that in other ways. &lt;br /&gt;
&lt;br /&gt;
I would say that I nowadays mostly hear about copyright law when it comes to piracy, eg. sharing and accessing copyright protected material online. One of the texts in the readings of this week talks about Pirate Parties, parties that are pro free information. The first Pirate Party was founded in 2006, and since then has this type of party been established in several countries across the globe. The reason for why I bring this up is that I see it as a sign of how much the significance and effect of copyright law has changed in recent years. Just a decade ago, we weren´t able to access and spread for example music the way we are today. If you wanted to hear a specific song, you either bought the CD, you listened to it in the (physical) store, or you waited for it to be played on the radio. As we all know, that is not what we do today. If I want to hear a song, I listen to spotify. And if it isn´t accessible there, I search for it on youtube. This has changed the whole entertainment industry (along with several other creative industries) and that is why an improved copyright law (if that means greater or weaker protection for the creator can be debated) is of great importance. &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 04:18, 7 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I have always been interested in how technology affects art and visa versa.  For example, as a movie geek, it’s fascinating to observe how an entire new art form was born based on technologic innovations in the late 19th century, and how subsequent innovations have shaped it.  I have also been interested in the way the Internet has shaped movies, tv shows, and even home videos.  However, it wasn’t until this week’s readings that I thought about how much copyright around these works plays a part in my consumption on online media and how it even shapes the production of the content itself.  &lt;br /&gt;
&lt;br /&gt;
Terry Hart’s idea “mark piracy harder, make legal options easier” resonated with me, since in my personal experience, I often to defer to consuming media through the easiest legal option.  Much like the example he outlined, I am often willing to pay for content on Amazon.com because of how easy it is to access. Amazon has an extremely diverse library, it is a trusted source, and it even stores my payment information, which improves ease of use.  On the other hand, certain pieces of content (older episodes of Saturday Night Live come to mind) take great pains to keep themselves off of sites like YouTube, but also are not accessible on Amazon.com.  In this case, they seem to be making legal options as difficult as possible, and I would imagine it leads to increased piracy of this content.&lt;br /&gt;
&lt;br /&gt;
This reminds me of a related debate currently happening around music content and streaming services.  The recent press event promoting the Tidal music streaming service was interesting to me for this reason.  It is hard to disagree with the artist claims that they deserve more money from their music than services like Spotify provide.  But it also seems like Tidal is asking people to do the “right” thing, rather than the “easy” thing, especially because it costs almost twice as much as its competitors.  Recently, artists have started releasing “Tidal exclusives” which seems like a step in the right direction if it wants to get people on board, but I’m still dubious about how much the service can prove it is the easiest option.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 10:24, 7 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
&lt;br /&gt;
Beccalew, you bring up some interesting points. Asking people to do the right thing is not the most efficient marketing tool, that&#039;s almost like asking customers to &#039;pay what you can&#039;. The better model would be to make music recordings as accessible as amazon.com is for books. But here we run into another problem. Music has been brought into the copyright protection the same way that books by authors were. The difference is that while music can be replicated and performed limitless times, books can&#039;t be performed by others, as easily as music is. Maria Pallante in the &#039;The next great copyright act&amp;quot; brings up this point that musicians are at a distinct disadvantage in current copyright law, because no one pays for performance rights. But even if there was a law to enforce payments on performance of music, it would be unenforceable because people perform others music in countless of ways at bars, living rooms, country fairs and such without ever paying any performance royalties. &lt;br /&gt;
&lt;br /&gt;
Another point on Maria Pallante&#039;s article that sticks out is that the only venue available for authors of creative content to enforce copyright infringement is a Federal Court. That is way too intimidating for a new or unknown artist to bring up a complaint, and the stakes are too high for both sides, so if you don&#039;t have the money to hire a lawyer, you&#039;re at a disadvantage.&lt;br /&gt;
&lt;br /&gt;
There ought to be a streamlined process to deal with copyright infringement in claims of less than $ 500 because a new or unknown artist should be able to hold on to his or her copyright, the reason being that the protected work may be profitable many years afterward. [[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 15:21, 7 April 2015 (EDT) &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Michael Smith essentially argues that it is the market that will ultimately eliminate the problem of piracy – not only that, other non-market factors will also help resolve key issues in anti-piracy legislation; ease of access, variety, pricing, reliability, quality… that the general public, if a product is cheap enough and easier to get by legal means vs. free, illegal, and cumbersome to attain, the value of “free” becomes significantly diminished and obeying the law is very common-sensibly incentivized. &lt;br /&gt;
&lt;br /&gt;
That said, there will always be that group, that slice in society that on principle alone, will continue to cumbersomely work around the laws in order to undermine the system. It is a lifestyle for some, an identity for others, and, from Coleman’s video from last week on Anonymous, an image and persona that is increasingly glamorized and on the edges of the novel.&lt;br /&gt;
&lt;br /&gt;
Boston’s own history is somewhat of a testament to the allegory that pure economics can sometimes fail… Consider the parallel of the Sugar Act: American smugglers found it eminently more profitable to smuggle sugar by bypassing the taxes demanded by Mother England; consumers bought cheaper, smuggled sugar. No one stopped it. The law was weakly enforced; but when this weak-enforcement suddenly changed and taxes were being collected by British tax collectors and smuggling was clamped down, the smugglers upped their game; they made even greater profits. England, realizing a losing battle, changed everything again, through the market by adjusting the tax so that the LEGAL means was even cheaper than the SMUGGLER’S means. So the American people were expected to follow the law just under the sheer principle of pricing – legal sugar was cheaper sugar. The backlash from the smugglers ultimately resulted in societal upendings and a fundamental shift in the political landscape. Americans bought from Americans out of sheer principle. The details of this particular history are far more fascinating than I can surmise in this comment box, and certainly there are details overlooked. But the spirit of the thing is the very same spirit we face with this discussion of market based incentives for fighting piracy. &lt;br /&gt;
&lt;br /&gt;
For the most part, I agree with the Smith line of arguing. Make the product cheaper, more reliable, more accessible, and just all around easier to use, and the basic incentive to gymnastically seek out the illegal means to attain low quality digital media for free are quite effectively tampered out. But the other side, the “whack a mole” perspective about Internet piracy are also right. Just not to the extent that they think that legal/market resolutions are impracticable; they are right to the extent that the CULTURE of piracy is never going to quite go away. Diminished, disempowered, waysided, but, not annihilated. For, humanity will always have a sliver of its kind who possess perverse and inseparable attractions to rebelling societal norms.&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:23, 7 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
Beccalew, when I came across the readings this week, I immediately thought about the new streaming service, Tidal.  For those who are not aware, here is an article that give an overview on how this service is different from others: http://www.theguardian.com/music/2015/apr/05/tidal-10-things-you-need-to-know-jay-z-madonna-music-streaming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Approximately a decade ago, I wanted began to study law in England because I was interested in international intellectual property; more specifically, the rights of athletes’ image in the domestic US and abroad. Historically, the NCAA required all athletes to sign releases, which would allow for their images to be managed in order to endorse NCAA events.  For about over a decade the NCAA has made millions of dollars on the images of college athletes through television broadcasting, merchandising and advertising. The legality regarding the licensing of their images gained traction as athletes began to question copyright entitlements and initiated a lawsuit against the NCAA.  &lt;br /&gt;
&lt;br /&gt;
Here is a wonderful timeline about the NCAA lawsuit: http://www.ncaa.org/about/resources/media-center/press-releases/student-athlete-likeness-lawsuit-timeline. As stated in the timeline, athletes wanted the NCAA and institutions to allow athletes the opportunity to profit from the revenue. Due to recent lawsuits, the NCAA dropped the requirement of athletes signing image releases; although at the conference level (SEC, PAC 12, BIG 12 etc) athletes are often still required to sign waivers that give up their publicity rights without compensation. Where my main position of advocacy for athletes is for the gaps in college expenses and funding.  If you think across all three divisions, very few athletes are fortunate to receive full funding that cover tuition, fees, books, room and board. Given their practice and schedules, most athletes would like to work in a manner that optimizes their income with very little time required; but NCAA athletes did not have the ability to use their image for gain, this includes modeling, public speaking or having a funded blog.  &lt;br /&gt;
&lt;br /&gt;
In August 2014, Federal Judge Claudia Wilken concluded that the NCAA could not prohibit schools from giving football and men’s basketball players a share of licensing revenue; but it would have to manifest in the form of a stipend that reimburses expenses not covered by scholarships and a $5,000 a year trust fund once students graduate.  Here is a link that outlines the full ruling: https://ia601404.us.archive.org/35/items/gov.uscourts.cand.218079/gov.uscourts.cand.218079.291.0.pdf. &lt;br /&gt;
Although the court made a remedy addressing the antitrust breaches by eliminating some practices, it still does not address the copyright issues pertaining to the monopoly over college athlete images. How does this ruling benefit athletes outside of large revenue generating football and men’s basketball athletic programs of Division I schools? How does this ruling benefit the gymnasts, track and field athletes, and women’s basketball players with established financial need? &lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 14:26, 7 April 2015 (EDT)&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
The  Copyright in Internet  seams  to  be the Pandora’s box.  Everyone, starting from Lawrence Lessig in his beautiful lecture, seams to agree that copyright today “touches everyone and everything”, quoting Jessica Litman.  It is very much true  that because of the  platform we use to access  creations  we can not escape the collision with the  copyright law. Exactly because of this  what should be better developed both in the legislation and  in the practical use  should  be  the  “fair  use” as well as the “customised copyright” the Creative Commons is offering. What is done by CC team is a simple and easy way to express your own opinion about how  you want  your work to be treated. I truly believe that  if  more  people were aware of the CC idea  and principle and mostly of the fact that by using  CC license  they would not  “give up” their  rights , more people  would use  it. The possibility given to authors and creators by  CC to choose  between different  options and “levels” of  protection, I think is the  key  to its success. &lt;br /&gt;
&lt;br /&gt;
The article written by Terry Hart is a  very interesting analyses and the perfect prove why copyright is truly a Pandora’s box issue. His article  could be perfectly synthesised  by the phrase “make piracy harder, make legal options easier”. The solution can not be making  half of the  population (even more  maybe) criminals and skyrocketing sentences and penalties for  copyright infringement. I believe users  and mostly  Internet  users, who are particularly freedom-loving, should be convinced not to make copyright infringement. Тhey should  be led and guided to the  right  choice of not  doing this. Exactly  like Terry Hart says: “Make piracy harder, make legal options easier”. On the other hand I dare to disagree with him saying that  it is “insane” to think that copyright  protection legal measures could lead to  too much surveillance  and personal freedom restrictions. I  consider this  a real  danger , which  should be taken into consideration.&lt;br /&gt;
&lt;br /&gt;
I really enjoyed  reading about the “Cake Wrecks” case. In a situation when a customer  buys,  a cake , pays  for  it and than makes  a photo, could the case  be regulated  under the provisions of Section 101 of the copyright law defines a “work made for hire” (U.S. Copyright Office, Circular 1: Copyright Basics)?&lt;br /&gt;
And last but not least , I think that  when we  talk about copyright, people are mostly associating  it  with movie and musical industries but there are a lot of other types  of “original works of authorship” which should be considered as well. In the  U.S. Copyright Office, Circular 1: Copyright Basics I did not saw how  are treated  mathematical theorems, for  example. Such kind of a work was not situated neither in the “What Works Are Protected?” Section, nor in the “What Is Not Protected by Copyright” Section?&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;How Can a Dissertaion Paper Be Hazardous Material?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This week’s readings hit home with me more than most of those past.  The point is made in several of the works presented: in the past copyright was not a matter for daily life, but now, as Lessig notes, copyright “touches everyone and everything” and just about all digital uses are copies.  Couple this fact with the narrow limitations of fair use, and the anti-circumvention laws, and I see my daily work, particularly researching a paper for class as a hazard rather than an opportunity.  &lt;br /&gt;
&lt;br /&gt;
Recently I downloaded an MIT Masters Candidates’ paper (Trepte, Kai and Narayanaswarmy. “Forecasting Consumer Products Using Prediction Markets” MIT. Jun 2009.) through Harvard Library.  When I opened the PDF file and began reading in Adobe Acrobat®, I discovered that I could not highlight text.  So, I thought I would just select text and copy it to my notes; I could not copy text either.  Okay, I decided to print it out, all 106 pages, mark it with a highlighter and write my notes in the margins; I could not print it. I also could not add my own comments to the document or change the document in any way.  &lt;br /&gt;
&lt;br /&gt;
Using the tools available in Acrobat, I looked at the document’s security properties and found that it was password protected. Just about everything was restricted: “printing, changing the document, document assembly, content copying, page extraction, commenting….”  So, even though I could access the document, and could not use it in a normal and reasonable way as I had expected to be able to do.&lt;br /&gt;
&lt;br /&gt;
This weekend I read on the DMLP website that if I were to download a program (a circumvention tool) and use it to remove the password, thereby circumventing both copy and perhaps some level of access protection, I could be violating federal copyright laws, i.e., 17 U.S.C. § 1201(a)(1), and the owners of the website that sell the program would also be violating the law by offering and providing the tools to me. &lt;br /&gt;
&lt;br /&gt;
Even though I just want to highlight some of the text to make finding relevant portions more accessible, or copy an excerpt to fairly use in my paper, I find that doing so could be a federal crime, a felony, with a possible fine of $500,000 and five years in a federal prison, or a $1 million fine and ten years if I wanted to highlight another dissertation.  “Fair use,” I say.  Fair use is not a defense says the law.&lt;br /&gt;
&lt;br /&gt;
So, is it homework or hazard to do research? I ask you.&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:51, 7 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This copyright issue is pretty interesting. I’d start off by talking about the video by Lessig. It gives a nice summary about what copyright is and how it was in the past compared with now. Thanks to the internet, everything we touch now is going to be related to copyright. (Ref 1) Whether we like it or not, there will likely be some connection. Prior to the internet, we had unregulated and regulated issues; such as the example of books having different uses and whether it touches upon copyright issues due to it being part of the unregulated or regulated area. This becomes increasingly tricky with the internet. This platform creates – as the video says – a “copy” of everything that it transmits. This touches all parts of the unregulated vs. regulated issue. How exactly do we define copyright then? Does it violate copyright? I think these are all interesting issues. (Ref 1) This is probably a good starting point to explain why the internet has experienced so many copyright issues since its birth. Perhaps next we can use a quote from reference 2 – copyright green paper – below. &lt;br /&gt;
&lt;br /&gt;
“Some would argue that copyright protection and the free flow of information are inextricably at odds”&lt;br /&gt;
&lt;br /&gt;
Is that statement /quote valid above? Does copyright protection and free flow of information always at odds with one another? The internet created a platform for transferring data and information between multiple parties. It would inevitably create versions of each product. This is just the nature of the internet. If we look back at the unregulated vs. regulated laws of copyright, then it would seem that the existence of the internet is to be at odds with copyright. If the purpose and function of the internet is the “free flow of information”, as it dramatically excels; then copyright is precisely limiting this ability of the internet. So there are some truths to copyright and the internet being at odds. I shall talk further about creative commons below. (I do find it an interesting direction of where copyright should go) Let me first continue by quoting another part of the reading as well. &lt;br /&gt;
&lt;br /&gt;
The ultimate goal is to find, as then-Secretary of Commerce Gary Locke explained, “the sweet spot on Internet policy – one that ensures the Internet remains an engine of creativity and innovation; and a place where we do a better job protecting against piracy of copyrighted works.” – Ref 2&lt;br /&gt;
&lt;br /&gt;
This is what Locke truly believes in. He believes that a “sweet spot” could be achieved on the internet. As of now, to be honest, I do not know if it exists. As long as our definition of copyright is built upon those unregulated vs. regulated issues as mentioned above, I do not see it working. Though there is a plausibility that if the definition of copyright is different, such as the duration of holding said material. Or better yet, have a way to know when these materials are used or downloaded by the client, and charge them for it. Reference 3 gets exactly into this. We have cheaper alternatives, but most people would end up going back to Amazon, or big websites. Copyright is limiting the reach and reliability of those websites that breach copyright. Plus in my personal opinion, I believe people like convenience. If convenience is not an issue, then we would gladly fork out a couple of dollars for whatever the product is. We just like neatly organized things presented to us. So along this train of thought, it seems that copyright needs to be redefined, and reevaluated for it to suit the internet. The internet is a new platform, and its existence is a violation of the old copyright laws. (Ref 4) I shall once again quote two more quotes below. &lt;br /&gt;
&lt;br /&gt;
“the next great copyright act must be forward thinking but flexible, and, no matter what, it must serve the public interest.” – Ref 5&lt;br /&gt;
&lt;br /&gt;
“Thus, Congress has a central equation to consider today: what does and does not belong under a copyright owner’s control?” – Ref 5&lt;br /&gt;
&lt;br /&gt;
The first quote lets us know that many understand that “something” needs to be done. Something that is “forward thinking but flexible”, which is exactly what I said above. We need something new to define copyright, not the old stuff that is old of sync with current matters. So we could say, people understand something needs to be done, but we don’t know “what” needs to be done. Or “how” it must be done. This is definitely a hard one as the physical world could simplify and assist our logic of how copyright would be infringed upon. Digital society makes it a lot harder. Are we to base upon possession of things like the physical world? But wait, if we do it that way, it isn’t right because that’s not even how to digital world runs; it runs in binary, and it inevitably will create a copy of it. It’s just how the machines are run. So if we have laws to regulate the physical world, why are we trying to regulate the digital world based upon the laws of the physical world? Should we in fact make something “new”? I understand all of this is just talk, but it is extremely hard to pinpoint that “new” thing that should be created. If I knew exactly what to do, I won’t be here. &lt;br /&gt;
&lt;br /&gt;
I guess what my thought process is, is to lead towards the direction of creative commons. It is… an interesting concept. Though I am not sure if that tackles the issue entirely. My pain concern does come with why we should govern the digital world with physical world’s laws. The underlying issue and formation isn’t even the same. We need to evaluate how the digital world operates in order for the correct copyright laws to be passed. My thinking goes a bit like this; if the physical world – being constrained by geography, and the inability for a product (say a book) be at two places at once – is confined by the rules of physics, the act of infringement upon copyright would depend on the regulated laws mentioned in Lessig’s video. This makes sense because we can relate to it and picture it rationally of how interactions occur in real life. Digital world on the other hand are bits being passed through tubes from one side of the world to another. Let’s ignore the fact that they are far away geographically, but simply that it is an exchange of information. By it’s world’s rules, it creates a copy of the product before sending. After all, even if this product is “de-referenced” – meaning that the pointer no longer remembers the location of where it saved the information, thus assumes it as being deleted – it can theoretically be found again if some algorithm was created. Therefore we need laws that either…&lt;br /&gt;
&lt;br /&gt;
1. Regulate the transfer of these “data” in a systematic way. The downside though would be surveillance. &lt;br /&gt;
2. Automatically assume people would share it, and charge some universal fee for the data before hand. This is plausible because with economies of scale, and the scalability of the internet, it may only cost each user a very small amount. &lt;br /&gt;
&lt;br /&gt;
Personally I am not sure where creative commons is going, but it appears that they have the understanding that regulation means suppressing creativity. If they could sort out copyright somehow, it would give people less fear and more power to use their creativity to generate more masterpieces. Personally I am more inclined for my 2nd suggested solution. Not sure if it’ll work, but I guess it’s a start. I look at how a lot of subscription websites operate, it seems very plausible. People get loads of songs on Spotify, or a lot of movies from Netflix, etc, etc. It appears that this efficiency and speed of the internet may be the way copyright could evolve for the internet. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 -  http://blip.tv/lessig/it-is-about-time-getting-our-values-around-copyright-2847688&lt;br /&gt;
&lt;br /&gt;
Ref 2 - http://www.uspto.gov/sites/default/files/news/publications/copyrightgreenpaper.pdf&lt;br /&gt;
&lt;br /&gt;
Ref 3 - http://www.copyhype.com/2012/08/there-is-no-magic-bullet/&lt;br /&gt;
&lt;br /&gt;
Ref 4 - https://en.wikipedia.org/wiki/Copyright_Clause&lt;br /&gt;
&lt;br /&gt;
Ref 5 - http://www.copyright.gov/docs/next_great_copyright_act.pdf&lt;br /&gt;
&lt;br /&gt;
Ref 6 - https://www.youtube.com/watch?v=1DKm96Ftfko&lt;br /&gt;
&lt;br /&gt;
Ref 7 - https://www.law.cornell.edu/uscode/text/17/107&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:56, 7 April 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4159</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4159"/>
		<updated>2015-03-31T21:00:03Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 31st.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [[Special:Upload|Upload file]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
You can use the same bullet format if you wish:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Abby McHugh (Amchugh)&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039;Thinspiration and the Regulation of Unhealthy Online Weight Loss Content&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Amchugh_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Erika L. Rich&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:LSTU_E120_Erika_Rich_Assignment_3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;http://cyber.law.harvard.edu/is2015/File:Assignment_3_Barstoolsports.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Chanel Rion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; We the Judges: Sitejabber -- Navigating Challenges of User-Generated Review Sites &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Assignment3_Project_Outline.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; MattK&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Does the Hammer Ring True? Assessing the Effectiveness of John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:MattK_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 21:52, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Emily MacIntyre&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Analyzing the Legal Challenges and Chilling Effects of the Nintendo Creator Program through a Representative Survey of Let’s Play Videos and Vlogs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 22:56, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; JosefinS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:JosefinS_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:18, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name or pseudonym&#039;&#039;&#039;: Group: Ginka Todorova, Mishal Kennedy and Natasha Jalbut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;: PROJECT OUTLINE &amp;quot;The impact of the 419Eater.com community on the fight against scam baiting&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to your outline:&#039;&#039;&#039; (the file you uploaded) http://cyber.law.harvard.edu/is2015/sites/is2015/images/Natasha_Mishal_Gia_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User Group:&#039;&#039;&#039; Chelly.Byrne and HRomero&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Balancing Privacy for Victims of Sexual Crimes With Opportunity for Support in Online Forum AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 09:43, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Becca Lewis&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; /r/TwoXChromosomes: Promoting Feminism on Reddit While Upholding the Values of Privacy and Free Speech&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Beccalew_Assignment3.docx&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Alex Samaei&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; The Cyber Curtain Between Creators and Backers On Kickstarter&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039;  http://cyber.law.harvard.edu/is2015/File:InternetFinalOutline.pdf&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Gary Brown&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Crowdsourcing Geospatial Data for Search and Rescue, Disasters, Emergency Operations, and Social Objectives: Tomnod.com&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Gary_Brown_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
Caroline B&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:The_Study_of_Privacy,_Accuracy_%26_Order_on_InsideNova_Website_and_Moving_%E2%80%98Little_Sites%E2%80%99_Up.docx &lt;br /&gt;
&lt;br /&gt;
The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:47, 31 March 2015 (EDT)&lt;br /&gt;
--------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Mhoching&lt;br /&gt;
&lt;br /&gt;
#itooamHarvard: A Case Study of Social Activism through Media Photos &lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/sites/is2015/images/Mhoching_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:40, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
User: batjarks&lt;br /&gt;
Title: Mobile Alliance for Maternal Action: privacy in the context of mobile technology and an internationally accessible reproductive health forum&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:BatjarksAssignment3REAL.pdf&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 16:24, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Caelum&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reddit’s Constant Conflict between Freedom of Speech and their Censorship of Hate Speech and Personal Attacks in it’s Conspiracy Sub-category&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Caelum_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 16:59, 31 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4158</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4158"/>
		<updated>2015-03-31T20:59:23Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 31st.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [[Special:Upload|Upload file]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
You can use the same bullet format if you wish:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Abby McHugh (Amchugh)&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039;Thinspiration and the Regulation of Unhealthy Online Weight Loss Content&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Amchugh_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Erika L. Rich&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:LSTU_E120_Erika_Rich_Assignment_3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;http://cyber.law.harvard.edu/is2015/File:Assignment_3_Barstoolsports.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Chanel Rion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; We the Judges: Sitejabber -- Navigating Challenges of User-Generated Review Sites &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Assignment3_Project_Outline.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; MattK&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Does the Hammer Ring True? Assessing the Effectiveness of John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:MattK_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 21:52, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Emily MacIntyre&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Analyzing the Legal Challenges and Chilling Effects of the Nintendo Creator Program through a Representative Survey of Let’s Play Videos and Vlogs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 22:56, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; JosefinS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:JosefinS_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:18, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name or pseudonym&#039;&#039;&#039;: Group: Ginka Todorova, Mishal Kennedy and Natasha Jalbut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;: PROJECT OUTLINE &amp;quot;The impact of the 419Eater.com community on the fight against scam baiting&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to your outline:&#039;&#039;&#039; (the file you uploaded) http://cyber.law.harvard.edu/is2015/sites/is2015/images/Natasha_Mishal_Gia_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User Group:&#039;&#039;&#039; Chelly.Byrne and HRomero&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Balancing Privacy for Victims of Sexual Crimes With Opportunity for Support in Online Forum AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 09:43, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Becca Lewis&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; /r/TwoXChromosomes: Promoting Feminism on Reddit While Upholding the Values of Privacy and Free Speech&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Beccalew_Assignment3.docx&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Alex Samaei&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; The Cyber Curtain Between Creators and Backers On Kickstarter&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039;  http://cyber.law.harvard.edu/is2015/File:InternetFinalOutline.pdf&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Gary Brown&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Crowdsourcing Geospatial Data for Search and Rescue, Disasters, Emergency Operations, and Social Objectives: Tomnod.com&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Gary_Brown_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
Caroline B&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:The_Study_of_Privacy,_Accuracy_%26_Order_on_InsideNova_Website_and_Moving_%E2%80%98Little_Sites%E2%80%99_Up.docx &lt;br /&gt;
&lt;br /&gt;
The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:47, 31 March 2015 (EDT)&lt;br /&gt;
--------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Mhoching&lt;br /&gt;
&lt;br /&gt;
#itooamHarvard: A Case Study of Social Activism through Media Photos &lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/sites/is2015/images/Mhoching_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:40, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
User: batjarks&lt;br /&gt;
Title: Mobile Alliance for Maternal Action: privacy in the context of mobile technology and an internationally accessible reproductive health forum&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:BatjarksAssignment3REAL.pdf&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 16:24, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Caelum&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; &#039;&#039;&#039;User:&#039;&#039;&#039; Erika L. Rich&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reddit’s Constant Conflict between Freedom of Speech and their Censorship of Hate Speech and Personal Attacks in it’s Conspiracy Sub-category&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:LSTU_E120_Erika_Rich_Assignment_3.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 16:59, 31 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment3.pdf&amp;diff=4157</id>
		<title>File:Caelum Assignment3.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment3.pdf&amp;diff=4157"/>
		<updated>2015-03-31T20:57:38Z</updated>

		<summary type="html">&lt;p&gt;Caelum: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Cybersecurity_and_Computer_Crimes&amp;diff=4094</id>
		<title>Cybersecurity and Computer Crimes</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Cybersecurity_and_Computer_Crimes&amp;diff=4094"/>
		<updated>2015-03-28T21:33:09Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 31&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Last week we looked at hacking as a form of social protest. This week, we take a closer look at the more sinister side of hacking, and the various responses to it. Hacking at its heart involves modifying or intruding upon another’s system. But not all intrusion is socially harmful, and writing laws against hacking have a troubling (and at times, tragic) history of being misused. How big a threat is hacking, really? How should systems respond to hacking? What, if anything, should be the role of government? In what ways can we govern those who don’t consider code to be a governing influence?&lt;br /&gt;
&lt;br /&gt;
== Assignment 3 ==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3]] is due &#039;&#039;before class&#039;&#039; today. [[Assignment_3_Submissions|You can upload that here.]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Cybersecurity&lt;br /&gt;
&lt;br /&gt;
* [http://krebsonsecurity.com/wp-content/uploads/2012/10/HackedPC2012.png Brian Krebs, &amp;quot;The Scrap Value of a Hacked PC (infographic),&amp;quot; Oct 2012]&lt;br /&gt;
* [http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/ Bill Hardekopf, &amp;quot;The Big Data Breaches of 2014, Forbes, January 13, 2015]&lt;br /&gt;
* [http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426 Liana Baker and Jim Finkle, &amp;quot;Sony Playstation suffers massive data breach,&amp;quot; Reuters, April 26, 2011]&lt;br /&gt;
* [http://arstechnica.com/security/2014/12/hackers-promise-christmas-present-sony-pictures-wont-like/ Sean Gallagher, &amp;quot;Hackers Promise &#039;Christmas Present&#039; Sony Pictures Won&#039;t Like,&amp;quot; Ars Technica, December 15, 2015]&lt;br /&gt;
* [http://arstechnica.com/security/2014/12/us-government-fingers-north-korea-as-the-sony-hackers/ Peter Bright, &amp;quot;US Government Fingers North Korea as the Sony Hackers,&amp;quot; Ars Technica, December 17 2014]&lt;br /&gt;
&lt;br /&gt;
; Computer Crimes&lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cjr.org/cloud_control/scripps_hackers.php Sarah Laskow, Reporting, Or Illegal Hacking]&lt;br /&gt;
&lt;br /&gt;
; Case studies&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Project_Chanology Wikipedia, Project Chanology]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of &amp;quot;Aaron&#039;s Law&amp;quot; on Aaron Swartz&#039;s Case]&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/ David Kravets, Appeals Court Reverses Hacker/Troll &amp;quot;Weev&amp;quot; Conviction and Sentence]&lt;br /&gt;
&lt;br /&gt;
* [http://www.csmonitor.com/Innovation/2013/1113/Hacking-tool-threatens-Healthcare.gov-site Jeff Ward-Bailey, Hacking Tool Threatens Healthcare.gov Site]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.northwestern.edu/lawreview/v107/n2/795/LR107n2Matwyshyn.pdf Andrea Matwyshyn, Hacking Speech: Informational Speech and the First Amendment]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 10:28, 17 December 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
There are several types of hacking, including for example reputation hijacking, hacking account or financial credentials and bot activity. This is something that affects private citizens as well as large companies and governments. In the article ”Sony Playstation suffers massive data breach”, that deals with a hacker attack against Sony in 2011, Braker and Finkle write ”In the rush to get out innovative new products, security can sometimes take a back seat.”. The interesting question here is if it will continue the same way, or if consumers will put more pressure on companies to care about security. &lt;br /&gt;
&lt;br /&gt;
The article ”Hackers promise ”Christmas present” Sony Pictures won´t like” deals with other hacker attacks on Sony and the quote ”The sooner SPE accept our demands, the better, of course…The farther time goes by, the worse state SPE will be put into and we will have Sony go bankrupt in the end.” shows what power the hackers can have in the computer based society of today. Hacking can be used to blackmail people, companies and governments.&lt;br /&gt;
&lt;br /&gt;
Operation payback was a group of attacks on opponents of Internet privacy by the decentralized community ”Anonymous”. It all begun with the crisis on Wikileaks, when they were under pressure after publishing secret US. diplomatic cables. Anonymous was on the side of Wikileaks and there it begun. What made me really angry was when I read that Anonymous threatened to disrupt British government websites because the group opposed the possible act of handing over Julian Assange (who is often called the founder of Wikileaks) to Sweden. This is upsetting in at least three ways. &lt;br /&gt;
&lt;br /&gt;
Firstly, it would have been an act that would´ve denied the British citizens information that they by law have the right to access.&lt;br /&gt;
&lt;br /&gt;
Secondly, it is to indirect aggravate a lawsuit since the reason for why the Swedish court system wanted Assange to be extradited was that there had been a subpoena about rape directed towards Assange. To make it difficult for the court system to plead someone guilty or not guilty is a very serious thing to do.&lt;br /&gt;
&lt;br /&gt;
Thirdly, it is illegal and there are other ways of changing laws and systems. The laws are made by the government and the government is chosen by the citizens. To believe that you are above the laws is also to believe that you are above other citizens. Laws are there for a reason and if you don´t like it, you can either vote differently or try to change the opinion in ways that don´t hurt others.&lt;br /&gt;
&lt;br /&gt;
Anonymous acted this way because they believe that information should be free and open for everyone to see. It is therefore very weird and contradictory that they protest through doing exactly what they are protesting against, i.e. limiting and blocking information. &lt;br /&gt;
&lt;br /&gt;
As a conclusion to my thoughts, I want to say that I believe that Internet terror is the future military threat against most countries. It might be on the Internet that our future wars will be held. Consequently, we can´t dismiss crimes on the Internet as ”something that is just on the Internet and not in the real world”, but instead look at the Internet as a natural part of our society. &lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:51, 25 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The first thing that comes to mind about cyber security and computer crimes are the financial errors in stock markets. As a stock trader, I get rather fearful when potential security issues happen. I’m not sure if they count as security issues, or… issues with their algorithms or partially hacking. Those would result in crashes. The second thing that comes to mind are those “reputation hijacking” (ref 1) on social networks. A family member of mine had this happened to her. She was using the application Line, and somehow pressed a bad link which asked for her logins. That wasn’t a smart move, but for a novice internet user, they would likely follow those instructions assuming it is legitimate. The end result was a long process of letting her friends know it was a hack, and to secure potential credit card information, etc. Therefore I really liked reference 1 which shows all the potential hacks others could do to a PC. I would suspect I had personally experienced a few of them. &lt;br /&gt;
&lt;br /&gt;
Reference 2, 3, and 4 becomes very exciting to see the power of hackers obtaining information of normal citizens. Are we really safe by providing our information to corporations online? 77 million user accounts hacked, that is quite something. Not only is privacy an issue here, it also questions if authorities have what it takes to prevent these issues from happening. Sony not announcing it till Tuesday was, in my opinion, also a breach of it’s customers’ trust. It does raise a fair point of how the hackers will use the information that was illegally obtained. Will there be an outlet for the hackers to use it? Are these hacks individual, or are they political? It appears that hackers are yielding too much power. I still hold by my beliefs that “winners” take all. The winners get everything. Once a hacker cracks a code; that’s it, they can decrypt everything and obtain everything. Of course, as the US claims, it was hackers from Korea, most likely due to the release of The Interview. Personally I think it isn’t as bad as Team America that was released 10 years ago. &lt;br /&gt;
&lt;br /&gt;
As I mentioned for last weeks readings, Anonymous has a lot of power. Not exactly sure if it is a good thing or a bad thing. But we should also consider if what they’re doing is just or not. Is it just to give “justice” to the ones they think deem it? Are they above the law? I’m not sure. As Operation Payback and Project Chanology has showed us. Were they really being just for doing what they did? Were they off base? I think the founder of Scientology website does have a point…&lt;br /&gt;
&lt;br /&gt;
Heldal-Lund commented, &amp;quot;People should be able to have easy access to both sides and make up their own opinions. Freedom of speech means we need to allow all to speak - including those we strongly disagree with. I am of the opinion that the Church of Scientology is a criminal organisation and a cult which is designed by its delusional founder to abuse people. I am still committed to fight for their right to speak their opinion.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
So it is therefore unconstitutional for what Anonymous did. This also led me to think about Edward Snowden. Was he really doing good for society, or was he doing it for fame, and his own ideals of justice? What constitutes as constitutional? This argument was shared by the United Kingdom Intellectual Property Office too, as they had said the below after Operation Payback.&lt;br /&gt;
&lt;br /&gt;
“The United Kingdom Intellectual Property Office said that when its site was attacked, those responsible were depriving its citizens of access to information they have a democratic right to access. Other critics claimed the attacks restricted Gene Simmons&#039; right to free speech.”&lt;br /&gt;
&lt;br /&gt;
Anonymous is not pro-democracy. They want to dictate what is right or wrong in their own hands. If they did things that reflected what people really believed in, then I believe they have done things “just”-ly. But to deprive people of their basic right to speech and beliefs; I’m not so sure. Was it a troll taken too far? &lt;br /&gt;
&lt;br /&gt;
There have been increasing amounts of threats that we face, such as “Destroy Obama Care”. Also forbes gives a whole list of the top 20 data breaches. They are increasing in numbers, and it seems like corporations don’t know what to do. Just as technology has enhanced their reach, they would also be required to invest in technological defense against these potential hackers. It also feels that law really lags behind technology a lot. Technology advances so quickly that law requires time to pass. The amendments to the CFAA, which occurred many times. I believe there needs to be a better way to enforce new laws at the same pace as technological advancement, otherwise law would always be a step behind.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
http://krebsonsecurity.com/wp-content/uploads/2012/10/HackedPC2012.png&lt;br /&gt;
&lt;br /&gt;
http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426&lt;br /&gt;
&lt;br /&gt;
http://arstechnica.com/security/2014/12/hackers-promise-christmas-present-sony-pictures-wont-like/&lt;br /&gt;
&lt;br /&gt;
http://arstechnica.com/security/2014/12/us-government-fingers-north-korea-as-the-sony-hackers/&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Project_Chanology&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Operation_Payback&lt;br /&gt;
&lt;br /&gt;
http://www.csmonitor.com/Technology/2013/1113/Hacking-tool-threatens-Healthcare.gov-site&lt;br /&gt;
&lt;br /&gt;
http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/&lt;br /&gt;
&lt;br /&gt;
http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 17:32, 28 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Cybersecurity_and_Computer_Crimes&amp;diff=4093</id>
		<title>Cybersecurity and Computer Crimes</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Cybersecurity_and_Computer_Crimes&amp;diff=4093"/>
		<updated>2015-03-28T21:32:39Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 31&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Last week we looked at hacking as a form of social protest. This week, we take a closer look at the more sinister side of hacking, and the various responses to it. Hacking at its heart involves modifying or intruding upon another’s system. But not all intrusion is socially harmful, and writing laws against hacking have a troubling (and at times, tragic) history of being misused. How big a threat is hacking, really? How should systems respond to hacking? What, if anything, should be the role of government? In what ways can we govern those who don’t consider code to be a governing influence?&lt;br /&gt;
&lt;br /&gt;
== Assignment 3 ==&lt;br /&gt;
&lt;br /&gt;
[[Assignments#Assignment_3:_Project_Outline|Assignment 3]] is due &#039;&#039;before class&#039;&#039; today. [[Assignment_3_Submissions|You can upload that here.]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Cybersecurity&lt;br /&gt;
&lt;br /&gt;
* [http://krebsonsecurity.com/wp-content/uploads/2012/10/HackedPC2012.png Brian Krebs, &amp;quot;The Scrap Value of a Hacked PC (infographic),&amp;quot; Oct 2012]&lt;br /&gt;
* [http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/ Bill Hardekopf, &amp;quot;The Big Data Breaches of 2014, Forbes, January 13, 2015]&lt;br /&gt;
* [http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426 Liana Baker and Jim Finkle, &amp;quot;Sony Playstation suffers massive data breach,&amp;quot; Reuters, April 26, 2011]&lt;br /&gt;
* [http://arstechnica.com/security/2014/12/hackers-promise-christmas-present-sony-pictures-wont-like/ Sean Gallagher, &amp;quot;Hackers Promise &#039;Christmas Present&#039; Sony Pictures Won&#039;t Like,&amp;quot; Ars Technica, December 15, 2015]&lt;br /&gt;
* [http://arstechnica.com/security/2014/12/us-government-fingers-north-korea-as-the-sony-hackers/ Peter Bright, &amp;quot;US Government Fingers North Korea as the Sony Hackers,&amp;quot; Ars Technica, December 17 2014]&lt;br /&gt;
&lt;br /&gt;
; Computer Crimes&lt;br /&gt;
&lt;br /&gt;
* [http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf United States Department of Justice, Prosecuting Computer Crimes] (read pages 1-11: Introduction to the Computer Fraud and Abuse Act and Key Definitions)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cjr.org/cloud_control/scripps_hackers.php Sarah Laskow, Reporting, Or Illegal Hacking]&lt;br /&gt;
&lt;br /&gt;
; Case studies&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Operation_Payback Wikipedia, Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Project_Chanology Wikipedia, Project Chanology]&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/impact-aarons-law-aaron-swartzs-case Andy Sellars, The Impact of &amp;quot;Aaron&#039;s Law&amp;quot; on Aaron Swartz&#039;s Case]&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2014/04/appeals-court-reverses-hackertroll-weev-conviction-and-sentence/ David Kravets, Appeals Court Reverses Hacker/Troll &amp;quot;Weev&amp;quot; Conviction and Sentence]&lt;br /&gt;
&lt;br /&gt;
* [http://www.csmonitor.com/Innovation/2013/1113/Hacking-tool-threatens-Healthcare.gov-site Jeff Ward-Bailey, Hacking Tool Threatens Healthcare.gov Site]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.intelligencesquaredus.org/debates/past-debates/item/576-the-cyber-war-threat-has-been-grossly-exaggerated Intelligence Squared Debate: &amp;quot;The Cyberwar Threat Has Been Grossly Exaggerated&amp;quot;] (an [http://en.wikipedia.org/wiki/Oxford-Style_debate#Oxford-Style_debate Oxford-style debate] with Marc Rotenberg, Bruce Schneier, Mike McConnell, and Jonathan Zittrain; watch the video of the debate)&lt;br /&gt;
&lt;br /&gt;
* [http://www.law.northwestern.edu/lawreview/v107/n2/795/LR107n2Matwyshyn.pdf Andrea Matwyshyn, Hacking Speech: Informational Speech and the First Amendment]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?_r=0 Nicole Perlroth, Hackers in China Attacked The Times for Last 4 Months (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [https://torrentfreak.com/pirate-parties-use-influence-to-halt-operation-payback-101120/ TorrentFreak, Pirate Parties Use Influence to Halt Anonymous’ Operation Payback]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/interactive/events/2012/10/soghoian Christopher Soghoian, The Growing Trade in Software Security Exploits]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 10:28, 17 December 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
There are several types of hacking, including for example reputation hijacking, hacking account or financial credentials and bot activity. This is something that affects private citizens as well as large companies and governments. In the article ”Sony Playstation suffers massive data breach”, that deals with a hacker attack against Sony in 2011, Braker and Finkle write ”In the rush to get out innovative new products, security can sometimes take a back seat.”. The interesting question here is if it will continue the same way, or if consumers will put more pressure on companies to care about security. &lt;br /&gt;
&lt;br /&gt;
The article ”Hackers promise ”Christmas present” Sony Pictures won´t like” deals with other hacker attacks on Sony and the quote ”The sooner SPE accept our demands, the better, of course…The farther time goes by, the worse state SPE will be put into and we will have Sony go bankrupt in the end.” shows what power the hackers can have in the computer based society of today. Hacking can be used to blackmail people, companies and governments.&lt;br /&gt;
&lt;br /&gt;
Operation payback was a group of attacks on opponents of Internet privacy by the decentralized community ”Anonymous”. It all begun with the crisis on Wikileaks, when they were under pressure after publishing secret US. diplomatic cables. Anonymous was on the side of Wikileaks and there it begun. What made me really angry was when I read that Anonymous threatened to disrupt British government websites because the group opposed the possible act of handing over Julian Assange (who is often called the founder of Wikileaks) to Sweden. This is upsetting in at least three ways. &lt;br /&gt;
&lt;br /&gt;
Firstly, it would have been an act that would´ve denied the British citizens information that they by law have the right to access.&lt;br /&gt;
&lt;br /&gt;
Secondly, it is to indirect aggravate a lawsuit since the reason for why the Swedish court system wanted Assange to be extradited was that there had been a subpoena about rape directed towards Assange. To make it difficult for the court system to plead someone guilty or not guilty is a very serious thing to do.&lt;br /&gt;
&lt;br /&gt;
Thirdly, it is illegal and there are other ways of changing laws and systems. The laws are made by the government and the government is chosen by the citizens. To believe that you are above the laws is also to believe that you are above other citizens. Laws are there for a reason and if you don´t like it, you can either vote differently or try to change the opinion in ways that don´t hurt others.&lt;br /&gt;
&lt;br /&gt;
Anonymous acted this way because they believe that information should be free and open for everyone to see. It is therefore very weird and contradictory that they protest through doing exactly what they are protesting against, i.e. limiting and blocking information. &lt;br /&gt;
&lt;br /&gt;
As a conclusion to my thoughts, I want to say that I believe that Internet terror is the future military threat against most countries. It might be on the Internet that our future wars will be held. Consequently, we can´t dismiss crimes on the Internet as ”something that is just on the Internet and not in the real world”, but instead look at the Internet as a natural part of our society. &lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:51, 25 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
The first thing that comes to mind about cyber security and computer crimes are the financial errors in stock markets. As a stock trader, I get rather fearful when potential security issues happen. I’m not sure if they count as security issues, or… issues with their algorithms or partially hacking. Those would result in crashes. The second thing that comes to mind are those “reputation hijacking” (ref 1) on social networks. A family member of mine had this happened to her. She was using the application Line, and somehow pressed a bad link which asked for her logins. That wasn’t a smart move, but for a novice internet user, they would likely follow those instructions assuming it is legitimate. The end result was a long process of letting her friends know it was a hack, and to secure potential credit card information, etc. Therefore I really liked reference 1 which shows all the potential hacks others could do to a PC. I would suspect I had personally experienced a few of them. &lt;br /&gt;
&lt;br /&gt;
Reference 2, 3, and 4 becomes very exciting to see the power of hackers obtaining information of normal citizens. Are we really safe by providing our information to corporations online? 77 million user accounts hacked, that is quite something. Not only is privacy an issue here, it also questions if authorities have what it takes to prevent these issues from happening. Sony not announcing it till Tuesday was, in my opinion, also a breach of it’s customers’ trust. It does raise a fair point of how the hackers will use the information that was illegally obtained. Will there be an outlet for the hackers to use it? Are these hacks individual, or are they political? It appears that hackers are yielding too much power. I still hold by my beliefs that “winners” take all. The winners get everything. Once a hacker cracks a code; that’s it, they can decrypt everything and obtain everything. Of course, as the US claims, it was hackers from Korea, most likely due to the release of The Interview. Personally I think it isn’t as bad as Team America that was released 10 years ago. &lt;br /&gt;
&lt;br /&gt;
As I mentioned for last weeks readings, Anonymous has a lot of power. Not exactly sure if it is a good thing or a bad thing. But we should also consider if what they’re doing is just or not. Is it just to give “justice” to the ones they think deem it? Are they above the law? I’m not sure. As Operation Payback and Project Chanology has showed us. Were they really being just for doing what they did? Were they off base? I think the founder of Scientology website does have a point…&lt;br /&gt;
&lt;br /&gt;
Heldal-Lund commented, &amp;quot;People should be able to have easy access to both sides and make up their own opinions. Freedom of speech means we need to allow all to speak - including those we strongly disagree with. I am of the opinion that the Church of Scientology is a criminal organisation and a cult which is designed by its delusional founder to abuse people. I am still committed to fight for their right to speak their opinion.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
So it is therefore unconstitutional for what Anonymous did. This also led me to think about Edward Snowden. Was he really doing good for society, or was he doing it for fame, and his own ideals of justice? What constitutes as constitutional? This argument was shared by the United Kingdom Intellectual Property Office too, as they had said the below after Operation Payback.&lt;br /&gt;
&lt;br /&gt;
“The United Kingdom Intellectual Property Office said that when its site was attacked, those responsible were depriving its citizens of access to information they have a democratic right to access. Other critics claimed the attacks restricted Gene Simmons&#039; right to free speech.”&lt;br /&gt;
&lt;br /&gt;
Anonymous is not pro-democracy. They want to dictate what is right or wrong in their own hands. If they did things that reflected what people really believed in, then I believe they have done things “just”-ly. But to deprive people of their basic right to speech and beliefs; I’m not so sure. Was it a troll taken too far? &lt;br /&gt;
&lt;br /&gt;
There have been increasing amounts of threats that we face, such as “Destroy Obama Care”. Also forbes gives a whole list of the top 20 data breaches. They are increasing in numbers, and it seems like corporations don’t know what to do. Just as technology has enhanced their reach, they would also be required to invest in technological defense against these potential hackers. It also feels that law really lags behind technology a lot. Technology advances so quickly that law requires time to pass. The amendments to the CFAA, which occurred many times. I believe there needs to be a better way to enforce new laws at the same pace as technological advancement, otherwise law would always be a step behind.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
http://krebsonsecurity.com/wp-content/uploads/2012/10/HackedPC2012.png&lt;br /&gt;
&lt;br /&gt;
http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426&lt;br /&gt;
&lt;br /&gt;
http://arstechnica.com/security/2014/12/hackers-promise-christmas-present-sony-pictures-wont-like/&lt;br /&gt;
&lt;br /&gt;
http://arstechnica.com/security/2014/12/us-government-fingers-north-korea-as-the-sony-hackers/&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Project_Chanology&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Operation_Payback&lt;br /&gt;
&lt;br /&gt;
http://www.csmonitor.com/Technology/2013/1113/Hacking-tool-threatens-Healthcare.gov-site&lt;br /&gt;
&lt;br /&gt;
http://www.forbes.com/sites/moneybuilder/2015/01/13/the-big-data-breaches-of-2014/&lt;br /&gt;
&lt;br /&gt;
http://www.justice.gov/criminal/cybercrime/docs/ccmanual.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 17:32, 28 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Speech,_Day_2:_Collective_Action,_Hacktivism,_and_Social_Movements&amp;diff=4085</id>
		<title>Speech, Day 2: Collective Action, Hacktivism, and Social Movements</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Speech,_Day_2:_Collective_Action,_Hacktivism,_and_Social_Movements&amp;diff=4085"/>
		<updated>2015-03-24T21:24:35Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Just before the break we started exploring speech online. Today, we look at what happens when speech is aggregated into social movements. When does this work? When does it fail? Who gets included and who are we leaving behind? Does the Internet serve as a better facilitator to protests in some areas versus others? We’ll also look at a particular new form of online protest –&lt;br /&gt;
hacktivism – and the special considerations that come into play when people engage in protest through altering or disabling websites. Along the way we&#039;ll grapple with limitations of online protest activity, the criticisms weighed against online protest behavior, and some of the ethical questions that come up when different organizations fight for attention to their specific causes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/dothman Dalia Othman], a Berkman fellow and expert on civic engagement.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; Framing&lt;br /&gt;
&lt;br /&gt;
* [http://web.mit.edu/comm-forum/forums/civic_media.html MIT Communications Forum, What is Civic Media?] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://ethanzuckerman.com/papers/newmedianewcivicsprepress.pdf Ethan Zuckerman, New Media, New Civics?] (read &amp;quot;The Thick and the Thin of Participatory Civics&amp;quot;, skim rest)&lt;br /&gt;
&lt;br /&gt;
* [http://dash.harvard.edu/bitstream/handle/1/4609956/SAIS%20online%20organizing%20paper%20final.pdf?sequence=1 Bruce Etling et al., Political Change in the Digital Age: The Fragility and Promise of Online Organizing] (read introduction, &amp;quot;Digital Technologies, Information and Political Transitions,&amp;quot; &amp;quot;Online Organizing and Contentious Politics,&amp;quot; and &amp;quot;The Uncertain Future of Digital Organizing&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
; Defining hackers, hacking, and hacktivism&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=-tB4onhtAmQ Gabriella Coleman, Anonymous from lulz to activists] (from 0:00 to 54:26)&lt;br /&gt;
&lt;br /&gt;
; Case Studies&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2295953 Yochai Benkler et al., Social Mobilization and the Networked Public Sphere: Mapping the SOPA/PIPA Debate] (pg. 4-10 only)&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2015_02_10_Score_Another_One_for_the_Internet_0.pdf Rob Faris et al., Score Another One for the Open Internet? The Role of the Networked Public Sphere in the U.S. Net Neutrality Debate] (read intro and conclusion, skim rest)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Bruce Etling et al., Mapping the Arabic Blogosphere: Politics, Culture, and Dissent] (read Key Findings and Introduction, skim rest)&lt;br /&gt;
&lt;br /&gt;
* [http://civicmediaproject.org/works/civic-media-project/index Eric Gordon and Paul Mihailidis, Civic Media Project] (peruse)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=Fgh2dFngFsg Aaron Swartz, How We Stopped SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.utsc.utoronto.ca/~farrell/blogpaperfinal.pdf Daniel Drezner and Henry Farrel, The Power and Politics of Blogs] (read introduction, &amp;quot;The networked structure of the blogosphere;&amp;quot; skim &amp;quot;How skewedness affects politics;&amp;quot; read &amp;quot;The constraints on blog influence&amp;quot; and conclusion)&lt;br /&gt;
&lt;br /&gt;
* [https://civic.mit.edu/blog/erhardt/molly-sauter-and-the-coming-swarm-a-fireside-chat Erhardt Graeff, Molly Sauter and the Coming Swarm: A Fireside Chat]&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW. &#039;&#039;Too Much Information&#039;&#039; drifts between fiction and non-fiction, but this excerpt is non-fiction.)&lt;br /&gt;
&lt;br /&gt;
* [http://civic.mit.edu/blog/erhardt/mapping-the-trayvon-martin-media-controversy Erhardt Graeff, Mapping the Trayvon Martin Media Controversy]&lt;br /&gt;
&lt;br /&gt;
* [http://www2.scedu.unibo.it/roversi/SocioNet/AdamicGlanceBlogWWW.pdf Lada Adamic and Natalie Glance, The Political Blogosphere and the 2004 U.S. Election: Divided They Blog] (read introduction, analysis, and conclusion – i.e., pages 1-3 and 8-15)&lt;br /&gt;
&lt;br /&gt;
* [http://journalistsresource.org/studies/international/global-tech/social-media-protest-egypt-tahrir-square Alex Remington, Social Media and Participation in Political Protest: Observations from Tahrir Square]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=904 Zeynep Tufekci, #Kony2012, Understanding Networked Symbolic Action &amp;amp; Why Slacktivism is Conceptually Misleading]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.socialflow.com/post/7120244932/data-viz-kony2012-see-how-invisible-networks-helped-a-campaign-capture-the-worlds-attention Gilad Lotan, KONY2012: See How Invisible Networks Helped a Campaign Capture the World’s Attention]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/publications/2010/Tale_Two_Blogospheres_Discursive_Practices_Left_Right Yochai Benkler and Aaron Shaw, A Tale of Two Blogospheres: Discursive Practices on the Left and Right]&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_7.pdf Yochai Benker, &#039;&#039;The Wealth of Networks&#039;&#039;] (Chapter 7 - &amp;quot;The Emergence of a Networked Public Sphere&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/04/20/the-tweetbomb-and-the-ethics-of-attention/ Ethan Zuckerman, The Tweetbomb and the Ethics of Attention]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 11:51, 11 February 2014 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hope everyone had a great break! This is not class related specifically - I just wanted to pop in and post about Facebook&#039;s new changes in service regarding the banning of certain content. I can certainly see where some people&#039;s freedom of expression would be insulted. &amp;quot;How dare they censor me!&amp;quot; are the cries being heard.&lt;br /&gt;
&lt;br /&gt;
That said, Facebook is a private enterprise (as in not a government agency paid for by tax dollars) and can therefore do whatever they please. You don&#039;t like it? Go use Twitter. Go make your own forum, go do your own blog, pound sand, you certainly are not required to use Facebook.&lt;br /&gt;
&lt;br /&gt;
What do you all think?&lt;br /&gt;
&lt;br /&gt;
Soundbites from the NYTimes Article:&lt;br /&gt;
http://bits.blogs.nytimes.com/2015/03/16/facebook-explains-what-it-bans-and-why/?_r=0&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Facebook Clarifies Rules on What It Bans and Why&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
On Monday, the company clarified its community standards to give its users more guidance about what types of posts are not allowed on the service.&lt;br /&gt;
&lt;br /&gt;
“We’re trying to strike the balance based on the way our community works,” Monika Bickert, Facebook’s head of global policy management, said in an interview. “The landscape is complicated.”&lt;br /&gt;
&lt;br /&gt;
Terrorist organizations like the Islamic State have long been banned from the service. But supporting or praising groups involved in “violent, criminal or hateful behavior” is also banned, the updated rules say.&lt;br /&gt;
&lt;br /&gt;
Threatening people with physical or financial harm, or bullying them by posting items intended to degrade or shame them, is also prohibited. So is anything that encourages suicide or eating disorders.&lt;br /&gt;
&lt;br /&gt;
“It’s tempting to think of free expression and having a voice as black and white — either you have it or you don’t,” Mr. Zuckerberg said. “But giving people a voice, like most things in our society, is something that we must make incremental progress towards.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;And another writeup:&#039;&#039;&#039;&lt;br /&gt;
http://pontiactribune.com/new-facebook-rules-sharing-this-article-might-get-you-banned/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Just to add my viewpoint, this was my response to a friend that posted the above Pontiac Tribune link on Facebook. I may of course only be in the minority.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;I was reading this, and as someone who does not usually post anything controversial unless it&#039;s about which hard wood is better for making a portable bar, I thought this was interesting enough to take a devil&#039;s advocate stand on. Facebook is not a government agency. It&#039;s a private enterprise (I don&#039;t mean private company in relation to I know it&#039;s &#039;publicly traded&#039;).&lt;br /&gt;
&lt;br /&gt;
Therefore what they allow and don&#039;t allow is completely and utterly their choice. We don&#039;t have to use Facebook. We can go create our own blogs, our own sites, post our own content on a forum that we own and control, without risk of being &amp;quot;banned&amp;quot;. Now depending on what you are posting, you may or may not run afoul of the government, but that&#039;s between you and the government, and maybe the terms and conditions of wherever you are hosting said content.... but overall, I don&#039;t see this as a &amp;quot;freedom of speech&amp;quot; argument.&lt;br /&gt;
&lt;br /&gt;
This quote from the article is rather disingenuous. &amp;quot;Facebook has decided to become the world’s censor. This may end up being the final nail in the coffin of a social media outlet that has seen users flee from other idiotic policies.&amp;quot; (I doubt it by the way - the nail analogy)&lt;br /&gt;
&lt;br /&gt;
Facebook is only becoming the thought police FOR THEMSELVES. If they don&#039;t want certain content on THEIR servers, being fed to the masses that are THEIR users, then that is THEIR prerogative, not ours.&lt;br /&gt;
&lt;br /&gt;
Will people abandon Facebook because their feelings are hurt that they can&#039;t share that rape video? Or that gang beating? Or that gorgeous naked man with the sculpted 6-pack? Or whatever else pissed FB off? Of course. So be it. Get out of the sandbox and go build your own.&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 14:28, 22 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Erika (and everyone else)!&lt;br /&gt;
Interesting what you wrote. I liked the quote from Mr. Zuckerberg; “It’s tempting to think of free expression and having a voice as black and white — either you have it or you don’t...”, because that is something I believe often is forgotten in the debate about free speech. In my opinion is protecting the freedom of expression not the same as letting everyone say exactly what they want. Because that can limit the freedom of others. Here are some examples of why freedom of expression is not black and white: &lt;br /&gt;
&lt;br /&gt;
1. If someone threatens you, you might not have the courage to express yourself, and your freedom is therefore limited. (In some cases can threats even effect all aspects of your life.)&lt;br /&gt;
2. If you get triggered through pro-eating disorder material (like you talked about Erika), you will also be silenced since someone who is suffering from an eating disorder have a hard time focusing on anything else than food and weight (and therefore probably won´t be very active in debates). Consequently is such material limiting the expression of others.&lt;br /&gt;
3. If you bully someone online (or offline), you mentally break down the other person. That can result in lower self esteem of the bullied and he or she might no longer have the courage to speak up and express him/herself. &lt;br /&gt;
&lt;br /&gt;
It is hard to know what should be censored and what should´t. But it is important to reflect upon the fact that freedom never is black or white, and that liberalism isn´t a synonym to letting everyone do exactly what they want. &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:46, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
This week&#039;s readings were wonderful and engaging but internet activism and online social movements cannot always be categorized in the same way as traditional activism.  I feel that there is a heavy emphasis placed on an assumed laziness (perhaps the wrong phrasing) on the part of the blogger, online organizer, what have you.  Yes, traditional organizing like real life marches or on the ground activism translates to a certain kind of activism and can lead to social and political change that cannot be achieved if the efforts remain online, as articles like Ethan Zuckerman’s, “New Media, New Civics?” point out.  But we cannot define online activism in the same framework we use in examining our traditional notions of activism.  The Internet, this still relatively young space, doesn&#039;t yet have as much of a &amp;quot;status quo&amp;quot; of sorts - - meaning, space can be taken up by more people than before (granted, exceptions for places that don&#039;t easy access to the internet or their internet is censored and/or blocked).  In this way, saturating this new media with a marginalized viewpoint, perhaps from members of of traditionally marginalized groups is a strong political act within itself.  Making it so that new media is not the same as what you would get by turning on the regular news, this is an action itself. For example, I found the &amp;quot;Mapping the Arabic Blogosphere&amp;quot; article pointed to the phenomenon.  In looking at the different descriptions of peoples&#039; blogs one can see a range of traditional ones to a growing degree of ones discussing HIV/AIDS, women&#039;s issues, etc. &lt;br /&gt;
([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 15:49, 24 March 2015 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I loved watching Gabriella Coleman’s speech on Anonymous this week, particularly because I’ve been fascinated by – and conflicted in my opinions about – the group over the course of the past few years.   I first read about them in detail in 2012, following their focus on a rape case in Missouri.  The case had been all but dismissed by the courts and the media, until Anonymous seized on an exposé that had been published in the Kansas City Star.  In this case, I was immediately favorable to how they handled the situation; it truly seemed like they were bringing justice to a case that otherwise would have been brutally unjust.  But I also felt complications around the power of “online vigilantism,” since if a powerful group like Anonymous could focus its energies in a direction I agreed with, it could just as easily use its powers towards an end I (or others) felt was wrong.  For example, the group drew controversy when it released incorrect information about the supposed police officer that had shot Michael Brown in Ferguson.  It’s also potentially just as problematic to see what Anonymous chooses not to highlight, including this follow-up to the rape case in Missouri, when earlier this year, the victim attempted suicide again, and her mother wondered where the online group’s support had gone (http://www.washingtonpost.com/blogs/she-the-people/wp/2014/01/07/daisy-coleman-alleged-rape-victim-attempts-suicide-again/).&lt;br /&gt;
&lt;br /&gt;
Another thing I have had difficulty grappling with is how the group balances its “lulz” mentality with more serious political activism.  It was very interesting to hear Gabriella Coleman address this tension and show how it is clearly a big source of confusion even within the group itself.  But it was equally helpful to hear her assessment that the humor and irreverence are political statements in and of themselves.  I particularly liked her comparison of Anonymous to other groups in the past, such as the Cynics and the Dadaists.  I had not thought about the fact that confusion and humor can be powerful cultural forces of protest and activism, and I had never thought of the “lulz” as an essential part of the group’s activism until she drew those comparisons.  The humorous elements of the group also seem to help it gain legitimacy and respect among certain communities that might not afford such privilege to other activist groups.  It reminds me of Ethan Zuckerman’s “cute cat theory of digital activism,” because of the idea that sometimes political activism needs to be masked in other forms of content in order to gain traction online.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 09:02, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi everyone!&lt;br /&gt;
&lt;br /&gt;
This week´s reading was very interesting since it was about something you hear about almost every day. The Internet can be used in many ways, and social movements on the Internet don´t always look the same. &lt;br /&gt;
&lt;br /&gt;
Drezner and Farrel write that ”the typical blog is written by a teenage girl”. However, all blogs in table 3 - Blogs read by the media and Table 4 - Blogs read by elite media (they show influential blogs/bloggers) are as far as I can see, written by men. This is very interesting since it means that even though the typical blogger is a teenage girl (or at least was when this was written in 2004), the most influential bloggers are male. I also thought about gender when I read Etling´s text about the Arabic Blogosphere, when he wrote that ”Arabic bloggers are prominently young and male”.&lt;br /&gt;
&lt;br /&gt;
What I also found interesting was that it often is critical that traditional media pick up and write about what the blogs have posted if the big audience should pay notice to it. Traditional media has in that way power that sometimes is difficult for new media to claim. &lt;br /&gt;
&lt;br /&gt;
Zuckerman wrote about ”the thick and the thin of participatory civics”. He meant that ”thick” participation is when you have to use your head while ”thin” participation is when you need your feet, or when you don´t have to think and use your brain. He mentioned that thin participation often is negatively called slacktivism and that a lot of people blame those activists to be lazy and not doing ”real activism”. Zuckerman wanted to challenge that view and problematize the issue in new ways. &lt;br /&gt;
&lt;br /&gt;
Thin participatory civics is often connected to new and social media. However, I would say that traditional media sometimes take advantage of this type of activism as well. One example is the annual radio/TV program Serious request from the Netherlands that has been broadcasted every December since 2004. The project has now been spread to several countries, but in most cases under another name. The purpose of the project is to involve as many persons as possible in collecting money to a different cause each year. Money has been raised for victims of land mines, for clean drinking water, HIV/AIDS, for victims of sexual violence, etc. (Wikipedia, 2015). The following paragraph explains the project:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the Dutch 3FM Serious Request three popular radio DJs are locked up for six days in a small temporary radio studio (the &amp;quot;Glass House&amp;quot;), placed in a main square in a different city each year. Living on a juice-only fast, the DJs make an interactive, themed broadcast around the clock, while regular programming on the station is suspended. Instead 3FM and its website are completely dedicated to the event, which is also transmitted as a continuous audio and video live-stream. Additionally there is television coverage, integration with social media, and a dedicated mobile app.&amp;quot; (Wikipedia, 2015)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Some of the things the project include:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
-Radio/TV profiles that lead the show.&lt;br /&gt;
&lt;br /&gt;
-Auctions on the internet.&lt;br /&gt;
&lt;br /&gt;
-Telephone calls to raise money.&lt;br /&gt;
&lt;br /&gt;
-Projects that anyone can start to raise money.&lt;br /&gt;
&lt;br /&gt;
-Sharing for example TV clips on social media to raise people´s awareness. &lt;br /&gt;
&lt;br /&gt;
-Listening to the radio/watching TV (without listeners, there wouldn´t be a show.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As you can see, there are many ways (both ”thin” and ”thick”) in which people can participate and organize themselves. I think that it shows how both the ”thick” and ”thin” can be crucial and good. &lt;br /&gt;
&lt;br /&gt;
Wikipedia, 2015. Retrieved 3/23/2015 from &#039;&#039;http://en.wikipedia.org/wiki/Serious_Request&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 11:52, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great points, everyone! Another fun piece of reading that was just posted related to tomorrow&#039;s discussion is [http://civicmediaproject.org/works/civic-media-project/binders-full-of-election-memes-participatory-culture-invades-the-2012-us-election Binders Full of Election Memes] by fellow Berkman Fellow Erhardt Graeff. [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 14:45, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
I think that the internet is a great device for a civic debate, protest or manifestation of society, however there may be some dangers that these groups of activists can face such as being labeled, hacked, or portrait in different way than what they really are, so I think that the balance that one must strive to reach is the idea of non violence over the platform of the internet, and the education and security that can ensure safety, of everyone in every way.&lt;br /&gt;
&lt;br /&gt;
If some news are exposed can create a great impact on people, however it will take sometimes for people to be able to understand the way how information on the internet functions for the ones that posted and find it, this is we should strive to a greater level of awareness to only enjoy the benefits of the internet in social movements.&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:54, 23 March 2015 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hello All!&lt;br /&gt;
&lt;br /&gt;
I hope everyone had a fun and restful spring break. Even though I spent the week in Florida, thanks to my iPhone I was able to get through this week’s readings. &lt;br /&gt;
&lt;br /&gt;
While all of the readings on collective action, hacktivism, and social movements were extremely thought-provoking, I was especially intrigued by Ethan Zuckerman’s, “New Media, New Civics?” article about online activism because, even though I am a huge fan of Malcolm Gladwell’s work, I totally agree with Zuckerman’s opposing stance on the value of participatory civics in the digital public sphere as an agent for change. &lt;br /&gt;
   &lt;br /&gt;
In his article, Zuckerman applies a very useful matrix to case studies of digital activism which denotes how varying degrees of thin and thick engagement can collectively impact change of both norms and codes, as he eloquently points out, “if enough of us raise our voices loud enough, we may persuade our mobile phone company or our nation to change its path” (14). &lt;br /&gt;
&lt;br /&gt;
I know from personal experience that organizations such as Change.org not only collectively involve a large enough population of thin engagement participants to enact normative and instrumental change but they have also become an avenue of inspiration for others to participate in subsequent thick forms of engagement to solve additional problems and recruit even more participants. &lt;br /&gt;
&lt;br /&gt;
According to their “About” page Change.org currently has more than 85 million users in 196 countries. That is certainly a significant number of voices actively contributing to a wide array of social movements.&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 00:28, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Beth Noveck&#039;s take on civic engagement was particularly controversial to me; at once I agree with her view that community engagements don&#039;t &amp;quot;scale&amp;quot; -- this idea brings to mind the example of the stereotype cookie-bake ladies who, getting together, stand on the proverbial corner of the road, put up a bake sale, and send all $124 of the proceeds to the Pentagon to help out with the war. They go to sleep thinking they have come together and done a great thing. When in the bigger picture, it is not society they have helped but their own consciences. Noveck&#039;s point about civic scaleability is pertinent everywhere we watch community efforts like this come to fruition only to cause the smallest of imperceptible ripples across the water. I would add that in addition to this problem of non-effectively translatable community engagement to politics, the discussion about words to action also suffers from information-flooding and information-dilution. This problem aside, the part where Noveck&#039;s stance is problematic is that community engagement does not necessarily translate into action. This stance overly discounts the power of norms as understood from Lessig&#039;s Code point of view. While this may be the case short term, Zuckerman is a treasure trove of examples to counter this argument -- especially from the Middle East and Islamic states -- where community engagement translates into fundamental shifts in norms. And norms are, in the end, the most powerful political actors in a democracy -- even in non-democracies. &lt;br /&gt;
&lt;br /&gt;
In the Berkman report about trends in Arabic civic engagement, it was noted that most of these online activities seem to have the most &amp;quot;impact&amp;quot; in semi-repressive governments; doing less well in the least repressive governments and in the most repressive governments. One reason for this could be back to the problem of information dilution and over access in affluent communities. With societies in the least repressive governments, there is an overflow of news, of interests, of general online activity that have little to do with discussions about community. Rather, out of contentedness are born the classic children Complacency and Inaction. Digital media merely increases the speed of confusion and dilution. So the considerations of a society&#039;s comfort, it&#039;s information dilution levels, and its general government regulation are considerations that have come to the table about civic involvement and digital media in a way that is at once encouraging and discouraging. Encouraging when we read about Zuckerman&#039;s highlighting of the Pakistani community of women embroiderers who have been empowered to change societal norms via social media, and discouraging when we think about the majority of a comfortable society&#039;s use of its digital tools to do less than community-beneficial things. Great readings this week. Looking forward to piecing them together through lecture.&lt;br /&gt;
&lt;br /&gt;
Chanel&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 00:45, 24 March 2015 (EDT)&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
Hello everyone after the spring break!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Staring a Collective Action, Hacktivism or a Social Movement, they all are provoked by certain political or social events, by something done or something not being done by the government. From today’s reading it seams that in most of the cases the trigger has always something to do with the government not doing the right thing or not doing anything at all, Aaron Swartz telling  us  how  KOIKA , later on SOPA was  stopped, the Arab Spring, the hactivism organized by the Anonymous, the common element is that in all these cases single, otherwise ordinary individuals, combine forces in order to oppose the government united by a common goal.  During the history people has done this using different means , more or less violent, but civil protests are not new phenomenon. What is  new is the means we use nowadays. Internet is a very powerful tool. After today’s reading (and listening), I  would  conclude it’s power is based on three main pillars – Accessibility, Speed and Anonymity. Internet is an open tribune for everyone, everyone can make its opinion public and can easily find supporters by sharing it through the social communities.  The second thing is the speed, the number of the supporters can reach thousands for just few days, as Aaron Swartz said it happened  with the anti- SOPA campaign.  Last but not least is the anonymity Internet is offering. An Internet user can initiate a group, community or be counted  as a supporter of such one and still stay anonymous. A lot of people who would not dear to stand behind a cause and defend it on live, are gladly supporting the same cause online. This is bringing the question, how real all online movements and initiatives are? In some cases it turns out to be as real as it could be. When we take examples like the Arab Spring where the people transmitted the movement from Internet to the streets  and keep on defending the idea. The most recent example I found is in Istanbul, last week where more than 100,000 people turned the funeral of  Berkin Elvan into a mass demonstration for civil rights. As Zeynep Tufecki Is commenting on the event  “No formal organization made the call” she says,  it all has started in Twitter and later on turned out that Berkin&#039;s face had become a “symbol of civic resistance shared on social media from Facebook to Instagram”.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On the other hand there are cases when people are sharing a politically orientated  image macro memes (Erhardt Graeff’s analysis on the election memes) but we could hardly conclude all of them are truly engaged with the cause. Most of them are just finding  the memes  amusing and funny . We could judge by the number of people sharing and liking the memes for certain tendencies in the society  but  it would not be right to assume all those people would defend the idea or cause behind the funny memes on the street. The research showing that actually most of the tweets regarding the Arab Spring were coming from Arabs in US and Europe  is another prove  that the  conclusions based on the “online support” should be carefully examined and could  be  deceiving in some cases. I think Bruce Etling, Robert Faris and John Palfrey made a  very  good point on this, categorizing the social online activities  into Mobs, Movements and CSOs. In the same spirit is the “Thick and Thin of Participatory Civics”  theory of , Ethan Zuckerman who clearly explains that  there is a big difference between the  “lazy”, thin participation with by clicking the mouse and the thick one, where some dedication is needed.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
I really liked the speech of  Aaron Swartz and  felt  very sorry for his tragic end  of his personal story but  back to the subject , I was mostly impressed by the number of online petitions he had organized. What I am curious  about is to know  a little  bit more about the legal value of  such a petition. I  think  that some  issues  like the act of signing an online petition are not very clear to me. Should  each of the signatures use an e-signature in order his vote  to be recognized as a valid one. I think this would be impossible for realization but otherwise how the authenticity of such a petition could  be assured so it could have a legal value?    ([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
&lt;br /&gt;
[[Shouting from a soap box or singing in the shower?]] This line stuck in my head as i read Yockhai Benkler et al. This is a question often ask amongst activist and friends in regards to political blogs. When you blog, do you speak to three thousand people or only three? Very difficult to know. This is why i&#039;ve developed a few techniques to not waste time blogging. A quick short paragraph is usually best, no need for an entire manifesto because, again, you may be communicating with only three people. When it comes to countering hate speech, I only respond to those that cross the line into racism and violent threats, often referencing the audience and the possibility that someone in law enforcement might be reading the blog. Finally when it comes to arguing opposing points of view I try to respond to those who write full sentences and try to make an argument.&lt;br /&gt;
&lt;br /&gt;
From Anonymus to LULZ by Gabriella Coleman was a very interesting presentation. There is a big difference between blogging and actual face to face, hand shaking community organizing work. Furthermore, one doesn&#039;t work without the other. The occupy movement used both tactics to some extent, but in my opinion, got caught up in the anonymous philosophy and wasted a tremendous opportunity to really organize and have an impact. Sadly their obsession with no leadership and their endlessly mind numbing deliberation sessions won over reason, instinct and action. I still give the young kids Kudos for revolting and shaking up the tree. I&#039;ll admit, I used the occupy movement to further my own agenda and the movement happily obliged, and it was a net positive for the communty organization i worked with, but in terms of real impact on public opinion and legislation, I would say it&#039;s minimum. Mainly because their actions became more and more lame over time, and never even came close to anything &#039;audacious&#039; or daring as Anonymous&#039; could come up with. [[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 13:25, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
[[Hacktivism and civic media]]. Wanted to add another post in response to some comments. The problem of scaling up is very real in activist blogs. this type of thin involvement is what you get from on line petitions and so forth, and in order to have real impact it must be coupled with community organizing. meaning actual people, who get together, meet face to face, organize actions and actually show up at city hall or the state house and make their case to law makers. If people are not willing to do this it is difficult for online activism to scale up beyond a group of like minded individuals or to have any meaningful impact on their goals.[[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 13:44, 24 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This week’s topic, by far, is my favorite topic we have covered in class! I thoroughly enjoyed all of this week’s readings and was pleasantly surprised by what I learned. Before this week I considered myself proficient in the knowledge of online social movements, because I have been heavily involved with a lot of campus and student groups who participate heavily within avenues of civic engagement written about. Boy, was I wrong!&lt;br /&gt;
&lt;br /&gt;
The piece that most interested me was Erhardt Graeff’s “Binders Full of Election Memes”. Admittedly, I think this spoke to me because I was guilty of “trolling” the Internet around election time. Although I may have been trolling, I am proud to say I refrained from malicious acts described by Gabriella Coleman. The type of trolling I participated in was far from anything Anonymous has committed, yet I still had a hand in retweeting or reblogging the occasional funny meme about a presidential candidate – because “I did it all for the lulz”. Naturally, because I believe I am a political animal, I would follow debates on the news between presidential candidates and then would return to social media outlets to see what would resonate with Twitter followers, Tumblr feeds, or even my own Facebook group of friends. What amazed me was Graeff’s ability to describe and articulate what I would find on my social groups. &lt;br /&gt;
&lt;br /&gt;
Meme sharing indicates there is something worth paying attention to in that moment. Maybe it is just funny. Maybe it is a little too true, which underlies the humor and implores us to pass it on. A lot of memes act as shibboleths—they indicate that you are part of the in-crowd, you get the joke, you were there when it happened. This is the power of the meme speech act. It quickly creates a networked public from its in-group. That feeling of inclusion can inspire further and future discourse.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Like Graeff alluded to, the memes that I would post or repost, would initiate a conversation with a) people who watched political debates b) people who shared similar political views. It created this “in crowd” of people, which only perpetuated people to read or participate in politics to ensure they could get these jokes. I know there was a point in the running where Romney had made the famous “47 percent” comment for which I had not yet accessed.  Sure enough, all my social media was blowing up with 47% hashtags, memes, and funny gifs. Not being able to understand what the trends were about, I was motivated to seek out legitimate news sources to read what had happened. The comment by Romney, exacerbated by online groups and memes, undoubtedly tainted the candidate’s image and I’m not sure he has been able to recover from this perspective. This small example shows the strength of social movements online is powerful, and has yet to know no boundaries. &lt;br /&gt;
&lt;br /&gt;
I think in situations such as a presidential campaign, which promotes the freedoms of democracy, it is ideal to have as many citizens participate in the matters. In this aspect, social movements have done a wonderful job of providing information to as many people as possible. Before, matters of political platforms were somewhat reserved for the elite and privileged. Recent developments have made information more accessible and relevant. Secondly, social movements can positively reinforce the desire to be involved, even if it’s out of social pressure to be part of the “in crowd”. My wanting to be involved with the latest 47% topic drove me to seek out information and stay more current with politics and national news. In this respect, social movements can promote participation. &lt;br /&gt;
&lt;br /&gt;
But, I believe that politics nowadays have moved away from what originally was concentrated on the validity of the content being discussed, to highlighting who flubbed or what mistake can be made in to memes. This, I believe, is one of the negative perspectives for which social movements fail online.  The focus of participation can be shifted to aspects that may be funny, but take away from the real issues at hand.  Henry Jenkin’s “civic media” suggests that social media and television are not solitary actions, which I agree with, but at what degree does participation look like? Does change come about when things are being retweeted or reblogged, but not translating into action. Graeff’s describes some of these concerns as:  &lt;br /&gt;
&lt;br /&gt;
Although this corroborates the value of connective action and the argument that election memes represent legitimate political speech acts, it also calls into question the quality of personalized expression and grassroots mobilization involved. But “authentic” and even cynical political participation through memes can coexist with their adoption and exploitation by professional political organizations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When speech becomes aggregated into social movements, the results are simply unfathomable. As past events have shown, massive movements (i.e. #blacklivematter, #occupy) or social injustice campaigns (i.e. Aziz Ansari’s #rupertsfault campaign against Rupert Murdoch) have happened due to the ability to assemble on online forums. I think the reason I am so attracted to this topic is because the environment of social movements have endless possibilities and unlimited abilities to include more, and more participants. &lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:11, 24 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why Accountability Matters&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Beth Novek asks, “what does civic, rather than deliberative, media look like?” She answers, “Ultimately it means recasting our conceptualization of the First Amendment to be not simply about talking about talk but also talking about action.” We do need to talk about action, but that is not enough. We need to talk about responsibility and accountability in taking action.  &lt;br /&gt;
&lt;br /&gt;
Action is an abstract word that evokes a virtually infinite number of manifestations, weak, strong, legal, illegal, disobedient, constructive, and destructive.  Action, particularly concerted action, without the constraint of accountability is a very dangerous movement. I am not limiting my discussion to physical action, as in moving online bullying to physical bullying. Digital action in our digitally dependent and digitally empowered world holds many risks. We will never agree on regulating action based on our opinions of whether a particular action is positive or negative. There are those that would contend that the actions of the 9/11 terrorists had positive effects. What we can do is take the steps to help ensure that actors are accountable for the actions. This would seem a basic tenant of a civil society, digital or physical. &lt;br /&gt;
 &lt;br /&gt;
Certainly, accountability inhibits in varying degrees the actions that a community or individual might be willing to take, as exemplified in the reactions by the government to the demonstrations against Mubarek in Egypt. There demonstrators were identified and arrested based on their Facebook identities. The videos of the release of the demonstrators were employed by the government as propaganda that it still had power over such demonstrations.  But the story does not need to end there, and we may also consider the reactions of the online world to those videos and to the actions of the government in making the arrests.  Here, everyone, demonstrator and government alike, is accountable. It is when action is taken anonymously, when actors are not accountable for their actions, that we are most at risk of abuses of power. Anonymity would appear to offer far more risks of abuse than sanctity for concerted action. As Etling observes, “anonymity diminishes the effectiveness of the very factors that facilitate effective social and political organizing…: leadership and displays of unity and commitment. It is therefore not surprising that there are no examples of influential political movements comprised of anonymous participants…. digital technologies can be used just as easily by those with nefarious intentions as those acting in the public interest.”&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:57, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Welcome back from break everyone!&lt;br /&gt;
Three topics struck me as fascinating and relevant this week: social movements gaining support through social media, symbolic versus institutional power, and the role of narratives in the acceptance and change of social norms.&lt;br /&gt;
&lt;br /&gt;
One of the common themes that struck me as I read our literature this week (especially the article by Tufecki) is that of a call for a social movement that breaks us out of an existence dictated by mass media. More specifically, I am fascinated that individuals used social media to communicate their messages and eventually gain support for social movements. In the Coleman video, we saw signs of this in the “Anonymous movement” in which people publicly attacked or poked fun of public individuals or symbols that preserve our somewhat “mundane” existence.&lt;br /&gt;
&lt;br /&gt;
I also really enjoyed the discussion of symbolic power versus institutional power. Again, in the Coleman video, the anonymous movement fought for human rights, for example, and eventually was able to positively change social norms, solely with symbolic power. &lt;br /&gt;
&lt;br /&gt;
A perfect recent example that brings these two themes together, along with Tufecki’s third theme of narratives as a driving force for social norms and social change, is the recent public outcry surrounding the Ferguson shooting. Though racism clearly existed in area for some time, a “hands up don’t shoot” narrative was falsely constructed and then spread throughout mass media, and repeated by individuals and organizations with institutional power. It has been discovered that this was a fabricated narrative. Ferguson was a huge topic on social media, and unfortunately countless individuals were misinformed as they banned together for change. It is unfortunate that institutional powers are not always required to apologize for spreading misinformation to the masses, especially because the narratives they spread are given such weight due to their formal power.&lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 16:00, 24 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Etling et al (2010) stated “The Internet also allows new voices to enter the debate by reducing the influence of gatekeepers and by permitting the rise of citizen journalists to engage in previously expensive journalistic, transparency, or fact-checking endeavors.” Social media has become the main avenue that give people the space to demonstrate how community and global issues still matter and that people are still deeply concerned and want to take an active role in making change. Zuckerman(2013) asked the following question, “So I leave you with a question: Civics is changing. How do we help those inspired by The Hunger Games use digital tools to become participatory, passionate and effective civic actors?”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In a university setting, media tools have allowed for student protests to become larger, more engaged, and effective than they would have been with the ability to access or use social media. While working in higher education institutions, I have seen social media movements reach out beyond the university student body to include parents, university administration, peer institutions and the wider community. Today’ students are very adept at quickly organizing social activism networks through email lists and Facebook; but Twitter feeds are a primary artery for soliciting participation and creating solidarity. Here is an article that speaks about the quick organization of protests and the garnering of social support after the arrest of University of Virginia student, Martese Johnson: http://www.dailymail.co.uk/news/article-3002398/Bloody-arrest-University-Virginia-student-outside-bar-sparks-massive-protest-governor-s-call-investigation.html. This demonstrates how social media and technology has given the opportunity for students’ voices about community concerns that were confined to their particular geographic areas and given them an international. Another recent incident involving a sexual assault investigation at Brown University caused uproar on the campus when an accuser, the child of a Brown corporation member/donor, was not charged. The Brown community used a blog and the hashtag #MoneyTalksatBrown to organize a protest and garner a social movement. You can read more on the blog to see how the students used social media to support their cause: http://bluestockingsmag.com/2015/03/12/moneytalksatbrown/. So while media activism is being called into question, technology allows for students to continue making their voices heard until they receive the attention of the administration and the community listens.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
Etling, B., Faris, R., and Palfrey, J. (2010) Political Change in the Digital Age: The Fragility and Promise of Online Organizing.&lt;br /&gt;
&lt;br /&gt;
Zuckerman, E. (2013) New Media, New Civics. Adapted from &amp;quot;New Media, New Civics?&amp;quot;&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 16:02, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I’m going to jump in right away and say that I enjoyed the video about how Anonymous started. From trolling to political activist is pretty interesting. I like how Anonymous became a provocative medium to spread ideas to the masses. Yet this makes me question if indeed the internet has too much power. Back then, social movements were physical, now it could occur digitally. How do we measure the strength of these movements? I mean, in the United States, there is a right to your beliefs (religion), so is going against Scientology really a just cause? Does the majority always dictate what is the right course of action? Is Democracy always to favor the majority, and thus ignore the liberties of the minority? I personally do not agree with the teachings of Scientology, yet if the law gives people the right to practice their own religion, isn’t Project Chanology unconstitutional? I understand it was a response to Scientology’s attempt to remove Tom Cruise’s interview from the internet; yet if Scientology has done it with legal and legitimate ways, it should be done. &lt;br /&gt;
&lt;br /&gt;
So my question about this is; since Anonymous has a horizontal structure with no real leaders, how do these people’s ideals reflect the masses? Do they really reflect the actual situation, and would promote things for the better? Of course, I am supportive that a cause like this could create more justice for different sensitive issues, but it still brings me to the question of whether Anonymous view reflect the publics. If it does, then sure, it’s a good way to voice the opinions and ideals of the masses. But what happens when they do not reflect those ideals? To stretch it further, what about the minorities who also have the right for their own liberties. Isn’t a social digital movement against those minorities unconstitutional? It raises more questions than it answers. The framework of voicing opinions becomes increasingly enticing, but how do we determine what the “just” cause is to do? If they are pro-Democracy, then why are they a small group focused on spreading minority ideals to the public (my assumption is that Anonymous group isn’t going to be half the population of the US). &lt;br /&gt;
&lt;br /&gt;
It questions the power and how much control governments should have. It brings us back to previous lectures about government’s way for censorship, and surveillance. Are these digital social movements harmful to the society? I do not see a problem if it reflects the masses. But what if it does not reflect the masses? Then what? Shouldn’t we find legal means to voice our opinions about certain topics? What constitute as “just”? &lt;br /&gt;
&lt;br /&gt;
Next I’d like to talk about our definition of civic media. I think Greg Peverill-Conti makes a good point about World of Warcraft. The issue about real communities versus created communities. Personally I had played World of Warcraft (very addicting), and I understand that those communities do share their interests and communicate probably more than between a mother and son. Beth Noveck also points an interesting issue that the current structure of the media is flawed. It is not playing a role to “enhance” democracy. I believe it is endangering it. With so many arguments about hate-speech, silencing, undermining, and such, I think the plausible exploitations by the media to achieve their monetary interests becomes increasingly easy. It also brings into question of whether it is “just” to jump on the bandwagon to distribute “unconfirmed” news in order to get traffic. (As we learned from previous lectures about how news websites would promote gossips from the “internet”) &lt;br /&gt;
&lt;br /&gt;
Linking the two readings/videos, Anonymous is a civic media. It is a community that uses its medium to promote things far beyond their community. It is stretching out further to other communities. As such, it beckons whether this is a good thing or not. What if one community has too much power and too much reach to voice their opinions to everyone else? What if one community has the power to silence, undermine, and or discriminate other communities? Has communities leveraged civic media to extreme levels to achieve their goals? Has the press extended their reach with civic media to the extent where news no longer is relevant? It becomes self-fulfilling, and it is not very pleasant to question if every article is legitimate or not. &lt;br /&gt;
&lt;br /&gt;
I find it very interesting to tie social movements with civic media uses to fulfill the voicing of their ideals. I believe in efficiency. As for the case of demonstrations and voicing ideals, I believe that social movements are made more efficient by using civic media. Civic media promotes it further and makes connections within the community stronger and more convenient. It also conveys its messages loudly and strongly. As you may have noticed, my previous posts had emphasized efficiency. I believe the advancement of technology is strongly tied to efficiency. Mankind is moving towards making “everything” more efficient. Be it storing foods so they don’t rot, to communicating through thousands of miles; it is all based on efficiency. Social movements do happen from time to time. As long as politics and governments are subjective, we will never have an objective way to know what regime is “just” and “sustainable”. As such, when social movements happen, it would be 10 years of pain, or 5 years of pain. With more efficiency through civic media, we could achieve a more efficient voicing of the social movement’s opinions. Whether it works or not would soon be known. It would take less time to know if it works out. This is what I believe to be the strength of Civic Media for social movements.&lt;br /&gt;
&lt;br /&gt;
I’d like to talk about the plausible flaws of Democracy. Does lobbying reflect the ideals of the masses, or just the ones that are lobbying? I think this is obvious. Only the ones that are lobbying. So could we also conclude that whoever spends more money to lobby would likely get a better outcome? I do believe so. Just as Reference 1 says, it was plausibly due to the lobbying from newer start ups and Internet-Savvy White House staff that beat out the older technology companies which resulted in Wheeler’s decision on net neutrality. I know I mentioned this many times in today’s post, but is it “just” to do this? There seems to be a lot of moral issues associated with today’s readings. Is lobbying the just way to deal with things; does it reflect what people really want? Is privacy just dependent on who has the most money for lobbying governmental officials? &lt;br /&gt;
&lt;br /&gt;
Lastly I want to say it is very interesting to read about the Arabic blogosphere. What enticed me the most was the issue about terrorism. In fact Arab bloggers would be “overwhelmingly critical” of violent extremists. That does make a pretty huge statement that I believe the majority of the Western world seem to not realize. These extremists exist not because they are from Arabic countries (I know, it’s a generalization, but may I dare say, this is sort of what the Western world seems to view of Middle East), but simply because they are extremists! The next interesting factor I found about the article is that Arabic bloggers tend to blog with their real names. I think more research and emphasis needs to be done on this. This is an interesting finding. And I also (hopefully I’m not generalizing once again) think that women were more likely to blog anonymously than men is due to the gender issues that Arabic countries face. Not trying to put my value on theirs, but perhaps women feel safer to blog anonymously. I’d definitely like to see more research on this issue. Why exactly do Arabic male bloggers use their names or obvious pseudonym? Is it so that they could “make a statement”? &lt;br /&gt;
&lt;br /&gt;
In conclusion to this week’s readings, I think it brings a lot of moral questions into technology. Technology has allowed us to advance extremely fast, but our morals and judgment seems to lag behind it. We could make efficient uses of civic media to promote social movements. We could voice our opinions through mediums (Anonymous) and do actions as long as we believe it is “just”. Though what exactly is just? That I do not know. I believe it is still a very undeveloped issue at the moment. Should we use “just” based on old norms prior to the internet? But wait, the internet is something entirely different, so shouldn’t we actually make new definitions to determine what is “just”? There is no “half” filtering, or “half” censorship. It’s either entirely, or none. With that sort of distinction, we are at the mercy of the extremes. How do we satisfy moral questions so we could have “some” censorship, but also the liberty to voice our opinions, without the destruction of news media outlets that would endorse and spread any sort of internet rumor for their own monetary benefit? We need some sort of middle ground. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=-tB4onhtAmQ&lt;br /&gt;
&lt;br /&gt;
http://web.mit.edu/comm-forum/forums/civic_media.html&lt;br /&gt;
&lt;br /&gt;
http://ethanzuckerman.com/papers/newmedianewcivicsprepress.pdf&lt;br /&gt;
&lt;br /&gt;
http://dash.harvard.edu/bitstream/handle/1/4609956/SAIS%20online%20organizing%20paper%20final.pdf?sequence=1&lt;br /&gt;
&lt;br /&gt;
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2295953&lt;br /&gt;
&lt;br /&gt;
https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2015_02_10_Score_Another_One_for_the_Internet_0.pdf    (Ref 1)&lt;br /&gt;
&lt;br /&gt;
http://civicmediaproject.org/works/civic-media-project/index&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf&lt;br /&gt;
&lt;br /&gt;
Note: Arghh, I tried posting this earlier but it did not actually get posted!&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 17:22, 24 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Speech,_Day_2:_Collective_Action,_Hacktivism,_and_Social_Movements&amp;diff=4083</id>
		<title>Speech, Day 2: Collective Action, Hacktivism, and Social Movements</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Speech,_Day_2:_Collective_Action,_Hacktivism,_and_Social_Movements&amp;diff=4083"/>
		<updated>2015-03-24T21:22:28Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Just before the break we started exploring speech online. Today, we look at what happens when speech is aggregated into social movements. When does this work? When does it fail? Who gets included and who are we leaving behind? Does the Internet serve as a better facilitator to protests in some areas versus others? We’ll also look at a particular new form of online protest –&lt;br /&gt;
hacktivism – and the special considerations that come into play when people engage in protest through altering or disabling websites. Along the way we&#039;ll grapple with limitations of online protest activity, the criticisms weighed against online protest behavior, and some of the ethical questions that come up when different organizations fight for attention to their specific causes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Joining us this week will be [http://cyber.law.harvard.edu/people/dothman Dalia Othman], a Berkman fellow and expert on civic engagement.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
; Framing&lt;br /&gt;
&lt;br /&gt;
* [http://web.mit.edu/comm-forum/forums/civic_media.html MIT Communications Forum, What is Civic Media?] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://ethanzuckerman.com/papers/newmedianewcivicsprepress.pdf Ethan Zuckerman, New Media, New Civics?] (read &amp;quot;The Thick and the Thin of Participatory Civics&amp;quot;, skim rest)&lt;br /&gt;
&lt;br /&gt;
* [http://dash.harvard.edu/bitstream/handle/1/4609956/SAIS%20online%20organizing%20paper%20final.pdf?sequence=1 Bruce Etling et al., Political Change in the Digital Age: The Fragility and Promise of Online Organizing] (read introduction, &amp;quot;Digital Technologies, Information and Political Transitions,&amp;quot; &amp;quot;Online Organizing and Contentious Politics,&amp;quot; and &amp;quot;The Uncertain Future of Digital Organizing&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
; Defining hackers, hacking, and hacktivism&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=-tB4onhtAmQ Gabriella Coleman, Anonymous from lulz to activists] (from 0:00 to 54:26)&lt;br /&gt;
&lt;br /&gt;
; Case Studies&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2295953 Yochai Benkler et al., Social Mobilization and the Networked Public Sphere: Mapping the SOPA/PIPA Debate] (pg. 4-10 only)&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2015_02_10_Score_Another_One_for_the_Internet_0.pdf Rob Faris et al., Score Another One for the Open Internet? The Role of the Networked Public Sphere in the U.S. Net Neutrality Debate] (read intro and conclusion, skim rest)&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf Bruce Etling et al., Mapping the Arabic Blogosphere: Politics, Culture, and Dissent] (read Key Findings and Introduction, skim rest)&lt;br /&gt;
&lt;br /&gt;
* [http://civicmediaproject.org/works/civic-media-project/index Eric Gordon and Paul Mihailidis, Civic Media Project] (peruse)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=Fgh2dFngFsg Aaron Swartz, How We Stopped SOPA]&lt;br /&gt;
&lt;br /&gt;
* [http://www.utsc.utoronto.ca/~farrell/blogpaperfinal.pdf Daniel Drezner and Henry Farrel, The Power and Politics of Blogs] (read introduction, &amp;quot;The networked structure of the blogosphere;&amp;quot; skim &amp;quot;How skewedness affects politics;&amp;quot; read &amp;quot;The constraints on blog influence&amp;quot; and conclusion)&lt;br /&gt;
&lt;br /&gt;
* [https://civic.mit.edu/blog/erhardt/molly-sauter-and-the-coming-swarm-a-fireside-chat Erhardt Graeff, Molly Sauter and the Coming Swarm: A Fireside Chat]&lt;br /&gt;
&lt;br /&gt;
* [https://soundcloud.com/bwalker/doing-it-for-the-lulz Benjamen Walker, Doing it for the LULZ (from &#039;&#039;Too Much Information&#039;&#039;)] (11:00 to 22:45 only, language at times is NSFW. &#039;&#039;Too Much Information&#039;&#039; drifts between fiction and non-fiction, but this excerpt is non-fiction.)&lt;br /&gt;
&lt;br /&gt;
* [http://civic.mit.edu/blog/erhardt/mapping-the-trayvon-martin-media-controversy Erhardt Graeff, Mapping the Trayvon Martin Media Controversy]&lt;br /&gt;
&lt;br /&gt;
* [http://www2.scedu.unibo.it/roversi/SocioNet/AdamicGlanceBlogWWW.pdf Lada Adamic and Natalie Glance, The Political Blogosphere and the 2004 U.S. Election: Divided They Blog] (read introduction, analysis, and conclusion – i.e., pages 1-3 and 8-15)&lt;br /&gt;
&lt;br /&gt;
* [http://journalistsresource.org/studies/international/global-tech/social-media-protest-egypt-tahrir-square Alex Remington, Social Media and Participation in Political Protest: Observations from Tahrir Square]&lt;br /&gt;
&lt;br /&gt;
* [http://technosociology.org/?p=904 Zeynep Tufekci, #Kony2012, Understanding Networked Symbolic Action &amp;amp; Why Slacktivism is Conceptually Misleading]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.socialflow.com/post/7120244932/data-viz-kony2012-see-how-invisible-networks-helped-a-campaign-capture-the-worlds-attention Gilad Lotan, KONY2012: See How Invisible Networks Helped a Campaign Capture the World’s Attention]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/publications/2010/Tale_Two_Blogospheres_Discursive_Practices_Left_Right Yochai Benkler and Aaron Shaw, A Tale of Two Blogospheres: Discursive Practices on the Left and Right]&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_7.pdf Yochai Benker, &#039;&#039;The Wealth of Networks&#039;&#039;] (Chapter 7 - &amp;quot;The Emergence of a Networked Public Sphere&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/04/20/the-tweetbomb-and-the-ethics-of-attention/ Ethan Zuckerman, The Tweetbomb and the Ethics of Attention]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 11:51, 11 February 2014 (EST)&#039;&#039;&#039;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hope everyone had a great break! This is not class related specifically - I just wanted to pop in and post about Facebook&#039;s new changes in service regarding the banning of certain content. I can certainly see where some people&#039;s freedom of expression would be insulted. &amp;quot;How dare they censor me!&amp;quot; are the cries being heard.&lt;br /&gt;
&lt;br /&gt;
That said, Facebook is a private enterprise (as in not a government agency paid for by tax dollars) and can therefore do whatever they please. You don&#039;t like it? Go use Twitter. Go make your own forum, go do your own blog, pound sand, you certainly are not required to use Facebook.&lt;br /&gt;
&lt;br /&gt;
What do you all think?&lt;br /&gt;
&lt;br /&gt;
Soundbites from the NYTimes Article:&lt;br /&gt;
http://bits.blogs.nytimes.com/2015/03/16/facebook-explains-what-it-bans-and-why/?_r=0&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Facebook Clarifies Rules on What It Bans and Why&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
On Monday, the company clarified its community standards to give its users more guidance about what types of posts are not allowed on the service.&lt;br /&gt;
&lt;br /&gt;
“We’re trying to strike the balance based on the way our community works,” Monika Bickert, Facebook’s head of global policy management, said in an interview. “The landscape is complicated.”&lt;br /&gt;
&lt;br /&gt;
Terrorist organizations like the Islamic State have long been banned from the service. But supporting or praising groups involved in “violent, criminal or hateful behavior” is also banned, the updated rules say.&lt;br /&gt;
&lt;br /&gt;
Threatening people with physical or financial harm, or bullying them by posting items intended to degrade or shame them, is also prohibited. So is anything that encourages suicide or eating disorders.&lt;br /&gt;
&lt;br /&gt;
“It’s tempting to think of free expression and having a voice as black and white — either you have it or you don’t,” Mr. Zuckerberg said. “But giving people a voice, like most things in our society, is something that we must make incremental progress towards.”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;And another writeup:&#039;&#039;&#039;&lt;br /&gt;
http://pontiactribune.com/new-facebook-rules-sharing-this-article-might-get-you-banned/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Just to add my viewpoint, this was my response to a friend that posted the above Pontiac Tribune link on Facebook. I may of course only be in the minority.:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;I was reading this, and as someone who does not usually post anything controversial unless it&#039;s about which hard wood is better for making a portable bar, I thought this was interesting enough to take a devil&#039;s advocate stand on. Facebook is not a government agency. It&#039;s a private enterprise (I don&#039;t mean private company in relation to I know it&#039;s &#039;publicly traded&#039;).&lt;br /&gt;
&lt;br /&gt;
Therefore what they allow and don&#039;t allow is completely and utterly their choice. We don&#039;t have to use Facebook. We can go create our own blogs, our own sites, post our own content on a forum that we own and control, without risk of being &amp;quot;banned&amp;quot;. Now depending on what you are posting, you may or may not run afoul of the government, but that&#039;s between you and the government, and maybe the terms and conditions of wherever you are hosting said content.... but overall, I don&#039;t see this as a &amp;quot;freedom of speech&amp;quot; argument.&lt;br /&gt;
&lt;br /&gt;
This quote from the article is rather disingenuous. &amp;quot;Facebook has decided to become the world’s censor. This may end up being the final nail in the coffin of a social media outlet that has seen users flee from other idiotic policies.&amp;quot; (I doubt it by the way - the nail analogy)&lt;br /&gt;
&lt;br /&gt;
Facebook is only becoming the thought police FOR THEMSELVES. If they don&#039;t want certain content on THEIR servers, being fed to the masses that are THEIR users, then that is THEIR prerogative, not ours.&lt;br /&gt;
&lt;br /&gt;
Will people abandon Facebook because their feelings are hurt that they can&#039;t share that rape video? Or that gang beating? Or that gorgeous naked man with the sculpted 6-pack? Or whatever else pissed FB off? Of course. So be it. Get out of the sandbox and go build your own.&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 14:28, 22 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Erika (and everyone else)!&lt;br /&gt;
Interesting what you wrote. I liked the quote from Mr. Zuckerberg; “It’s tempting to think of free expression and having a voice as black and white — either you have it or you don’t...”, because that is something I believe often is forgotten in the debate about free speech. In my opinion is protecting the freedom of expression not the same as letting everyone say exactly what they want. Because that can limit the freedom of others. Here are some examples of why freedom of expression is not black and white: &lt;br /&gt;
&lt;br /&gt;
1. If someone threatens you, you might not have the courage to express yourself, and your freedom is therefore limited. (In some cases can threats even effect all aspects of your life.)&lt;br /&gt;
2. If you get triggered through pro-eating disorder material (like you talked about Erika), you will also be silenced since someone who is suffering from an eating disorder have a hard time focusing on anything else than food and weight (and therefore probably won´t be very active in debates). Consequently is such material limiting the expression of others.&lt;br /&gt;
3. If you bully someone online (or offline), you mentally break down the other person. That can result in lower self esteem of the bullied and he or she might no longer have the courage to speak up and express him/herself. &lt;br /&gt;
&lt;br /&gt;
It is hard to know what should be censored and what should´t. But it is important to reflect upon the fact that freedom never is black or white, and that liberalism isn´t a synonym to letting everyone do exactly what they want. &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:46, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
This week&#039;s readings were wonderful and engaging but internet activism and online social movements cannot always be categorized in the same way as traditional activism.  I feel that there is a heavy emphasis placed on an assumed laziness (perhaps the wrong phrasing) on the part of the blogger, online organizer, what have you.  Yes, traditional organizing like real life marches or on the ground activism translates to a certain kind of activism and can lead to social and political change that cannot be achieved if the efforts remain online, as articles like Ethan Zuckerman’s, “New Media, New Civics?” point out.  But we cannot define online activism in the same framework we use in examining our traditional notions of activism.  The Internet, this still relatively young space, doesn&#039;t yet have as much of a &amp;quot;status quo&amp;quot; of sorts - - meaning, space can be taken up by more people than before (granted, exceptions for places that don&#039;t easy access to the internet or their internet is censored and/or blocked).  In this way, saturating this new media with a marginalized viewpoint, perhaps from members of of traditionally marginalized groups is a strong political act within itself.  Making it so that new media is not the same as what you would get by turning on the regular news, this is an action itself. For example, I found the &amp;quot;Mapping the Arabic Blogosphere&amp;quot; article pointed to the phenomenon.  In looking at the different descriptions of peoples&#039; blogs one can see a range of traditional ones to a growing degree of ones discussing HIV/AIDS, women&#039;s issues, etc. &lt;br /&gt;
([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 15:49, 24 March 2015 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I loved watching Gabriella Coleman’s speech on Anonymous this week, particularly because I’ve been fascinated by – and conflicted in my opinions about – the group over the course of the past few years.   I first read about them in detail in 2012, following their focus on a rape case in Missouri.  The case had been all but dismissed by the courts and the media, until Anonymous seized on an exposé that had been published in the Kansas City Star.  In this case, I was immediately favorable to how they handled the situation; it truly seemed like they were bringing justice to a case that otherwise would have been brutally unjust.  But I also felt complications around the power of “online vigilantism,” since if a powerful group like Anonymous could focus its energies in a direction I agreed with, it could just as easily use its powers towards an end I (or others) felt was wrong.  For example, the group drew controversy when it released incorrect information about the supposed police officer that had shot Michael Brown in Ferguson.  It’s also potentially just as problematic to see what Anonymous chooses not to highlight, including this follow-up to the rape case in Missouri, when earlier this year, the victim attempted suicide again, and her mother wondered where the online group’s support had gone (http://www.washingtonpost.com/blogs/she-the-people/wp/2014/01/07/daisy-coleman-alleged-rape-victim-attempts-suicide-again/).&lt;br /&gt;
&lt;br /&gt;
Another thing I have had difficulty grappling with is how the group balances its “lulz” mentality with more serious political activism.  It was very interesting to hear Gabriella Coleman address this tension and show how it is clearly a big source of confusion even within the group itself.  But it was equally helpful to hear her assessment that the humor and irreverence are political statements in and of themselves.  I particularly liked her comparison of Anonymous to other groups in the past, such as the Cynics and the Dadaists.  I had not thought about the fact that confusion and humor can be powerful cultural forces of protest and activism, and I had never thought of the “lulz” as an essential part of the group’s activism until she drew those comparisons.  The humorous elements of the group also seem to help it gain legitimacy and respect among certain communities that might not afford such privilege to other activist groups.  It reminds me of Ethan Zuckerman’s “cute cat theory of digital activism,” because of the idea that sometimes political activism needs to be masked in other forms of content in order to gain traction online.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 09:02, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi everyone!&lt;br /&gt;
&lt;br /&gt;
This week´s reading was very interesting since it was about something you hear about almost every day. The Internet can be used in many ways, and social movements on the Internet don´t always look the same. &lt;br /&gt;
&lt;br /&gt;
Drezner and Farrel write that ”the typical blog is written by a teenage girl”. However, all blogs in table 3 - Blogs read by the media and Table 4 - Blogs read by elite media (they show influential blogs/bloggers) are as far as I can see, written by men. This is very interesting since it means that even though the typical blogger is a teenage girl (or at least was when this was written in 2004), the most influential bloggers are male. I also thought about gender when I read Etling´s text about the Arabic Blogosphere, when he wrote that ”Arabic bloggers are prominently young and male”.&lt;br /&gt;
&lt;br /&gt;
What I also found interesting was that it often is critical that traditional media pick up and write about what the blogs have posted if the big audience should pay notice to it. Traditional media has in that way power that sometimes is difficult for new media to claim. &lt;br /&gt;
&lt;br /&gt;
Zuckerman wrote about ”the thick and the thin of participatory civics”. He meant that ”thick” participation is when you have to use your head while ”thin” participation is when you need your feet, or when you don´t have to think and use your brain. He mentioned that thin participation often is negatively called slacktivism and that a lot of people blame those activists to be lazy and not doing ”real activism”. Zuckerman wanted to challenge that view and problematize the issue in new ways. &lt;br /&gt;
&lt;br /&gt;
Thin participatory civics is often connected to new and social media. However, I would say that traditional media sometimes take advantage of this type of activism as well. One example is the annual radio/TV program Serious request from the Netherlands that has been broadcasted every December since 2004. The project has now been spread to several countries, but in most cases under another name. The purpose of the project is to involve as many persons as possible in collecting money to a different cause each year. Money has been raised for victims of land mines, for clean drinking water, HIV/AIDS, for victims of sexual violence, etc. (Wikipedia, 2015). The following paragraph explains the project:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the Dutch 3FM Serious Request three popular radio DJs are locked up for six days in a small temporary radio studio (the &amp;quot;Glass House&amp;quot;), placed in a main square in a different city each year. Living on a juice-only fast, the DJs make an interactive, themed broadcast around the clock, while regular programming on the station is suspended. Instead 3FM and its website are completely dedicated to the event, which is also transmitted as a continuous audio and video live-stream. Additionally there is television coverage, integration with social media, and a dedicated mobile app.&amp;quot; (Wikipedia, 2015)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Some of the things the project include:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
-Radio/TV profiles that lead the show.&lt;br /&gt;
&lt;br /&gt;
-Auctions on the internet.&lt;br /&gt;
&lt;br /&gt;
-Telephone calls to raise money.&lt;br /&gt;
&lt;br /&gt;
-Projects that anyone can start to raise money.&lt;br /&gt;
&lt;br /&gt;
-Sharing for example TV clips on social media to raise people´s awareness. &lt;br /&gt;
&lt;br /&gt;
-Listening to the radio/watching TV (without listeners, there wouldn´t be a show.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As you can see, there are many ways (both ”thin” and ”thick”) in which people can participate and organize themselves. I think that it shows how both the ”thick” and ”thin” can be crucial and good. &lt;br /&gt;
&lt;br /&gt;
Wikipedia, 2015. Retrieved 3/23/2015 from &#039;&#039;http://en.wikipedia.org/wiki/Serious_Request&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 11:52, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Great points, everyone! Another fun piece of reading that was just posted related to tomorrow&#039;s discussion is [http://civicmediaproject.org/works/civic-media-project/binders-full-of-election-memes-participatory-culture-invades-the-2012-us-election Binders Full of Election Memes] by fellow Berkman Fellow Erhardt Graeff. [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 14:45, 23 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
I think that the internet is a great device for a civic debate, protest or manifestation of society, however there may be some dangers that these groups of activists can face such as being labeled, hacked, or portrait in different way than what they really are, so I think that the balance that one must strive to reach is the idea of non violence over the platform of the internet, and the education and security that can ensure safety, of everyone in every way.&lt;br /&gt;
&lt;br /&gt;
If some news are exposed can create a great impact on people, however it will take sometimes for people to be able to understand the way how information on the internet functions for the ones that posted and find it, this is we should strive to a greater level of awareness to only enjoy the benefits of the internet in social movements.&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:54, 23 March 2015 (EDT))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hello All!&lt;br /&gt;
&lt;br /&gt;
I hope everyone had a fun and restful spring break. Even though I spent the week in Florida, thanks to my iPhone I was able to get through this week’s readings. &lt;br /&gt;
&lt;br /&gt;
While all of the readings on collective action, hacktivism, and social movements were extremely thought-provoking, I was especially intrigued by Ethan Zuckerman’s, “New Media, New Civics?” article about online activism because, even though I am a huge fan of Malcolm Gladwell’s work, I totally agree with Zuckerman’s opposing stance on the value of participatory civics in the digital public sphere as an agent for change. &lt;br /&gt;
   &lt;br /&gt;
In his article, Zuckerman applies a very useful matrix to case studies of digital activism which denotes how varying degrees of thin and thick engagement can collectively impact change of both norms and codes, as he eloquently points out, “if enough of us raise our voices loud enough, we may persuade our mobile phone company or our nation to change its path” (14). &lt;br /&gt;
&lt;br /&gt;
I know from personal experience that organizations such as Change.org not only collectively involve a large enough population of thin engagement participants to enact normative and instrumental change but they have also become an avenue of inspiration for others to participate in subsequent thick forms of engagement to solve additional problems and recruit even more participants. &lt;br /&gt;
&lt;br /&gt;
According to their “About” page Change.org currently has more than 85 million users in 196 countries. That is certainly a significant number of voices actively contributing to a wide array of social movements.&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 00:28, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Beth Noveck&#039;s take on civic engagement was particularly controversial to me; at once I agree with her view that community engagements don&#039;t &amp;quot;scale&amp;quot; -- this idea brings to mind the example of the stereotype cookie-bake ladies who, getting together, stand on the proverbial corner of the road, put up a bake sale, and send all $124 of the proceeds to the Pentagon to help out with the war. They go to sleep thinking they have come together and done a great thing. When in the bigger picture, it is not society they have helped but their own consciences. Noveck&#039;s point about civic scaleability is pertinent everywhere we watch community efforts like this come to fruition only to cause the smallest of imperceptible ripples across the water. I would add that in addition to this problem of non-effectively translatable community engagement to politics, the discussion about words to action also suffers from information-flooding and information-dilution. This problem aside, the part where Noveck&#039;s stance is problematic is that community engagement does not necessarily translate into action. This stance overly discounts the power of norms as understood from Lessig&#039;s Code point of view. While this may be the case short term, Zuckerman is a treasure trove of examples to counter this argument -- especially from the Middle East and Islamic states -- where community engagement translates into fundamental shifts in norms. And norms are, in the end, the most powerful political actors in a democracy -- even in non-democracies. &lt;br /&gt;
&lt;br /&gt;
In the Berkman report about trends in Arabic civic engagement, it was noted that most of these online activities seem to have the most &amp;quot;impact&amp;quot; in semi-repressive governments; doing less well in the least repressive governments and in the most repressive governments. One reason for this could be back to the problem of information dilution and over access in affluent communities. With societies in the least repressive governments, there is an overflow of news, of interests, of general online activity that have little to do with discussions about community. Rather, out of contentedness are born the classic children Complacency and Inaction. Digital media merely increases the speed of confusion and dilution. So the considerations of a society&#039;s comfort, it&#039;s information dilution levels, and its general government regulation are considerations that have come to the table about civic involvement and digital media in a way that is at once encouraging and discouraging. Encouraging when we read about Zuckerman&#039;s highlighting of the Pakistani community of women embroiderers who have been empowered to change societal norms via social media, and discouraging when we think about the majority of a comfortable society&#039;s use of its digital tools to do less than community-beneficial things. Great readings this week. Looking forward to piecing them together through lecture.&lt;br /&gt;
&lt;br /&gt;
Chanel&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 00:45, 24 March 2015 (EDT)&lt;br /&gt;
------&lt;br /&gt;
&lt;br /&gt;
Hello everyone after the spring break!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Staring a Collective Action, Hacktivism or a Social Movement, they all are provoked by certain political or social events, by something done or something not being done by the government. From today’s reading it seams that in most of the cases the trigger has always something to do with the government not doing the right thing or not doing anything at all, Aaron Swartz telling  us  how  KOIKA , later on SOPA was  stopped, the Arab Spring, the hactivism organized by the Anonymous, the common element is that in all these cases single, otherwise ordinary individuals, combine forces in order to oppose the government united by a common goal.  During the history people has done this using different means , more or less violent, but civil protests are not new phenomenon. What is  new is the means we use nowadays. Internet is a very powerful tool. After today’s reading (and listening), I  would  conclude it’s power is based on three main pillars – Accessibility, Speed and Anonymity. Internet is an open tribune for everyone, everyone can make its opinion public and can easily find supporters by sharing it through the social communities.  The second thing is the speed, the number of the supporters can reach thousands for just few days, as Aaron Swartz said it happened  with the anti- SOPA campaign.  Last but not least is the anonymity Internet is offering. An Internet user can initiate a group, community or be counted  as a supporter of such one and still stay anonymous. A lot of people who would not dear to stand behind a cause and defend it on live, are gladly supporting the same cause online. This is bringing the question, how real all online movements and initiatives are? In some cases it turns out to be as real as it could be. When we take examples like the Arab Spring where the people transmitted the movement from Internet to the streets  and keep on defending the idea. The most recent example I found is in Istanbul, last week where more than 100,000 people turned the funeral of  Berkin Elvan into a mass demonstration for civil rights. As Zeynep Tufecki Is commenting on the event  “No formal organization made the call” she says,  it all has started in Twitter and later on turned out that Berkin&#039;s face had become a “symbol of civic resistance shared on social media from Facebook to Instagram”.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On the other hand there are cases when people are sharing a politically orientated  image macro memes (Erhardt Graeff’s analysis on the election memes) but we could hardly conclude all of them are truly engaged with the cause. Most of them are just finding  the memes  amusing and funny . We could judge by the number of people sharing and liking the memes for certain tendencies in the society  but  it would not be right to assume all those people would defend the idea or cause behind the funny memes on the street. The research showing that actually most of the tweets regarding the Arab Spring were coming from Arabs in US and Europe  is another prove  that the  conclusions based on the “online support” should be carefully examined and could  be  deceiving in some cases. I think Bruce Etling, Robert Faris and John Palfrey made a  very  good point on this, categorizing the social online activities  into Mobs, Movements and CSOs. In the same spirit is the “Thick and Thin of Participatory Civics”  theory of , Ethan Zuckerman who clearly explains that  there is a big difference between the  “lazy”, thin participation with by clicking the mouse and the thick one, where some dedication is needed.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
I really liked the speech of  Aaron Swartz and  felt  very sorry for his tragic end  of his personal story but  back to the subject , I was mostly impressed by the number of online petitions he had organized. What I am curious  about is to know  a little  bit more about the legal value of  such a petition. I  think  that some  issues  like the act of signing an online petition are not very clear to me. Should  each of the signatures use an e-signature in order his vote  to be recognized as a valid one. I think this would be impossible for realization but otherwise how the authenticity of such a petition could  be assured so it could have a legal value?    ([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
&lt;br /&gt;
[[Shouting from a soap box or singing in the shower?]] This line stuck in my head as i read Yockhai Benkler et al. This is a question often ask amongst activist and friends in regards to political blogs. When you blog, do you speak to three thousand people or only three? Very difficult to know. This is why i&#039;ve developed a few techniques to not waste time blogging. A quick short paragraph is usually best, no need for an entire manifesto because, again, you may be communicating with only three people. When it comes to countering hate speech, I only respond to those that cross the line into racism and violent threats, often referencing the audience and the possibility that someone in law enforcement might be reading the blog. Finally when it comes to arguing opposing points of view I try to respond to those who write full sentences and try to make an argument.&lt;br /&gt;
&lt;br /&gt;
From Anonymus to LULZ by Gabriella Coleman was a very interesting presentation. There is a big difference between blogging and actual face to face, hand shaking community organizing work. Furthermore, one doesn&#039;t work without the other. The occupy movement used both tactics to some extent, but in my opinion, got caught up in the anonymous philosophy and wasted a tremendous opportunity to really organize and have an impact. Sadly their obsession with no leadership and their endlessly mind numbing deliberation sessions won over reason, instinct and action. I still give the young kids Kudos for revolting and shaking up the tree. I&#039;ll admit, I used the occupy movement to further my own agenda and the movement happily obliged, and it was a net positive for the communty organization i worked with, but in terms of real impact on public opinion and legislation, I would say it&#039;s minimum. Mainly because their actions became more and more lame over time, and never even came close to anything &#039;audacious&#039; or daring as Anonymous&#039; could come up with. [[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 13:25, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
[[Hacktivism and civic media]]. Wanted to add another post in response to some comments. The problem of scaling up is very real in activist blogs. this type of thin involvement is what you get from on line petitions and so forth, and in order to have real impact it must be coupled with community organizing. meaning actual people, who get together, meet face to face, organize actions and actually show up at city hall or the state house and make their case to law makers. If people are not willing to do this it is difficult for online activism to scale up beyond a group of like minded individuals or to have any meaningful impact on their goals.[[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 13:44, 24 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This week’s topic, by far, is my favorite topic we have covered in class! I thoroughly enjoyed all of this week’s readings and was pleasantly surprised by what I learned. Before this week I considered myself proficient in the knowledge of online social movements, because I have been heavily involved with a lot of campus and student groups who participate heavily within avenues of civic engagement written about. Boy, was I wrong!&lt;br /&gt;
&lt;br /&gt;
The piece that most interested me was Erhardt Graeff’s “Binders Full of Election Memes”. Admittedly, I think this spoke to me because I was guilty of “trolling” the Internet around election time. Although I may have been trolling, I am proud to say I refrained from malicious acts described by Gabriella Coleman. The type of trolling I participated in was far from anything Anonymous has committed, yet I still had a hand in retweeting or reblogging the occasional funny meme about a presidential candidate – because “I did it all for the lulz”. Naturally, because I believe I am a political animal, I would follow debates on the news between presidential candidates and then would return to social media outlets to see what would resonate with Twitter followers, Tumblr feeds, or even my own Facebook group of friends. What amazed me was Graeff’s ability to describe and articulate what I would find on my social groups. &lt;br /&gt;
&lt;br /&gt;
Meme sharing indicates there is something worth paying attention to in that moment. Maybe it is just funny. Maybe it is a little too true, which underlies the humor and implores us to pass it on. A lot of memes act as shibboleths—they indicate that you are part of the in-crowd, you get the joke, you were there when it happened. This is the power of the meme speech act. It quickly creates a networked public from its in-group. That feeling of inclusion can inspire further and future discourse.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Like Graeff alluded to, the memes that I would post or repost, would initiate a conversation with a) people who watched political debates b) people who shared similar political views. It created this “in crowd” of people, which only perpetuated people to read or participate in politics to ensure they could get these jokes. I know there was a point in the running where Romney had made the famous “47 percent” comment for which I had not yet accessed.  Sure enough, all my social media was blowing up with 47% hashtags, memes, and funny gifs. Not being able to understand what the trends were about, I was motivated to seek out legitimate news sources to read what had happened. The comment by Romney, exacerbated by online groups and memes, undoubtedly tainted the candidate’s image and I’m not sure he has been able to recover from this perspective. This small example shows the strength of social movements online is powerful, and has yet to know no boundaries. &lt;br /&gt;
&lt;br /&gt;
I think in situations such as a presidential campaign, which promotes the freedoms of democracy, it is ideal to have as many citizens participate in the matters. In this aspect, social movements have done a wonderful job of providing information to as many people as possible. Before, matters of political platforms were somewhat reserved for the elite and privileged. Recent developments have made information more accessible and relevant. Secondly, social movements can positively reinforce the desire to be involved, even if it’s out of social pressure to be part of the “in crowd”. My wanting to be involved with the latest 47% topic drove me to seek out information and stay more current with politics and national news. In this respect, social movements can promote participation. &lt;br /&gt;
&lt;br /&gt;
But, I believe that politics nowadays have moved away from what originally was concentrated on the validity of the content being discussed, to highlighting who flubbed or what mistake can be made in to memes. This, I believe, is one of the negative perspectives for which social movements fail online.  The focus of participation can be shifted to aspects that may be funny, but take away from the real issues at hand.  Henry Jenkin’s “civic media” suggests that social media and television are not solitary actions, which I agree with, but at what degree does participation look like? Does change come about when things are being retweeted or reblogged, but not translating into action. Graeff’s describes some of these concerns as:  &lt;br /&gt;
&lt;br /&gt;
Although this corroborates the value of connective action and the argument that election memes represent legitimate political speech acts, it also calls into question the quality of personalized expression and grassroots mobilization involved. But “authentic” and even cynical political participation through memes can coexist with their adoption and exploitation by professional political organizations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When speech becomes aggregated into social movements, the results are simply unfathomable. As past events have shown, massive movements (i.e. #blacklivematter, #occupy) or social injustice campaigns (i.e. Aziz Ansari’s #rupertsfault campaign against Rupert Murdoch) have happened due to the ability to assemble on online forums. I think the reason I am so attracted to this topic is because the environment of social movements have endless possibilities and unlimited abilities to include more, and more participants. &lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:11, 24 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Why Accountability Matters&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Beth Novek asks, “what does civic, rather than deliberative, media look like?” She answers, “Ultimately it means recasting our conceptualization of the First Amendment to be not simply about talking about talk but also talking about action.” We do need to talk about action, but that is not enough. We need to talk about responsibility and accountability in taking action.  &lt;br /&gt;
&lt;br /&gt;
Action is an abstract word that evokes a virtually infinite number of manifestations, weak, strong, legal, illegal, disobedient, constructive, and destructive.  Action, particularly concerted action, without the constraint of accountability is a very dangerous movement. I am not limiting my discussion to physical action, as in moving online bullying to physical bullying. Digital action in our digitally dependent and digitally empowered world holds many risks. We will never agree on regulating action based on our opinions of whether a particular action is positive or negative. There are those that would contend that the actions of the 9/11 terrorists had positive effects. What we can do is take the steps to help ensure that actors are accountable for the actions. This would seem a basic tenant of a civil society, digital or physical. &lt;br /&gt;
 &lt;br /&gt;
Certainly, accountability inhibits in varying degrees the actions that a community or individual might be willing to take, as exemplified in the reactions by the government to the demonstrations against Mubarek in Egypt. There demonstrators were identified and arrested based on their Facebook identities. The videos of the release of the demonstrators were employed by the government as propaganda that it still had power over such demonstrations.  But the story does not need to end there, and we may also consider the reactions of the online world to those videos and to the actions of the government in making the arrests.  Here, everyone, demonstrator and government alike, is accountable. It is when action is taken anonymously, when actors are not accountable for their actions, that we are most at risk of abuses of power. Anonymity would appear to offer far more risks of abuse than sanctity for concerted action. As Etling observes, “anonymity diminishes the effectiveness of the very factors that facilitate effective social and political organizing…: leadership and displays of unity and commitment. It is therefore not surprising that there are no examples of influential political movements comprised of anonymous participants…. digital technologies can be used just as easily by those with nefarious intentions as those acting in the public interest.”&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:57, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Welcome back from break everyone!&lt;br /&gt;
Three topics struck me as fascinating and relevant this week: social movements gaining support through social media, symbolic versus institutional power, and the role of narratives in the acceptance and change of social norms.&lt;br /&gt;
&lt;br /&gt;
One of the common themes that struck me as I read our literature this week (especially the article by Tufecki) is that of a call for a social movement that breaks us out of an existence dictated by mass media. More specifically, I am fascinated that individuals used social media to communicate their messages and eventually gain support for social movements. In the Coleman video, we saw signs of this in the “Anonymous movement” in which people publicly attacked or poked fun of public individuals or symbols that preserve our somewhat “mundane” existence.&lt;br /&gt;
&lt;br /&gt;
I also really enjoyed the discussion of symbolic power versus institutional power. Again, in the Coleman video, the anonymous movement fought for human rights, for example, and eventually was able to positively change social norms, solely with symbolic power. &lt;br /&gt;
&lt;br /&gt;
A perfect recent example that brings these two themes together, along with Tufecki’s third theme of narratives as a driving force for social norms and social change, is the recent public outcry surrounding the Ferguson shooting. Though racism clearly existed in area for some time, a “hands up don’t shoot” narrative was falsely constructed and then spread throughout mass media, and repeated by individuals and organizations with institutional power. It has been discovered that this was a fabricated narrative. Ferguson was a huge topic on social media, and unfortunately countless individuals were misinformed as they banned together for change. It is unfortunate that institutional powers are not always required to apologize for spreading misinformation to the masses, especially because the narratives they spread are given such weight due to their formal power.&lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 16:00, 24 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Etling et al (2010) stated “The Internet also allows new voices to enter the debate by reducing the influence of gatekeepers and by permitting the rise of citizen journalists to engage in previously expensive journalistic, transparency, or fact-checking endeavors.” Social media has become the main avenue that give people the space to demonstrate how community and global issues still matter and that people are still deeply concerned and want to take an active role in making change. Zuckerman(2013) asked the following question, “So I leave you with a question: Civics is changing. How do we help those inspired by The Hunger Games use digital tools to become participatory, passionate and effective civic actors?”&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
In a university setting, media tools have allowed for student protests to become larger, more engaged, and effective than they would have been with the ability to access or use social media. While working in higher education institutions, I have seen social media movements reach out beyond the university student body to include parents, university administration, peer institutions and the wider community. Today’ students are very adept at quickly organizing social activism networks through email lists and Facebook; but Twitter feeds are a primary artery for soliciting participation and creating solidarity. Here is an article that speaks about the quick organization of protests and the garnering of social support after the arrest of University of Virginia student, Martese Johnson: http://www.dailymail.co.uk/news/article-3002398/Bloody-arrest-University-Virginia-student-outside-bar-sparks-massive-protest-governor-s-call-investigation.html. This demonstrates how social media and technology has given the opportunity for students’ voices about community concerns that were confined to their particular geographic areas and given them an international. Another recent incident involving a sexual assault investigation at Brown University caused uproar on the campus when an accuser, the child of a Brown corporation member/donor, was not charged. The Brown community used a blog and the hashtag #MoneyTalksatBrown to organize a protest and garner a social movement. You can read more on the blog to see how the students used social media to support their cause: http://bluestockingsmag.com/2015/03/12/moneytalksatbrown/. So while media activism is being called into question, technology allows for students to continue making their voices heard until they receive the attention of the administration and the community listens.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
Etling, B., Faris, R., and Palfrey, J. (2010) Political Change in the Digital Age: The Fragility and Promise of Online Organizing.&lt;br /&gt;
&lt;br /&gt;
Zuckerman, E. (2013) New Media, New Civics. Adapted from &amp;quot;New Media, New Civics?&amp;quot;&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 16:02, 24 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I’m going to jump in right away and say that I enjoyed the video about how Anonymous started. From trolling to political activist is pretty interesting. I like how Anonymous became a provocative medium to spread ideas to the masses. Yet this makes me question if indeed the internet has too much power. Back then, social movements were physical, now it could occur digitally. How do we measure the strength of these movements? I mean, in the United States, there is a right to your beliefs (religion), so is going against Scientology really a just cause? Does the majority always dictate what is the right course of action? Is Democracy always to favor the majority, and thus ignore the liberties of the minority? I personally do not agree with the teachings of Scientology, yet if the law gives people the right to practice their own religion, isn’t Project Chanology unconstitutional? I understand it was a response to Scientology’s attempt to remove Tom Cruise’s interview from the internet; yet if Scientology has done it with legal and legitimate ways, it should be done. &lt;br /&gt;
&lt;br /&gt;
So my question about this is; since Anonymous has a horizontal structure with no real leaders, how do these people’s ideals reflect the masses? Do they really reflect the actual situation, and would promote things for the better? Of course, I am supportive that a cause like this could create more justice for different sensitive issues, but it still brings me to the question of whether Anonymous view reflect the publics. If it does, then sure, it’s a good way to voice the opinions and ideals of the masses. But what happens when they do not reflect those ideals? To stretch it further, what about the minorities who also have the right for their own liberties. Isn’t a social digital movement against those minorities unconstitutional? It raises more questions than it answers. The framework of voicing opinions becomes increasingly enticing, but how do we determine what the “just” cause is to do? If they are pro-Democracy, then why are they a small group focused on spreading minority ideals to the public (my assumption is that Anonymous group isn’t going to be half the population of the US). &lt;br /&gt;
&lt;br /&gt;
It questions the power and how much control governments should have. It brings us back to previous lectures about government’s way for censorship, and surveillance. Are these digital social movements harmful to the society? I do not see a problem if it reflects the masses. But what if it does not reflect the masses? Then what? Shouldn’t we find legal means to voice our opinions about certain topics? What constitute as “just”? &lt;br /&gt;
&lt;br /&gt;
Next I’d like to talk about our definition of civic media. I think Greg Peverill-Conti makes a good point about World of Warcraft. The issue about real communities versus created communities. Personally I had played World of Warcraft (very addicting), and I understand that those communities do share their interests and communicate probably more than between a mother and son. Beth Noveck also points an interesting issue that the current structure of the media is flawed. It is not playing a role to “enhance” democracy. I believe it is endangering it. With so many arguments about hate-speech, silencing, undermining, and such, I think the plausible exploitations by the media to achieve their monetary interests becomes increasingly easy. It also brings into question of whether it is “just” to jump on the bandwagon to distribute “unconfirmed” news in order to get traffic. (As we learned from previous lectures about how news websites would promote gossips from the “internet”) &lt;br /&gt;
&lt;br /&gt;
Linking the two readings/videos, Anonymous is a civic media. It is a community that uses its medium to promote things far beyond their community. It is stretching out further to other communities. As such, it beckons whether this is a good thing or not. What if one community has too much power and too much reach to voice their opinions to everyone else? What if one community has the power to silence, undermine, and or discriminate other communities? Has communities leveraged civic media to extreme levels to achieve their goals? Has the press extended their reach with civic media to the extent where news no longer is relevant? It becomes self-fulfilling, and it is not very pleasant to question if every article is legitimate or not. &lt;br /&gt;
&lt;br /&gt;
I find it very interesting to tie social movements with civic media uses to fulfill the voicing of their ideals. I believe in efficiency. As for the case of demonstrations and voicing ideals, I believe that social movements are made more efficient by using civic media. Civic media promotes it further and makes connections within the community stronger and more convenient. It also conveys its messages loudly and strongly. As you may have noticed, my previous posts had emphasized efficiency. I believe the advancement of technology is strongly tied to efficiency. Mankind is moving towards making “everything” more efficient. Be it storing foods so they don’t rot, to communicating through thousands of miles; it is all based on efficiency. Social movements do happen from time to time. As long as politics and governments are subjective, we will never have an objective way to know what regime is “just” and “sustainable”. As such, when social movements happen, it would be 10 years of pain, or 5 years of pain. With more efficiency through civic media, we could achieve a more efficient voicing of the social movement’s opinions. Whether it works or not would soon be known. It would take less time to know if it works out. This is what I believe to be the strength of Civic Media for social movements.&lt;br /&gt;
&lt;br /&gt;
I’d like to talk about the plausible flaws of Democracy. Does lobbying reflect the ideals of the masses, or just the ones that are lobbying? I think this is obvious. Only the ones that are lobbying. So could we also conclude that whoever spends more money to lobby would likely get a better outcome? I do believe so. Just as Reference 1 says, it was plausibly due to the lobbying from newer start ups and Internet-Savvy White House staff that beat out the older technology companies which resulted in Wheeler’s decision on net neutrality. I know I mentioned this many times in today’s post, but is it “just” to do this? There seems to be a lot of moral issues associated with today’s readings. Is lobbying the just way to deal with things; does it reflect what people really want? Is privacy just dependent on who has the most money for lobbying governmental officials? &lt;br /&gt;
&lt;br /&gt;
Lastly I want to say it is very interesting to read about the Arabic blogosphere. What enticed me the most was the issue about terrorism. In fact Arab bloggers would be “overwhelmingly critical” of violent extremists. That does make a pretty huge statement that I believe the majority of the Western world seem to not realize. These extremists exist not because they are from Arabic countries (I know, it’s a generalization, but may I dare say, this is sort of what the Western world seems to view of Middle East), but simply because they are extremists! The next interesting factor I found about the article is that Arabic bloggers tend to blog with their real names. I think more research and emphasis needs to be done on this. This is an interesting finding. And I also (hopefully I’m not generalizing once again) think that women were more likely to blog anonymously than men is due to the gender issues that Arabic countries face. Not trying to put my value on theirs, but perhaps women feel safer to blog anonymously. I’d definitely like to see more research on this issue. Why exactly do Arabic male bloggers use their names or obvious pseudonym? Is it so that they could “make a statement”? &lt;br /&gt;
&lt;br /&gt;
In conclusion to this week’s readings, I think it brings a lot of moral questions into technology. Technology has allowed us to advance extremely fast, but our morals and judgment seems to lag behind it. We could make efficient uses of civic media to promote social movements. We could voice our opinions through mediums (Anonymous) and do actions as long as we believe it is “just”. Though what exactly is just? That I do not know. I believe it is still a very undeveloped issue at the moment. Should we use “just” based on old norms prior to the internet? But wait, the internet is something entirely different, so shouldn’t we actually make new definitions to determine what is “just”? There is no “half” filtering, or “half” censorship. It’s either entirely, or none. With that sort of distinction, we are at the mercy of the extremes. How do we satisfy moral questions so we could have “some” censorship, but also the liberty to voice our opinions, without the destruction of news media outlets that would endorse and spread any sort of internet rumor for their own monetary benefit? We need some sort of middle ground. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=-tB4onhtAmQ&lt;br /&gt;
&lt;br /&gt;
http://web.mit.edu/comm-forum/forums/civic_media.html&lt;br /&gt;
&lt;br /&gt;
http://ethanzuckerman.com/papers/newmedianewcivicsprepress.pdf&lt;br /&gt;
&lt;br /&gt;
http://dash.harvard.edu/bitstream/handle/1/4609956/SAIS%20online%20organizing%20paper%20final.pdf?sequence=1&lt;br /&gt;
&lt;br /&gt;
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2295953&lt;br /&gt;
&lt;br /&gt;
https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2015_02_10_Score_Another_One_for_the_Internet_0.pdf    (Ref 1)&lt;br /&gt;
&lt;br /&gt;
http://civicmediaproject.org/works/civic-media-project/index&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Mapping_the_Arabic_Blogosphere_0.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 17:22, 24 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=User_talk:ErikaLRich&amp;diff=4044</id>
		<title>User talk:ErikaLRich</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=User_talk:ErikaLRich&amp;diff=4044"/>
		<updated>2015-03-11T15:54:25Z</updated>

		<summary type="html">&lt;p&gt;Caelum: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Reply to ErikaRich&#039;s comment-&lt;br /&gt;
&lt;br /&gt;
Thanks so much for your comment! As well as the links! Yes, me too. I used to spend a lot of time on Digg, until it just... got worse. I used Reddit for a while, but then work overtook me and I don&#039;t use it as much anymore. Thanks for the links, advice, and comments once again! Let me know if you think there&#039;s any way I could improve on this. (I&#039;m very open to criticism) Thanks so much!&lt;br /&gt;
&lt;br /&gt;
Best, Eric&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:54, 11 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=User_talk:ErikaLRich&amp;diff=4043</id>
		<title>User talk:ErikaLRich</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=User_talk:ErikaLRich&amp;diff=4043"/>
		<updated>2015-03-11T15:54:07Z</updated>

		<summary type="html">&lt;p&gt;Caelum: Created page with &amp;quot;Reply to ErikaRich&amp;#039;s comment-  Thanks so much for your comment! As well as the links! Yes, me too. I used to spend a lot of time on Digg, until it just... got worse. I used Re...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Reply to ErikaRich&#039;s comment-&lt;br /&gt;
&lt;br /&gt;
Thanks so much for your comment! As well as the links! Yes, me too. I used to spend a lot of time on Digg, until it just... got worse. I used Reddit for a while, but then work overtook me and I don&#039;t use it as much anymore. Thanks for the links, advice, and comments once again! Let me know if you think there&#039;s any way I could improve on this. (I&#039;m very open to criticism) Thanks so much!&lt;br /&gt;
&lt;br /&gt;
Best, Eric&lt;br /&gt;
&lt;br /&gt;
Caelum (talk) 11:53, 11 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=User_talk:Caelum&amp;diff=4042</id>
		<title>User talk:Caelum</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=User_talk:Caelum&amp;diff=4042"/>
		<updated>2015-03-11T15:53:33Z</updated>

		<summary type="html">&lt;p&gt;Caelum: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An excellent topic! One I wish I had thought of.&lt;br /&gt;
&lt;br /&gt;
As a long time member of Digg, I am interested to read where your study goes.&lt;br /&gt;
&lt;br /&gt;
From a personal perspective, I used Digg (way back) as a resource to promote websites, and help create links and &amp;quot;search engine juice&amp;quot; in order to get more favorable Google rankings for a large network of sites that I ran. Digg was a monster in its heyday, but its collapse seemed inevitable.&lt;br /&gt;
&lt;br /&gt;
The voting system could indeed be gamed, and &amp;quot;voters&amp;quot; could be bought for pennies, causing massive upheavals across the board for certain articles and categories. This of course angered long time users that took their &amp;quot;job&amp;quot; of voting articles up or down very seriously.&lt;br /&gt;
&lt;br /&gt;
As a resource, you may find this Wired article useful &amp;quot;I Bought Votes on Digg&amp;quot;:&lt;br /&gt;
http://archive.wired.com/techbiz/people/news/2007/03/72832?currentPage=all&lt;br /&gt;
&lt;br /&gt;
This quote could help to dig further (no pun intended):&lt;br /&gt;
&lt;br /&gt;
From: http://www.warriorforum.com/main-internet-marketing-discussion-forum/32417-niche-marketing-buy-digg-votes.html&lt;br /&gt;
&lt;br /&gt;
&amp;quot;As I understand it, to rise up the rankings it&#039;s not necessarily the amount of votes but the quality of the people voting. (apparently diggs algorithm bases this on things such as the length of time a user has been on digg, how often they digg, the quality of the posts they dig etc). &amp;quot;&lt;br /&gt;
&lt;br /&gt;
Good luck and look forward to reading the final paper!&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 20:42, 10 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
Reply to ErikaRich-&lt;br /&gt;
&lt;br /&gt;
Thanks so much for your comment! As well as the links! Yes, me too. I used to spend a lot of time on Digg, until it just... got worse. I used Reddit for a while, but then work overtook me and I don&#039;t use it as much anymore. Thanks for the links, advice, and comments once again! Let me know if you think there&#039;s any way I could improve on this. (I&#039;m very open to criticism) Thanks so much!&lt;br /&gt;
&lt;br /&gt;
Best, Eric&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:53, 11 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Speech,_Day_1:_Free_Expression,_Information,_and_Unwanted_Speech&amp;diff=3987</id>
		<title>Speech, Day 1: Free Expression, Information, and Unwanted Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Speech,_Day_1:_Free_Expression,_Information,_and_Unwanted_Speech&amp;diff=3987"/>
		<updated>2015-03-10T02:20:02Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can speak to a wide audience. With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? Is this form of information dissemination a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed? Will the current trends lead to more information, better information, and better- informed people or to an infinite stream of unreliable chatter? When different countries take different approaches on speech, whose values should take precedence? This class will explore speech online, the laws and corporations that regulate it, and how the Internet deals with speech that is hateful, hurtful, or otherwise objectionable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
The second half of Assignment 2 (commenting on at least three [[Assignment_2_Submissions|prospectuses]]) is due before class today.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Speech Theory&lt;br /&gt;
&lt;br /&gt;
* [https://h2o.law.harvard.edu/collages/32505 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
; Informing the Public in the Internet Age&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Persephone Miel and Rob Faris, News and Information as Digital Media Come of Age] (read executive summary)&lt;br /&gt;
&lt;br /&gt;
* [http://towcenter.org/wp-content/uploads/2015/02/LiesDamnLies_Silverman_TowCenter.pdf Craig Silverman, Lies, Damned Lies, and Viral Content: How News Websites Spread (And Debunk) Online Rumors, Unverified Claims, and Misinformation] (read executive summary)&lt;br /&gt;
&lt;br /&gt;
; Private, public, and platforms - control of speech online&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2015/sites/is2015/images/NOC_United_States_case_study.pdf Adam Holland et al., NoC Intermediary Case Studies: Intermediary Liability of Intermediaries in the United States] (Sections I and II.A. only)&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
; Unwanted and Dangerous Speech&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/aponline/2015/01/28/us/politics/ap-us-police-tracking-app.html Sheriffs Expand Concerns About Waze Mobile Traffic App]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2014/03/25/susan-benesch-on-dangerous-speech-and-counterspeech/ Ethan Zuckerman, Susan Benesch on Dangerous Speech and Counterspeech]&lt;br /&gt;
&lt;br /&gt;
* [https://medium.com/internet-monitor-2014-public-discourse/flower-speech-new-responses-to-hatred-online-d98bf67735b7 Susan Benesch, Flower Speech: New Responses to Hatred Online]&lt;br /&gt;
&lt;br /&gt;
* [http://thehill.com/blogs/floor-action/house/233660-gop-lawmaker-isis-shouldnt-have-access-to-twitter Christina Marcos, GOP Lawmaker: ISIS Shouldn&#039;t Have Access to Twitter]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* You may want to revisit EFF&#039;s [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Facing the Challenge of Online Harassment], from the second class&#039;s readings&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_7.pdf Yochai Benkler, The Wealth of Networks (Chapter 7)] (skim from 225 (&amp;quot;Our second story focuses…&amp;quot;) to 241 (end before &amp;quot;On Power Law Distributions, Network Topology, and Being Heard&amp;quot;); read from 261-66 (&amp;quot;Who Will Play the Watchdog Function?&amp;quot;))&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://law.wlu.edu/deptimages/Law%20Review/68-2Jones.pdf RonNell Anderson Jones, Litigation, Legislation, and Democracy in a Post-Newspaper America] (Section I only)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=sCk97LyrqYQ Yochai Benkler, Truthiness and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Typologies_MR.pdf Persephone Miel and Rob Faris, A Typology of Media Organizations] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://www.thisamericanlife.org/radio-archives/episode/493/picture-show?act=0#play This American Life, Picture Show] (audio, from 0:00 to 5:09)&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
* [http://www.state.gov/secretary/remarks/2015/02/237610.htm Secretary John Kerry, Outlining an Action Agenda to Counter Violent Extremism]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I really liked this week’s readings as we start to enter the topics about speech. It certainly is an interesting and back and forth topic as we must consider the implications of allowing speech (first Amendment), or censoring it incase of certain harms. (such as Apple removing the shaking baby and Bush countdown apps) The Innocence of the Muslim is definitely the most controversial of them all. Though I do agree with Facebook’s and YouTube’s decisions to only censor it for countries that it is considered offensive, and keep it up in the United States due to the first Amendment. The Constitution was created hundreds of years ago, and just as Professor Sellars has said, it’s not like its California Constitution that could be given less importance. The First Amendment has great importance and would be extremely hard to undermine or to change. This reflects hugely on laws that govern the United States as well as firms based in the US. (which means a lot of websites) &lt;br /&gt;
&lt;br /&gt;
It is quite shocking to realize that verification is so difficult on the internet. As Professor Sellars has mentioned, credit card verification for age is difficult for non-commercial websites since extra costs would be required that threatens them to close down. Passwords wouldn’t help much either. With it’s enforcement, even the government has doubts of its ability to really identify if a person is under 18 and visiting a pornographic website. This tough verification process isn’t just in explicit websites but very important too in media outlets on the web. The “blurring” between amateurs and professionals and the different forms of media forces companies to adapt. Profitability comes from internet traffic and when that is the main concern, the quality of the news becomes secondary. There is a conflict on interest between internet traffic and quality of news. As long as traffic is high, it justifies the lower quality of news. &lt;br /&gt;
&lt;br /&gt;
As such, the unfortunate feedback loop of how these fake rumor news becomes headlines and makes the news environment highly delusional. Furthermore, when multiple news outlets release the same fake story, it becomes self fulfilling. The belief that “perception is reality” makes people believe in the rumor already even if they know it is fake. They would associate “some truths” to it. But that should be left for another time to discuss. According to Silverman, the trend goes like this: a rumor happens on the internet, then some news outlets report it. It therefore gains traction which makes more news media outlets think it is legitimate and also report it. With so many news websites supporting it, it gains credibility and could no longer trace the source of origin anymore. This is all due to the inability to verify, or the ignorance to verify rumors, especially when these rumor news generate a lot of internet traffic, which translates into advertisement money or click-through-rates, etc. &lt;br /&gt;
&lt;br /&gt;
As mentioned above, the First Amendment is the basic Constitutional law of the United States and would be extremely hard to undermine or ignore. It is in built into the American way of life. This provides the breeding ground of another huge debate between the increasing amount of internet platforms (which are mostly US companies) and the traditional industries that generate content. The former wants “immunity from third party claims” whereas the latter wants laws against copyright infringement. It is hard to satisfy both sides, but both sides do have their points as well. The Digital Millennium Copyright Act criminalizes copyright work. Yet in contrast, radio and television that infringe this law in live broadcasts tend to be given a better treatment than do websites that are live all the time. &lt;br /&gt;
&lt;br /&gt;
Next I’d like to talk about whether hate speech should be censored. There is always the consideration of censoring hate speech to prevent potential harms coming the way of the institutions or countries. Yet is it against the fundamental laws of that country? I think what Facebook and YouTube did on the video “Innocence of the Muslims” reflected their careful thinking in balancing between regulations (and potential consequences) and the belief of maintaining freedom of speech. According to Rosen, Wong and Willner had the conviction to do what they believed in. Willner finalized Facebook’s hate speech policy to “ban attack on groups, but not institutions”. This was a very good framework to start from. It prevents discrimination to groups of people, but allows opinions towards things, like institutions. This actually resonates with the Waze Traffic application. Facebook and Google (YouTube) were smart to make changes dependent on the laws of those countries it affects. The Waze application lets the app users know where police are. I do not see a problem with this as they are on public territory and once again should be protected by the First Amendment. If it protects me to tell my friend that a cop car is in front of me, it should also protect me to tell people using the app that a cop car is in front of me. This action should be exactly the same. &lt;br /&gt;
&lt;br /&gt;
Now I’d like to give some views on this topic. It is a very fine line between allowing speech to be free on the internet, and potential hazards or discriminations that could occur due to that. I really liked the way Facebook (Willner) did it. I too agree that groups of people should not be allowed to be discriminated against, but institutions should be given the freedom to be criticized if necessary. A just way could be achieved from this. If localizing rules and regulations to websites is plausible (as we learned in previous lectures from the Yahoo case with Nazi products in France), then it should also be plausible to filter down to see what sort of speeches would be against local laws in different countries. I do not agree with the way Apple does things; being scared and taking down apps because they were afraid that a backlash would occur. Corporations should take a strong stance on this too. Yet I feel that because the internet has grown so quickly, it is hard to create “norms” for the internet society. Who should regulate them? Ideally I think a government department should be in charge of this; to create laws and regulations as well as guidelines for these potential sensitive issues. Make it universal so corporations like Facebook and Google could follow. If these two giant corporations follow, so would the rest of the internet. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=HfS_2oXVch0&lt;br /&gt;
&lt;br /&gt;
https://h2o.law.harvard.edu/collages/32505&lt;br /&gt;
&lt;br /&gt;
https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf&lt;br /&gt;
&lt;br /&gt;
http://towcenter.org/wp-content/uploads/2015/02/LiesDamnLies_Silverman_TowCenter.pdf&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/sites/is2015/images/NOC_United_States_case_study.pdf&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act&lt;br /&gt;
&lt;br /&gt;
http://www.dmlp.org/blog/2012/structural-weakness-internet-speech&lt;br /&gt;
&lt;br /&gt;
http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules&lt;br /&gt;
&lt;br /&gt;
https://medium.com/internet-monitor-2014-public-discourse/flower-speech-new-responses-to-hatred-online-d98bf67735b7&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=HfS_2oXVch0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:33, 7 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On the topic of ISIS use of Twitter, you may want to check out the [http://www.brookings.edu/~/media/research/files/papers/2015/03/isis-twitter-census-berger-morgan/the-isis-twitter-census-defining-and-describing-the-population-of-isis-supporters-on-twitter.pdf brand new study] by the Center for Middle East Policy at Brookings. [http://boingboing.net/2015/03/07/isis-vs-twitter-a-cautionary.html BoingBoing] already pulled some highlights. [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 09:31, 9 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Hypocrisy of Watchers: Waze&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Full concurrence with Caelum; this has been a fascinating week of readings. &lt;br /&gt;
&lt;br /&gt;
I was caught especially by the New York Times article about the Waze mobile traffic app alerting users to locations of police cars in their neighborhoods. &lt;br /&gt;
&lt;br /&gt;
I’ve noted this app before on the app store and I always viewed it as similar to those pseudo-spy/surveillance shops. Surely, some kind of undercover detail was covering these places and keeping a sort of watch and tracking of who was buying super secret surveillance cameras that could be hidden inside bobby pins and fountain pens. Surely, these places are tracked and watched themselves by law enforcement. Moreso if these shops are online and it is easier than ever to not only determine who is buying these on the edge of legality spy gadgets, but where they are and what their other purchasing history might be. I associated apps like Waze to be in a similar category; not illegal but certainly not chummy with law enforcement. And certainly watched.&lt;br /&gt;
&lt;br /&gt;
But this is the conspiracist in me.  That enforcement is actually concerned enough about these apps seems to imply that they have no real way to track users. &lt;br /&gt;
&lt;br /&gt;
So why do watchers fear being watched? Are they afraid that they will become targets? Law enforcement? So long as they have police cars and wear uniforms that all of us can actually see, unfortunately, they will always be targets to those who want them to be. &lt;br /&gt;
&lt;br /&gt;
It seems that this is more a protest against loss of speeding ticket revenues using the pretense of safety concerns. &lt;br /&gt;
&lt;br /&gt;
In Japan, they have life size silhouettes and pictures of police officers with whistles in their mouths reminding drivers to keep to the speed limit and drive carefully. The result has been that these signs have proven to be effective at preventing traffic infringements on Japanese roadways. The mere presence and reminder is enough to keep law-abiding citizens on the up and up.  Waze has a similar effect. If anything, it reminds drivers that we are being watched. And watchers would much rather see things from the shadows than from the spotlight. &lt;br /&gt;
&lt;br /&gt;
This case of protest from law enforcement is a fascinating miniature study into the broader topic of this week’s readings. Watchers don’t appreciate being watched themselves because it has a chilling effect on society when we know and identify those giant cameras in the room. Interestingly, it is an example where the chilling effect is on behavior and on behavior that is illegal or not appropriate to begin with. A positive chilling effect if ever there was one.&lt;br /&gt;
&lt;br /&gt;
The only major loss I see here is that from a traffic enforcement perspective, speeders are going to slow down and as a result, majorly impede police enforcement’s abilities to bring revenue from speed traps. We cannot punish society from sharing public information. Waze deals with public information about police cars parked or located in full view. It simply propates the information so that we “see” the police car one intersection earlier. If law enforcement were truly fearful of their own safety and fearful of targeting, then they wouldn’t put sirens on their cars or decals on their doors or drive around in a police badge or uniform. If they were truly afraid of the light, they’d hide in the darkness wearing not uniforms but in plainscothes and driving unmarked police cars. &lt;br /&gt;
&lt;br /&gt;
In the broader scope of discussion between the tensions of free speech and public safety – this is a case where I fail to see the public safety argument coming on top. It just doesn’t work when it comes from the mouths of the ones who have the most (or, theoretically should have the most) resources to watch and control society. &lt;br /&gt;
&lt;br /&gt;
Chanel&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 13:20, 9 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I’m fascinated by the topics of free speech, dangerous speech, and harassment online, especially as someone who feels passionate about making the Internet a safer place for women.  I have always supported the U.S. Constitution’s steadfast devotion to free speech, but some of the vitriol and abuse I have observed against women online has made me question whether free speech above all other values is too simplistic an approach.  My doubts particularly grew throughout the Gamergate phenomenon, during which I observed mind-boggling misogyny directed both to the general online world of women, as well as to specific individuals.  It was at that point that I realized that I am personally not in favor of free speech at all costs, since online, the speech of some can silence the speech of others through intimidation and fear.  I agree with Ethan Zuckerman free speech is a false concept, since lack of censorship will still lead to certain voices getting suppressed.  &lt;br /&gt;
&lt;br /&gt;
Because of this, I was particularly intrigued by Susan Benesch’s research and the idea that hate speech and dangerous speech can be combatted through counter speech, rather than censorship or restrictions.  I also found it interesting that social media platforms can make subtle changes to their layout or user experience in order to encourage or discourage certain types of speech.  It reinforces the idea that engineers working in Silicon Valley wield incredible power with the choices they make in designing social platforms, and it also highlights the importance of diversity in that workforce, based on the social implications of even the most subtle design choices.&lt;br /&gt;
&lt;br /&gt;
The question that still lingers for me is how the tactic of counter speech might work in self-selecting communities, such as a men’s rights forum.  In those cases, there most likely won’t be a larger community to temper conversation through counter speech, but the conversation that takes place on those sites could still potentially spur someone to commit violent action.  For example, in the case of the Isla Vista shooter, it’s known that he was involved with men’s rights groups online, but it’s less clear how directly members of those groups incited him to action.  It seems that the lines defining incitement and threats are growing blurrier as a result of the Internet, which presents problems of its own when that might be the only justification for restricting certain speech on a site, or addressing it from a legal standpoint (I’m also reminded of the Elonis vs. United States case, where the lines have been particularly blurry as well).&lt;br /&gt;
&lt;br /&gt;
Despite the additional questions that crop up, and some nuances that still aren’t clear to me, I find Susan Benesch’s approach intriguing and promising.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 21:02, 9 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
“In Japan, they have life size silhouettes and pictures of police officers with whistles in their mouths reminding drivers to keep to the speed limit and drive carefully. The result has been that these signs have proven to be effective at preventing traffic infringements on Japanese roadways. “&lt;br /&gt;
&lt;br /&gt;
Great point Chanel, I am in Japan right now and that is what I am seeing all the time when I drive around! They even have fake posters of cop cars with sirens on! Definitely a great chilling effect.&lt;br /&gt;
&lt;br /&gt;
Since the topic is about ISIS, I’d like to share this video that gives a good summary of ISIS. http://youtu.be/AQPlREDW-Ro&lt;br /&gt;
&lt;br /&gt;
“Almost one in five ISIS supporters selected English as their primary language when using Twitter. Three quarters selected Arabic (section 1.5).”&lt;br /&gt;
&lt;br /&gt;
I think this is an important issue because their purpose of using Twitter would likely to spread their beliefs and thoughts. English is a great medium to do things after all. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
“A minimum of 1,000 ISIS-supporting accounts were suspended between September and December 2014, and we saw evidence of potentially thousands more. Accounts that tweeted most often and had the most followers were most likely to be suspended (section 2.5.1).”&lt;br /&gt;
&lt;br /&gt;
I wonder where this kicks in in the security vs. free speech debate. My initial thoughts are that it’s such a sensitive topic that something has to be done. ISIS has definitely done a great deal to promote themselves on social media as evident from the high volume and number of active ISIS users. One in five uses English which really questions who these people are? Are they really radicals and extremists? Not to summarize or generalize, but I believe having some exposure to English means that they probably seen the world in more than one perspective before. If so, wouldn’t they become less of an extremist? Now what questions me is that ISIS might have hired people to help them promote themselves on social media. If so, who is willing to help them? For money? Is it moral to help a group like ISIS? Or wait, did they capture people to do it for them forcefully? &lt;br /&gt;
&lt;br /&gt;
By looking at “Top Hashtags” on page 20 from Berger and Morgan, we could see ISIS references far outweigh other topics in the Middle East. It is not only raising awareness for their group, but also creates this “fear” in other users. This is now the hot topic, and I fear that news outlets would just use this as an excuse to create more traffic for their websites. Afterall, most of these websites only focus on the traffic. And as mentioned in my previous post, over time other news outlets would follow along and it gives “legitimacy” to ISIS. Which is exactly what we do not want. It gives recognition to their group. &lt;br /&gt;
&lt;br /&gt;
“Suspensions, of which Twitter made more than a thousand by December, may have unintended consequences, including cutting off ISIS supporters from beneficial social pressures on Twitter.” – Berger and Morgan.&lt;br /&gt;
&lt;br /&gt;
This is great news, but I do not believe there are smart enough algorithms to track this yet. I believe the data is available, but its more about how we extract this out. I found this website and findings very fascinating. It detaches the extremists from the average Twitter user, which means their objective of spreading their beliefs and causing fear in others would fail. The unintended consequences by Twitter has definitely done more good than harm (from the Western anti-ISIS perspective of course). &lt;br /&gt;
&lt;br /&gt;
Yet it does lurk another question. If there’s more interactions between extremists, did we just help ISIS filter out potential members? Did we just help them find more hardcore supporters that would do their deed? Afterall sifting through hundreds of thousands of people on Twitter isn’t easy. By threatening their existence by deleting accounts, we might have made it easier for them to find loyal followers. (literally, not just on Twitter) Of course all of this is unfalsifiable and we could never prove this unless we go back in time. &lt;br /&gt;
&lt;br /&gt;
After reading those two articles, I start to wonder if platforms are just platforms, or are they much more? So I had a thought about this, imagine a huge whiteboard in a public space. The intention is for people to write on it. It is a public good. It just “exists”. It is a platform for drawings and messages. Some people would draw funny stuff, some would write inspirational stuff. Yet I am sure, some would write religious and philosophical beliefs on it too. Or beliefs that say they despise a group of people. I understand that it is offensive to some groups of people, but what if the sole purpose of that whiteboard was to be a public good so people could write “anything” they want? Or is that too farfetched? Too idealistic of a world? In that case we could say that we never really have full freedom of speech. But then ISIS isn’t protected by the First Amendment! But what if some members of ISIS are Americans? &lt;br /&gt;
&lt;br /&gt;
This issue seems to bring up more questions than it answers. Or perhaps I’m just asking too many questions. Not sure if they’re stupid questions, but they’re just taking over my head. Does the First Amendment only protect Americans? So if Americans uses hate-speech on Twitter to express their disliking of a group, is that protected by the First Amendment or not? I hope I am not ignorant here and just writing about something that has already been answered. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
http://www.brookings.edu/~/media/research/files/papers/2015/03/isis-twitter-census-berger-morgan/the-isis-twitter-census-defining-and-describing-the-population-of-isis-supporters-on-twitter.pdf&lt;br /&gt;
&lt;br /&gt;
http://youtu.be/AQPlREDW-Ro&lt;br /&gt;
&lt;br /&gt;
http://boingboing.net/2015/03/07/isis-vs-twitter-a-cautionary.html&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 22:20, 9 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Speech,_Day_1:_Free_Expression,_Information,_and_Unwanted_Speech&amp;diff=3948</id>
		<title>Speech, Day 1: Free Expression, Information, and Unwanted Speech</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Speech,_Day_1:_Free_Expression,_Information,_and_Unwanted_Speech&amp;diff=3948"/>
		<updated>2015-03-07T16:33:41Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet has the potential to revolutionize public discourse. Instead of large media companies and corporate advertisers controlling the channels of speech, anyone with an Internet connection can speak to a wide audience. With this great potential, however, comes new questions. What happens when anyone can publish to a global audience with virtually no oversight? Is this form of information dissemination a passing fad of enthusiastic amateurs or the beginning of a fundamental restructuring of the way media and news are produced and consumed? Will the current trends lead to more information, better information, and better- informed people or to an infinite stream of unreliable chatter? When different countries take different approaches on speech, whose values should take precedence? This class will explore speech online, the laws and corporations that regulate it, and how the Internet deals with speech that is hateful, hurtful, or otherwise objectionable.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Assignments==&lt;br /&gt;
&lt;br /&gt;
The second half of Assignment 2 (commenting on at least three [[Assignment_2_Submissions|prospectuses]]) is due before class today.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Speech Theory&lt;br /&gt;
&lt;br /&gt;
* (Reading on theory will be added here)&lt;br /&gt;
&lt;br /&gt;
* [https://h2o.law.harvard.edu/collages/32505 &#039;&#039;Reno v. American Civil Liberties Union&#039;&#039;, 521 U.S. 844 (1997)]&lt;br /&gt;
&lt;br /&gt;
; Informing the Public in the Internet Age&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf Persephone Miel and Rob Faris, News and Information as Digital Media Come of Age] (read executive summary)&lt;br /&gt;
&lt;br /&gt;
* [http://towcenter.org/wp-content/uploads/2015/02/LiesDamnLies_Silverman_TowCenter.pdf Craig Silverman, Lies, Damned Lies, and Viral Content: How News Websites Spread (And Debunk) Online Rumors, Unverified Claims, and Misinformation] (read executive summary)&lt;br /&gt;
&lt;br /&gt;
; Private, public, and platforms - control of speech online&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/is2015/sites/is2015/images/NOC_United_States_case_study.pdf Adam Holland et al., NoC Intermediary Case Studies: Intermediary Liability of Intermediaries in the United States] (Sections I and II.A. only)&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=HfS_2oXVch0 Berkman Center, How Internet Censorship Works] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2012/structural-weakness-internet-speech Andy Sellars, The Structural Weakness of Internet Speech]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules Jeffrey Rosen, The Delete Squad (New Republic)]&lt;br /&gt;
&lt;br /&gt;
*  Biz Stone and Alex Macgillivary, [http://blog.twitter.com/2011/01/tweets-must-flow.html The Tweets Must Flow] and [http://blog.twitter.com/2012/01/tweets-still-must-flow.html The Tweets Still Must Flow]&lt;br /&gt;
&lt;br /&gt;
; Unwanted and Dangerous Speech&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/aponline/2015/01/28/us/politics/ap-us-police-tracking-app.html Sheriffs Expand Concerns About Waze Mobile Traffic App]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2014/03/25/susan-benesch-on-dangerous-speech-and-counterspeech/ Ethan Zuckerman, Susan Benesch on Dangerous Speech and Counterspeech]&lt;br /&gt;
&lt;br /&gt;
* [https://medium.com/internet-monitor-2014-public-discourse/flower-speech-new-responses-to-hatred-online-d98bf67735b7 Susan Benesch, Flower Speech: New Responses to Hatred Online]&lt;br /&gt;
&lt;br /&gt;
* [http://thehill.com/blogs/floor-action/house/233660-gop-lawmaker-isis-shouldnt-have-access-to-twitter Christina Marcos, GOP Lawmaker: ISIS Shouldn&#039;t Have Access to Twitter]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* You may want to revisit EFF&#039;s [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Facing the Challenge of Online Harassment], from the second class&#039;s readings&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_7.pdf Yochai Benkler, The Wealth of Networks (Chapter 7)] (skim from 225 (&amp;quot;Our second story focuses…&amp;quot;) to 241 (end before &amp;quot;On Power Law Distributions, Network Topology, and Being Heard&amp;quot;); read from 261-66 (&amp;quot;Who Will Play the Watchdog Function?&amp;quot;))&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1625820 David Ardia, Free Speech Savior or Shield for Scoundrels: An Empirical Study of Intermediary Immunity Under Section 230 of the Communications Decency Act] (Read all of Section I, Parts C&amp;amp;D of Section II, and Conclusion)&lt;br /&gt;
&lt;br /&gt;
* [http://law.wlu.edu/deptimages/Law%20Review/68-2Jones.pdf RonNell Anderson Jones, Litigation, Legislation, and Democracy in a Post-Newspaper America] (Section I only)&lt;br /&gt;
&lt;br /&gt;
* [http://access.opennet.net/wp-content/uploads/2011/12/accesscontrolled-chapter-5.pdf Ethan Zuckerman, Intermediary Censorship (from &#039;&#039;Access Controlled&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://googleblog.blogspot.co.uk/2007/11/free-expression-and-controversial.html Rachel Whetstone, Free Expression and Controversial Content on the Web]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=sCk97LyrqYQ Yochai Benkler, Truthiness and the Networked Public Sphere]&lt;br /&gt;
&lt;br /&gt;
* [http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Typologies_MR.pdf Persephone Miel and Rob Faris, A Typology of Media Organizations] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://www.thisamericanlife.org/radio-archives/episode/493/picture-show?act=0#play This American Life, Picture Show] (audio, from 0:00 to 5:09)&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act Wikipedia, Section 230 of the Communications Decency Act]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/sites/default/files/cda-ag-letter.pdf Letter to Members of Congress from 49 state and territorial Attorneys General]&lt;br /&gt;
&lt;br /&gt;
* [http://www.state.gov/secretary/remarks/2015/02/237610.htm Secretary John Kerry, Outlining an Action Agenda to Counter Violent Extremism]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Links from Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I really liked this week’s readings as we start to enter the topics about speech. It certainly is an interesting and back and forth topic as we must consider the implications of allowing speech (first Amendment), or censoring it incase of certain harms. (such as Apple removing the shaking baby and Bush countdown apps) The Innocence of the Muslim is definitely the most controversial of them all. Though I do agree with Facebook’s and YouTube’s decisions to only censor it for countries that it is considered offensive, and keep it up in the United States due to the first Amendment. The Constitution was created hundreds of years ago, and just as Professor Sellars has said, it’s not like its California Constitution that could be given less importance. The First Amendment has great importance and would be extremely hard to undermine or to change. This reflects hugely on laws that govern the United States as well as firms based in the US. (which means a lot of websites) &lt;br /&gt;
&lt;br /&gt;
It is quite shocking to realize that verification is so difficult on the internet. As Professor Sellars has mentioned, credit card verification for age is difficult for non-commercial websites since extra costs would be required that threatens them to close down. Passwords wouldn’t help much either. With it’s enforcement, even the government has doubts of its ability to really identify if a person is under 18 and visiting a pornographic website. This tough verification process isn’t just in explicit websites but very important too in media outlets on the web. The “blurring” between amateurs and professionals and the different forms of media forces companies to adapt. Profitability comes from internet traffic and when that is the main concern, the quality of the news becomes secondary. There is a conflict on interest between internet traffic and quality of news. As long as traffic is high, it justifies the lower quality of news. &lt;br /&gt;
&lt;br /&gt;
As such, the unfortunate feedback loop of how these fake rumor news becomes headlines and makes the news environment highly delusional. Furthermore, when multiple news outlets release the same fake story, it becomes self fulfilling. The belief that “perception is reality” makes people believe in the rumor already even if they know it is fake. They would associate “some truths” to it. But that should be left for another time to discuss. According to Silverman, the trend goes like this: a rumor happens on the internet, then some news outlets report it. It therefore gains traction which makes more news media outlets think it is legitimate and also report it. With so many news websites supporting it, it gains credibility and could no longer trace the source of origin anymore. This is all due to the inability to verify, or the ignorance to verify rumors, especially when these rumor news generate a lot of internet traffic, which translates into advertisement money or click-through-rates, etc. &lt;br /&gt;
&lt;br /&gt;
As mentioned above, the First Amendment is the basic Constitutional law of the United States and would be extremely hard to undermine or ignore. It is in built into the American way of life. This provides the breeding ground of another huge debate between the increasing amount of internet platforms (which are mostly US companies) and the traditional industries that generate content. The former wants “immunity from third party claims” whereas the latter wants laws against copyright infringement. It is hard to satisfy both sides, but both sides do have their points as well. The Digital Millennium Copyright Act criminalizes copyright work. Yet in contrast, radio and television that infringe this law in live broadcasts tend to be given a better treatment than do websites that are live all the time. &lt;br /&gt;
&lt;br /&gt;
Next I’d like to talk about whether hate speech should be censored. There is always the consideration of censoring hate speech to prevent potential harms coming the way of the institutions or countries. Yet is it against the fundamental laws of that country? I think what Facebook and YouTube did on the video “Innocence of the Muslims” reflected their careful thinking in balancing between regulations (and potential consequences) and the belief of maintaining freedom of speech. According to Rosen, Wong and Willner had the conviction to do what they believed in. Willner finalized Facebook’s hate speech policy to “ban attack on groups, but not institutions”. This was a very good framework to start from. It prevents discrimination to groups of people, but allows opinions towards things, like institutions. This actually resonates with the Waze Traffic application. Facebook and Google (YouTube) were smart to make changes dependent on the laws of those countries it affects. The Waze application lets the app users know where police are. I do not see a problem with this as they are on public territory and once again should be protected by the First Amendment. If it protects me to tell my friend that a cop car is in front of me, it should also protect me to tell people using the app that a cop car is in front of me. This action should be exactly the same. &lt;br /&gt;
&lt;br /&gt;
Now I’d like to give some views on this topic. It is a very fine line between allowing speech to be free on the internet, and potential hazards or discriminations that could occur due to that. I really liked the way Facebook (Willner) did it. I too agree that groups of people should not be allowed to be discriminated against, but institutions should be given the freedom to be criticized if necessary. A just way could be achieved from this. If localizing rules and regulations to websites is plausible (as we learned in previous lectures from the Yahoo case with Nazi products in France), then it should also be plausible to filter down to see what sort of speeches would be against local laws in different countries. I do not agree with the way Apple does things; being scared and taking down apps because they were afraid that a backlash would occur. Corporations should take a strong stance on this too. Yet I feel that because the internet has grown so quickly, it is hard to create “norms” for the internet society. Who should regulate them? Ideally I think a government department should be in charge of this; to create laws and regulations as well as guidelines for these potential sensitive issues. Make it universal so corporations like Facebook and Google could follow. If these two giant corporations follow, so would the rest of the internet. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=HfS_2oXVch0&lt;br /&gt;
&lt;br /&gt;
https://h2o.law.harvard.edu/collages/32505&lt;br /&gt;
&lt;br /&gt;
https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Overview_MR.pdf&lt;br /&gt;
&lt;br /&gt;
http://towcenter.org/wp-content/uploads/2015/02/LiesDamnLies_Silverman_TowCenter.pdf&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/sites/is2015/images/NOC_United_States_case_study.pdf&lt;br /&gt;
&lt;br /&gt;
https://en.wikipedia.org/wiki/Digital_Millennium_Copyright_Act&lt;br /&gt;
&lt;br /&gt;
http://www.dmlp.org/blog/2012/structural-weakness-internet-speech&lt;br /&gt;
&lt;br /&gt;
http://www.newrepublic.com/article/113045/free-speech-internet-silicon-valley-making-rules&lt;br /&gt;
&lt;br /&gt;
https://medium.com/internet-monitor-2014-public-discourse/flower-speech-new-responses-to-hatred-online-d98bf67735b7&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=HfS_2oXVch0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:33, 7 March 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3947</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3947"/>
		<updated>2015-03-06T18:43:57Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Facebook &amp;amp; Big Data vs. Your Privacy&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Prospectus_FB_and_privacy_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:06, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Intentions and Outcomes of Youtube’s Copyright and Coding Regulations&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_prospectus03.03.15.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 15:51, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Comments on Olivia&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Hi Olivia, &lt;br /&gt;
&lt;br /&gt;
Let me start by saying I think that Youtube is a great source for your project.  I’m not saying that just because I am doing my paper on Youtube.  I find the creative ways that people are using it fascinating.  Much more so than some of the other platforms.&lt;br /&gt;
&lt;br /&gt;
If I may summarize, you plan to discuss how legal pressures forced Youtube to introduce technologies that changed the user experiences, like Copyright ID.  You also mentioned some other (possibly voluntary) technologies that are part of the user experience with the intent to discuss how they impact users.  I think they are good ideas and good concepts to write about.  &lt;br /&gt;
&lt;br /&gt;
As you rightly point the Youtube community is one of the largest communities on the Internet.  I wonder if it might not be taking on too much to try to examine Youtube as a whole.  I would suggest selecting a small group that is susceptible to the effects of the technologies you are reviewing.  Describe who the group is and how certain characteristics of their make-up or user experience make them particularly sensitive to the technologies you will focus on.&lt;br /&gt;
&lt;br /&gt;
For example I will be focusing on hobbyist inventors.  Guys that spend their weekends in the garage putting “junk” together and posting videos about their “inventions” on Youtube.  Their content is all original so they are not impacted by Copyright ID.  There is very little thumbs up/down.  They are a much more “expressive” crowd as the comments indicate.&lt;br /&gt;
&lt;br /&gt;
I’m not trying to discourage you.  I think if you pick the right group and tell us why you picked them, it can very interesting.  I hope that is helpful.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 19:47, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
•  Erika L Rich&lt;br /&gt;
&lt;br /&gt;
•  Title: Reputation Management and Ethical Considerations for Members of the Internet Marketing Super Friends (IMSF) Facebook Group&lt;br /&gt;
&lt;br /&gt;
•  Link: [[File:LSTU_E120_Erika_Rich_Assignment_2.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 15:22, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Emily, &lt;br /&gt;
&lt;br /&gt;
Great job on your prospectus! It is very well organized, and your citations sources are well researched. I found your research really enticing because I had never heard of this sweep, and I consider myself an avid youtube visitor. I think you are on to a great research project. Although the topic is remarkably fascinating, I wonder if investigating and juxtaposing the different types of monitoring will be too large or too abstract for the limit of the project. I also read up on the PewDiePie character cited, and I think it is really fascinating to see that he has 35 mil subscribers, yet chose to turn off his commenting feature because of how volatile he claimed the space was becoming. His specific youtube channel then does not have a community to investigate. But it would be interesting to examine someone or a specific youtube channel that has a similar following as the case study to better help zone in on collecting and investigating data. Thank you for this topic, I am currently reading more about the youtube actions in 2008 and 2013 because I had little to no prior knowledge of both events. &lt;br /&gt;
&lt;br /&gt;
Good luck on your project!&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:09, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
RE: Mhoching,&lt;br /&gt;
&lt;br /&gt;
Thank you for your comment. I very much like your prospectus topic as well as you can see from my comments below. With regards to my final project, I thought I should reiterate and clarify that my community is the YouTube contributors that concentrate on making Let’s Plays and video game reviews. While it is helpful to find a video with an active comment section, where other users further explain how the ID sweep influences their output choices,  in the case of PewDiePie, his decision to turn off his comment section does in part illustrate how YouTube has rapidly evolved. Since Google began catering to commercial enterprises over the original volunteer contributors, some of the volunteer contributors have become increasingly more frustrated and they exhibit their frustration in a variety of ways.      &lt;br /&gt;
&lt;br /&gt;
Thanks Again,&lt;br /&gt;
 &lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:37, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Becca!&lt;br /&gt;
I absolutely love the theme of your project, it is an exceptional live issue since feminism has been discussed much more this past year than it has been for many years. Therefore, it´s really important to examine the forums in which people have the opportunity to discuss the subject. Great!&lt;br /&gt;
&lt;br /&gt;
I also found it cool that you are thinking about recording a podcast for the project. If you do so, you might consider including an interview with someone active in the specific forums, a professor in gender studies or perhaps two people with different views on the issue?&lt;br /&gt;
&lt;br /&gt;
I have a question about the subreddits you talked about though. You wrote about a ”safe space” for women. Are those subreddits only for women or are they open for anyone who want to discuss feminism and gender roles? If it is a women-only forum, you might also discuss the consequences on that. If not, maybe that has consequences as well. Maybe you should discuss self censorship in the feminism subreddits as well (which is very interesting since Reddit-as you said-values free speech above almost all else)?&lt;br /&gt;
&lt;br /&gt;
Good luck!&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 10:39, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Comments on Gary&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Gary,&lt;br /&gt;
&lt;br /&gt;
Great topic!  I hope to be going out to for crowdfunding by the end of the May.  So I will follow your Wiki with interest.  (In your proposal you link to crowdfunded.  I think you meant community funded. You may want to look at that.) &lt;br /&gt;
&lt;br /&gt;
You mentioned the stated purpose of Communityfunded.  But you did not mention their reason for existing.  In other words, what started crowdfunding and why would individuals seek funds for their projects from the public and not other traditional sources.  Why are people like me willing to go online (to communityfunded) to ask for money, as opposed to going to another site or pitching a Venture Capitalist or a bank?  Why would people fund a project on line versus invest in the stock market or Bank CDs?&lt;br /&gt;
&lt;br /&gt;
I think that the answer to those questions goes to the heart of crowdfunding.  It also is germane to the “troublesome obstacles” you refer to in your prospectus. &lt;br /&gt;
&lt;br /&gt;
When you mention failed projects, I would suggest that not all failures are the same.  I might be willing to invest money in a project I consider socially redeeming even if I thought it had very little chance of success.  Where as, if I were investing in some Harvard wiz-kids that profess to have the next Facebook, I might have very different feelings if they went belly up.  So you may want to include categories of projects, or claims/expectations in your discussions.  As well as any risk factor ratings.&lt;br /&gt;
&lt;br /&gt;
You also mentioned building and keeping trust of supporters.  One of the areas that interests me is the ways that Fundraisers generate funding support.  Do they rely solely on the site?  In other words, is there a pool of would be investors just waiting for the right idea to come around so they can invest.  Or is a fundraiser expected to go outside the community and raise interest and drive that interest back to the site?  How does that impact the “trust” factor?  If I am a one-time fundraiser does it matter all that much what people think about me after I’ve got my money?  &lt;br /&gt;
&lt;br /&gt;
You discuss how you will break down funded projects, etc.  Is there a way to figure out what various fundraiser did to get funded?  Marketing may prove to be more of a factor than the project or its worthiness.  &lt;br /&gt;
&lt;br /&gt;
It would certainly be worthwhile to compare and contrast crowdfunding before and after changes in regs that made it easier for the public to invest.  And how post reg trends may lead to new regs/controls.&lt;br /&gt;
&lt;br /&gt;
I look forward to reading your paper.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 20:45, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Meagan,&lt;br /&gt;
&lt;br /&gt;
Every aspect of your prospectus is incredibly interesting to me. I am especially intrigued by how well you have matched up the readings to your topic. &lt;br /&gt;
&lt;br /&gt;
After I read your section on Norms I thought about how you point out that “the gaming system is very competitive” and it made me wonder, if Valve placed more restrictions to prevent bullying could it potentially take some of the pleasure of competition out of the mix.  If so, then would some users leave the game because they like the hostile environment, which may be why they chose to play in it in the first place.  Keeping this line of thought in mind, perhaps you could find another similar community that has more strict modes of control in place to observe the differences between them.&lt;br /&gt;
&lt;br /&gt;
I thoroughly enjoyed reading your prospectus and I look forward to seeing your finished product.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:25, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Meagan!&lt;br /&gt;
&lt;br /&gt;
What an interesting and relevant subject! &lt;br /&gt;
&lt;br /&gt;
I think that it was a very good idea of you to use the Dot Model with the components ”Market”, ”Architecture”, ”Norms” and ”Law”, it makes everything much more clear. I agree with Emily that it would be a good idea to compare DOTA 2 with another game, preferably from another website than STEAM and with another system of regulation. I would find it really interesting to see the result of a such a study and if norms, the language, the members of the site, etc. differ between the two games. &lt;br /&gt;
&lt;br /&gt;
I´m looking forward to see the result! Good luck!&lt;br /&gt;
&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 10:16, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:1_Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Jan,&lt;br /&gt;
&lt;br /&gt;
This is a really interesting community to build your case study around. Prior to today I have only been on the site a few times to look at subreddits that relate to topics that I am interested in, and since I am not a member I have not considered how the site protects the user’s privacy. &lt;br /&gt;
&lt;br /&gt;
Today I decided to look at the IAmA subreddit to get a better handle of the scope of your project. Consequently, I came across and interesting and fairly benign thread started by an employee of a movie theater and it brought to mind, how does the site handle issues of privacy, libel or defamation against a company or a consumer when an employee engages in what appears at first glance as an anonymous tell all blog that highlights how he/she has witnessed vulgar and perhaps even criminal activity. &lt;br /&gt;
&lt;br /&gt;
Considering your topic and direction you want to take, I think you might want to blend together aspects of the readings from our classes on privacy with the readings for next week’s class on free expression, information, and unwanted speech.&lt;br /&gt;
&lt;br /&gt;
I am looking forward to seeing your completed final project. I am sure it will be very informative.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
P.S. (Here is the link to the AMA I referenced: http://www.reddit.com/r/IAmA/comments/2xz6nb/iama_movie_theater_employee_and_ive_seen_the/)&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 13:04, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei (Samaei1)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The Framework of Projects and Backers on Kickstarter&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Samaei1_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 15:37, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Alex! &lt;br /&gt;
&lt;br /&gt;
I&#039;m so happy you picked this website because I&#039;ve donated to various projects on this website, but never took into account the structure of the website and complications due to misappropriating of funding. I find it hard to try to quantify what is appropriate to fundraise, because the topic is subjective. Of course I don&#039;t think it would be appropriate to fundraise to support hate speech (if that&#039;s what someone is fundraising for), yet I don&#039;t find it appropriate to fundraise for movies about starving children, when that money can go to feeding starving children. I hope I&#039;m communicating the subjectiveness of trying to find what would be considered appropriate to raise money for and how it varies from person to person. &lt;br /&gt;
&lt;br /&gt;
But speaking in regards to the Lessig&#039;s Dot Model I think the website can be broken down into different sections to address some of the issues you raise. For example, how does the structure of kickstarter promote accountability on the artist/person asking for money? On the donation page for example, a vast amount of information about the artist is available, as well as avenues in which you can contact the fundraiser. So if kickstarter has provided this as a requirement for people to submit or provide when asking to be funded, is it then up to the donor to hold that person accountable? I have the tools on that page to ask the fundraiser for that specific information and continue to follow up on that information. I think once you start looking at specific/deliberate aspects of kickstarter, it will start to inform or control behavior. &lt;br /&gt;
&lt;br /&gt;
I hope this helps! Look forward to reading the final project; happy researching and writing!&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:35, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Gia&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Chivalry online&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Gia_Assignment2.docx&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 15:46, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Mishal R. Kennedy&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Enforcing Guidelines Without Harming User Contributions&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mishal_R._Kennedy_Assignment2.rtf&lt;br /&gt;
([[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 15:51, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Richard Markow&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The YouTube video-sharing platform &amp;amp; The Community of Alternative Heating Systems and Appliance Inventors&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Rich_Markow_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:03, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name AlexanderH&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Managing the Petitions of Change.org: B Corps, Social Enterprise and Transparency&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2015/File:AlexanderH_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:10, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name: Meredith Blake&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:Identifying Avenues of Recourse for Businesses on Yelp &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Meredith_Blake._Assignment_2.docx&lt;br /&gt;
[[User:Meredithmblake|Meredith]] ([[User talk:Meredithmblake|talk]]) 16:13, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Wesley Verge&lt;br /&gt;
&lt;br /&gt;
Prospectus Title : Scrolling into Darkness -- An investigation into the regulatory forces at work in Youtube&#039;s comment section&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Wesley_Verge_Prospectus.txt&lt;br /&gt;
&lt;br /&gt;
 [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 16:19, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Knocking the Wind out of Whistleblowers: The US&#039; response to the growing threat from WikiLeaks &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly.WilsonAssignment_2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 16:38, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Exploring the Complexity of Rapidly Evolving Information in a Bodybuilding Forum and the Challenges of Quality Assurance&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 17:12, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Josefin Sasse&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinSasse.pdf&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 17:26, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Josefin!&lt;br /&gt;
&lt;br /&gt;
I find your topic utterly intriguing. I had no idea such a website existed and it&#039;s been quite fascinating just poking around the website a little bit. I think it is a very valid point to raise about &amp;quot;who monitors Kidzworld&amp;quot;, because there doesn&#039;t seem to be much of a screening process to ensure the user that is signing up for an account is in fact between the ages of 9-17. Also, I see you have cited the Pew Research Center study from the readings, which is a great resource for dissecting the demographics and statistics of harassment, but the study was done on &amp;quot;young adults&amp;quot; ranging from 18-29, and &amp;quot;young women&amp;quot; between the ages of 18-24 years old. Which I hope illuminates, rather than complicates, the issue of doing research on a demographic ranging from 9-17, but more so how do you set up  a website that serves a population that would need adult consent to participate in almost everything they do. Along with privacy issues, I think the question of who is responsible for what and for whom is a great aspect you have raised in your paper! I would love to stay in touch and see the developments of your paper if that would be okay. I think this is the perfect website to investigate for this project.  &lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:10, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Josefin,&lt;br /&gt;
&lt;br /&gt;
I think you picked a great online community to explore for your final project, not only because it is a social space for a specific group, but also because there seems to be some fairly strict regulations in place to maintain a safe environment for kids. &lt;br /&gt;
&lt;br /&gt;
It might be interesting if you could find some weakness in its structure. For example can kids go into private chats or are all the chats and comment sections being screened. If they are being screened, is it by a computer generated logarithm or real people? &lt;br /&gt;
&lt;br /&gt;
Another question that you could delve into is, how do the site’s administrators know the users are minors.  Do they require parents’ permission? If so how do they prove it is actually a real parent?  &lt;br /&gt;
  &lt;br /&gt;
I hope these suggestions are helpful. I am looking forward to seeing your finished project. &lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 00:13, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:   Brooke Tjarks&lt;br /&gt;
&lt;br /&gt;
Prospectus:   Art. Business. Fans. (...) How this collaborative space shapes mass visual media production and worldwide distribution&lt;br /&gt;
&lt;br /&gt;
Link:   http://cyber.law.harvard.edu/is2015/File:Prospectus.Brooke.Tjarks.pdf&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Abby McHugh&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: From #Thinspiration to “Low Carb Friends”: The Regulation of Online Weight Loss Content&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Amchugh_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Hi Abby!&lt;br /&gt;
&lt;br /&gt;
Okay, so I really wich I had chosen this issue. It is great that you did!&lt;br /&gt;
&lt;br /&gt;
To facilitate the work, I would recommend that you are more specific in which websites you are going to explore since there is so much #thinspo content out there. But Twitter, Tumbler, Pinterest, and Instagram are great platforms to explore, together with blogs like you said. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Other things you might want to discuss are:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
What makes the most harm: #thinspo/pro-ana blogs and posts or limitations on freedom of speech by regulating such content? (On my part, I am determined in my opinion that #thinspo is devastating and that regulation in this case is a good thing.)&lt;br /&gt;
&lt;br /&gt;
Who is active in this community?&lt;br /&gt;
&lt;br /&gt;
Could pro-ana be illegitimate harassment? Compare it the possibility of a pro-cancer or a pro-aids community (deadly diseases just like anorexia).&lt;br /&gt;
&lt;br /&gt;
What effects could/does the sometimes lack of regulation have on the community online and offline?&lt;br /&gt;
Good luck! You´ve chosen a very interesting subject!&lt;br /&gt;
&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 11:08, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Note: If I’m a little direct in the comments, I really mean the best. Hope it doesn’t offend anyone. &lt;br /&gt;
&lt;br /&gt;
Ryan Hurley: I think professor said stay away from these huge websites. Perhaps you could discuss with the professors if Facebook is the right website to focus on? &lt;br /&gt;
&lt;br /&gt;
Olivia Brinich: I think you’re asking a lot of questions to be answered here.  &lt;br /&gt;
&lt;br /&gt;
“How does it Pind and protect information, how do copyrighters choose to deal with the individual cases of copyright infringement, and what happens when a clip is wrongfully targeted for copyright violation, i.e., the adverse unintended consequences of Content ID?”&lt;br /&gt;
&lt;br /&gt;
Perhaps you should just focus on one main thesis and explore on that. For example, focusing on how copyrighters deal with copyright infringement, and how that eventually influenced youtube to introduce copyright ID system.&lt;br /&gt;
&lt;br /&gt;
One last issue is whether youtube is too big of a website to focus on. Perhaps you could narrow it down to say, copyright issues for music on youtube. &lt;br /&gt;
&lt;br /&gt;
Erika L. Rich: I think it’s a very broad term to discuss the ethical considerations. Perhaps if you narrowed it down to 1 or 2 main issues you find extremely compelling about the website and community? Or maybe I have simply mistaken your train of thought. &lt;br /&gt;
&lt;br /&gt;
Emily MacIntyre: I like how you had such conviction to talk about youtube that despite its size, its still worth researching about. I think you could also talk a little bit about how these game commentators earn their living by commenting on games. PewDiePie is estimated to earn millions every year. It could show a greater perspective on things if we could see their earnings as well. South Park actually has a very funny episode about commentators commenting on commentators commenting on games on youtube. &lt;br /&gt;
&lt;br /&gt;
Matt K: Do you think that changing the title to reflect your research would make it easier for the reader? (Just a thought) I think its interesting how you mentioned “democratic instrument”, bringing politics into the way his blog is ran. According to the quote you took, Scalzi has indeed used some controls over potential commentators. Furthermore, you should consider that if it’s a blog about all sorts of things, with John’s comments on it, he should also be open to listen to commentators reply to this, especially if its about sensitive topics. If he’s going to filter away those he “considers” as offensive, then perhaps he shouldn’t comment on other things either. (unless the comment really does not have a valid point and is not related to the topic) &lt;br /&gt;
&lt;br /&gt;
Edwin Duque: Good to see you in this class too. I think you should just focus on one website. I’d do JuryX instead of Facebook as professor said big websites aren’t good. Also, you’d need a stronger thesis to connect what the real question is. Is it about allowing free sharing? Or is it about limiting what gets shared? I’m a little confused with your thesis. &lt;br /&gt;
&lt;br /&gt;
Chelly Byrne: I think you have a strong thesis here. The contradictions between sharing information on the internet, and the fear of being exposed would be very interesting. I think you can even go into the subscription process. I assume the website allows anyone to join. This means that even predators could read up on what victims write. Unfortunately, they probably get quite the entertainment from reading it, or pretending to ask “leading” questions. As you said, just a tiny bit of excessive information leaked out could result in a victim being violated again. I guess you could talk about that.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion: Since you’re talking about Yelp and reviews, I’d like to share what I learned from another class. Most of these reviews are at the ends of the spectrum. Unless someone is a regular of Yelp and does a review for every restaurant, the rest of them would be people who had great experiences or really bad experiences. They won’t be bothered to write a review about a mediocre or average restaurant. It’s not worth their time. You could also mention that. Also, do you think there are fake reviews too? I’d go for siteJabbar. &lt;br /&gt;
&lt;br /&gt;
Becca Lewis: Firstly its interesting how you’re talking about Reddit because I’m talking about Digg. I think new beliefs takes time to be adapted by the masses. Feminism isn’t very old, and its on going. I think it takes time for people to adapt to it, so for the short term I won’t be surprised if the discussion board sees a lot of anti-feminism people. But also do bare in mind that these are “beliefs”, just like “liberalism” (which is quite similar to feminism, fighting for individual rights, etc). Not everyone believes in these values, so some disagreements should be expected. I guess an interesting way could be to examine if people become more offensive when they are shown as anonymous. My thoughts are that it is. You could look at reddit discussions compared with the core values of Wikipedia, and why it worked for Wikipedia, but a little hard for Reddit. &lt;br /&gt;
&lt;br /&gt;
Gary Brown: Are there any data on the selection process, or ventures that were rejected? It’s hard to associate it with discrimination if there is no evidence. Since you can’t prove or disprove this, it means “site controls” cannot be determined. Therefore you need to make a new thesis that really reflects the paper. &lt;br /&gt;
&lt;br /&gt;
Meagan Moana HoChing: DOTA is a fun game. My initial response is that with huge amounts of ego on the line, that’s how bullying start. Haha. From what I read and know, it is the architecture that is dominantly the issue. This structure allows the audience to exploit it. I think you could also investigate is how is “harassment” identified as? Calling someone a “loser”? Do note that a lot of cyber bullying are to kids that people know in real life. So can we causally say trash talking is the same as harassing? When NBA players trash talk one another, I don’t think they considered it as harassing. So I guess this definition needs to be very clear.&lt;br /&gt;
&lt;br /&gt;
Caroline B: Perhaps you could mention NPOV as one of their values they used in order to keep readers like yourself going to the website. &lt;br /&gt;
&lt;br /&gt;
Jan Yburan: Second Reddit I saw today. Haha. I think you need to be weary of the upvote system. More popular and famous people would get a self –fulfilling upvote treatment, where as more niche people or radical ones would get less. This way of identifying success might be a little questionable. &lt;br /&gt;
&lt;br /&gt;
Alex Samaei: I’d be more interested in how kickstarter protects pledgers from potential false projects. This seems like a very good question for privacy and control. &lt;br /&gt;
&lt;br /&gt;
Gia: &lt;br /&gt;
“New scambaiters can request to be assigned a &amp;quot;mentor&amp;quot; to assist them in learning how to bait.”&lt;br /&gt;
&lt;br /&gt;
I think this is really cool. &lt;br /&gt;
&lt;br /&gt;
“. In the past, scammers were tricked into sending money themselves, which was later given to charity.”&lt;br /&gt;
&lt;br /&gt;
That’s crazy. Not sure who the scammer is now. I’d spend more time discussing the aspect about scammers being scammed by scambaiters, and the moral and ethical implications of it. &lt;br /&gt;
&lt;br /&gt;
Mishal R. Kennedy: I think you have a legit question there. Looking at whether deleting an old post or controlling spambots to be more important. You could also consider that perhaps it was the ease of registration that led to the spambots. Deleting the old posts doesn’t actually go to the root of the problem. I guess you could also talk more about the ease of registration. &lt;br /&gt;
&lt;br /&gt;
Richard Markow: I think you should just talk about 1 or 2 points out of the 5. Don’t think you have enough space to write that much. &lt;br /&gt;
&lt;br /&gt;
Alexander H: Do you think you could also go into the ease of account creation? To attain legitimacy, the website would need real personal data to determine that the petition is signed by a real person. If so the privacy concerns would be the biggest. A deeper look at the terms and agreement is a must. &lt;br /&gt;
&lt;br /&gt;
Meredith Blake: That’s an interesting take on Yelp. I do believe that the reviews are either from the ones who enjoyed the restaurant the most, or the ones that hated it. The ones in the middle won’t be bothered to write a review. &lt;br /&gt;
&lt;br /&gt;
Wesley Verge: Personally I think it is an inevitable part of anonymity and high view count. There’s bound to be a few trolls, but that too is what makes youtube entertaining. I think youtube just needs to make a better flagging system. &lt;br /&gt;
&lt;br /&gt;
Kelly Wilson: You could talk about how the internet might influence more people to be whistleblowers, or even anonymous whistleblowers.&lt;br /&gt;
&lt;br /&gt;
Tasha: I think to begin with you need to bare in mind that a lot of fitness people already know the difference between science and bro-science. I further believe that bodybuilding.com would just allow people to say whatever they want knowing full well it is just a forum. As long as they don’t endorse it, they shouldn’t be liable. But as such, you should also talk about the privacy of fitness people on the website. A lot of them post photos up too, and their diet and schedules.&lt;br /&gt;
&lt;br /&gt;
Josefin S: Nice logo. I don’t really like the age range for kidzworld.com. It doesn’t make sense for 9 year olds to interact with 17 year olds. Furthermore, I wouldn’t want my 9 year old kid to socialize with 17 year old kids and being taught 17 year old stuff. So my biggest concern, as you also mentioned, is how do they keep content separate between different ages to prevent the younger kids to learn the wrong stuff? Or do they not do this at all?&lt;br /&gt;
&lt;br /&gt;
Brooke Ashley Tjarks: Yes, I’d agree with you that IMDB is a good balance between the other two websites. I think by becoming a member, the legitimacy of the votes would become higher. There’s bound to be some sort of influence between people regardless of the platform, so I think IMDB is an interesting one to investigate further.&lt;br /&gt;
&lt;br /&gt;
Amchugh: I think you could go into internet being free also has its consequences. Since the internet could edit and post something online in a matter of seconds, it becomes very vulnerable for unintended things to hit the net. The filtering has to either occurred before the posting, or after it has been up. When it’s up already, it’s hard to say whether the rest of them would oblige, or would they prefer to continue the troll game. You could talk about the reasons for why Twitter would take it down (assuming that it does not violate Twitter’s policies). &lt;br /&gt;
&lt;br /&gt;
Note: Good luck everyone!&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 13:43, 6 March 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3946</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3946"/>
		<updated>2015-03-06T18:43:29Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Facebook &amp;amp; Big Data vs. Your Privacy&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Prospectus_FB_and_privacy_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:06, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Intentions and Outcomes of Youtube’s Copyright and Coding Regulations&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_prospectus03.03.15.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 15:51, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Comments on Olivia&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Hi Olivia, &lt;br /&gt;
&lt;br /&gt;
Let me start by saying I think that Youtube is a great source for your project.  I’m not saying that just because I am doing my paper on Youtube.  I find the creative ways that people are using it fascinating.  Much more so than some of the other platforms.&lt;br /&gt;
&lt;br /&gt;
If I may summarize, you plan to discuss how legal pressures forced Youtube to introduce technologies that changed the user experiences, like Copyright ID.  You also mentioned some other (possibly voluntary) technologies that are part of the user experience with the intent to discuss how they impact users.  I think they are good ideas and good concepts to write about.  &lt;br /&gt;
&lt;br /&gt;
As you rightly point the Youtube community is one of the largest communities on the Internet.  I wonder if it might not be taking on too much to try to examine Youtube as a whole.  I would suggest selecting a small group that is susceptible to the effects of the technologies you are reviewing.  Describe who the group is and how certain characteristics of their make-up or user experience make them particularly sensitive to the technologies you will focus on.&lt;br /&gt;
&lt;br /&gt;
For example I will be focusing on hobbyist inventors.  Guys that spend their weekends in the garage putting “junk” together and posting videos about their “inventions” on Youtube.  Their content is all original so they are not impacted by Copyright ID.  There is very little thumbs up/down.  They are a much more “expressive” crowd as the comments indicate.&lt;br /&gt;
&lt;br /&gt;
I’m not trying to discourage you.  I think if you pick the right group and tell us why you picked them, it can very interesting.  I hope that is helpful.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 19:47, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
•  Erika L Rich&lt;br /&gt;
&lt;br /&gt;
•  Title: Reputation Management and Ethical Considerations for Members of the Internet Marketing Super Friends (IMSF) Facebook Group&lt;br /&gt;
&lt;br /&gt;
•  Link: [[File:LSTU_E120_Erika_Rich_Assignment_2.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 15:22, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Emily, &lt;br /&gt;
&lt;br /&gt;
Great job on your prospectus! It is very well organized, and your citations sources are well researched. I found your research really enticing because I had never heard of this sweep, and I consider myself an avid youtube visitor. I think you are on to a great research project. Although the topic is remarkably fascinating, I wonder if investigating and juxtaposing the different types of monitoring will be too large or too abstract for the limit of the project. I also read up on the PewDiePie character cited, and I think it is really fascinating to see that he has 35 mil subscribers, yet chose to turn off his commenting feature because of how volatile he claimed the space was becoming. His specific youtube channel then does not have a community to investigate. But it would be interesting to examine someone or a specific youtube channel that has a similar following as the case study to better help zone in on collecting and investigating data. Thank you for this topic, I am currently reading more about the youtube actions in 2008 and 2013 because I had little to no prior knowledge of both events. &lt;br /&gt;
&lt;br /&gt;
Good luck on your project!&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:09, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
RE: Mhoching,&lt;br /&gt;
&lt;br /&gt;
Thank you for your comment. I very much like your prospectus topic as well as you can see from my comments below. With regards to my final project, I thought I should reiterate and clarify that my community is the YouTube contributors that concentrate on making Let’s Plays and video game reviews. While it is helpful to find a video with an active comment section, where other users further explain how the ID sweep influences their output choices,  in the case of PewDiePie, his decision to turn off his comment section does in part illustrate how YouTube has rapidly evolved. Since Google began catering to commercial enterprises over the original volunteer contributors, some of the volunteer contributors have become increasingly more frustrated and they exhibit their frustration in a variety of ways.      &lt;br /&gt;
&lt;br /&gt;
Thanks Again,&lt;br /&gt;
 &lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:37, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Becca!&lt;br /&gt;
I absolutely love the theme of your project, it is an exceptional live issue since feminism has been discussed much more this past year than it has been for many years. Therefore, it´s really important to examine the forums in which people have the opportunity to discuss the subject. Great!&lt;br /&gt;
&lt;br /&gt;
I also found it cool that you are thinking about recording a podcast for the project. If you do so, you might consider including an interview with someone active in the specific forums, a professor in gender studies or perhaps two people with different views on the issue?&lt;br /&gt;
&lt;br /&gt;
I have a question about the subreddits you talked about though. You wrote about a ”safe space” for women. Are those subreddits only for women or are they open for anyone who want to discuss feminism and gender roles? If it is a women-only forum, you might also discuss the consequences on that. If not, maybe that has consequences as well. Maybe you should discuss self censorship in the feminism subreddits as well (which is very interesting since Reddit-as you said-values free speech above almost all else)?&lt;br /&gt;
&lt;br /&gt;
Good luck!&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 10:39, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Comments on Gary&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Gary,&lt;br /&gt;
&lt;br /&gt;
Great topic!  I hope to be going out to for crowdfunding by the end of the May.  So I will follow your Wiki with interest.  (In your proposal you link to crowdfunded.  I think you meant community funded. You may want to look at that.) &lt;br /&gt;
&lt;br /&gt;
You mentioned the stated purpose of Communityfunded.  But you did not mention their reason for existing.  In other words, what started crowdfunding and why would individuals seek funds for their projects from the public and not other traditional sources.  Why are people like me willing to go online (to communityfunded) to ask for money, as opposed to going to another site or pitching a Venture Capitalist or a bank?  Why would people fund a project on line versus invest in the stock market or Bank CDs?&lt;br /&gt;
&lt;br /&gt;
I think that the answer to those questions goes to the heart of crowdfunding.  It also is germane to the “troublesome obstacles” you refer to in your prospectus. &lt;br /&gt;
&lt;br /&gt;
When you mention failed projects, I would suggest that not all failures are the same.  I might be willing to invest money in a project I consider socially redeeming even if I thought it had very little chance of success.  Where as, if I were investing in some Harvard wiz-kids that profess to have the next Facebook, I might have very different feelings if they went belly up.  So you may want to include categories of projects, or claims/expectations in your discussions.  As well as any risk factor ratings.&lt;br /&gt;
&lt;br /&gt;
You also mentioned building and keeping trust of supporters.  One of the areas that interests me is the ways that Fundraisers generate funding support.  Do they rely solely on the site?  In other words, is there a pool of would be investors just waiting for the right idea to come around so they can invest.  Or is a fundraiser expected to go outside the community and raise interest and drive that interest back to the site?  How does that impact the “trust” factor?  If I am a one-time fundraiser does it matter all that much what people think about me after I’ve got my money?  &lt;br /&gt;
&lt;br /&gt;
You discuss how you will break down funded projects, etc.  Is there a way to figure out what various fundraiser did to get funded?  Marketing may prove to be more of a factor than the project or its worthiness.  &lt;br /&gt;
&lt;br /&gt;
It would certainly be worthwhile to compare and contrast crowdfunding before and after changes in regs that made it easier for the public to invest.  And how post reg trends may lead to new regs/controls.&lt;br /&gt;
&lt;br /&gt;
I look forward to reading your paper.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 20:45, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Meagan,&lt;br /&gt;
&lt;br /&gt;
Every aspect of your prospectus is incredibly interesting to me. I am especially intrigued by how well you have matched up the readings to your topic. &lt;br /&gt;
&lt;br /&gt;
After I read your section on Norms I thought about how you point out that “the gaming system is very competitive” and it made me wonder, if Valve placed more restrictions to prevent bullying could it potentially take some of the pleasure of competition out of the mix.  If so, then would some users leave the game because they like the hostile environment, which may be why they chose to play in it in the first place.  Keeping this line of thought in mind, perhaps you could find another similar community that has more strict modes of control in place to observe the differences between them.&lt;br /&gt;
&lt;br /&gt;
I thoroughly enjoyed reading your prospectus and I look forward to seeing your finished product.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:25, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Meagan!&lt;br /&gt;
&lt;br /&gt;
What an interesting and relevant subject! &lt;br /&gt;
&lt;br /&gt;
I think that it was a very good idea of you to use the Dot Model with the components ”Market”, ”Architecture”, ”Norms” and ”Law”, it makes everything much more clear. I agree with Emily that it would be a good idea to compare DOTA 2 with another game, preferably from another website than STEAM and with another system of regulation. I would find it really interesting to see the result of a such a study and if norms, the language, the members of the site, etc. differ between the two games. &lt;br /&gt;
&lt;br /&gt;
I´m looking forward to see the result! Good luck!&lt;br /&gt;
&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 10:16, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:1_Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Jan,&lt;br /&gt;
&lt;br /&gt;
This is a really interesting community to build your case study around. Prior to today I have only been on the site a few times to look at subreddits that relate to topics that I am interested in, and since I am not a member I have not considered how the site protects the user’s privacy. &lt;br /&gt;
&lt;br /&gt;
Today I decided to look at the IAmA subreddit to get a better handle of the scope of your project. Consequently, I came across and interesting and fairly benign thread started by an employee of a movie theater and it brought to mind, how does the site handle issues of privacy, libel or defamation against a company or a consumer when an employee engages in what appears at first glance as an anonymous tell all blog that highlights how he/she has witnessed vulgar and perhaps even criminal activity. &lt;br /&gt;
&lt;br /&gt;
Considering your topic and direction you want to take, I think you might want to blend together aspects of the readings from our classes on privacy with the readings for next week’s class on free expression, information, and unwanted speech.&lt;br /&gt;
&lt;br /&gt;
I am looking forward to seeing your completed final project. I am sure it will be very informative.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
P.S. (Here is the link to the AMA I referenced: http://www.reddit.com/r/IAmA/comments/2xz6nb/iama_movie_theater_employee_and_ive_seen_the/)&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 13:04, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei (Samaei1)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The Framework of Projects and Backers on Kickstarter&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Samaei1_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 15:37, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Alex! &lt;br /&gt;
&lt;br /&gt;
I&#039;m so happy you picked this website because I&#039;ve donated to various projects on this website, but never took into account the structure of the website and complications due to misappropriating of funding. I find it hard to try to quantify what is appropriate to fundraise, because the topic is subjective. Of course I don&#039;t think it would be appropriate to fundraise to support hate speech (if that&#039;s what someone is fundraising for), yet I don&#039;t find it appropriate to fundraise for movies about starving children, when that money can go to feeding starving children. I hope I&#039;m communicating the subjectiveness of trying to find what would be considered appropriate to raise money for and how it varies from person to person. &lt;br /&gt;
&lt;br /&gt;
But speaking in regards to the Lessig&#039;s Dot Model I think the website can be broken down into different sections to address some of the issues you raise. For example, how does the structure of kickstarter promote accountability on the artist/person asking for money? On the donation page for example, a vast amount of information about the artist is available, as well as avenues in which you can contact the fundraiser. So if kickstarter has provided this as a requirement for people to submit or provide when asking to be funded, is it then up to the donor to hold that person accountable? I have the tools on that page to ask the fundraiser for that specific information and continue to follow up on that information. I think once you start looking at specific/deliberate aspects of kickstarter, it will start to inform or control behavior. &lt;br /&gt;
&lt;br /&gt;
I hope this helps! Look forward to reading the final project; happy researching and writing!&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:35, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Gia&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Chivalry online&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Gia_Assignment2.docx&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 15:46, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Mishal R. Kennedy&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Enforcing Guidelines Without Harming User Contributions&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mishal_R._Kennedy_Assignment2.rtf&lt;br /&gt;
([[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 15:51, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Richard Markow&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The YouTube video-sharing platform &amp;amp; The Community of Alternative Heating Systems and Appliance Inventors&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Rich_Markow_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:03, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name AlexanderH&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Managing the Petitions of Change.org: B Corps, Social Enterprise and Transparency&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2015/File:AlexanderH_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:10, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name: Meredith Blake&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:Identifying Avenues of Recourse for Businesses on Yelp &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Meredith_Blake._Assignment_2.docx&lt;br /&gt;
[[User:Meredithmblake|Meredith]] ([[User talk:Meredithmblake|talk]]) 16:13, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Wesley Verge&lt;br /&gt;
&lt;br /&gt;
Prospectus Title : Scrolling into Darkness -- An investigation into the regulatory forces at work in Youtube&#039;s comment section&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Wesley_Verge_Prospectus.txt&lt;br /&gt;
&lt;br /&gt;
 [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 16:19, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Knocking the Wind out of Whistleblowers: The US&#039; response to the growing threat from WikiLeaks &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly.WilsonAssignment_2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 16:38, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Exploring the Complexity of Rapidly Evolving Information in a Bodybuilding Forum and the Challenges of Quality Assurance&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 17:12, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Josefin Sasse&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinSasse.pdf&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 17:26, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Josefin!&lt;br /&gt;
&lt;br /&gt;
I find your topic utterly intriguing. I had no idea such a website existed and it&#039;s been quite fascinating just poking around the website a little bit. I think it is a very valid point to raise about &amp;quot;who monitors Kidzworld&amp;quot;, because there doesn&#039;t seem to be much of a screening process to ensure the user that is signing up for an account is in fact between the ages of 9-17. Also, I see you have cited the Pew Research Center study from the readings, which is a great resource for dissecting the demographics and statistics of harassment, but the study was done on &amp;quot;young adults&amp;quot; ranging from 18-29, and &amp;quot;young women&amp;quot; between the ages of 18-24 years old. Which I hope illuminates, rather than complicates, the issue of doing research on a demographic ranging from 9-17, but more so how do you set up  a website that serves a population that would need adult consent to participate in almost everything they do. Along with privacy issues, I think the question of who is responsible for what and for whom is a great aspect you have raised in your paper! I would love to stay in touch and see the developments of your paper if that would be okay. I think this is the perfect website to investigate for this project.  &lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:10, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Josefin,&lt;br /&gt;
&lt;br /&gt;
I think you picked a great online community to explore for your final project, not only because it is a social space for a specific group, but also because there seems to be some fairly strict regulations in place to maintain a safe environment for kids. &lt;br /&gt;
&lt;br /&gt;
It might be interesting if you could find some weakness in its structure. For example can kids go into private chats or are all the chats and comment sections being screened. If they are being screened, is it by a computer generated logarithm or real people? &lt;br /&gt;
&lt;br /&gt;
Another question that you could delve into is, how do the site’s administrators know the users are minors.  Do they require parents’ permission? If so how do they prove it is actually a real parent?  &lt;br /&gt;
  &lt;br /&gt;
I hope these suggestions are helpful. I am looking forward to seeing your finished project. &lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 00:13, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:   Brooke Tjarks&lt;br /&gt;
&lt;br /&gt;
Prospectus:   Art. Business. Fans. (...) How this collaborative space shapes mass visual media production and worldwide distribution&lt;br /&gt;
&lt;br /&gt;
Link:   http://cyber.law.harvard.edu/is2015/File:Prospectus.Brooke.Tjarks.pdf&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Abby McHugh&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: From #Thinspiration to “Low Carb Friends”: The Regulation of Online Weight Loss Content&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Amchugh_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Hi Abby!&lt;br /&gt;
&lt;br /&gt;
Okay, so I really wich I had chosen this issue. It is great that you did!&lt;br /&gt;
&lt;br /&gt;
To facilitate the work, I would recommend that you are more specific in which websites you are going to explore since there is so much #thinspo content out there. But Twitter, Tumbler, Pinterest, and Instagram are great platforms to explore, together with blogs like you said. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Other things you might want to discuss are:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
What makes the most harm: #thinspo/pro-ana blogs and posts or limitations on freedom of speech by regulating such content? (On my part, I am determined in my opinion that #thinspo is devastating and that regulation in this case is a good thing.)&lt;br /&gt;
&lt;br /&gt;
Who is active in this community?&lt;br /&gt;
&lt;br /&gt;
Could pro-ana be illegitimate harassment? Compare it the possibility of a pro-cancer or a pro-aids community (deadly diseases just like anorexia).&lt;br /&gt;
&lt;br /&gt;
What effects could/does the sometimes lack of regulation have on the community online and offline?&lt;br /&gt;
Good luck! You´ve chosen a very interesting subject!&lt;br /&gt;
&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 11:08, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Note: If I’m a little direct in the comments, I really mean the best. Hope it doesn’t offend anyone. &lt;br /&gt;
&lt;br /&gt;
Ryan Hurley: I think professor said stay away from these huge websites. Perhaps you could discuss with the professors if Facebook is the right website to focus on? &lt;br /&gt;
&lt;br /&gt;
Olivia Brinich: I think you’re asking a lot of questions to be answered here.  &lt;br /&gt;
&lt;br /&gt;
“How does it Pind and protect information, how do copyrighters choose to deal with the individual cases of copyright infringement, and what happens when a clip is wrongfully targeted for copyright violation, i.e., the adverse unintended consequences of Content ID?”&lt;br /&gt;
&lt;br /&gt;
Perhaps you should just focus on one main thesis and explore on that. For example, focusing on how copyrighters deal with copyright infringement, and how that eventually influenced youtube to introduce copyright ID system.&lt;br /&gt;
&lt;br /&gt;
One last issue is whether youtube is too big of a website to focus on. Perhaps you could narrow it down to say, copyright issues for music on youtube. &lt;br /&gt;
&lt;br /&gt;
Erika L. Rich: I think it’s a very broad term to discuss the ethical considerations. Perhaps if you narrowed it down to 1 or 2 main issues you find extremely compelling about the website and community? Or maybe I have simply mistaken your train of thought. &lt;br /&gt;
&lt;br /&gt;
Emily MacIntyre: I like how you had such conviction to talk about youtube that despite its size, its still worth researching about. I think you could also talk a little bit about how these game commentators earn their living by commenting on games. PewDiePie is estimated to earn millions every year. It could show a greater perspective on things if we could see their earnings as well. South Park actually has a very funny episode about commentators commenting on commentators commenting on games on youtube. &lt;br /&gt;
&lt;br /&gt;
Matt K: Do you think that changing the title to reflect your research would make it easier for the reader? (Just a thought) I think its interesting how you mentioned “democratic instrument”, bringing politics into the way his blog is ran. According to the quote you took, Scalzi has indeed used some controls over potential commentators. Furthermore, you should consider that if it’s a blog about all sorts of things, with John’s comments on it, he should also be open to listen to commentators reply to this, especially if its about sensitive topics. If he’s going to filter away those he “considers” as offensive, then perhaps he shouldn’t comment on other things either. (unless the comment really does not have a valid point and is not related to the topic) &lt;br /&gt;
&lt;br /&gt;
Edwin Duque: Good to see you in this class too. I think you should just focus on one website. I’d do JuryX instead of Facebook as professor said big websites aren’t good. Also, you’d need a stronger thesis to connect what the real question is. Is it about allowing free sharing? Or is it about limiting what gets shared? I’m a little confused with your thesis. &lt;br /&gt;
&lt;br /&gt;
Chelly Byrne: I think you have a strong thesis here. The contradictions between sharing information on the internet, and the fear of being exposed would be very interesting. I think you can even go into the subscription process. I assume the website allows anyone to join. This means that even predators could read up on what victims write. Unfortunately, they probably get quite the entertainment from reading it, or pretending to ask “leading” questions. As you said, just a tiny bit of excessive information leaked out could result in a victim being violated again. I guess you could talk about that.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion: Since you’re talking about Yelp and reviews, I’d like to share what I learned from another class. Most of these reviews are at the ends of the spectrum. Unless someone is a regular of Yelp and does a review for every restaurant, the rest of them would be people who had great experiences or really bad experiences. They won’t be bothered to write a review about a mediocre or average restaurant. It’s not worth their time. You could also mention that. Also, do you think there are fake reviews too? I’d go for siteJabbar. &lt;br /&gt;
&lt;br /&gt;
Becca Lewis: Firstly its interesting how you’re talking about Reddit because I’m talking about Digg. I think new beliefs takes time to be adapted by the masses. Feminism isn’t very old, and its on going. I think it takes time for people to adapt to it, so for the short term I won’t be surprised if the discussion board sees a lot of anti-feminism people. But also do bare in mind that these are “beliefs”, just like “liberalism” (which is quite similar to feminism, fighting for individual rights, etc). Not everyone believes in these values, so some disagreements should be expected. I guess an interesting way could be to examine if people become more offensive when they are shown as anonymous. My thoughts are that it is. You could look at reddit discussions compared with the core values of Wikipedia, and why it worked for Wikipedia, but a little hard for Reddit. &lt;br /&gt;
&lt;br /&gt;
Gary Brown: Are there any data on the selection process, or ventures that were rejected? It’s hard to associate it with discrimination if there is no evidence. Since you can’t prove or disprove this, it means “site controls” cannot be determined. Therefore you need to make a new thesis that really reflects the paper. &lt;br /&gt;
&lt;br /&gt;
Meagan Moana HoChing: DOTA is a fun game. My initial response is that with huge amounts of ego on the line, that’s how bullying start. Haha. From what I read and know, it is the architecture that is dominantly the issue. This structure allows the audience to exploit it. I think you could also investigate is how is “harassment” identified as? Calling someone a “loser”? Do note that a lot of cyber bullying are to kids that people know in real life. So can we causally say trash talking is the same as harassing? When NBA players trash talk one another, I don’t think they considered it as harassing. So I guess this definition needs to be very clear.&lt;br /&gt;
&lt;br /&gt;
Caroline B: Perhaps you could mention NPOV as one of their values they used in order to keep readers like yourself going to the website. &lt;br /&gt;
&lt;br /&gt;
Jan Yburan: Second Reddit I saw today. Haha. I think you need to be weary of the upvote system. More popular and famous people would get a self –fulfilling upvote treatment, where as more niche people or radical ones would get less. This way of identifying success might be a little questionable. &lt;br /&gt;
&lt;br /&gt;
Alex Samaei: I’d be more interested in how kickstarter protects pledgers from potential false projects. This seems like a very good question for privacy and control. &lt;br /&gt;
&lt;br /&gt;
Gia: &lt;br /&gt;
“New scambaiters can request to be assigned a &amp;quot;mentor&amp;quot; to assist them in learning how to bait.”&lt;br /&gt;
&lt;br /&gt;
I think this is really cool. &lt;br /&gt;
&lt;br /&gt;
“. In the past, scammers were tricked into sending money themselves, which was later given to charity.”&lt;br /&gt;
&lt;br /&gt;
That’s crazy. Not sure who the scammer is now. I’d spend more time discussing the aspect about scammers being scammed by scambaiters, and the moral and ethical implications of it. &lt;br /&gt;
&lt;br /&gt;
Mishal R. Kennedy: I think you have a legit question there. Looking at whether deleting an old post or controlling spambots to be more important. You could also consider that perhaps it was the ease of registration that led to the spambots. Deleting the old posts doesn’t actually go to the root of the problem. I guess you could also talk more about the ease of registration. &lt;br /&gt;
&lt;br /&gt;
Richard Markow: I think you should just talk about 1 or 2 points out of the 5. Don’t think you have enough space to write that much. &lt;br /&gt;
&lt;br /&gt;
Alexander H: Do you think you could also go into the ease of account creation? To attain legitimacy, the website would need real personal data to determine that the petition is signed by a real person. If so the privacy concerns would be the biggest. A deeper look at the terms and agreement is a must. &lt;br /&gt;
&lt;br /&gt;
Meredith Blake: That’s an interesting take on Yelp. I do believe that the reviews are either from the ones who enjoyed the restaurant the most, or the ones that hated it. The ones in the middle won’t be bothered to write a review. &lt;br /&gt;
&lt;br /&gt;
Wesley Verge: Personally I think it is an inevitable part of anonymity and high view count. There’s bound to be a few trolls, but that too is what makes youtube entertaining. I think youtube just needs to make a better flagging system. &lt;br /&gt;
&lt;br /&gt;
Kelly Wilson: You could talk about how the internet might influence more people to be whistleblowers, or even anonymous whistleblowers.&lt;br /&gt;
&lt;br /&gt;
Tasha: I think to begin with you need to bare in mind that a lot of fitness people already know the difference between science and bro-science. I further believe that bodybuilding.com would just allow people to say whatever they want knowing full well it is just a forum. As long as they don’t endorse it, they shouldn’t be liable. But as such, you should also talk about the privacy of fitness people on the website. A lot of them post photos up too, and their diet and schedules.&lt;br /&gt;
&lt;br /&gt;
Josefin S: Nice logo. I don’t really like the age range for kidzworld.com. It doesn’t make sense for 9 year olds to interact with 17 year olds. Furthermore, I wouldn’t want my 9 year old kid to socialize with 17 year old kids and being taught 17 year old stuff. So my biggest concern, as you also mentioned, is how do they keep content separate between different ages to prevent the younger kids to learn the wrong stuff? Or do they not do this at all?&lt;br /&gt;
&lt;br /&gt;
Brooke Ashley Tjarks: Yes, I’d agree with you that IMDB is a good balance between the other two websites. I think by becoming a member, the legitimacy of the votes would become higher. There’s bound to be some sort of influence between people regardless of the platform, so I think IMDB is an interesting one to investigate further.&lt;br /&gt;
&lt;br /&gt;
Amchugh: I think you could go into internet being free also has its consequences. Since the internet could edit and post something online in a matter of seconds, it becomes very vulnerable for unintended things to hit the net. The filtering has to either occurred before the posting, or after it has been up. When it’s up already, it’s hard to say whether the rest of them would oblige, or would they prefer to continue the troll game. You could talk about the reasons for why Twitter would take it down (assuming that it does not violate Twitter’s policies). &lt;br /&gt;
&lt;br /&gt;
Note: Good luck everyone!&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 13:43, 6 March 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3865</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3865"/>
		<updated>2015-03-03T20:11:43Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3864</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3864"/>
		<updated>2015-03-03T20:11:13Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment2.pdf&amp;diff=3863</id>
		<title>File:Caelum Assignment2.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment2.pdf&amp;diff=3863"/>
		<updated>2015-03-03T20:10:17Z</updated>

		<summary type="html">&lt;p&gt;Caelum: Caelum uploaded a new version of &amp;amp;quot;File:Caelum Assignment2.pdf&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment2.pdf&amp;diff=3862</id>
		<title>File:Caelum Assignment2.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Caelum_Assignment2.pdf&amp;diff=3862"/>
		<updated>2015-03-03T20:07:33Z</updated>

		<summary type="html">&lt;p&gt;Caelum: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3821</id>
		<title>Privacy Part 3: Government Surveillance</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3821"/>
		<updated>2015-03-02T22:35:53Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments&#039;) citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We&#039;ll also look at how companies are working to inform citizens about surveillance, and the issues they encounter.&lt;br /&gt;
&lt;br /&gt;
==Assignment 2==&lt;br /&gt;
&lt;br /&gt;
Your [[Assignments#Assignment_2:_Prospectus|final project prospectus]] is due today before class. Please upload your prospectus [[Assignment_2_Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Government vs. Corporate Surveillance&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/ Brian Fung, Yes, There Is Actually a Huge Difference Between Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
; Surveillance Theory and Practice&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412 Neil Richards, The Dangers of Surveillance] (pages 1934-96; 1942-45; and 1952-58)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA&#039;s Spying Powers: Reading the Statute]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]&lt;br /&gt;
&lt;br /&gt;
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue&#039;s Comprehensive Case Against Bulk Metadata Collection]&lt;br /&gt;
&lt;br /&gt;
:* If you&#039;re interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here].&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=yaylQmnXztU Re/Code, An Interview with President Obama] (10:50-15:25 only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/19/apples-dangerous-game/ Orin Kerr, Apple&#039;s Dangerous Game] and [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-2-the-strongest-counterargument/ Apple&#039;s Dangerous Game, Part 2: The Strongest Counterargument]&lt;br /&gt;
&lt;br /&gt;
; Transparency and Accountability&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2013/12/what-transparency-reports-dont-tell-us/282529/ Ryan Budish, What Transparency Reports Don&#039;t Tell Us]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://icontherecord.tumblr.com/ IC on the Record] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://www.google.com/transparencyreport/userdatarequests/US/ Google Transparency Report: United States] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://transparency.twitter.com/ Twitter Transparency Report] (skim)&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
* The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment&lt;br /&gt;
&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/metadata-fourth-amendment/ Granick&#039;s opening]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/debate-metadata-fourth-amendment-reply-jennifer-granick/ Kerr&#039;s response]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick&#039;s reply]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr&#039;s sur-reply]&lt;br /&gt;
&lt;br /&gt;
* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 (&amp;quot;Mass surveillance raises issues beyond individual surveillance,&amp;quot; &amp;quot;Secret and confusing law,&amp;quot; and &amp;quot;Chilling Effects&amp;quot;) only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/ Ryan Gallagher, Meet the Machines That Steal Your Phone&#039;s Data]&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hello everyone, just wanted to start off the discussions with net neutrality. Regardless of which camp you&#039;re on, it seems like it has taken a huge step towards one direction.&lt;br /&gt;
&lt;br /&gt;
Links:&lt;br /&gt;
&lt;br /&gt;
http://www.bloomberg.com/news/articles/2015-02-26/fcc-adopts-net-neutrality-rule-backed-by-obama-for-open-internet&lt;br /&gt;
&lt;br /&gt;
http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html?_r=0&lt;br /&gt;
&lt;br /&gt;
http://money.cnn.com/2015/02/26/technology/comcast-net-neutrality/&lt;br /&gt;
&lt;br /&gt;
http://www.politico.com/story/2015/02/republicans-gop-split-on-net-neutrality-115564.html   (government split on net neutrality) &lt;br /&gt;
&lt;br /&gt;
http://www.huffingtonpost.com/2015/02/26/net-neutrality-fcc-vote_n_6761702.html&lt;br /&gt;
&lt;br /&gt;
http://www.vox.com/2015/2/26/8117905/new-net-neutrality-rules-explained&lt;br /&gt;
&lt;br /&gt;
http://www.theguardian.com/technology/2015/feb/26/net-neutrality-activists-landmark-victory-fcc     (Net Neutrality activists) &lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:45, 27 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:We&#039;ll talk more about Net Neutrality in a future class, after we get the written rules from the FCC. Thanks for sharing! [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 11:57, 27 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
&lt;br /&gt;
thanks Caelum. It seems net neutrality is another one of those issues of balancing the govmt&#039;s ability to function v. individual&#039;s rights. [[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 13:16, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Re: Government Surveillance. When the revelations of the NSA surveillance program first came to the surface my first reaction was, who the hell these CEO&#039;s think they are to just open the doors for the feds to come in and take whatever they want without even challenging their authority to do this? The answer quickly became clear - like everything else related to National Security - intimidation. Intimidation by the government against private companies for the consequences of refusing to cooperate which could cause them to be responsible for allowing the next 9-11 to happen. The scepter of a similar terrorist attack has been the cudgel the government has wielded over every questionable piece of legislation to come from the Patriot Act, like the approval of &#039;enhanced interrogations&#039; to holding enemy combatants without charges, to the assassination of U.S. Citizens abroad without due process. &lt;br /&gt;
&lt;br /&gt;
As expected, most companies folded promptly like a deck of cards, and only a few courageos souls had the conviction to challenge the government&#039;s authority and methods. Its important to note that many of those executives who opened the door for the feds to come in had already been helped handsomely by the government in previous years in their transition from phone providers to internet service providers like Verizon and Comcast, so they were not in a strong position to tell the government to take a hike - the feds practically owned them. So with the doors wide open - one stream of information went to the phone and internet companies, the other went straight to the government&#039;s servers - the feds have been collecting massive amounts of personal information on private citizens without a search warrant for years.&lt;br /&gt;
&lt;br /&gt;
Because of the inaction of some spineless executives and CEOs, some of them simply beholden to the government&#039;s wishes, there is very little that can be done to stop the government&#039;s constant intrusion and gathering of relevant and irrelevant information about millions of citizens without a warrant. Court litigation and lobbying in congress will help some, but what citizens can do is hold these web service and phone companies&#039; feet to the fire. Consumers should demand that our privacy be respected and guarded, not sold to the highest bidder, or third or fourth parties. On that, we are only in the begining stages - the public is only becoming more aware of the depth of the surveilance and the possible consequences in future years. &lt;br /&gt;
&lt;br /&gt;
A very important question was raised in passing during RE/Code&#039;s interview with President Obama in which he asks: &amp;quot;Who owns your data? Your health records,your financial information, your e-mail?&amp;quot; He didn&#039;t elaborate much on the issue but it is a hugely important question. If the answer is data belongs to the individual that generates it, then we have a big problem because we know corporations are gonna find a way to own it and charge people to release it or erase it if they want, getting back tangentially to the issue of the right to be forgotten. But the bottom line is that all data about a person should belong to the individual. As it stands today, no one is really sure, but one thing is for certain, no one has any control of their own data today. No one can control what government does with it or what a company does with it, much less what any hacker can do with your personal information. The only thing I&#039;ve seen on the web out there is a handful of websites that show people how to prevent advertisers and third parties from following your clicks on line and purchases for marketing purposes. In conclusion, the internet is a long way, hundreds of thousands of miles, perhaps even light years away from anything resembling privacy. [[User:Hromero10|Hromero10]] ([[User talk:Hromero10|talk]]) 13:16, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I enjoyed this week’s readings as it goes into the reasonings from the government’s perspectives. I also liked the video interview with Obama in it. Perhaps that is what I shall be talking first. Perhaps the main aspect I could draw out from the video is that US has no cyber army, and if so, these armies are not just for defense, but also offense. Furthermore, I liked how he explains that there are many non-state actors that are “hard to pinpoint”. Yet the greatest state actors would be China, Russia and Iran. The highlight would bring it to when Obama said it is hard to get information from companies as a warrant is required, and subsequently encryptions makes their job even harder. (ref 1)&lt;br /&gt;
&lt;br /&gt;
I do share the same vision as Obama for teaching kids to code. For one, I too felt extremely dated for not being exposed to coding at an early age. Therefore I am now learning to code. Teaching code to kids earlier, or the concepts of it during “abc’s” would ensure more knowledge about computers and coding. The other issue deals with gender equality, and a bigger influence and encouragement of women into sciences and technology subjects. I started off by mentioning this video is because it summarizes the views of US about cyber security and surveillance right now. It came from the man himself. (ref 1)&lt;br /&gt;
&lt;br /&gt;
The next point to emphasize is that the difference between a company and a government doing the surveillance means a whole big deal. The key here according to Fung is that us individual citizens could boycott a company if necessary, but we cannot do so for a government. The government has the power to imprison us, and from one of his responses it says, “I am a strong believer in the 1st, 2nd, 4th and 5th amendments”, which meant that individual privacy should be respected. (ref 2) Just as Obama said it was hard to get data about your online communications, Fung also mentioned the same thing that it is hard for NSA to crack the encryption (as of now). Yet as the price of technology goes down, it directly benefits the surveillance from companies and governments. The government’s use of the “three hops”, which meant that three connections away from a suspicious individual, meant that they could pretty much surveillance quite a number of people! (ref 3) Also the four hurdles is almost child’s play with the ways the government overcomes them. The NSA actually have a lot of spying power. (ref 4)&lt;br /&gt;
&lt;br /&gt;
So now with relatively low levels of threat, it seems like net neutrality and low government surveillance seems like the right thing to do. But as Goldsmith points out, “If a “catastrophic cyber-attack occurs,” the Timesconcluded, “Americans will be justified in asking why their lawmakers ... failed to protect them.”. What do we do when something really does happen? Will it be too late then? As it continues, since anyone anywhere can do a cyber attack, it makes it very easy and vulnerable to do so. (ref 5)&lt;br /&gt;
&lt;br /&gt;
With all that in place, I do see the value of having some balances in check. The NSA does have its powers, but it is limited when it requires to extract data from companies. You could also see a whole bunch of transparency reports. Yet it is also questionable whether such transparency reports tells us enough of what is going on. If the warrant leads to the search of a suspected individual’s messages which stops some sort of crime, it should be applauded. Yet it does seem that we have this rigid stance against government surveillance right now. I remember seeing a comic about two individuals on a phone conversation while Obama was listening in to their conversation. (I tried looking for it, but I can’t find it) Surveillance seems necessary but also unnecessary at the same time. I agree it is very contradictory, but perhaps a new type of “system” could be created to ensure more security and still allow people to obtain and maintain some of their liberties. (Ref 6, 7, 8)&lt;br /&gt;
&lt;br /&gt;
Lastly, I really liked the NSA spying timeline. (ref 9) I believe that government surveillance would not lower. It would only increase, as the potential for a huge cyberattack is much more dangerous than for everyone to keep their liberties. Since if a cyberattack occurs, the US would be devastated, and whatever liberties doesn’t matter at that point. US’s online presence is too huge, and people would complain if that happens anyways. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 - https://www.youtube.com/watch?v=yaylQmnXztU&lt;br /&gt;
&lt;br /&gt;
Ref 2 - http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/&lt;br /&gt;
&lt;br /&gt;
Ref 3 - https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html&lt;br /&gt;
&lt;br /&gt;
Ref 4 - http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute&lt;br /&gt;
&lt;br /&gt;
Ref 5 - http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks&lt;br /&gt;
&lt;br /&gt;
Ref 6 - https://www.google.com/transparencyreport/userdatarequests/US/&lt;br /&gt;
&lt;br /&gt;
Ref 7 - https://transparency.twitter.com/&lt;br /&gt;
&lt;br /&gt;
Ref 8 - http://icontherecord.tumblr.com/&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 17:35, 2 March 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3809</id>
		<title>Privacy Part 3: Government Surveillance</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3809"/>
		<updated>2015-02-27T18:43:46Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments&#039;) citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We&#039;ll also look at how companies are working to inform citizens about surveillance, and the issues they encounter.&lt;br /&gt;
&lt;br /&gt;
==Assignment 2==&lt;br /&gt;
&lt;br /&gt;
Your [[Assignments#Assignment_2:_Prospectus|final project prospectus]] is due today before class. Please upload your prospectus [[Assignment_2_Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Government vs. Corporate Surveillance&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/ Brian Fung, Yes, There Is Actually a Huge Difference Between Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
; Surveillance Theory and Practice&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412 Neil Richards, The Dangers of Surveillance] (pages 1934-96; 1942-45; and 1952-58)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA&#039;s Spying Powers: Reading the Statute]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]&lt;br /&gt;
&lt;br /&gt;
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue&#039;s Comprehensive Case Against Bulk Metadata Collection]&lt;br /&gt;
&lt;br /&gt;
:* If you&#039;re interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here].&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=yaylQmnXztU Re/Code, An Interview with President Obama] (10:50-15:25 only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/19/apples-dangerous-game/ Orin Kerr, Apple&#039;s Dangerous Game] and [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-2-the-strongest-counterargument/ Apple&#039;s Dangerous Game, Part 2: The Strongest Counterargument]&lt;br /&gt;
&lt;br /&gt;
; Transparency and Accountability&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2013/12/what-transparency-reports-dont-tell-us/282529/ Ryan Budish, What Transparency Reports Don&#039;t Tell Us]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://icontherecord.tumblr.com/ IC on the Record] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://www.google.com/transparencyreport/userdatarequests/US/ Google Transparency Report: United States] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://transparency.twitter.com/ Twitter Transparency Report] (skim)&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
* The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment&lt;br /&gt;
&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/metadata-fourth-amendment/ Granick&#039;s opening]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/debate-metadata-fourth-amendment-reply-jennifer-granick/ Kerr&#039;s response]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick&#039;s reply]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr&#039;s sur-reply]&lt;br /&gt;
&lt;br /&gt;
* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 (&amp;quot;Mass surveillance raises issues beyond individual surveillance,&amp;quot; &amp;quot;Secret and confusing law,&amp;quot; and &amp;quot;Chilling Effects&amp;quot;) only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/ Ryan Gallagher, Meet the Machines That Steal Your Phone&#039;s Data]&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hello everyone, just wanted to start off the discussions with net neutrality. Regardless of which camp you&#039;re on, it seems like it has taken a huge step towards one direction.&lt;br /&gt;
&lt;br /&gt;
Links:&lt;br /&gt;
&lt;br /&gt;
http://www.bloomberg.com/news/articles/2015-02-26/fcc-adopts-net-neutrality-rule-backed-by-obama-for-open-internet&lt;br /&gt;
&lt;br /&gt;
http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html?_r=0&lt;br /&gt;
&lt;br /&gt;
http://money.cnn.com/2015/02/26/technology/comcast-net-neutrality/&lt;br /&gt;
&lt;br /&gt;
http://www.politico.com/story/2015/02/republicans-gop-split-on-net-neutrality-115564.html   (government split on net neutrality) &lt;br /&gt;
&lt;br /&gt;
http://www.huffingtonpost.com/2015/02/26/net-neutrality-fcc-vote_n_6761702.html&lt;br /&gt;
&lt;br /&gt;
http://www.vox.com/2015/2/26/8117905/new-net-neutrality-rules-explained&lt;br /&gt;
&lt;br /&gt;
http://www.theguardian.com/technology/2015/feb/26/net-neutrality-activists-landmark-victory-fcc     (Net Neutrality activists) &lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:45, 27 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:We&#039;ll talk more about Net Neutrality in a future class, after we get the written rules from the FCC. Thanks for sharing! [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 11:57, 27 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3807</id>
		<title>Privacy Part 3: Government Surveillance</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3807"/>
		<updated>2015-02-27T16:46:43Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments&#039;) citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We&#039;ll also look at how companies are working to inform citizens about surveillance, and the issues they encounter.&lt;br /&gt;
&lt;br /&gt;
==Assignment 2==&lt;br /&gt;
&lt;br /&gt;
Your [[Assignments#Assignment_2:_Prospectus|final project prospectus]] is due today before class. Please upload your prospectus [[Assignment_2_Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Government vs. Corporate Surveillance&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/ Brian Fung, Yes, There Is Actually a Huge Difference Between Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
; Surveillance Theory and Practice&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412 Neil Richards, The Dangers of Surveillance] (pages 1934-96; 1942-45; and 1952-58)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA&#039;s Spying Powers: Reading the Statute]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]&lt;br /&gt;
&lt;br /&gt;
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue&#039;s Comprehensive Case Against Bulk Metadata Collection]&lt;br /&gt;
&lt;br /&gt;
:* If you&#039;re interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here].&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=yaylQmnXztU Re/Code, An Interview with President Obama] (10:50-15:25 only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/19/apples-dangerous-game/ Orin Kerr, Apple&#039;s Dangerous Game] and [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-2-the-strongest-counterargument/ Apple&#039;s Dangerous Game, Part 2: The Strongest Counterargument]&lt;br /&gt;
&lt;br /&gt;
; Transparency and Accountability&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2013/12/what-transparency-reports-dont-tell-us/282529/ Ryan Budish, What Transparency Reports Don&#039;t Tell Us]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://icontherecord.tumblr.com/ IC on the Record] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://www.google.com/transparencyreport/userdatarequests/US/ Google Transparency Report: United States] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://transparency.twitter.com/ Twitter Transparency Report] (skim)&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
* The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment&lt;br /&gt;
&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/metadata-fourth-amendment/ Granick&#039;s opening]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/debate-metadata-fourth-amendment-reply-jennifer-granick/ Kerr&#039;s response]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick&#039;s reply]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr&#039;s sur-reply]&lt;br /&gt;
&lt;br /&gt;
* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 (&amp;quot;Mass surveillance raises issues beyond individual surveillance,&amp;quot; &amp;quot;Secret and confusing law,&amp;quot; and &amp;quot;Chilling Effects&amp;quot;) only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/ Ryan Gallagher, Meet the Machines That Steal Your Phone&#039;s Data]&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hello everyone, just wanted to start off the discussions with net neutrality. Regardless of which camp you&#039;re on, it seems like it has taken a huge step towards one direction. ;)~&lt;br /&gt;
&lt;br /&gt;
Links:&lt;br /&gt;
&lt;br /&gt;
http://www.bloomberg.com/news/articles/2015-02-26/fcc-adopts-net-neutrality-rule-backed-by-obama-for-open-internet&lt;br /&gt;
&lt;br /&gt;
http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html?_r=0&lt;br /&gt;
&lt;br /&gt;
http://money.cnn.com/2015/02/26/technology/comcast-net-neutrality/&lt;br /&gt;
&lt;br /&gt;
http://www.politico.com/story/2015/02/republicans-gop-split-on-net-neutrality-115564.html   (government split on net neutrality) &lt;br /&gt;
&lt;br /&gt;
http://www.huffingtonpost.com/2015/02/26/net-neutrality-fcc-vote_n_6761702.html&lt;br /&gt;
&lt;br /&gt;
http://www.vox.com/2015/2/26/8117905/new-net-neutrality-rules-explained&lt;br /&gt;
&lt;br /&gt;
http://www.theguardian.com/technology/2015/feb/26/net-neutrality-activists-landmark-victory-fcc     (Net Neutrality activists) &lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:45, 27 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3806</id>
		<title>Privacy Part 3: Government Surveillance</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Privacy_Part_3:_Government_Surveillance&amp;diff=3806"/>
		<updated>2015-02-27T16:45:27Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;March 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Over the past two weeks we’ve looked at big-picture concepts of privacy and how the Internet reflects these issues in the context of corporations and people. This week, we dive into the specific question of surveillance by governments: how the Internet allows governments to observe their (and other governments&#039;) citizens, how these issues are different than from the corporate context, and what government surveillance does to us and the Internet as a system. We&#039;ll also look at how companies are working to inform citizens about surveillance, and the issues they encounter.&lt;br /&gt;
&lt;br /&gt;
==Assignment 2==&lt;br /&gt;
&lt;br /&gt;
Your [[Assignments#Assignment_2:_Prospectus|final project prospectus]] is due today before class. Please upload your prospectus [[Assignment_2_Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Government vs. Corporate Surveillance&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/blogs/the-switch/wp/2013/11/04/yes-there-actually-is-a-huge-difference-between-government-and-corporate-surveillance/ Brian Fung, Yes, There Is Actually a Huge Difference Between Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
* [https://www.schneier.com/blog/archives/2013/10/the_trajectorie.html Bruce Schneier, The Trajectories of Government and Corporate Surveillance]&lt;br /&gt;
&lt;br /&gt;
; Surveillance Theory and Practice&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239412 Neil Richards, The Dangers of Surveillance] (pages 1934-96; 1942-45; and 1952-58)&lt;br /&gt;
&lt;br /&gt;
* [http://www.dmlp.org/blog/2013/nsas-spying-powers-reading-statute Kit Walsh, The NSA&#039;s Spying Powers: Reading the Statute]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newrepublic.com/article/115002/invasive-nsa-will-protect-us-cyber-attacks Jack Goldsmith, We Need an Invasive NSA]&lt;br /&gt;
&lt;br /&gt;
* [http://justsecurity.org/2013/10/23/laura-donohues-comprehensive-case-bulk-metadata-collection/ Steve Vladeck, Laura Donohue&#039;s Comprehensive Case Against Bulk Metadata Collection]&lt;br /&gt;
&lt;br /&gt;
:* If you&#039;re interested, the Donohue article can be found [http://justsecurity.org/wp-content/uploads/2013/10/Just-Security-Donohue-PDF.pdf here].&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=yaylQmnXztU Re/Code, An Interview with President Obama] (10:50-15:25 only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/19/apples-dangerous-game/ Orin Kerr, Apple&#039;s Dangerous Game] and [http://www.washingtonpost.com/news/volokh-conspiracy/wp/2014/09/22/apples-dangerous-game-part-2-the-strongest-counterargument/ Apple&#039;s Dangerous Game, Part 2: The Strongest Counterargument]&lt;br /&gt;
&lt;br /&gt;
; Transparency and Accountability&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2013/12/what-transparency-reports-dont-tell-us/282529/ Ryan Budish, What Transparency Reports Don&#039;t Tell Us]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/nsa-spying/timeline Electronic Frontier Foundation, Timeline of NSA Domestic Spying] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://icontherecord.tumblr.com/ IC on the Record] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://www.google.com/transparencyreport/userdatarequests/US/ Google Transparency Report: United States] (skim)&lt;br /&gt;
&lt;br /&gt;
* [https://transparency.twitter.com/ Twitter Transparency Report] (skim)&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
* The Jennifer Granick / Orin Kerr debates on metadata and the Fourth Amendment&lt;br /&gt;
&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/metadata-fourth-amendment/ Granick&#039;s opening]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/23/debate-metadata-fourth-amendment-reply-jennifer-granick/ Kerr&#039;s response]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/metadata-4a-round2-jg/ Granick&#039;s reply]&lt;br /&gt;
:* [http://justsecurity.org/2013/09/27/debate-round-2-metadata-fourth-amendment-response/ Kerr&#039;s sur-reply]&lt;br /&gt;
&lt;br /&gt;
* [http://towcenter.org/wp-content/uploads/2013/10/Letter-Effect-of-mass-surveillance-on-journalism.pdf Emily Bell et al., Comment to Review Group on Intelligence and Communication Technologies Regarding the Effects of Mass Surveillance on the Practice of Journalism] (pages 9-12 (&amp;quot;Mass surveillance raises issues beyond individual surveillance,&amp;quot; &amp;quot;Secret and confusing law,&amp;quot; and &amp;quot;Chilling Effects&amp;quot;) only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1 The Guardian, NSA Surveillance Revelations Decoded] (skim)&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/tech-policy/2013/09/meet-the-machines-that-steal-your-phones-data/ Ryan Gallagher, Meet the Machines That Steal Your Phone&#039;s Data]&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hello everyone, just wanted to start off the discussions with net neutrality. Regardless of which camp you&#039;re on, it seems like it has taken a huge step towards one direction. ;)~&lt;br /&gt;
&lt;br /&gt;
Links:&lt;br /&gt;
&lt;br /&gt;
http://www.bloomberg.com/news/articles/2015-02-26/fcc-adopts-net-neutrality-rule-backed-by-obama-for-open-internet&lt;br /&gt;
&lt;br /&gt;
http://www.nytimes.com/2015/02/27/technology/net-neutrality-fcc-vote-internet-utility.html?_r=0&lt;br /&gt;
&lt;br /&gt;
http://money.cnn.com/2015/02/26/technology/comcast-net-neutrality/&lt;br /&gt;
&lt;br /&gt;
http://www.politico.com/story/2015/02/republicans-gop-split-on-net-neutrality-115564.html   (government split on net neutrality) &lt;br /&gt;
&lt;br /&gt;
http://www.huffingtonpost.com/2015/02/26/net-neutrality-fcc-vote_n_6761702.html&lt;br /&gt;
&lt;br /&gt;
http://www.vox.com/2015/2/26/8117905/new-net-neutrality-rules-explained&lt;br /&gt;
&lt;br /&gt;
http://www.theguardian.com/technology/2015/feb/26/net-neutrality-activists-landmark-victory-fcc     (Net Neutrality activists) &lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 11:45, 27 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Privacy_Part_2:_The_Right_to_Be_Forgotten&amp;diff=3750</id>
		<title>Privacy Part 2: The Right to Be Forgotten</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Privacy_Part_2:_The_Right_to_Be_Forgotten&amp;diff=3750"/>
		<updated>2015-02-23T02:40:50Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 24&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Court of Justice of the European Union made big waves last May when it ruled against Google on a claim brought by a Spanish citizen asserting a right to remove two news articles that appeared in Google search results when he searched for his own name. The case, now known as the case that recognized the “right to be forgotten,” has come to the forefront of discussions of online privacy. In today’s class, we’ll explore the “right to be forgotten,” how it applies in Europe, whether it could ever come to the United States, and how international companies address competing national balances over privacy and free speech. &lt;br /&gt;
&lt;br /&gt;
We’ll also spend part of this day describing the final project for the class, and discuss how to pick a good community and issue to study for the project.&lt;br /&gt;
&lt;br /&gt;
Our guest this week is Berkman staffer [http://cyber.law.harvard.edu/people/aholland Adam Holland], who oversees the operations of several projects, including [https://www.chillingeffects.org/ Chilling Effects], which tracks legal threats against online speech.&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten Jeffery Rosen, &amp;quot;The Right to Be Forgotten,&amp;quot; 64 Stanford Law Review Online 88 (February 13, 2012)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.slate.com/articles/news_and_politics/view_from_chicago/2014/05/the_european_right_to_be_forgotten_is_just_what_the_internet_needs.single.html Eric Posner, &amp;quot;We All Have the Right to Be Forgotten,&amp;quot; Slate, May 14, 2014]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2014/05/15/opinion/dont-force-google-to-forget.html Jonathan Zittrain, &amp;quot;Don&#039;t Force Google to &#039;Forget&#039;,&amp;quot; New York Times, May 14, 2014]&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/news/morning-mix/wp/2014/07/03/google-erases-unflattering-news-stories-because-of-right-to-be-forgotten-is-this-like-burning-books-in-a-library/ Gail Sullivan, &amp;quot;&#039;Right to be Forgotten&#039; gets real as Google wipes stories from search results,&amp;quot; July 3, 2014]&lt;br /&gt;
&lt;br /&gt;
* [http://www.newyorker.com/magazine/2014/09/29/solace-oblivion Jeffery Toobin, &amp;quot;The Solace of Oblivion,&amp;quot; The New Yorker, September 29, 2014]&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [https://h2o.law.harvard.edu/collages/31818 Google Spain SL v. Agencia Española de Protección de Datos] (an abridged version of the ECJ decision from May 2014 - built on the Berkman Center&#039;s own [https://h2o.law.harvard.edu/p/about H2O Platform] for online textbooks)&lt;br /&gt;
&lt;br /&gt;
* [https://publixphere.net/i/noc/page/OI_Case_Study_European_Union_and_Google_Spain Aleksandra Kuczerawy and Jef Ausloos, European Union and Google Spain] (from the [http://cyber.law.harvard.edu/node/98684 brand new report from the Global Network of Internet and Society centers])&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Andy, could you please look over the microphones in the classroom? I had a really hard time hearing what was said in class last week. There was no problem with hearing the people closest to the camera, but those further away (including Mr. Faris) were really difficult to hear. :) [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 06:38, 19 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Thanks for the heads up, Josefin. I think we were having some problems with Rob&#039;s mic, and I&#039;ll tell folks in class to speak up to make sure the table mics pick up the sound. [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 08:09, 19 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I have a hard time deciding wether I like the ”right to be forgotten law” or not. It can be a good thing when it comes to giving people a second chance in life or preventing false rumors from destroing peoples lives. But it could at the same time undermine the freedom of speech, which is a very important important element in a democracy. &lt;br /&gt;
&lt;br /&gt;
Also, three reasons for search results to be removed are that they are ”inadequate, irrelevant or no longer relevant”, which is very subjective. Who should have the power to decide what is irrelevant and what is important information to the public? And what if information that is irrelevant today unexpectedly happens to be relevant in a few years? &lt;br /&gt;
&lt;br /&gt;
I was surprised to know that ”Google has fielded about a hundred and twenty thousand requests for deletions and granted roughly half of them.”, because I haven´t heard about this law since last spring and didn´t reflect upon the fact that a lot of people could´ve used this ”right to be forgotten”. I wonder what kind of people that use it, why they do it, etc. Is it to be able to move on from previous mistakes? Is it to hide things about themselves to be able to defraud others? Whatever you think is right (to implement this right or not) there are several approaches on this matter that are relevant. It is important that we discuss these issues now, when more and more information can be found on the Internet. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 14:12, 22 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I’m sure I’m not the only one who has embarrassing photos on Facebook and wished to delete them. Some of them were posted by myself and later realized how idiotic they were; some were then copied from mine and reposted by my friends; and ofcourse, some were taken by my friends of me doing embarrassing things. This is precisely what we fear, and the sensitive issue about privacy in the internet world. &lt;br /&gt;
&lt;br /&gt;
Sometimes I wonder what exactly constitutes the internet? Freedom to post everything and share everything without restrictions? But the other issue is the problem about privacy. It is hard to have a completely free society on the internet if there are restrictions here and there. So where should privacy start? Should it be based upon the existing privacy laws in real life? I guess since we do live in the physical world, some of it have to derive from the real world. “The right to be forgotten” is precisely that. It governs the areas in Europe to have those rights. (Ref 1 and 2) From paragraph one I mentioned the three things that were questionable. Under the right to be forgotten law, Europeans could demand to have their data deleted regardless if it was posted by them, redistributed, or taken by someone else. &lt;br /&gt;
&lt;br /&gt;
Google tried a different approach of allowing users to comment on searches of you. (ref 3) but against such tough regulations on privacy, I’m not surprised that Google abandoned it soon after. I believe they do not have aligned interests with regulators. Search engines should be pro- openness, pro-free data, anti-regulations. But such is difficult when the internet is actually possible to be governed by geographical location (as we learned previously). “The right to be forgotten” has really forced Google and other search engines to remove certain results from some searches. (ref 4) It goes into the territory of whether they would be reliable for keeping certain data online. I think Toobin’s story proved a very valid point. The way Nikki Catsouras was decapitated was gruesome, and the employees of the California Highway Patrol should not have spread the photos. (ref 5) It should be kept professional. When issues like this occur, it really brings us back to the privacy issue. Is it better to have an open internet where everything is available? Or is it better to control the internet with certain privacy settings? It seems that this topic would continue for a while.&lt;br /&gt;
&lt;br /&gt;
I think “the right to be forgotten” comes in handy when it needs to be used, but also restricts true freedom of sharing data. When the internet first started and everyone thought it would not be under the jurisdiction of governments were very wrong. It was not only geographically controlled, not only digitally but physically (wires and cables), it was also controlled by means of “rights”, such as privacy. I could see issues with and without “the Right to Be Forgotten”. Both sides of the argument seems valid. Yet I do think the digital world reflects the physical one more than the other way round. So for the time being, I believe it benefits society more with these privacy settings than it harms us. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;References:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Ref 1 - http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten&lt;br /&gt;
&lt;br /&gt;
Ref 2 - http://www.slate.com/articles/news_and_politics/view_from_chicago/2014/05/the_european_right_to_be_forgotten_is_just_what_the_internet_needs.single.html&lt;br /&gt;
&lt;br /&gt;
Ref 3 - http://www.nytimes.com/2014/05/15/opinion/dont-force-google-to-forget.html?_r=0&lt;br /&gt;
&lt;br /&gt;
Ref 4 - http://www.washingtonpost.com/news/morning-mix/wp/2014/07/03/google-erases-unflattering-news-stories-because-of-right-to-be-forgotten-is-this-like-burning-books-in-a-library/&lt;br /&gt;
&lt;br /&gt;
Ref 5 - http://www.newyorker.com/magazine/2014/09/29/solace-oblivion&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 21:40, 22 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=A_Series_of_Tubes:_The_Internet%27s_Backbone_and_Network_Neutrality&amp;diff=3748</id>
		<title>A Series of Tubes: The Internet&#039;s Backbone and Network Neutrality</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=A_Series_of_Tubes:_The_Internet%27s_Backbone_and_Network_Neutrality&amp;diff=3748"/>
		<updated>2015-02-22T03:26:17Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 17&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The late Senator Ted Stevens famously said in a 2006 committee meeting that the “Internet is not something that you just dump something on; it’s not a big truck. [https://www.youtube.com/watch?v=f99PcP0aFNE It’s a series of tubes].” While he was ridiculed widely at the time, Senator Stevens’s remarks actually reveal an interesting hortatory description of what the Internet should be (though given the rest of his comments, apparently not one that he intended). What Stevens’s metaphor suggests is that the physical conduits of the Internet should act like nothing more than non-judgmental conduits of the rest of the world’s traffic. We will see this week, however, that this is not a true reflection of how the tubes work, and we have strong debates as to what the government&#039;s role should be in ensuring that large enough &amp;quot;tubes&amp;quot; reach all those who would like to be online. The big questions for this week: What are the “tubes” of the Internet? Should the tubes have a role in controlling the throughput content? What is the role of government when it comes to developing and regulating our Internet conduits?&lt;br /&gt;
&lt;br /&gt;
Our guest this week will be [http://cyber.law.harvard.edu/people/rfaris Rob Faris], the Research Director of the Berkman Center.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2015/File:Series_of_Tubes_Slides.pdf Download Slides from this Week&#039;s Class]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Connectivity&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nPzjUMdpmSw The Berkman Center, How Do We Connect To The Internet?] (about 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Berkman_Center_Broadband_Final_Report-C1_15Feb2010.pdf Yochai Benkler et al., Next Generation Connectivity] (executive summary and introduction only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=MD9Ss3SI2v8 Susan Crawford, remarks at the 2013 National Conference on Media Reform]&lt;br /&gt;
&lt;br /&gt;
* [http://www.whitehouse.gov/sites/default/files/docs/community-based_broadband_report_by_executive_office_of_the_president.pdf White House Report - Community Based Broadband Solutions: The Benefits of Competition and Choice for Community Development and Highspeed Internet Access] (p. 5-19)&lt;br /&gt;
&lt;br /&gt;
; Network Neutrality&lt;br /&gt;
&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Net_neutrality Wikipedia, Net Neutrality]&lt;br /&gt;
&lt;br /&gt;
* [http://www.slate.com/articles/technology/future_tense/2014/01/net_neutrality_d_c_circuit_court_ruling_the_battle_s_been_lost_but_we_can.html Marvin Ammori, The Net Neutrality Battle Has Been Lost, But Now We Can Finally Win the War]&lt;br /&gt;
&lt;br /&gt;
* [http://www.nytimes.com/2014/11/11/technology/obama-net-neutrality-fcc.html NYT: Obama Asks FCC to Adopt Tough Net Neutrality Rules]&lt;br /&gt;
&lt;br /&gt;
* [http://www.washingtonpost.com/blogs/the-switch/wp/2014/11/10/obamas-gone-old-school-net-neutrality-a-tim-wu-qa/ Obama&#039;s Gone Old School Net Neutrality: A Tim Wu Q&amp;amp;A]&lt;br /&gt;
&lt;br /&gt;
* [http://www.concurringopinions.com/archives/2010/05/bright-ideas-nunziato-on-virtual-freedom-net-neutrality-and-free-speech-in-the-internet-age.html Daniel Solove, Interview with Dawn Nunziato on her book &#039;&#039;Virtual Freedom&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
* [http://techliberation.com/2011/03/01/more-confusion-about-internet-freedom/ Adam Thierer, More Confusion about Internet “Freedom” (Tech Liberation)]&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;New reading&#039;&#039;&#039; (optional, but highly recommended) - [https://www.fcc.gov/document/chairman-wheeler-proposes-new-rules-protecting-open-internet Federal Communications Commission, Chairman Wheeler Proposes New Rules for Protecting the Open Internet]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://gizmodo.com/5912383/how-to-destroy-the-internet Sam Biddle, How to Destroy the Internet (Gizmodo)]&lt;br /&gt;
&lt;br /&gt;
* [https://cyber.law.harvard.edu/digitaldemocracy/internetarchitecture.html Ethan Zuckerman &amp;amp; Andrew McLaughlin, Introduction to Internet Architecture and Institutions]&lt;br /&gt;
&lt;br /&gt;
* [http://seeingnetworks.in/nyc/ Ingrid Burrington, Seeing Networks in New York City] (peruse)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (pages 3-9) &lt;br /&gt;
&lt;br /&gt;
* [https://freedom-to-tinker.com/blog/felten/taking-stevens-seriously/ Ed Felten, Taking Ted Stevens Seriously]&lt;br /&gt;
&lt;br /&gt;
* [http://www.renesys.com/2013/11/mitm-internet-hijacking/ Jim Cowie, The New Threat: Targeted Internet Traffic Misdirection]&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=fpbOEoRrHyU Last Week Tonight With John Oliver: Net Neutrality]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
Common Carriers: http://en.wikipedia.org/wiki/Common_carrier&lt;br /&gt;
&lt;br /&gt;
Public Goods: http://en.wikipedia.org/wiki/Public_good&lt;br /&gt;
&lt;br /&gt;
Interconnection: http://en.wikipedia.org/wiki/Interconnection&lt;br /&gt;
&lt;br /&gt;
Switchboard Operators: http://en.wikipedia.org/wiki/Switchboard_operator&lt;br /&gt;
&lt;br /&gt;
Radio Act of 1927: http://en.wikipedia.org/wiki/Federal_Radio_Commission#The_Radio_Act_of_1927&lt;br /&gt;
&lt;br /&gt;
The Kingsbury Commitment: https://en.wikipedia.org/wiki/Kingsbury_Commitment&lt;br /&gt;
&lt;br /&gt;
FCC&#039;s history of cable TV: http://www.fcc.gov/encyclopedia/evolution-cable-television&lt;br /&gt;
&lt;br /&gt;
Colbert explained the breakup and then rebuilding of AT&amp;amp;T: http://www.wticommunications.com/blog/steven-colbert-att-merger-explanation/&lt;br /&gt;
&lt;br /&gt;
The RBOCs: https://en.wikipedia.org/wiki/Regional_Bell_Operating_Company&lt;br /&gt;
&lt;br /&gt;
The Folwer and Brenner article (needs Hein Online access, through Harvard): http://heinonline.org/HOL/Page?handle=hein.journals/tlr60&amp;amp;g_sent=1&amp;amp;id=229&lt;br /&gt;
&lt;br /&gt;
Dial up modem sounds explained: http://www.theverge.com/2012/6/1/3057679/dial-up-modem-sound-explained&lt;br /&gt;
&lt;br /&gt;
Brand X decision: http://en.wikipedia.org/wiki/National_Cable_%26_Telecommunications_Ass&#039;n_v._Brand_X_Internet_Services&lt;br /&gt;
&lt;br /&gt;
Brand X is a major part of Dawn Nunziato&#039;s book Virtual Freedom (we had you read an interview with her and Dan Solove): http://www.sup.org/books/title/?id=10874&lt;br /&gt;
&lt;br /&gt;
Brand X decision text: http://www.law.cornell.edu/supct/html/04-277.ZS.html&lt;br /&gt;
&lt;br /&gt;
National Broadband Plan: http://transition.fcc.gov/national-broadband-plan/national-broadband-plan.pdf&lt;br /&gt;
&lt;br /&gt;
The Berkman report is called Next Generation Connectivity: http://cyber.law.harvard.edu/pubrelease/broadband/&lt;br /&gt;
&lt;br /&gt;
OECD Report on Mobile Broadband Penetration: http://www.oecd.org/sti/broadband/broadband-statistics-update.htm&lt;br /&gt;
&lt;br /&gt;
A concept in the law called a &amp;quot;regulatory taking&amp;quot;: http://en.wikipedia.org/wiki/Regulatory_taking&lt;br /&gt;
 &lt;br /&gt;
Fiber to the Home (which is what Verizon was doing) is different from Qwest and ATT&#039;s Fiber to the Node: http://en.wikipedia.org/wiki/Fiber_to_the_x&lt;br /&gt;
&lt;br /&gt;
Map of Municipal Broadband in US: http://www.muninetworks.org/communitymap&lt;br /&gt;
&lt;br /&gt;
Benefits of Chatanooga&#039;s Muni Internet: http://www.theguardian.com/world/2014/aug/30/chattanooga-gig-high-speed-internet-tech-boom&lt;br /&gt;
&lt;br /&gt;
Our friends in Leverett, MA (in the central-western part of the state, near Amherst) are a leader in the muni broadband movement: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2366044&lt;br /&gt;
&lt;br /&gt;
The FCC Open Internet Order 2010: https://en.wikipedia.org/wiki/FCC_Open_Internet_Order_2010 (which talks about the 2005 genesis and 2009 revision)&lt;br /&gt;
&lt;br /&gt;
Verizon sued the case went up to the DC Circuit: https://en.wikipedia.org/wiki/Verizon_Communications_Inc._v._FCC_%282014%29&lt;br /&gt;
&lt;br /&gt;
John Oliver on Net Neutrality: https://www.youtube.com/watch?v=fpbOEoRrHyU&lt;br /&gt;
&lt;br /&gt;
When the new Title II rules are issued, Verizon and other ISPs are likely to immediately sue: http://venturebeat.com/2015/02/03/source-fcc-will-reclassify-internet-as-public-utility-att-and-verizon-will-immediately-sue/&lt;br /&gt;
&lt;br /&gt;
Reed Hastings on ISPs: http://www.theverge.com/2014/3/20/5530898/netflix-blasts-comcast-and-verizon-on-net-neutrality-some-big-isps&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
{|class=&amp;quot;wikitable&amp;quot; border=3 style=&amp;quot;margin: auto; background-color:#FFFFCC;&amp;quot; &lt;br /&gt;
|align=&amp;quot;center&amp;quot;|&amp;lt;big&amp;gt;&#039;&#039;&#039;REMINDER&#039;&#039;&#039;&amp;lt;/big&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
|style=&amp;quot;background-color:#FFFFFF;&amp;quot;|Your comments must be submitted &#039;&#039;&#039;before 4:00PM ET&#039;&#039;&#039; on the Tuesday we hold class in order to count for participation credit.  Please see the [[Class Participation|participation policy]] for more information.&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Hi everyone - thought you might like to see the [https://cyber.law.harvard.edu/publications/2015/score_another_one_for_the_internet new report] from Media Cloud, a joint project of the Berkman Center and the MIT Center for Civic Media about the role of the networked public sphere (see our class 2 reading from Yochai Benkler for discussion of the term) in shaping the net neutrality debate in the United States. We may revisit this in our class days about online speech, but for now I wanted to make sure you also had it as part of our class discussion for today. Enjoy! [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 09:36, 10 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Another late-breaking piece of additional reading - the FCC has issued an interesting [http://transition.fcc.gov/Daily_Releases/Daily_Business/2015/db0204/DOC-331869A1.pdf fact sheet] about it&#039;s pending decision to reclassify broadband under Title II. It&#039;s a good overview of the pending reclassification of broadband. [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 07:12, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hello All!&lt;br /&gt;
&lt;br /&gt;
This week’s readings surprised me in many ways. First, before reading the Berkman Center’s 2010 report on &#039;&#039;Next Generation Connectivity&#039;&#039; I had no idea that the United States, when compared to other nations, was a “middle-of-the-pack performer on most first generation broadband measures, [and] a weak performer on prices for high and next-generation speeds”(12).&lt;br /&gt;
&lt;br /&gt;
Then when I watched the 2012 Berkman Center YouTube video on &#039;&#039;How Do We Connect to the Internet?&#039;&#039; I was quite impressed with the penetration rates in the Scandinavian countries listed, as well as the extremely high average line speed in South Korea.  &lt;br /&gt;
&lt;br /&gt;
Consequently, while I contemplate this week’s question about, “what is the role of government when it comes to developing and regulating our Internet conduits,” I cannot help but notice that according to the &#039;&#039;Next Generation Connectivity&#039;&#039; report there is a strong correlation between government intervention, penetration and available line speeds, as it states, “it does appear that the leaders in fiber deployment—South Korea, Japan, and Sweden—are also the leading examples of large, long term public capital investments through expenditures, tax breaks, and low cost loans that helped deployment in those countries” (16).&lt;br /&gt;
&lt;br /&gt;
As I continued to consider the role of government, I can see from the &#039;&#039;Community-Based Broadband Solutions&#039;&#039; report recently published by The Executive Office of the President, that issues persist regarding penetration, speed and cost in the United States. According to the President’s report there are still “nearly 51 million Americans [who] cannot purchase a wired broadband connection with download speeds of at least 25 Mbps, and only 63 percent have access to speeds of 100 Mbps or more” (7). Likewise the report describes how a great disparity exists between urban and rural communities with rural residents having limited access to line speeds equal or greater than 25 Mbps (TEOP, 8).   &lt;br /&gt;
&lt;br /&gt;
Even though the President’s report proposes that promoting competitive markets is a “proven mechanism for increasing Internet access, quality and affordability,” (11) it also suggests that it “will not necessarily solve all broadband access challenges” (12). Subsequently the report recommends that government infrastructure investments are worthwhile because they can “put in place the ‘middle mile’ network that lowers costs of entering the ‘last mile’ market” (TEOP,13).&lt;br /&gt;
&lt;br /&gt;
Granted it does seem as though some states such as Massachusetts are on the right track when it comes to investing in infrastructure. However other states are clearly still lagging behind. As a result it seems as though the Federal government will need to intervene more on their behalf.    &lt;br /&gt;
&lt;br /&gt;
Thanks, Emily M.&lt;br /&gt;
&lt;br /&gt;
Works Cited&lt;br /&gt;
&lt;br /&gt;
Benkler, Yochai et al. &#039;&#039;Next Generation Connectivity: A review of broadband Internet transitions and policy from around the world.&#039;&#039; Berkmen Center: Harvard University. February 2010. PDF.&lt;br /&gt;
&lt;br /&gt;
Berkman Center. &#039;&#039;“How Do We Connect to the Internet?”&#039;&#039; Youtube.com 2012. Video.&lt;br /&gt;
&lt;br /&gt;
The Executive Office of the President. &#039;&#039;Community-Based Broadband Solutions: The Benefits of Compition and Choice for Community Development and Highspeed Internet Access.&#039;&#039; January 2015.&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 21:56, 14 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Solove (2010),  interviewed one of his colleagues to discuss his views about the internet usage and censorship.  His colleague indicated that the controversy is that most Americans believe that the internet is an opportunity to voice free speech.  However, it lends itself to being censored by many private parties. This action violates the 1st amendment  that guarantees free speech.&lt;br /&gt;
&lt;br /&gt;
Solove ( 2010) , asked his colleague which of the internet gatekeepers was the most troubling.  He reported broadband providers and wireless carriers were the most troubling.  Large search engines such as Google have oversight to minimize or eliminate discriminatory practices. After reading this article, I continued to research this topic and realized there are other organizations that are concerned with internet censorship and freedom of speech and advocating for a civil liberties.  &lt;br /&gt;
&lt;br /&gt;
The American Civil Liberties Union (ACLU)  reported that their views on internet censorship was  explained in a Supreme Court case. In Reno v. ACLU, the court decided the Internet to be a free speech zone, deserving at least as much First Amendment protection as that afforded to books, newspapers and magazines. The court said the government can no more restrict a person&#039;s access to words or images on the Internet than it could be allowed to snatch a book out of a reader&#039;s hands in the library, or cover over a statue of a nude in a museum. I have included a website that reviews this case and how it addresses the transmission of information via the internet: https://en.wikipedia.org/wiki/Reno_v._American_Civil_Liberties_Union.&lt;br /&gt;
&lt;br /&gt;
Tasha&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
American Civil Liberties Union (n.d.). Retrieved from http://aclu.org/free-speech/internet-cer&lt;br /&gt;
&lt;br /&gt;
Solove,D., (2010).  Brightideas:  Nunziato on virtual freedom:  Net neutrality and free speech in the internet age.  Retrieved from http://www.concurringopinion&lt;br /&gt;
&lt;br /&gt;
Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 21:28, 16 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I know I am going to open a can of worms, but I would like to present a couple of other ways for looking at what I think are two of the major issues from this week’s readings.  I will be in class today for discussion but I thought I would take a risk and put this out there.&lt;br /&gt;
&lt;br /&gt;
1.	Internet connectivity, cost of service, higher cost for faster speeds, throttling of bandwidth.  It is quite humbling to learn that US is only middle of the pack.   However, the infrastructure has been largely built by private companies who did so in order to sell the service.  If the government paid for the labor, time and materials to install over these past decades, then they can dictate same cost of service across the board.  Communities investing tax dollars to provide this service are great and can therefore provide service to everyone at the same rate, because their tax dollars helped pay for it.  Otherwise, Comcast and RCN should have a right to charge higher rates if they are providing a better service.  They have to maintain the infrastructure as well and make a profit.  Is the government going to repair the routers and switches that may have been damaged in the past couple of blizzards?&lt;br /&gt;
&lt;br /&gt;
2.	Net Neutrality, unfettered conduit, First Amendment rights to speech, no manipulation of searches, no blocking of sites.   Be careful what you ask for – you may receive it.  Do you really want a company’s SPAM email and stealing of cycles to interrupt your service or block your online streaming of 50 Shades of Grey?  Do you really want your children browsing porn sites while they are at school simply because those people creating porn have the right to express themselves?  Remember, even the FCC regulates content during certain hours of the day.  If someone wants to watch violent action movies or porn, nobody is stopping them (as long as they are 18) from going to the video store.  But I don’t want my 10 year old nephew having unfettered access to that or streaming of war scenes from Afghanistan.   Sometimes putting restrictions on malicious virus/spamming or dangerous content is not a bad thing. &lt;br /&gt;
 &lt;br /&gt;
Just remember – there may be other factors and reasons at play.   Sometimes it’s about a profit, and sometimes not.    [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 09:02, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
PS - In reading the newly added FCC proposal, I see they did provision for &amp;quot;legal content&amp;quot; not being blocked...   but it is hard to determine the age of the audience on the internet.    [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 09:07, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Really interesting inputs, Chelly. Your second numbered comment raises an issue that I think needs to be part of the policy discussion around net neutrality - specifically, at what tier do we impose the neutrality? At the physical network (ISP) layer? At the protocol layer? At the service layer? On the platforms themselves? My sense is most of the discussion has been only at the first level, but even in that tier there are hard questions - whether ISPs should be able to prioritize packets from certain protocols (VOIP, streaming video), especially in lower-bandwidth environments (mobile, on planes/trains, etc.). [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 14:21, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I, too, was surprised with this weeks readings. First, I will begin with the question asked on the short clip-- &amp;quot;With no internet, how would life be different&amp;quot; -- I rarely stop to think about this, but life would be no where near the same without Internet. We are constantly connected everywhere we go that in many ways, people would not be able to exist and function &amp;quot;properly&amp;quot; without Internet. I was a little surprised with then numbers and statistics presented on Internet use throughout country and was also surprised South Korea houses the fastest Internet in the world. &lt;br /&gt;
&lt;br /&gt;
I agree with point two on the post above mine, from Chelly. Restrictions of dangerous/inappropriate content is a good thing becasue it allows innocent children protection from the world we live in. However, the argument goes much deeper in terms of where free speech plays in to violating that amendment. There needs to be a balance with no loop holes, which seems to be the case with Internet in general.  [[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 12:54, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While reading on Net Neutrality I felt that the articles included were, overall, a little one sided in favor of net neutrality. While I support net neutrality, I wanted to read more in detail about the opposing viewpoint. The final article in the required reading by Adam Thierer &#039;More Confusion about Internet “Freedom”&#039; touched on this and brought up some important questions like, “how much faith should we place in central planners as opposed to evolutionary market forces?” First of all, I’d like to say that the government and evolutionary market forces are both inherently flawed in that they are equally subject to manipulation by special interest parties, but the above question is highly relevant in the net neutrality debate. &lt;br /&gt;
&lt;br /&gt;
In my opinion, Thierer goes a bit overboard in his argument against government intervention and his unwavering faith in the marketplace (not to mention that he needs a proofreader) by assuming that corporate power is less tyrannical than government power. I think that total power by either is equally damaging to the freedom of consumers and the question should become, “How can we prevent any major player from restricting Internet access?” While parts of his argument are compelling, the research shared in Yonchai Benkler’s Next Generation Connectivity that we are a middle-of-the-pack performer precisely because of our government policies against open access (something which may never change if left to “evolutionary market forces”) offers a picture that favors some government regulation. &lt;br /&gt;
&lt;br /&gt;
While connectivity and net neutrality are parallel issues, the example of open access and the consequent innovation and increased Internet penetration in the countries that have adopted it says that government intervention is not always a bad thing. These very government interventions are exactly what have caused countries like Japan and South Korea to leave us in the cyber dust in the area of connectivity. We are behind in price, penetration, and speed partially because we allow the top monopolies to continue dominating unfettered and are allowed to control what happens to be one of the most important resources to the human race. The fact that the Internet so important is exactly why they will fight tooth and nail to keep control of it, because if they are in control they will always be in business. &lt;br /&gt;
&lt;br /&gt;
What this comes down to is that the Internet is not just a marketplace matter. The Internet is not just another consumer good that people can take or leave, it’s something they must have access to or they will be left behind in education, status, and income. So, why would we, in good conscience, allow corporate profit to remain the bottom line for our access to this vital resource? Taking that one step further, I refer to Sovlove’s interview with Nunziato where it’s pointed out that communications have been blocked by companies based solely on content with no financial incentives in mind. Thus, the argument that the government will try to violate our constitutional rights by regulating the Internet ignores the fact that companies are already doing so, the difference being that they are not held accountable to the same provisions as the government. Obviously, just because one option is not working, does not mean that the alternative is ideal. The conversation on how to regulate the Internet needs to continue, but leaving it to the “open marketplace” clearly isn’t working. &lt;br /&gt;
&lt;br /&gt;
Unfortunately, I won&#039;t be able to attend class in real time today because of work, but I look forward to hearing the discussion on this. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 14:34, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:That&#039;s a great critique in terms of the readings being a bit one-sided; we&#039;ll try and shape that up in the future. One good reading that didn&#039;t make the list on the debate side is [http://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1485&amp;amp;context=fclj Christopher Yoo and Tim Wu&#039;s debate on net neutrality for the Maurer Law Journal]. We left it off because it&#039;s a bit dated and very technical, but it cuts a bit deeper than the Therier article. Thanks for the comments! [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 15:19, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Greetings Everyone,&lt;br /&gt;
&lt;br /&gt;
Olivia, I agree in that the many positive articles about the beauties of net neutrality caused me to question what the other side had to say about it. My conclusions have left me in a sort of confused middling field where I absolutely cannot agree with either side and I can only see nefarious motives from all directions -- thanks to this week&#039;s readings I&#039;m feeling stuck in a bad Roger Corman movie or a Kafka-esque moral limbo. &lt;br /&gt;
&lt;br /&gt;
Theirer&#039;s article was indeed a fresh breather from all the pro-net-neutrality discussions and the question surrounding net neutrality left me with the conclusion that all these scenerios were merely choices presenting us with merely differentiating degrees of evils-- which scenario was the lesser of them? Centralized regulation? Marketplace havoc? Corporate shenanigans? I had most trouble wrapping my mind around what is actually happening right now and who in fact, knows the facts in totality. To what extent are we positive that these individual companies have the power and control or manipulate access and to what extent are they doing so? To what extent would the FCC actually be able to regulate Internet under a telecommunications classification?&lt;br /&gt;
&lt;br /&gt;
Conclusions were bleaker leaving the readings than in anticipating them: placing the Internet and all its cables into a kind of &amp;quot;box&amp;quot; and then handing over the care of that box to any one actor in the world is a terrifically calamitous idea. Be it via government regulation or Corporate market puppeteering. &lt;br /&gt;
&lt;br /&gt;
Net neutrality is a discussion about GIVING. Giving free and equal access to all for all. Or it is one about ensuring free and equal access to all for all. But vest any one actor with the power to give, the power to ensure, and that same actor has the power to take. Ensuring is also a two way street -- ensuring good or ensuring bad. &lt;br /&gt;
&lt;br /&gt;
The Slate article painted a bleak picture with the idea that the murder of net neutrality would mean corporate censorship of the most nefarious kinds -- of the kinds driven by money, power, and corporate monopolistic self-interest. Again, the same discussion against giving the State power to control and &amp;quot;ensure freedom&amp;quot; on the Internet can be applied here to the market world. &lt;br /&gt;
&lt;br /&gt;
With the power to give comes the power to take. Every action has an equal and opposite reaction. Keeping this simple lesson in mind, I found myself very confused as to what to think about how we are to best ensure the ideal of Internet freedom of communication and connection. &lt;br /&gt;
&lt;br /&gt;
So at the end of the day, what really is the difference? The core problem to me seems to be that the Internet is at all controllable in any sense. Once it has handles to its large and once chaotic and incomprehensible body, the Internet becomes something that is up for grabs by whomever has the hands and the arm strength big enough. And someone with the hand and arm strength big enough to pick up and mold and design and direct something as organic as the Internet is a scary character indeed. Be it state or marketplace. &lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 15:35, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi everyone!&lt;br /&gt;
&lt;br /&gt;
This week´s readings is a lot about the free market vs. the government. In the texts about connectivity, the different authors discuss whether the government should interfere with the market concerning improving access to high speed internet, or if that is up to the market to handle. Like Oliviabrinich said very well here in the class discussion; ”What this comes down to is that the Internet is not just a marketplace matter. The Internet is not just another consumer good that people can take or leave, it’s something they must have access to or they will be left behind in education, status, and income.”, the Internet is not just something that is fun to be connected to but is instead an important part of today´s infrastructure. And in my opinion is the government responsible for supplying the country and it´s citizens with important infrastructure, that means Internet as well as roads and railroads. &lt;br /&gt;
&lt;br /&gt;
I was also very surprised that so few had access to Internet in America, and after I´ve been reading the other comments here in the class discussion, I realize that I´m not the only one who reacted when I read that. What is sad is that there was such a strong correlation between a low income and not having access to the Internet. Since the Internet plays such a huge part in both the private and the commercial communication today, not having access to it is a great handicap.&lt;br /&gt;
&lt;br /&gt;
When it comes to network neutrality, I found the video by the President very interesting. He said that the Internet is a great part of our lives and how we communicate today, and that made me think about not having net neutrality as comparable with not being able to access information and places in the world outside of the Internet. I believe it is just as bad to say ”no you can´t enter this Apple store because you have made a purchase at a Microsoft store and they don´t want you to access Apple´s products”, as for Verizon to limit my access to for example AT&amp;amp;T´s website. &lt;br /&gt;
&lt;br /&gt;
I have a question about Ammori´s article though. I don´t fully understand why the FCC lost the case with network neutrality. He mentioned something about lobbyists in the end of the article, is that the answer to why they lost the case? This might be a silly question, perhaps I missed the answer in the article, but English is not my first language so I thought I´d better ask.&lt;br /&gt;
&lt;br /&gt;
Another question I have is about net neutrality in other countries than the United States. Is this an ongoing debate in many countries? And where in the world (or perhaps more specifically ”in which democracies”) is there net neutrality and where isn´t it? [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 15:41, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
:Josefin, to the very specific question about what the FCC &amp;quot;lost,&amp;quot; Ammori&#039;s article was written after [https://en.wikipedia.org/wiki/Verizon_Communications_Inc._v._FCC_%282014%29 this case] that struck the FCC&#039;s rulings in place at the time. The past year has been a debate to see what will fill in those shoes. [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 15:44, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This week’s readings opened my eyes to the very complicated, and multi-leveled role government plays in the development and regulation of Internet channels. It seems that America faces the two problems in unison as we approach the FCC decision and the ongoing and heated debate of governmental reach for enforcing Title 2. While watching Susan Crawford’s speech, she declared, “Internet access is like oxygen – it’s necessary for life”. I found this to be a very profound statement, and she almost alluded that Internet should be viewed as a right or primary concern the government should be investing in for the American people. The How Do We Connect to The Internet?, showed the advancement of developing easy and faster access to Internet shapes our economy for better results. &lt;br /&gt;
&lt;br /&gt;
Furthermore, it seems to me, that the regulating of the Internet must be done by governmental entities to keep the Internet “free and open”.  It is evident from the readings that the role of government must be implemented on all levels of government for any kind of initiatives to be successful. In the White House Report, it states, “these federal and state initiatives are only part of the solution. Local governments also have a critical role to play. In markets where private competition is anemic, whether because of regulatory barriers to entry or the high fixed costs of infrastructure investment, town and cities can build their own middle-mile networks and offer competitive access to the private sector” (p13) &lt;br /&gt;
&lt;br /&gt;
The new clear and enforceable rules proposed by FCC Chairman Wheeler seem very promising, but I am very interested with what will develop leading up to February 26th as some of the rules are viewed as “not strong enough” by millions of people in the public. I think it is the government’s role to enforce harder rules to ensure that the Internet stays principally an open entity that supports innovation and free exchange of ideas. &lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:43, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This week’s readings were very stimulating. Susan Crawford’s remarks to the National Conference for Media Reform raise some great points.  Actually, I look forward to class helping to rein in and focus my somewhat runaway reflections on these issues. At the time of this presentation, Professor Crawford was mentioned as a possible appointee to Chair of the FCC.  Understandably, this political opportunity shaped the form of her remarks. Still, I found the fundamental ideas underlying here call to action to be clear and well formulated, although I would contend that she might have stepped over the logical line arguing that government intervention is what makes free speech possible.&lt;br /&gt;
&lt;br /&gt;
Professor Crawford opines that with respect to high speed Internet connectivity the United States has no plan for the future, no competition, and no oversight.  She observes that the cable industry has won the connectivity market by building the physical networks that allow individuals and businesses to connect to the Internet.  With a third of the U.S. unable to affordably access high speed Internet, and millions unable to access it at any price, she points out that the cable companies have achieved a monopolistic “quiet life,” presumably meaning without government intervention.  &lt;br /&gt;
&lt;br /&gt;
For me, the professor’s argument was won with these facts. In my view, the lack of competition and the existence of unregulated private monopolies are more than sufficient reasons to consider some form of government action. But, she goes on to add a point that opens the door to criticism of her reasoning. Professor Crawford contends that “we need to recapture the regulatory ideal. That ideal is that regulation of infrastructure, government intervention, makes free markets and free speech possible.” Here, I part company with her. Not that she is incorrect that there can be a connection between regulation and the quality of infrastructure. Positive, professional, uniform regulation may bring better connectivity, perhaps net neutrality, and this will assist in our having the ability to speak without great barriers. But, it is the Internet itself, not the regulation of the companies providing it, that makes global speech and global markets possible. It is free Americans and our counterparts around the globe doing business with each other and communicating with each other that makes markets and free speech.  It is not regulation per se, government intervention, that makes these freedoms possible.&lt;br /&gt;
&lt;br /&gt;
While I quibble with this single point in Professor Crawford’s remarks, I take from her argument that the anti-competitive efforts of connectivity goliaths at the local and state levels of government suggest a national solution. I am persuaded that the best way to meet the many fronts of local regulatory disruption by the cable industry is with federal preemption. This is a strategically sound plan to control abuses of the free market, but it is not what makes free markets possible.&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:48, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
External link to Susan Crawford&#039;s remarks at the 2013 National Conference for Media Reform:&lt;br /&gt;
&lt;br /&gt;
https://www.youtube.com/watch?v=MD9Ss3SI2v8&lt;br /&gt;
&lt;br /&gt;
External link to transcript of Crawford’s video remarks: &lt;br /&gt;
&lt;br /&gt;
http://conference.freepress.net/ncmr-resource/susan-crawfords-remarks-national-conference-media-reform&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Perhaps I have somewhat Orwellian views on the Net Neutrality debate, but a world without open internet and a permanent absence of net neutrality feels incredibly frightening.  I found the Slate article by Marvin Ammori to be particularly enlightening in that a problem with the view opposing net neutrality is that it fails to account for future iterations of what the Internet and related technologies could look like.  Ammori writes about the ways in which start ups could be shut out and innovation could be stifled.    Furthermore, the ability of providers to block specific sites or slow them down is a direct affront to free speech.  What if providers found loopholes in which they could speed up sites for a specific candidate and thus make that information more readily available? Furthermore, I find the argument about blocking porn and videos of Afghanistan to be a bit misinformed and the solution not narrowly tailored to the issue.  Schools, workplaces, and individual parents at home can already block certain sites and content.  Products and services regarding malware protect against viruses, and these are things individuals can decide to purchase or not.  Using these arguments in relation to net neutrality sounds a lot like the imposition of a moral code to me… The state should not be a parent.  Neither should an internet provider. ([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 14:59, 17 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----------------&lt;br /&gt;
&lt;br /&gt;
I think that the use of the internet in our lives is very important it gives us common citizens the power to be inform, to communicate faster, and to perform transactions in a like manner. I think that now since it has been many years since we have got accustomed to the use of the internet since its creation it would be very problematic to be without it.&lt;br /&gt;
&lt;br /&gt;
The second question about neutrality, I think that it should be enforced by law, to avoid discrimination, and even if there has been a great effort, I think that the enforcement of it can only do good, because it would allow everyone to be treated in the same way, for a powerful tool.&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (17:12, 17 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
We’re always chasing for faster internet speed. Every time someone goes to a new place, the joke is to ask what the wifi password is. We can’t live without the internet, and the speed of the internet becomes crucial of how fast we could communicate with one another. According to the white house broadband report, about 30% of American households do not have home broadband in 2013. (ref 1) That is actually pretty low. But of course, as the article continues, it is the cost that also becomes an issue for Americans. This seems to be of top priority for Obama as well, as he ordered plans to encourage “competition and innovation by safeguarding net neutrality” (ref 1). &lt;br /&gt;
&lt;br /&gt;
Along the same topic of internet speed, I came across an article that is related to it. &lt;br /&gt;
&lt;br /&gt;
http://www.businessinsider.com/the-internet-is-about-to-get-faster--heres-why-2015-2&lt;br /&gt;
&lt;br /&gt;
In summary of the link above, HTTP/2 will get a major update very soon. Current HTTP 1.1 requests different data from web servers, but it would also cause “strain” to web servers and the loading speed would be slow. It only supports “one request per connection”. Since it is a high latency connection, it does not serve mobile devices well. On the other hand, HTTP/2 uses binary protocol which is quicker. It only allows “one connection per site” but it uses “stream multiplexing” which can “fit many requests into a single connection.” Basically it will make the internet faster. &lt;br /&gt;
&lt;br /&gt;
As mentioned above about Obama’s direction of creating competition and innovation, his belief of net neutrality is something we should applaud. It prevents certain immoral business decisions which undermine competitors and or certain websites. (ref 2) It does make sense that even data should be equal. There is so much room to exploit this belief. Data should definitely be equal with one another. But this vision is not shared by everyone. According to Ammori from Slate, “The Net Neutrality Battle Has Been Lost”. Thanks to former FCC Chairman Julius Genachowski, we do not have net neutrality. (ref 3) It still definitely stunt innovation and competition for a while. I think the power to dictate who gets the “views” on the internet to be too powerful for any one company to have. This power should be regulated to place it on even footing. Just like in capitalist societies, we are allowed to create our own companies, and if we also exhibit innovation and creativity, could excel and prosper. This should also hold true on the internet. Data should be equal. New innovation should be given the same chance to prosper as existing websites or websites with deals with those in power (cable companies). I believe innovation requires the fairness for the ones who work hard and are creative. Without this sort of platform, we’ll be moving backwards technologically. Perhaps Obama’s influence on the FCC would result in a different outcome (ref 4 &amp;amp; 5). &lt;br /&gt;
&lt;br /&gt;
The most recent news of all is that the current FCC Chairman, Thomas Wheeler has enforced more rules in order to maintain more net neutrality. Perhaps this was partially Obama’s influence, but either way, it has benefitted society. According to Wheeler, there will be no blocking, no throttling, and no pain prioritization. All of these are done to prevent “harm to the Open Internet”. Greater transparency would also work for the average consumer to know more about what is going on. (ref 6) Even though the previous FCC Chairman did what he did, and from a previous article (slate), it suggested that it challenges the current Chairman to do something about it. The current FCC chairman did in the end do something to “amend” the previous rules. I believe the move towards net neutrality is the right direction and should be embraced. For a country that believes so strongly in freedom of speech/association/assembly/etc (United States), it seems very constitutional to allow net neutrality as well. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 - http://www.whitehouse.gov/sites/default/files/docs/community-based_broadband_report_by_executive_office_of_the_president.pdf&lt;br /&gt;
&lt;br /&gt;
Ref 2 - https://en.wikipedia.org/wiki/Net_neutrality&lt;br /&gt;
&lt;br /&gt;
Ref 3 - http://www.slate.com/articles/technology/future_tense/2014/01/net_neutrality_d_c_circuit_court_ruling_the_battle_s_been_lost_but_we_can.html&lt;br /&gt;
&lt;br /&gt;
Ref 4 - http://www.nytimes.com/2014/11/11/technology/obama-net-neutrality-fcc.html&lt;br /&gt;
&lt;br /&gt;
Ref 5 - http://www.washingtonpost.com/blogs/the-switch/wp/2014/11/10/obamas-gone-old-school-net-neutrality-a-tim-wu-qa/&lt;br /&gt;
&lt;br /&gt;
Ref 6 - https://www.fcc.gov/document/chairman-wheeler-proposes-new-rules-protecting-open-internet&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 22:26, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Privacy_Part_1:_Corporate_Data_Gathering_and_Intrusions_by_the_Public&amp;diff=3747</id>
		<title>Privacy Part 1: Corporate Data Gathering and Intrusions by the Public</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Privacy_Part_1:_Corporate_Data_Gathering_and_Intrusions_by_the_Public&amp;diff=3747"/>
		<updated>2015-02-22T00:21:23Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;This class was held on February 13th due to an storm on the 10th.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[http://cyber.law.harvard.edu/is2015/File:Privacy_Day_1_Slides.pdf Download slides from this weeks class.]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet control. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online, our interests may fall to the interests of profitability, online behavior regulation, and cybersecurity. Over the next few weeks we&#039;ll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns raised by corporations gathering data on people online and what happens when highly private information about a person finds its way online.&lt;br /&gt;
&lt;br /&gt;
Our own [http://cyber.law.harvard.edu/people/dobrien David O&#039;Brien] will be leading the class discussion this week.&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Conceptualizing privacy&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, &#039;&#039;Understanding Privacy&#039;&#039; (Chapter 1)] (skim)&lt;br /&gt;
&lt;br /&gt;
; Privacy and data&lt;br /&gt;
&lt;br /&gt;
* [https://medium.com/internet-monitor-2014-data-and-privacy/data-and-privacy-f7bfa24bbddc Robert Faris and David O&#039;Brien, &#039;&#039;Data and Privacy&#039;&#039;] (from [https://thenetmonitor.org/research/2014/ &#039;&#039;Internet Monitor 2014: Reflections on the Digital World&#039;&#039;])&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/science/discoveries/magazine/16-07/pb_theory Chris Anderson, The End of Theory]&lt;br /&gt;
&lt;br /&gt;
* [http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data Viktor Mayer-Shoenberger, The Rise of Big Data]&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213 Bruce Schneier, Why Anonymous Data Sometimes Isn&#039;t]&lt;br /&gt;
&lt;br /&gt;
* Play around with some of the websites by [http://latanyasweeney.org/ Latanya Sweeney]&lt;br /&gt;
&lt;br /&gt;
:* [http://thedatamap.org/ The Data Map]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyride.org/more.html About My Ride]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyinfo.org/ About My Info]&lt;br /&gt;
&lt;br /&gt;
; Corporate data practices&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.wsj.com/digits/2012/12/07/how-dataium-watches-you/ Jeremy Singer-Vine, How Dataium Watches You] &lt;br /&gt;
&lt;br /&gt;
* [http://www.interactually.com/linkedin-creepiest-social-network/ David Veldt, LinkedIn: The Creepiest Social Network]&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.wsj.com/wtk/ play around with the WSJ&#039;s interactive graphics])&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, &#039;&#039;The Future of the Internet and How to Stop It&#039;&#039; (Chapter 9)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, &#039;&#039;Blown to Bits&#039;&#039; (Chapter 2)] (pages 36-42)&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, &#039;&#039;Code 2.0&#039;&#039; (Chapter 7)] (focus on &amp;quot;Privacy in Public: Data&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States Wikipedia, Privacy Laws of the United States]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship]&lt;br /&gt;
&lt;br /&gt;
* [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
[[Assignment 1 Details and Reporting|Assignment 1]] is due &#039;&#039;before class&#039;&#039; today (i.e., February 10th before 5:30pm ET). You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
==Links From Class==&lt;br /&gt;
&amp;quot;An Englishman&#039;s home is his castle&amp;quot;:  http://www.phrases.org.uk/meanings/an-englishmans-home-is-his-castle.html&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The Right of Privacy&amp;quot; by Samuel Warren and (later Supreme Court Justice) Louis Brandeis: https://en.wikipedia.org/wiki/The_Right_to_Privacy_%28article%29&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Yellow Journalism&amp;quot;: https://en.wikipedia.org/wiki/Yellow_journalism&lt;br /&gt;
 &lt;br /&gt;
The elite in Boston in the 1890s were known as the &amp;quot;Boston Brahmin&amp;quot;: https://en.wikipedia.org/wiki/Boston_Brahmin&lt;br /&gt;
&lt;br /&gt;
Google Books Ngram viewer: https://books.google.com/ngrams&lt;br /&gt;
&lt;br /&gt;
William Prosser - https://en.wikipedia.org/wiki/William_Prosser&lt;br /&gt;
&lt;br /&gt;
The RAND Corporation - https://en.wikipedia.org/wiki/RAND_Corporation&lt;br /&gt;
&lt;br /&gt;
Griswold - https://en.wikipedia.org/wiki/Griswold_v._Connecticut, Roe v. Wade - https://en.wikipedia.org/wiki/Roe_v._Wade, Whalen v. Roe - https://en.wikipedia.org/wiki/Whalen_v._Roe&lt;br /&gt;
&lt;br /&gt;
Olmstead v. United States - https://en.wikipedia.org/wiki/Olmstead_v._United_States&lt;br /&gt;
&lt;br /&gt;
William Howard Taft - https://en.wikipedia.org/wiki/William_Howard_Taft&lt;br /&gt;
&lt;br /&gt;
Katz overruled Olmstead - https://en.wikipedia.org/wiki/Katz_v._United_States&lt;br /&gt;
&lt;br /&gt;
Church Committee: https://en.wikipedia.org/wiki/Church_Committee&lt;br /&gt;
&lt;br /&gt;
The old HEW agency - https://simple.wikipedia.org/wiki/United_States_Department_of_Health,_Education,_and_Welfare&lt;br /&gt;
&lt;br /&gt;
The Privacy Act - https://en.wikipedia.org/wiki/Privacy_Act_of_1974&lt;br /&gt;
&lt;br /&gt;
FERPA - https://en.wikipedia.org/wiki/Family_Educational_Rights_and_Privacy_Act&lt;br /&gt;
&lt;br /&gt;
The FIPPs system is now largely enforced by the FTC - https://en.wikipedia.org/wiki/FTC_Fair_Information_Practice&lt;br /&gt;
&lt;br /&gt;
EPIC - the Electronic Privacy Information Center - https://en.wikipedia.org/wiki/Electronic_Privacy_Information_Center&lt;br /&gt;
&lt;br /&gt;
Robert Bork - https://en.wikipedia.org/wiki/Robert_Bork&lt;br /&gt;
&lt;br /&gt;
XKCD: https://xkcd.com/&lt;br /&gt;
&lt;br /&gt;
You can also follow http://explainxkcd.com/&lt;br /&gt;
&lt;br /&gt;
Universal Declaration of Human Rights:  http://www.un.org/en/documents/udhr/&lt;br /&gt;
&lt;br /&gt;
Not just rivals the Apollo program; it vastly exceeded it - http://insidesearch.blogspot.com/2012/08/the-power-of-apollo-missions-in-single.html&lt;br /&gt;
 &lt;br /&gt;
Moore&#039;s Law: https://en.wikipedia.org/wiki/Moore%27s_law&lt;br /&gt;
&lt;br /&gt;
Amazon Web Services: https://en.wikipedia.org/wiki/Amazon_Web_Services&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Lead generation&amp;quot; - https://en.wikipedia.org/wiki/Lead_generation&lt;br /&gt;
&lt;br /&gt;
Target Identification Of Pregnant Woman: http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&lt;br /&gt;
&lt;br /&gt;
Acxiom - https://en.wikipedia.org/wiki/Acxiom&lt;br /&gt;
&lt;br /&gt;
Roku - https://en.wikipedia.org/wiki/Roku&lt;br /&gt;
&lt;br /&gt;
EFF&#039;s Privacy Badger - https://www.eff.org/privacybadger&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hello All!&lt;br /&gt;
&lt;br /&gt;
Delving into this week’s readings has definitely opened my eyes to the seemingly limitless complexities of defining privacy boundaries in an effort to create adequate laws and policy to address privacy issues in what Chris Anderson calls the “Petabyte Age”. &lt;br /&gt;
&lt;br /&gt;
In our first reading from &#039;&#039;Understanding Privacy,&#039;&#039; Daniel Solove illustrates how difficult it has become for every tier of society “to adequately conceptualize the problems that privacy law is asked to redress” (2). In an effort to offer a solution to this dilemma, Solove proposes a new theory of privacy as a means to “aid the creation of law and policy to address privacy issues” (11). By conceptualizing privacy as pluralistic and contextual Solove creates a “taxonomy of privacy,” which focuses on “the specific activities that pose privacy problems” that bombard us with ever increasing frequency including: information collection, information processing, information dissemination and invasion (10-11).  &lt;br /&gt;
&lt;br /&gt;
The ease at which this data can be invasively collected and disseminated was clearly illustrated to me when I plugged my birthdate and zipcode into Latanya Sweeny’s &#039;&#039;Data Privacy Lab&#039;&#039; search tool. With two simple key strokes I was shown that I am uniquely identifiable. Add this to the “Click-tracking” and “CSS history sniffing” used by companies such as Dataium LLC as discussed in Jeremy Singer-Vine’s article on “How Dataium Watches You,” it is easy to become paranoid. Nonetheless, I am trying to remain as optimistic as possible. In some ways I like it when ads are generated on the internet, geared towards my personal interests. Still I think it should be feasible for consumers to have a choice as to what data is being collected on their habits and how it is being shared. Perhaps there should be an app for that. If there already is one, please let me know where I can get it.&lt;br /&gt;
&lt;br /&gt;
Thanks,&lt;br /&gt;
Emily M.&lt;br /&gt;
&lt;br /&gt;
Works Cited&lt;br /&gt;
&lt;br /&gt;
Anderson, Chris. “The End of Theory: The Data Deluge Makes the Scientific Method Obsolete.” &#039;&#039;Wired Magazine.&#039;&#039; 23 June 2008.&lt;br /&gt;
&lt;br /&gt;
Singer-Vine, Jeremy. “How Dataium Watches You” &#039;&#039;Wall Street Journal.com&#039;&#039; 12 Dec. 2012. &lt;br /&gt;
&lt;br /&gt;
Solove, Daniel. &#039;&#039;Understanding Privacy.&#039;&#039; Cambridge: Harvard University Press. 2008.&lt;br /&gt;
 &lt;br /&gt;
Sweeney, Latanya. “How Unique are You?.” &#039;&#039;Data Privacy Lab.&#039;&#039; Harvard University: Institute for Quantitative Social Science. 2013.&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 12:22, 6 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The assignment to update a wikipedia page has been challenging!  It took me a few days to come across a page that needed updating and one which I could make a contribution.  I have spent all day verifying sources and editing the page, and I feel like I haven&#039;t made much headway!  I&#039;ll keep at this tonight and all day tomorrow.  How is everyone else doing?   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 17:45, 7 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Hello, Chelly! I had the same feelings in regards to the assignment. I recommend that you find an article that goes over a topic that you know a lot about (in my case, it was military history in regards to armored fighting vehicles.) If you have books on the topic, they will definitely prove helpful! I had plenty of books that went over the rifles used by Finnish troops during the Winter War! (NOTE: Will be creating a second post that goes over the lesson material!) [[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 1:35PM, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Thank you Mishal!   It sounds like you found a really good page to update for yourself!   I came across a “stub” page for a music band started by one of my school mates, so I researched more about their discography and band members.  He was delighted that I was helping with their Wikipedia page.   I will complete the assignment and then do more research in the future to help him out some more!    Good luck on the rest of the work.   I have finished most of this week’s readings and will also post additionally.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:28, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Fantastic work, Chelly! I&#039;ve almost gotten done with my page, but have yet to read the lesson material (have a class on Monday, and have to stay up until 2:30 in the morning to attend this, and my class on expository writing [mandatory!]) Good luck on your assignment, and I can&#039;t wait to see you in the classroom! (If you attend the lectures online!) [[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 1:35PM, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi everyone!&lt;br /&gt;
First I want to say that it was nice seeing you guys in class last tuesday. I participated asynchronously but I am hoping to be able to participate online synchronously next time :)&lt;br /&gt;
&lt;br /&gt;
I have always been one of those who really aren´t participating in or are interested in the debate about privacy on the internet. Mostly because I know so little about it, but also because I haven´t considered it being something particularly serious. Or perhaps it´s because it is an issue too wide and complex to dig in to, it is almost like thinking about the universe. Whatever the reason for my previous lack of interest is, this week´s literature made me more curious about the subject. &lt;br /&gt;
&lt;br /&gt;
Privacy on the Internet has been very discussed in society, but my own experience tell me that it isn´t as much anymore. As I’ve mentioned I live in Europe, and during the campaigns for the elections to the European Parliament in 2009, this was an issue several parties focused on throughout the debate. For example, there was one party (Piratpartiet) from my country that had Internet privacy as their only political issue. Pretty much their entire political program was about privacy on the Internet and they ended up getting two seats in the parliament in Brussels. Last year, there was a new election to the European Parliament. This time, Internet privacy was not as discussed in the media nor in society as in 2009, and the party I mentioned above lost both of their seats. &lt;br /&gt;
&lt;br /&gt;
Faris and O´Brien write in ”Data and privacy” that ”…our actions contradict our stated preferences on privacy; when asked in surveys, Internet users express growing concerns over online privacy, yet they continue to share a stunning amount of sensitive information online.”. This is a statement that correspond with my picture of how most people think about privacy on the Internet. Our will to reach access to certain websites is stronger than our fear of an intruded privacy and we are  therefore willing to submit private information to those websites we want to access. &lt;br /&gt;
&lt;br /&gt;
The discussion about what privacy actually is was also interesting. We talk and discuss about something that we can´t even define properly. It is also important to discuss when privacy is good and when it is bad. I take a class at another university and we read classics right now. I read Walter Lippman´s ”Public Opinion” and he says ”Privacy is insisted upon at all kinds of places in the area of what is called public affairs.”. That is something that I would say still is up-to-date, but we can today also say the opposite, that parts of what used to be private now is public. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 08:21, 10 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Self is an Illusion: Chariots of the Internet Gods&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The question of privacy raised in this week’s readings, to me, raised some active discourse regarding what exactly is the Self.  Privacy implies that something is guarded. Before we even understand what the act of privacy even looks like, we must first visualize what it is this guard is protecting. &lt;br /&gt;
&lt;br /&gt;
There is a marvelous parable told in Buddhism about how the self exists and yet it doesn’t… It is a paradox in and of itself and to think otherwise is to blind oneself to the Self. To truly understand something so un-understandable, one must look at all the elements in a very certain way. &lt;br /&gt;
&lt;br /&gt;
Solove’s (and history’s) understandable fumbling with the term, the word, the meaning of “Privacy” was, to me, a revelatory mirror to the parable of the Chariot. &lt;br /&gt;
&lt;br /&gt;
In thinking about this parable in conjunction with some of our readings on what Privacy is, I can but clumsily conclude that one reason privacy is so difficult to define is because it is a shield, a forcefield, a protector of something even more undefineable – or at least debatable and that is, the self. For something so metamorphic, so subjective to each individual it is understandable, if not expected that “privacy” will always be a term never quite captured. We will forever hunt it. It will change with the ebb and flow of the zeitgeist, of the individual, and now, of the technology. &lt;br /&gt;
&lt;br /&gt;
Solove condenses this feeling so well:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Other commentators have lamented that privacy is “protean” and suffers from “an embarrassment of meanings. “Perhaps the most striking thing about the right to privacy,” philosopher Judith Jarvis Thomson has observed, “is that nobody seems to have any clear idea what it is.” (7)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The following dialogue between King Milinda and the Buddhist sage Nagasena examines this concept of the indescribable describable in a way that was revealing to me in conceptualizing “Privacy” and how we might universalize its meaning for more than just one individual in today’s world:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;KING MILINDA AND THE CHARIOT&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
King Milinda asks the sage how he might address him by name, how he is “to be known.“&lt;br /&gt;
&lt;br /&gt;
The sage replies:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;As Nagasena I am known, O Great King, and as Nagasena do my fellow religious habitually address me. But although parents give names such as Nagasena, or Surasena, or Virasena, or Sihasena, nevertheless, this word ‘Nagasena’ is just a denomination, a designation, a conceptual term, a current appellation, a mere name. For no real person can here be apprehended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The King scoffs the sage, asking how he can possibly agree that Nagasena is not actually a person. Nagasena responds by asking if the King has a chariot and the King responds that he has. &lt;br /&gt;
&lt;br /&gt;
“What is the chariot?” asks Nagasena. Was it the wheels? The King responds “No.” Was the chariot the spokes, the axle, the seat, the frame, the yoke, the wood? To all of these, the King answers “No” because none of these could be singled out and called a “chariot” individually.&lt;br /&gt;
&lt;br /&gt;
Then is it the collection of these elements? The answer again, is “no” because if they were simply put together in large pile, a chariot the pile does not make. So the chariot cannot be found within this collection of elements – so too, it cannot be found outside this collection of elements. So where and what is the chariot?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Nagasena:&#039;&#039;&#039; “Then, ask as I may, I can discover no chariot at all.  Just a mere sound is this ‘chariot’. But what is the real chariot? Your Majesty has told a lie, has spoken a falsehood!  There really is no chariot…”&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Milinda:&#039;&#039;&#039;  “I have not, Nagasena, spoken a falsehood.  For it is in dependence on the pole, the axle, the wheels, the framework, the flag-staff, etc., that there takes place this denomination ‘chariot,’ this designation, this conceptual term, a current appellation, and a mere name.”&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Nagasena:&#039;&#039;&#039;  “Your Majesty has spoken well about the chariot.  It is just so with me.  In dependence on the thirty-two parts of the body and the five Skandhas there takes place this denomination ‘Nagasena,’ this designation, this conceptual term, a current appellation, and a mere name.  In ultimate reality, however, this person cannot be apprehended.”&lt;br /&gt;
&lt;br /&gt;
- - - - - - - -&lt;br /&gt;
&lt;br /&gt;
For it is in dependence on all the other elements that constitute Privacy that we are to even begin to conceptualize it. Privacy as the shield of the self – and the self is constantly changing, it is never a constant idea and so, in turn, privacy is constantly changing, our ideas about it, as Solove seems to suggest through history, will never unite to mean any one thing. &lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 12:19, 10 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I personally think that the three most interesting articles in today&#039;s course readings were the articles by David Veldt, by Jeremy Singer (author of the article titled: How Dataium Watches You) and by Robert Faris and David R. O&#039;Brien. Special software programs, like Dataium, track even the smallest little things that we click on. Online social media services, like Facebook and LinkedIn, can make extremely intrusive (and shockingly accurate, as Mr. Veldt found out...) guesses about who we know, and who we are connected with. &lt;br /&gt;
&lt;br /&gt;
I believe that now is the time to act if we as individuals want to live in a world where our right to privacy is honored. If we do not act, it is believe that it is very likely that our children will unfortunately inherit a world where privacy was a luxury from the past.&lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 1:35PM, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As consumers share more and more information through online purchasing, social media and email, companies are collecting information without any explanation on what will be done with it. What Scheiner and Sweeney reiterate is that with certain datasets it is very simple to de-anonymize users. It is very apparent that consumers are becoming very weary of the intrusion of data monitoring and fear has been elevated by numerous data breaches, including Target, Sony Playstation, Chick-Fla and Turbo Tax to name a few. As a consumer that just purchased a Samsung SMART TV, it was very disturbing to find out that third parties have the ability to screen and send conversations through the voice activated TV controls, which was disclosed in their privacy agreement. Samsung responded by stating, consumers’ conversations are only screenable while the control is activated and Wi-Fi is connected. It is fair to say that Samsung’s minimal disclosure of personal data usage creates a level of distrust among consumers.  Veldt’s research into LinkedIn’s practices and data generation peaked my interest, as I too wondered how I received requests and recommendations from individuals without any obvious professional nor personal connections. After reading his article, the privacy settings of my account were promptly adjusted. The constant ‘Big Brother’ consumer monitoring has caused me to become very weary. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 18:05, 10 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This weeks reading has been very interesting, defining data, privacy, and their interrelation with one another. The past, present and future have been compared with respect to this topic, to give an idea of the involution of privacy and how it is very ambiguous the way how it is dealt now at days.&lt;br /&gt;
The fourth amendment, first amendment, and fourteenth amendment deal with privacy to the extend of the physical world in which names, property, and activities have privacy rules that protect them and cannot allow to disclose them, search them or act unreasonably invading or breaking these laws.&lt;br /&gt;
&lt;br /&gt;
However the question presented in our time is whether the law of the fourth amendment, first amendment, and fourteenth amendment, or our current laws are equipped enough to deal with our current problems involving privacy, particularly speaking of the cyber world? This question is difficult to answer because of two reasons, first privacy in the cyber world, the world of the internet is an ambiguous concept, it is is difficult to be defined. The second reason is Data, the way how data is handled makes a difficult to enforce and protect privacy issues.&lt;br /&gt;
&lt;br /&gt;
The rule in this case comes from the understanding, that data and privacy work by first data is presented in the internet without deep analysis, with correlation and not causation, what can be found in one website and it is linked to other peace of information it is not analyzed but linked by correlation. Google operates this way. Therefore data is pilled in the web on thousands of ways which makes difficult to track it, and understand it sometimes, but it works towards finding similar things that if do not come from one another&#039;s understanding, they do have something to do with each other.&lt;br /&gt;
 &lt;br /&gt;
Now privacy in this context cannot be defined, because how can thousands of links and posts can have privacy when they intervene with one another, piling data.&lt;br /&gt;
Therefore how can one unreasonably search the web, is there a limit, and that limit is within some scope, and that scope has some rationality. Therefore the general rule is that in the internet privacy is ambiguous and data is humongous to trace.&lt;br /&gt;
&lt;br /&gt;
Therefore it can be concluded that our past laws cannot keep up with the cyber world and if data is enormous, and privacy ambiguous in the web, then there has to be another way to regulate this, how people research of a subject, topic, person, property, etc. How data is reveled, linking property, people, etc without analysis. This is what needs to be solved for a future that entails uncertainty, but promises great communication, knowledge, and relations if this problem is solved.&lt;br /&gt;
&lt;br /&gt;
(Edwin Duque)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When the “Founding Fathers” framed the Bill of Rights, the concept of the internet and shape it would take in regards to mass media, content and privacy would have been unimaginable.  &lt;br /&gt;
The First Amendment applies protecting of one’s information and possessions and the Fourth Amendment protects against unreasonable search-the framework of protecting privacy&lt;br /&gt;
&lt;br /&gt;
However, the concept and defining of privacy itself is always an ongoing debate and seems to allow the practice of one’s data or actions on the internet to be available, monitored etc. to any other person, company or government organization as the definition of privacy itself is not clearly outlined and based more on theory.  &lt;br /&gt;
&lt;br /&gt;
Individuals for example may give a mobile app access to one’s microphone or location service thinking it is for the purpose of utilizing the app.  Meanwhile, the app company may be using this data for other purposes and in turn the government may request this information from companies-in a sense could be argued as unreasonable search and seizure.  &lt;br /&gt;
&lt;br /&gt;
Until privacy and uniformed regulation can be established in regards to collection of data and use, one’s privacy will intrinsically be public.  In essence the only protection of privacy is for one not to provide the data they do not want to be public or collected. [[User:Andrew C.|Andrew C.]] ([[User talk:Andrew C.|talk]]) 17:54, 12 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really enjoyed the article focusing on LinkedIn. I sometimes wonder how sites match &amp;quot;people you may know&amp;quot; and it was a very interesting take from the author of a thought many of us have-- how LinkedIn/Facebook/etc match us with people we actually do know. In regards to that thought, the Internet tracks us in our daily searches. Especially around the Holidays, there were several times my Internet began advertising gifts I had bought online at Target/etc. Although many people like how that is generated, I find it not likeable and confirming that there truly is no privacy. &lt;br /&gt;
&lt;br /&gt;
The first article had a very interesting quote: &amp;quot;privacy has proven to be a powerful rhetorical battle cry...privacy means so many different things to so many different people that it has lost any precise legal connotation that it might once have had...&amp;quot; It would be a neat assignment to figure out what &amp;quot;privacy&amp;quot; means to each of us-- especially as we grew up in a  world focused on computers and technology and, obviously, have different views from our parents and children of what &amp;quot;privacy&amp;quot; means. It is really such an easy term yet something so hard to explain-- also brining in the idea of &amp;quot;if you don&#039;t want everyone (or anyone) to see, don&#039;t put it on the internet becasue then it is not private&amp;quot; &lt;br /&gt;
&lt;br /&gt;
I read more about Privacy and came across an interesting article some of you may want to glance at:&lt;br /&gt;
&lt;br /&gt;
 http://www.forbes.com/sites/danielnewman/2014/08/20/there-is-no-privacy-on-the-internet-of-things/&lt;br /&gt;
&lt;br /&gt;
About half way down, the article begins speaking on the Privacy Statements online and how many people, including myself, skim over and accept without really reading. [[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 19:11, 12 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the discussions in the readings on Internet privacy (or the lack thereof) quite daunting. It seems like each attempt to protect privacy is countered with a problem or another breach in that &amp;quot;security&amp;quot;. I was also intrigued by the argument on how everyone talks about Internet privacy and how important it is to them, but their behavior doesn&#039;t reflect those same concerns. Though this seems like a contradiction, I believe it&#039;s more of a lapse in our understanding of what it means to share on the Internet. The Internet being a relatively new resource, we are accustomed to a certain level of choice involved with the sharing of our information and we aren&#039;t yet fully aware of how the Internet removes that element of choice. Unfortunately, a lot of people are learning that lesson the hard way. The Internet and the elusive definition of &amp;quot;Privacy&amp;quot; is something many people have had to deal with in retrospect. Furthermore, we cannot make progress with what it means to protect privacy if we find it impossible to even define what privacy is. Many people opt to refrain from sharing on the internet at all and, while that seems like a solution, it seems wrong that a person should lack some of the benefits the Internet has to offer simply because of a fear of intrusion. Unfortunately, that is the reality that we deal with today, and one wonders if there is even a solution. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 13:39, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
::Great comment, Olivia - especially your observation about &amp;quot;a lapse in our understanding of what it means to share on the internet.&amp;quot;  I hope we will find a moment to touch on this today. &lt;br /&gt;
&lt;br /&gt;
::[[User:David|David]] ([[User talk:David|talk]]) 16:20, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi all!&lt;br /&gt;
&lt;br /&gt;
Not sure if i will be able to make class today so I&#039;m posting just in case! &lt;br /&gt;
&lt;br /&gt;
As soon as I read the topic for class I immediately cringed. I have read about our privacy and lack thereof online before and with each new bit of information I sort of shutter thinking about my confident adolescent self on infamous sites like myspace and even high school me on Facebook, where privacy was the least of my concerns and I was happy to show the world every minute of my life. Today the relevance of Facebook in this privacy realm should certainly make people think did I really need to share that one picture or post that one status because truthfully we have this false sense of security with what we share thinking that they are to be seen by our friends but as many of the readings have pointed out and as we have clearly seen in current events, this is most certainly not the case. I really loved how Farris and O&#039;brien put it about our privacy concerns, that essentially we all have a very fuzzy understanding of what privacy even means and although we all express our displeasure with intrusion of our privacy, we seem more than happy to share that video of ourselves on top of the bar singing piano man completely out of key at 3am. They go on to say we &amp;quot;quasi-agree&amp;quot; to sharing this information and forgoing our privacy concerns by accepting the all mighty &amp;quot;terms of agreement/conditions&amp;quot; box which is like a 100 page essay that no one ever reads (Cue the academic icon of South park..trust me when I say click for a good laugh.... https://www.youtube.com/watch?v=MAdu6GHV3tQ ) &lt;br /&gt;
&lt;br /&gt;
Farris and O&#039;brein further paint our over sharing of data in a scary light: &lt;br /&gt;
&amp;quot;Those with the best access to data are the companies with which we have shared this data in a quasi-consensual manner, and the third parties with which they subsequently share the data, and the governments that are able to persuade or coerce the companies to turn over this data to them, and the domestic and foreign governments that are able to monitor communications and hack into computers, and the perpetrators and beneficiaries of successful cyberattacks that precipitate massive data leaks.&amp;quot;  &lt;br /&gt;
&lt;br /&gt;
One story that comes straight to mind is the Target case study involving Andrew pole and a man and his teenage daughter in Minneapolis. To be brief, essentially what happened is the young daughter had used her target customer Id to purchase various items online on the Target store. A man by the name of Andrew Pole was a master statistician and had developed an algorithm to predict, based on what people bought at Target, where they were at in their life and thus what sort of coupons/deals, etc target should send to them to encourage them to come shop at their store. Well long story longer, Target used this algorithm and determined that based on the daughters purchases over the span of about a week, the algorithm said there was an 87% chance the teen was pregnant. Since she was still very young and living at home, her father would receive the mail and couldn&#039;t help but notice all of these coupons geared toward a pregnant mother coming to his house for strollers, cribs, formula etc. The father confronted the manager at a local target irate exclaiming that his wife was certainly not pregnant. Well it turned out that based on the daughter&#039;s purchase history and sharing of this information online, Target had known that this high school girl &#039;&#039;&#039;was in fact pregnant&#039;&#039;&#039; and she was still figuring out a way to tell her father.Unfortunately Target beat her to the punch.&lt;br /&gt;
&lt;br /&gt;
Thanks guys,&lt;br /&gt;
Ryan H (rhurls)&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 12:37, 13 February 2015 (EST)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
My post seemed to be in a weird format when I reloaded it so here it is again (sorry for the double-post)&lt;br /&gt;
&lt;br /&gt;
After reading the discussion post beginning with the “self” I began reflecting on the period following the 1965 Supreme Court case Griswold v CT when ideas about a more defined sense of legal privacy came to the forefront.  Arguments around that time articulated privacy more as it relates to the physical body.  Though opinions on reproductive independence are still quite divergent, I believe that Americans on both sides of that argument still hold bodily autonomy and privacy in some form (if not in the form discussed in Griswold) as sacred.  &lt;br /&gt;
&lt;br /&gt;
I can’t remember which author mentions this point (Solove perhaps) but one of the articles briefly describes “thermal imaging” in order to catch drug-related criminals as tantamount to searching a home without a warrant.  I think this kind of example is sort of a middle ground in examining bodily privacy to more abstract ideas about privacy in a technological world. &lt;br /&gt;
&lt;br /&gt;
As we move into looking at strictly online privacy, people willingly give out all kinds of personal information and their views of privacy diverge from their actions (Goldman says an iteration of this in the Solove reading).  If many people think of privacy as “the right to be left alone” what can that mean online?  It is easier to conceive of bodily privacy but I sometimes think the way we still think about privacy rights come from before the inception of the internet. ([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 08:34, 13 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am becoming more intrigued with how much net neutrality is becoming more of a headline subject within the news, or it could be that net neutrality has always been in the news and I&#039;m just now paying attention. I think it is a natural to be more sensitive to subjects you are becoming aware of, but it was very serendipitous that while reflecting on net neutrality and all the issues that have come out of the subject matter, CNBC had an interview with AT&amp;amp;T CEO Randall Stephenson in which he cautions the Obama administration about attempting to regulate the internet. &lt;br /&gt;
&lt;br /&gt;
Leading up the FCC&#039;s decision at the end of this month, I think it will be very exciting to continue to follow the story. The issue of regulating the internet is such a complex and permanent action. As we have discussed in class, and the readings have pointed out, the idea of the internet is to have and fully accessible resource. The implications of FCC and some recent events with administration somewhat threaten this idea if they are going to attempt to regulate it. So many more questions will be born with implementation and follow through with decision of regulations. &lt;br /&gt;
&lt;br /&gt;
Here&#039;s a small portion of the interview for anyone who is interested. http://www.cnbc.com/id/102424165#.&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:28, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Two aspects of this week’s readings were particularly interesting to me. Both come from “The Rise of Big Data” and what they term “datafication.”  Speaking of Google’s analysis of search terms and the resulting correlation with flu outbreaks, the article observes such correlations are predictive and not always correct; unrelated outside factors might influence the prediction (4). The article stops short of what seems to me an obvious next step to observe that such outside influences may be either coincidental or intentional.  This point has profound implications when we consider the uses to which big data predictions are being put.  The intentional interference with such predictions seems ripe for discussion. How it might take place and the complications of both trying to affect results and countermeasures against it raise many questions in my mind.&lt;br /&gt;
&lt;br /&gt;
Also, as noted later in the article, big data predictions may be used, for example by government, to make decisions without a full appreciation for or an understanding of the implications on society (7). This “misplaced” reliance on big data predictions could similarly be affected by the gaming or mischievous interference with the data process.[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:58, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chris Anderson’s “The End of Theory”, argues for the great potential of using big data, to explore the many facets of our world.  Indeed, the thought of being able to sequence an entire ecosystem is quite amazing. Discovering new species using statistics, rather than direct observation, is an ingenious use of computing power. Yet, when this massive amount of data is derived from people’s internet behaviour, the prospects become murkier. True internet privacy, seems more like a holy grail, than a possible reality, given all of the necessary steps to attain it. David O’Brien and Robert Farris’s article “Data and Privacy” makes the important link between privacy and data security.  It is interesting how many businesses have been slow to focus on data security, when data has become an important source of revenue. The prevalence of cyber attacks, on health insurers like Anthem Blue Cross, or retailers like Target, has created some public awareness, but not sufficiently.&lt;br /&gt;
&lt;br /&gt;
Farris and O’Brien, also raise the issue of the role that laws and regulations should take.   The European model is for greater regulations on privacy.  The European Court of Justice in May 2014 ruled against Google in a case involving the right to be forgotten. This means that search engines must provide a method for people to remove their data from search results. &lt;br /&gt;
Yet, as a legal concept, privacy is hard to pin down, particularly in this digital age. As many of the articles point out, a solution will likely be a hybrid, involving some sort of compromise. An important first step will be insuring that everyone is aware of the data that they create, and how it is being used. [[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:00, 13 February 2015 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
So after reading all the information on data collection, the dimensions of privacy and how easy it is to de-anonymize data I wonder how it all applies to me.  Is someone or something out there collecting info on me and creating a giant datastore that uniquely defines me and sets me apart from everyone else on the globe?  Cause I didn&#039;t get that from anyone of the articles.  Instead it would appear that all these different sources capture trace amount of data representing some specific characteristics about my behavior at a given time and place and use that to try to push info out to me.  Not sure how that translates to what I have always thought of as &amp;quot;my privacy&amp;quot;.  Interested to hear what others think about that?  [[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 17:21, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hey everyone, &lt;br /&gt;
I wasn&#039;t sure where to share this, but just an FYI, the slides to LECTURE 2 SLIDES are not synced with the LECTURE 2 VIDEO, it is the powerpoint from LECTURE 1. The slides discussed during LECTURE 2 can be found here: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Privacy_Day_1_Slides.pdf. Just in case anyone has trouble finding them.  &lt;br /&gt;
Cheers, &lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 22:46, 17 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Just as Arthur Miller had stated that privacy is hard to define “because it is exasperatingly vague and evanescent”, (ref 2) I do agree it is at a new era where its definition should be molded by the users. Of course, since it is so hard to define privacy, it has also made law making in this area rather difficult. I do agree with Solove’s argument that the focal point should be in privacy problems, in how we should look at “specific types of disruption.” (ref 2) I believe in order to look at how to formulate better ways to judge and secure privacy, we need data to let us know what to do. &lt;br /&gt;
&lt;br /&gt;
Not only in finance, but pretty much every industry benefits with quantifying statistics. It helps to come to a better and more objective solution. This ties in well with Anderson’s view of correlation is all that is needed, and causation isn’t necessary anymore. (ref 1) It is true that we always attempt to seek causation in order to determine what causes what. But at the age of the internet, websites like Google don’t even need that anymore to target ads for certain audiences. We no longer need to understand the content, we only need to match the data with whatever algorithm we have in place. Simply looking for correlation makes it a lot easier to do. With correlation beating out causation as the requirement for big data, it opens a world of ways to look at privacy.&lt;br /&gt;
&lt;br /&gt;
Data has definitely made it harder and harder to define privacy. The internet age, as Faris explained, made people more willing to share information; thus the question of what privacy really accounts for becomes increasingly difficult. (ref 3) It also shows how scary it was to take away privacy of people, such as the anonymous data of movie rankings in Netflix. It was easily “de-anonymize”. This was also the case for Google. It shows how little privacy we really have on the internet. In fact, I also know how valuable this dataset could be for businesses. I had learned in another class about the internet and data helping businesses “recommend” items for their customers. They were targeting the long tail. This was exactly what they wanted. Just as Schneier described that aside from the top movies, most of the other movies are quite “individualized”. (ref 4) People wanted a variance of different movies once outside of the top movies. With the availability of these datasets, it makes targeting individuals and what their real interests much more easier. &lt;br /&gt;
&lt;br /&gt;
Lastly, I like the website to search my birth date and how special I am. It shows how little privacy we really have. (ref 5) With all these readings about privacy, it becomes an increasing concern. It seems to raise more questions that it answers. As for now I still stand my ground that it takes more time to mold how we control and define privacy. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1 - http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory&lt;br /&gt;
&lt;br /&gt;
Ref 2 - https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888&lt;br /&gt;
&lt;br /&gt;
Ref 3 - https://medium.com/internet-monitor-2014-data-and-privacy/data-and-privacy-f7bfa24bbddc&lt;br /&gt;
&lt;br /&gt;
Ref 4 - http://archive.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213&lt;br /&gt;
&lt;br /&gt;
Ref 5 - http://aboutmyinfo.net/compute.php&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 19:21, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3746</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3746"/>
		<updated>2015-02-21T13:57:31Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. (Ref 2)This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
&lt;br /&gt;
Ref 2: http://media.portland.indymedia.org/media/2008/10/380532.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3745</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3745"/>
		<updated>2015-02-21T13:56:50Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
----&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. (Ref 2)This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
&lt;br /&gt;
Ref 2: http://media.portland.indymedia.org/media/2008/10/380532.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3744</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3744"/>
		<updated>2015-02-21T13:55:55Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. (Ref 2)This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
&lt;br /&gt;
Ref 2: http://media.portland.indymedia.org/media/2008/10/380532.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3743</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3743"/>
		<updated>2015-02-21T13:54:45Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. (Ref 2)This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
&lt;br /&gt;
Ref 2: http://media.portland.indymedia.org/media/2008/10/380532.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3742</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3742"/>
		<updated>2015-02-21T13:53:59Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. (Ref 2)This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
&lt;br /&gt;
Ref 2: http://media.portland.indymedia.org/media/2008/10/380532.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3741</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3741"/>
		<updated>2015-02-21T13:53:36Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. (Ref 2)This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
&lt;br /&gt;
Ref 2: http://media.portland.indymedia.org/media/2008/10/380532.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3740</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3740"/>
		<updated>2015-02-21T13:53:00Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. (Ref 2)This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
Ref 2: http://media.portland.indymedia.org/media/2008/10/380532.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3739</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3739"/>
		<updated>2015-02-21T13:51:26Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
Ref 1: http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3738</id>
		<title>Paradigms for Studying the Internet</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Paradigms_for_Studying_the_Internet&amp;diff=3738"/>
		<updated>2015-02-21T13:49:38Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 3&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Before we can even begin exploring the who&#039;s, what&#039;s, and why&#039;s – we need to answer the critical question of how. Indeed, the phrase &amp;quot;studying the web&amp;quot; could embrace a staggering world of possible routes to explore, even before beginning to examine its relationship with society and culture. We need something to guide us through this massive field of (very interesting!) foxholes, and link the ideas we encounter into a consistent piece. We need some kind of structure to allow us to understand what we are looking at, the same way a chemist thinks of things in terms of atoms and molecules, or a philosopher can think about things in terms of schools of thought. This class will explore different frameworks for studying the web, which will structure both the discussion and topic matter covered in the course, as well as the methodology that you should apply to your assignments.&lt;br /&gt;
&lt;br /&gt;
[http://cyber.law.harvard.edu/is2015/File:Class_Days_1_and_2.pdf &#039;&#039;&#039;Download slides from this week&#039;s class&#039;&#039;&#039;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;&lt;br /&gt;
== Readings ==&lt;br /&gt;
&lt;br /&gt;
; Mechanisms of control&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/what_things_regulate Lawrence Lessig, &#039;&#039;Code 2.0,&#039;&#039; Chapter 7] (read intro, &amp;quot;A Dot&#039;s Life,&amp;quot; and &amp;quot;On Governments and Ways to Regulate&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353457 Rob Faris and Rebekah Heacock, Measuring Internet Activity: a (Selective) Review of Methods and Metrics] (read 1-3 and 9-22)&lt;br /&gt;
&lt;br /&gt;
* [http://www.pewinternet.org/2014/10/22/online-harassment/ Maeve Duggan, Online Harassment: Summary of Findings] (from the [http://www.pewinternet.org/ PewResearch Internet Project])&lt;br /&gt;
&lt;br /&gt;
; The effects of control&lt;br /&gt;
&lt;br /&gt;
* [http://arstechnica.com/features/2008/06/book-review-2008-06-2-admin/ Nate Anderson, Book Review: Jonathan Zittrain&#039;s &amp;quot;The Future of the Internet And How to Stop It&amp;quot; (from &#039;&#039;Ars Technica&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/ Jonathan Zittrain, The Future of the Internet and How to Stop It] (Chapter 1, &amp;quot;The Battle of the Boxes,&amp;quot; and Chapter 4, &amp;quot;The Generative Pattern,&amp;quot; only)&lt;br /&gt;
&lt;br /&gt;
* [http://www.benkler.org/Benkler_Wealth_Of_Networks_Chapter_11.pdf Yochai Benkler, The Wealth of Networks] (pp. 379-396 only; stop at &amp;quot;The Physical Layer&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.theatlantic.com/technology/archive/2014/08/advertising-is-the-internets-original-sin/376041/ Ethan Zuckerman, The Internet&#039;s Original Sin]&lt;br /&gt;
&lt;br /&gt;
* [https://www.eff.org/deeplinks/2015/01/facing-challenge-online-harassment Nadiya Kayyali and Danny O&#039;Brien, Electronic Frontier Foundation, Facing the Challenge of Online Harassment]&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=nbYQ0AVVBGU Jeffrey Lin, Play Nice: the Science and Behavior of Online Games] (Focus on 0:00-27:17. It&#039;s a long video, but an interesting exploration of how one company uses game design to regulate griefing and other online bad behavior. Some of the discussed language is NSFW.)&lt;br /&gt;
&lt;br /&gt;
* [http://www.danah.org/papers/2011/WhiteFlight.pdf danah boyd, White Flight in Networked Publics? How Race and Class Shaped American Teen Engagement with MySpace and Facebook] (read 1-11, skim 12-18, read 19-end)&lt;br /&gt;
&lt;br /&gt;
* [http://www.niemanlab.org/2011/10/the-contribution-conundrum-why-did-wikipedia-succeed-while-other-encyclopedias-failed/ Megan Garber, The contribution conundrum: Why did Wikipedia succeed while other encyclopedias failed?, Nieman Journalism Lab]&lt;br /&gt;
&lt;br /&gt;
* [http://www.theverge.com/2015/1/28/7927425/wikipedia-bans-gamergate-editors-violating-policies Adi Robertson, Wikipedia Denies &#039;Purging&#039; Feminist Editors over Gamergate Debate]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=310020 Orin Kerr, The Problem of Perspective in Internet Law] (Focus on sections I and II)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
Assignment 1 is due before next week&#039;s class (February 11th). Details of the assignment will be discussed in today&#039;s class; see [[Assignment 1 Details and Reporting|this page]] for further information. You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
Article about submarine cable cuts: http://research.dyn.com/2014/03/beware-the-ides-of-march/&lt;br /&gt;
&lt;br /&gt;
Electronic Frontier Foundation (EFF): https://www.eff.org&lt;br /&gt;
&lt;br /&gt;
Buy an LP of Barlow reading his declaration of cyberspace: http://boingboing.net/2014/12/08/limited-edition-vinyl-john-pe.html&lt;br /&gt;
&lt;br /&gt;
IP Geolocation Example: http://www.iplocation.net&lt;br /&gt;
&lt;br /&gt;
Tor: http://en.wikipedia.org/wiki/Tor_(anonymity_network)&lt;br /&gt;
&lt;br /&gt;
Apple 1984 commercial:  https://www.youtube.com/watch?v=axSnW-ygU5g&lt;br /&gt;
&lt;br /&gt;
Ello social network: http://en.wikipedia.org/wiki/Ello_(social_network)&lt;br /&gt;
&lt;br /&gt;
Boston&#039;s office of new urban mechanics: http://www.cityofboston.gov/newurbanmechanics/&lt;br /&gt;
&lt;br /&gt;
On the FCC changing definition of &amp;quot;broadband&amp;quot; in the US: http://www.theverge.com/2015/1/29/7932653/fcc-changed-definition-broadband-25mbps&lt;br /&gt;
&lt;br /&gt;
Denial of Service Attacks: http://en.wikipedia.org/wiki/Denial-of-service_attack&lt;br /&gt;
&lt;br /&gt;
Herdict: http://herdict.org&lt;br /&gt;
&lt;br /&gt;
Chilling Effects: https://www.chillingeffects.org&lt;br /&gt;
&lt;br /&gt;
SOPA/PIPA protests: http://en.wikipedia.org/wiki/Protests_against_SOPA_and_PIPA&lt;br /&gt;
&lt;br /&gt;
Born This Way Foundation: http://en.wikipedia.org/wiki/Born_This_Way_Foundation&lt;br /&gt;
&lt;br /&gt;
danah&#039;s It&#039;s Complicated: http://www.danah.org/itscomplicated/&lt;br /&gt;
&lt;br /&gt;
A recent issue where apple approved, then un-approved, then re-approved an app for OS X: http://www.macrumors.com/2014/10/30/apple-reverses-course-on-calculator-widgets/&lt;br /&gt;
&lt;br /&gt;
Sports Illustrated just laid off their entire photojournalism staff: http://www.huffingtonpost.com/2015/01/23/sports-illustrated-photographers-lay-offs-magazine_n_6533142.html&lt;br /&gt;
&lt;br /&gt;
Bruce Schneier&#039;s blog: https://www.schneier.com&lt;br /&gt;
&lt;br /&gt;
Using Twitter to predict flu trends: http://www.technologyreview.com/view/520116/twitter-datastream-used-to-predict-flu-outbreaks/&lt;br /&gt;
&lt;br /&gt;
Using technology platforms is not always perfect: http://www.theguardian.com/technology/2014/mar/27/google-flu-trends-predicting-flu&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;&#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 10:17, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The Internet is the next frontier - not space. Grappling with the issues of how best to improve the logical layer of the Internet (with generativity or without), how to protect the harassed while protecting free speech, and how to protect copyrighted content are the big questions of our era. Many solutions are proffered in the readings in this section, some more reasonable than others, but we will only know how these will play out once they are put into practice. That’s why it’s a frontier, because we don’t know what’s out there or what will happen as a result of our actions until we do it. &lt;br /&gt;
&lt;br /&gt;
Scammers didn’t appear out of nowhere with the popularization of the internet, nor did bullies or content thieves, but the Internet has acted as an enabling force for these kinds of people. Yet, almost every attempt to head off these “wrongdoers” (depending on whom you ask) is met with a catch 22. On the Internet everyone is equal, everyone is an IP address. Thus, those that gain greater skill in the use of the Internet can cause great harm to people in the real world whom they would never have a chance against in real life. It’s created a whole new playing field where the bullied are turning into the bullies, and the bullies are able to be better bullies.&lt;br /&gt;
&lt;br /&gt;
Obviously, the Internet offers many positives as well, but we aren’t worried about those. Those are just there and we like them, but what we really need to deal with are the bad things. This opens us up to a whole new world of morality where relativism holds a lot of sway. We’re in an era where Redbox is going out of business because people either watch movies online or download them illegally. Some might say this is “bad” while others might view it from more of a Robinhoodesque perspective - take from the corporations and allow the little guys to benefit. We’re finding people staying out of trouble by using the “how” of things, for example, peer to peer sharing, which makes the waters even murkier. &lt;br /&gt;
&lt;br /&gt;
Many governments have found ways of controlling internet access and use in their countries. Will the whole world move more in this direction, or will we find ourselves more and more in a cyberpirate world were anything goes and anything can be done? This seems to depend on who develops what first and how well they do it. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 21:37, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Quite often, the Internet´s impact on society and on individuals is discussed in the media. However, the subjects discussed do almost solely concern the social effects or the long-term effects on sitting in front of a screen too much. What we should start focusing on is instead (or also) who and what it is that decide what we see and do on the Internet, because that can affect both our individual privacy and our view on the world.&lt;br /&gt;
&lt;br /&gt;
One thing that is very interesting is that there is not one person or one government that rule over the Internet. The Internet is shaped by its users, people that build the softwares and other infrastructure, private corporations, and of course by governments. Internet security/Internet terrorism and online harassment are two issues that concerns all of these groups in one way or another. What is also interesting is that even though we all are part of shaping the Internet, we do have different interests in doing so. Individuals use the internet for their own purpose, for example for amusement and to gather information. Those who build the infrastructure might do so because they want to improve the Internet or because out of curiosity. Private corporations want to do business, while governments are interested in protecting individuals and the country from threats. &lt;br /&gt;
&lt;br /&gt;
Even though the Internet is the source of a lot of good, there are like I mentioned also a lot of bad consequences to deal with. Issues like what to do about online harassment and online privacy problems are two of multiple hard nuts to crack. Laws are often important but not always the best and only solutions. Kayyali and O’Brien advocate in &#039;&#039;Facing the challenge of online harassment&#039;&#039; a more representative pool of toolmakers, to empower the users and to embrace counter-speak, etc., as part of a solution to the problems of harassment. I believe that it will take some time before we see a solution since there are so many players in this game called the Internet. The market, laws, norms and the Internet´s architecture all regulate the Internet in one way or another, even if they don´t mean to, and that is both a strength and a weakness. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 12:19, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
From today&#039;s class reading I was mostly impressed  by the Online Harassment article, by Mave  Duggan and more  precisely by the survey on how people response to online harassment . Only 5  % among those who have experienced online harassment reported the problem to law enforcement, it says. It means Internet users do not seek help from the offline authorities for violation of of their rights committed online. Considering this, I asked  myself the question, is it so because the online community has already elaborated it&#039;s own methods of enforcement and response  to online violence  or is it just because people  believe traditional, meaning offline measures, would not be  sufficiently applicable and efficient regarding Internet cases?  Another  question I asked myself is whether people react the same way to one and the same aggression online and  offline. For  example our job performance  being  criticized in Facebook (Online Harassment, Part 4:The Aftermath of Online Harassment), would  it  hurt   more  or  less  than being  criticized   in a face to face  conversation? ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 14:23, 3 February 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
I too was very drawn to the articles about online harassment.  As student affairs professional that has worked in higher education institutions for over 10 years, it has been very profound how the perception of internet bullying and the governance of such behavior has changed radically. Approximately a decade ago, there was a large amount of discussion about institution jurisdiction and the ability to adjudicate students and hold them accountable for actions occurring via the internet; but little was being done. As social media and technology became the forefront of communication for millennial students, institutions and practitioners had to reevaluate institution policies. As specific examples, I have served on committees that redefined internet harassment and code of conduct policies that no longer allowed for ‘remote’ behaviors to go unpunished.  In a number of colleges and universities, harassment that takes places through a university’s technology network is subject to disciplinary and potential criminal action. Some institutions have gone so far as to create a code of conduct that governs student behavior and bullying/harassment off-campus, which is subject to institution discipline and potentially criminal action. In my previous institution, we saw approximately a 30% increase in judicial cases that included internet harassment from the preceding year. What is interesting is the increase of reporting in a university setting while reporting incidents to law enforcement by the general public may not occur frequently. I would assume, with increased legislation about universities’ reporting criminal behaviors, there has been additional scrutiny about institutions demonstrating proactive comportments in protecting our students holistically. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:44, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
I have to chime in on the Online Harassment article as well.  Don’t know if I missed it, but I think they overlooked a huge demographic of young people who are harassed online.    There is a population of middle school students who are severely harassed and bullied, such that many states are enacting anti-bullying legislation (which borders on infringement of free speech in some cases).    These are victims who honestly don’t know how to handle the harassment and could face major depression and in some cases suicide.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:15, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the readings that caught my attention for today’s class is the concept of generativity from Zittrain’s book The Future of the Internet. Zittrain defines generativity as “a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences” and he uses this term to describe open source software systems as well as closed-source systems. My initial thought from this definition was that it perfectly encapsulates what the modern Internet has allowed people to create. We were once closed into what Zittrain refers to as a “walled garden” which by its very nature limits our creativity, but we were able to break out of that shell via PCs and the internet. But I do agree with one of Zittrain’s main points being that this “walled garden” invites a problem that if we do not take seriously it could derail further progress in our internet age.&lt;br /&gt;
&lt;br /&gt;
[[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 16:29, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
I agree with Olivia&#039;s point in regards to piracy. I personally see piracy as a major threat to the &amp;quot;generativity&amp;quot; that Mr. Zittrain mentioned in his book titled, &amp;quot;The Future of the Internet.&amp;quot; Online piracy encourages the governments to implement, and to enforce new laws that may make it harder for entrepreneurs to create and to innovate (Thus leading to stagnation - the nemesis of generativity.)&lt;br /&gt;
&lt;br /&gt;
The article titled, &amp;quot;Code 2.0&amp;quot; by Lawrence Lessig taught me a lot in regards to the constraints that we, as individuals, face online. I never considered social norms, or the architecture of the internet, as powerful factors that could regulate our every movements. The  &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 4:40PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;== The Internet&#039;s Chilling Effect: The Sound of Anonymity and the Silence of Vanity ==&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Duggan reveals to us the numbing numbers of online harassment and reveals in numbers what many of us may have already suspected about society and its Internet and what the two entities are doing to each other:&lt;br /&gt;
&lt;br /&gt;
Words are cheap, feelings cheaper, and attacks are virtual (at least half the population, according to Duggan, found their most recent experience with online harassment as being &amp;quot;not too upsetting&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
Duggan&#039;s article on Internet harassment brought to mind two thoughts from the realm of crowd psychology that might be useful in considering the Internet&#039;s behavioral effects on us.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 1: The more people in a situation, the simpler their collective mental capacity.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Gustave Le Bon wrote a book entitled &amp;quot;The Crowd&amp;quot; -- in it he claims that the mental capacity of a crowd boils down to &amp;quot;Yes&#039;s and No&#039;s&amp;quot;; the larger the crowd the more so and the more the crowd simplifies the choices, the more fervent they become. &lt;br /&gt;
&lt;br /&gt;
There&#039;s a potent amount of activity on platforms where people, no longer using their personal identities spur off on commentary and discussions that quickly turn nasty. The ability to disconnect peoples&#039; identities from reality and install their avatars in the virtual world of the Internet creates a surprising cacophony that only the anonymity of the crowd and of the Internet can inspire which segues us into…&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Crowd mentality parallel 2: The more anonymous, the less responsibility, the more the attack.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
With Internet Crowd Mentality, the Internet becomes an even more powerful assembler, rally-mongerer than any physical, on the ground crowd mongerer could ever be. It&#039;s effects are similar to Le Bon&#039;s thesis about the simplification of crowd mentality.&lt;br /&gt;
&lt;br /&gt;
The Internet is at once a paradise of (perceived) anonymity  and a kingdom of exposure. In physical life, crowds have this terrifying ability to de-individuate  -- to strip the individual of their identity and meld them with a larger identity -- the Crowd&#039;s. With the loss or in the Internet&#039;s case, the discarding of identity also comes the loss of personal responsibility, thus explaining the awful phenomena of normal individuals doing horrific things when in a mob. The exact phenomena can be seen with the Internet only with individuals sitting all alone in front of their computers-- that very same feeling of not being personally accountable that is found when surrounded by hundreds of people is brilliantly emulated through the portal of the Internet. &lt;br /&gt;
&lt;br /&gt;
Duggar well exhibits this with her Pew numbers.&lt;br /&gt;
&lt;br /&gt;
On a topic opposite crowd mentality, we turn to ultimate individualization; the power of vanity and how the Internet  and its many actors are utilizing this to control the landscape before it.&lt;br /&gt;
&lt;br /&gt;
In discussing the construction of the architectures of control, Lessig used a funny example of how a hotel was able to control their customers&#039; complaints about the elevator:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;A large hotel in an American city received many complaints about the slowness of its elevators. It installed mirrors next to the elevator doors. The complaints ended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The plausibility of this story makes it even funnier.&lt;br /&gt;
&lt;br /&gt;
In parallel, to discussions of the Internet and its means of control via its controllers, we learn from this elevator-mirror example something about human nature that will always work in conjunction with the Internet. Vanity is one of the most powerful manipulators and the most potently disguised usurpers of our liberties… Prime example, Facebook, where we witness the tradeoff of using a media platform to connect and to show off in exchange for the selling of our private information to megacompanies.&lt;br /&gt;
&lt;br /&gt;
Vanity is a great silencer. Social media platforms cater to this concept brilliantly. Through the Internet, they are the proverbial Mirrors before the Elevators. So long as we are admiring ourselves on our social media platforms, we will be distracted from the inherent malfunctionings and pitfalls of a devious system.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 14:55, 6 February 2015 (EST)&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
It is very interesting to look back and see the way how the internet evolves, what is framing it, regulating it, and making it be the way it is, such as norms, law, architecture, and market. There are problems such as ads, harassment and other things associated with this lack of regulation or evolution if you will.&lt;br /&gt;
The architecture can regulate it so much to as to the purpose of what the program was created for, the market but wanting it, the law by framing its ways, and norms by doing something similar to the law by the way of majorities. &lt;br /&gt;
&lt;br /&gt;
I think that with respect to the problems for lack of regulation like harassment, and annoyance pretty much, there is a thin line between some one&#039;s free right to express, and someone invading the rights of others to enjoy this product, but it is so difficult to establish laws that can regulate this matter in this situation, because the internet is intangible.&lt;br /&gt;
&lt;br /&gt;
I was doing some research and it appears that in order to monitor this behavior of harassing there should be surveillance in every where, and that it is  just very difficult. Therefore, that could be one big problem of regulation. &lt;br /&gt;
&lt;br /&gt;
There are also other parts of the reading that basically state that regulation and freedom overlap, but the results of harassment can make one think that twice in how this problem can be solved.  &lt;br /&gt;
&lt;br /&gt;
Edwin Duque (15:37, 19 February 2015 (EST)[[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]))&lt;br /&gt;
-------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
I took a course in January called Leadership Lessons from Modern Presidential Politics – which I highly recommend to everyone here if you’ve got the time – and we learned a few things about the internet as well. First I’d go into some detail about the concepts we learned. One of the most striking concepts was “The Starfish and the Spider”. This was taught to us in the perspective of business models and political campaign models, yet it could really apply to a wider range of things. The concept is simple, the spider structure has managers on top of managers, or shall we say a more inflexible management with power maintained at the top of the hierarchy. The starfish model attempts to break this apart; it not only take away a number of layers from the spider structure, but it also shifts the power down to the bottom. For example, an employee of the lowest rank could make certain decisions if it benefits his part of work. This gives more power and responsibility to the employees, which also gives them more meaning to stay with the firm. &lt;br /&gt;
&lt;br /&gt;
We could also summarize the starfish model as a “scalable” model. Scalable means software which could be copy and pasted almost indefinitely and distributed world wide. Unscalable things would be dentistry which requires time per patient, and you could only help a number of patients per day. This becomes interesting because in the internet world, starfish models means that information comes from multiple sources, such as Twitter, Facebook, and Wikipedia. Spider models would be like traditional news agencies, or websites like cnn, Financial times, Bloomberg. These websites get their information from one source only. The starfish model also states that things grow a lot faster, but the quality may diminish. Which is also in line with what we learned in assignment 1. Wikipedia had to create strict “rules” in order to maintain its legitimacy. It could have failed just as easily as it could have succeeded. &lt;br /&gt;
&lt;br /&gt;
After learning about scalability and the starfish model, I was very fascinated when I read about the other failed encyclopedias before Wikipedia came into existence. (Ref 1) The part about Wikipedia keeping the old norms of how an encyclopedia made a lot of sense. People like change, but not that much change. Something entirely different could in fact be too unusual to the human eye. I once heard that if you’re one step ahead of the curve, you’re smart; two steps, you’re a genius; three steps, you’re an idiot. I guess people can’t comprehend something that is so far away. The next point about Wikipedia not focusing on technological development does have some truths to it. It does not exclude the technologically challenged individuals. They could just as easily become an editor compared with other more technologically gifted individuals. Basically it is agreeing with the starfish model, of pushing power down to the lowest level. If the least technologically literate user could edit a Wikipedia page, it means everyone is capable of doing so! This point is also explained as Wikipedia offering low transaction costs to participation. This is exactly the point about making it easy for the average user.&lt;br /&gt;
&lt;br /&gt;
In my opinion, the availability of the starfish model being incorporated into technology meant that things could grow exponentially or fail miserably. The application “Draw Something” grew exponentially because it was scalable. If something physical gained this attraction, it would not grow that fast. Though I would also add my reasoning for the success of Wikipedia too. I believe the rules and regulations put forth by Wikipedia at the start created an aligned sense of belief on the direction of the community. It subsequently made the users become self –reinforcing the ideals of the website. From my learnings last semester on political leadership, one reason why Obama won the campaign was the use of the Starfish model; giving the power to the average folks. They could create subcategories such as MyObama-Skateboarders. This sense of connection was their greatest success. I believe Wikipedia has achieved their current success with a similar manner. &lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 08:49, 21 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=3686</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=3686"/>
		<updated>2015-02-16T10:02:53Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;January 27&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Class was cancelled on this day due to snow. Please see the class video for day 2 for the discussion of this material.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet at its core is simply an expression of a technological protocol that allows for a particular way of sharing information. But its role has never been this understated. The Internet has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal. So is this platform about fundamental social, political and economic change, or about access to solipsistic blogging, pornography, cheap pharmaceuticals, free music, and poker at home? This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber- terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;There is a small assignment to do before class. See [[#Preparation (Assignment &amp;quot;Zero&amp;quot;)|Assignment Zero]] below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (&amp;quot;Assignment Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Reflect on what you believe are the most significant social, cultural, political or economic changes associated with the spread of the Internet and digital technologies.  In a few sentences, please offer 2-3 examples in the [[#Class Discussion|Class Discussion]] section below and be prepared to discuss them during class.&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is the Internet?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=V2QdEj8UjBc Ethan Zuckerman, History of the Internet] (approx. 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=whmMNRHktX8 Jonathan Zittrain, How the Internet Works] (approx. 4 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How does the Internet change governance?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [https://projects.eff.org/~barlow/Declaration-Final.html John Perry Barlow, A Declaration of the Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
:* You can hear Barlow read this [http://departmentofrecords.co/dor1.html here].&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/issues/January-February-2006/feature_goldsmith_janfeb06.msp Jack Goldsmith &amp;amp; Tim Wu, Digital Borders (Legal Affairs)]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.ericgoldman.org/archives/2009/03/the_third_wave.htm Eric Goldman, The Third Wave of Internet Exceptionalism]&lt;br /&gt;
&lt;br /&gt;
* [https://medium.com/@internetmonitor/platforms-and-policy-e9984e1be4c6 Rob Faris and Rebekah Heacock, Platforms and Policy] (from the [http://thenetmonitor.org/research/2014/ &#039;Internet Monitor&#039; 2014 annual report])&lt;br /&gt;
&lt;br /&gt;
* [http://www.ted.com/talks/rebecca_mackinnon_let_s_take_back_the_internet.html Rebecca MacKinnon, Let’s Take Back the Internet! (TED.com)] (approx. 15 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Who governs the Internet?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://www.icann.org/sites/default/files/assets/governance-2500x1664-13jan14-en.png ICANN, Who Runs the Internet?] (infographic)&lt;br /&gt;
&lt;br /&gt;
* [http://ubiquity.acm.org/article.cfm?id=1071915 Alex Simonelis, A Concise Guide to the Major Internet Bodies] (skim, but focus on ICANN, IETF, IANA, and W3C)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Who is the Internet? Who is it not? What can we do about it?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://www.webuse.org/pdf/Hargittai-DigitalDivideWhatToDo2007.pdf Eszter Hargittai, The Digital Divide and What to Do About It (New Economy Handbook)] (focus on Sections I-III)&lt;br /&gt;
&lt;br /&gt;
:* Hargittai’s data is from 2003. For more recent data, see [http://pewinternet.org/~/media//Files/Reports/2013/PIP_Offline%20adults_092513_PDF.pdf Pew Internet &amp;amp; American Life Project, Who&#039;s Not Online and Why] (read the summary, skim the sections).&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=mNHkG7w2IA8 Ethan Zuckerman, Why Our Webs Are Rarely Worldwide, And What We Can Do About It] (approx. 14 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://advocacy.globalvoicesonline.org/2013/12/04/video-who-controls-the-internet/ Ellery Biddle, Who Controls the Internet? (&#039;&#039;Global Voices&#039;&#039;)] (video in Spanish with English subtitles, 10 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto); and [http://cluetrain.com/newclues/ New Clues]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1752415 Tim Wu, Is Internet Exceptionalism Dead?]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/12/05/good-and-bad-reasons-to-be-worried-about-wcit/ Ethan Zuckerman, Good and Bad Reasons to be Worried About WCIT]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links From Adobe Connect Session ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Welcome to Internet and Society: Technologies and Politics of Control! This is the section of the page where you should add your comments to complete &amp;quot;assignment zero.&amp;quot; Once you have registered an account, just click the &amp;quot;[edit]&amp;quot; button at the upper right hand corner of this section to add text! You can add a divider between comments by typing four hyphens (&amp;lt;nowiki&amp;gt;----&amp;lt;/nowiki&amp;gt;) in an empty line between comments. &#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 09:50, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the more significant social and economic changes that I have not only experienced but seen, is the ability to find things out instantly. Whether it be news or education, sports or politics, we now have the ability to informed immediately about anything and everything. This is both a blessing and a curse.[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 17:06, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
The most significant social change resulting from the spread of the Internet is simply the opportunity for the average person (whoever that may be) to establish two way connections with people, businesses, information, and governments around the world in other than a physical environment. Having two way communication, even if indirectly, is empowerment. I grew up in a world of listeners and watchers, from newspapers, to magazines, radio, broadcast television, and brochures. The Internet has given us a world filled with conversation. &lt;br /&gt;
&lt;br /&gt;
The most significant economic change is online sales of goods and services. I can buy just about anything on the Internet and never leave my home, my office, or the beach. I can’t imagine where I would have to physically go to buy, or how I would even locate, a 2 kilogram box of Scharfenberger cocoa without the Internet. I just would not take the time to locate it, and for that reason I would not buy it. More to the point, it would not be sold.&lt;br /&gt;
&lt;br /&gt;
Culturally, email is the big change. Of course, instant messaging and social media are gaining ground, but it was email that changed our culture to the right now work and personal environments, even before it was being delivered on the cell phone.  Wait, maybe the cell phone is a bigger change. [[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:51, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
There is some fascinating discussion taking place “below the line.” It makes me excited for this semester. To my mind, the internet and associated digital technologies remain the most influential invention of our time. They have been the facilitator of countless zeitgeists including the crumbling of oppressive kingdoms and the exploration of alternative currencies, as well as the breeding ground for unique forms of intellectual and social collaboration- be they twitter, Jstor journals, or your average online message board. This interconnectivity is, of course, not without its side-effects. While the relationship between various exchange and interest rates pre-dates the proliferation of the internet, I feel that such technologies have allowed the more unsavory characteristics of these economic relationships to be felt much more acutely by the average person.[[User:Jmerryma0287|Jmerryma0287]] ([[User talk:Jmerryma0287|talk]]) 14:39, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
One of the more recent ways in which the Internet is shaping our sociopolitical discourse is through the creation of strong cyber networks for more marginalized communities.  For example, the rise of feminist blogs and message boards or hashtags such as #blacklivesmatter can be used in connecting online activity and writing to other forms of non-cyber activism and understanding.&lt;br /&gt;
&lt;br /&gt;
In terms of economic changes prompted by the Internet, online capitalist competition has facilitated the growth of huge online sellers of a variety of goods with versatile virtual purveyors like Amazon. ([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 13:33, 3 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Digital technologies have changes many aspects of life and society. One example is the fact that I can participate in this class even though I live in Europe. That is just one example of how digital technologies have played a huge part in globalization. Even though I live in Sweden, I can still study at an American university, easily stay in touch with my best friend who lives in Missouri, I can follow the life of a stranger in Australia through his or her blog, and I can connect and share my thoughts with other people who think like me but who live in other parts of the world. As a young person of today, I do not only identify myself as a citizen of a particular city, but also as European or as a ”global citizen”. &lt;br /&gt;
&lt;br /&gt;
What is also important to reflect on is how we can influence and affect others through the Internet and digital media. (And of course how we are influenced and affected by others.) One out of many possible examples on this matter is blogs. I use the Swedish blog &#039;&#039;blondinbella.se&#039;&#039; as my example. ”Blondinbella” is one of the most popular blogs in Sweden with over 1 million unique readers each week. Sweden a country with only about 10 million citizens, and that one blog reach more people than many newspapers do is very interesting and worth reflecting about. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 03:40, 26 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I completely agree with what Josefin said above. The generation that is now entering adulthood is inheriting a much smaller, more connected world than their parents did. &lt;br /&gt;
	I think it&#039;s important to reflect on the possible downsides of the ever increasing invasiveness of the internet. We are a generation that can ask Siri how badly the Patriots beat the Seahawks in the Superbowl — and she’ll tell us almost immediately that the Patriots won in a landslide. Or what song is playing on the radio. Or what the largest star in the Milky Way is. Or if Pixar is ever going to make a sequel to the Incredibles (they are, finally). You get the point. We are used to being able to find out almost anything, almost anywhere, at almost anytime. &lt;br /&gt;
	There may be a subtle danger in adapting an entire generation to instant gratification. As we put more and more of our lives into our phones and computers, we stop relying on our own mental faculties. For example, my grandfather has a razor sharp memory, and he knows all the phone numbers of our immediate and extended family by heart. If I lost my phone, I might remember my mom’s number, but my whole contact book would be lost if it wasn&#039;t for iCloud. I’m certainly not exercising my memory on a daily basis to make calls like my grandfather. Will that hurt me in the long run? Probably not — but it’s an interesting thought. &lt;br /&gt;
&lt;br /&gt;
	Another aspect of the internet that I sometimes reflect on is its contribution to political close-mindedness here in the US, if not the world over. I worked for a long time in DC, and have friends and family all over the political spectrum — even a tea party uncle in Texas, and I can say with certainty that I’ve witnessed a trend where my highly conservative friends will follow and subscribe to conservative news sources or blogs that produce news that corresponds with their pre-existing beliefs, and like-wise for my liberal friends. Constant exposure to “news” written or spun to enforce and vindicate your beliefs serves to cement your views, and lessens the amount of meaningful debate that takes place. I would say this definitely serves to further polarize the political climate here in the US. Sean Hannity, Rush Limbaugh, Jon Stewart, Stephan Colbert, all have large followings of people who watch their shows, listen to their radio stations, and subscribe to their social media outlets. The political influence of these individuals can, in some cases, easily shape the political landscape more than many politicians do. Interesting to consider. [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 23:46, 26 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wesley Verge. The polarization of American Politics on the internet reflects popular attitudes, and at times exacerbate the problem. I think the problem has to do with journalistic standards. Remember those? They used to exist up until about the 1990&#039;s, or more precisely, since Rupert Murdoch bought Fox News -- and that&#039;s when the bar was lowered for everyone. With such a wide reach, high profits, and such obvious bias on all the publications under his ownership, journalistic standards went out the window in the pursuit of sensationalism and profit margin. And sadly, those who didn&#039;t adapt to this new way of selling news were left behind. The Philadelphia Inquirer comes to mind, but R. Murdoch&#039;s purchase of the Wall Street Journal is another good example. U.S. Politics have been in a sad state of affairs since G.W decided to invade Iraq, and the rancor and indignation that followed those years has still to subside. There are other factors that affect the current state of politics in the U.S, and two of those are geography and the diversity of demographics throughout the country. Notice that there isn&#039;t really a traditional democratic and republican party?  Despite the fact that the two party system is still dominant in voting patterns, there are many factions within those two large groups. Hromero [[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 12:41, 29 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hromero. You make valid points, though I would point out that they differ slightly from the point I was trying to make. To elaborate a little further, I was speaking only of how the internet plays a large role in exacerbating the political polarization of the country. You correctly point out that the shift in media tactics marked a shift towards increased polarization. I&#039;m saying that the internet provides access to sensationalist news and propaganda, on both sides of the spectrum, to anyone with a connection or a smart phone. People no longer have to be challenged in their thinking. If the President says &amp;quot;yadayadayada&amp;quot;, rather than reflect upon and come to consensus, people are bombarded with sound bites that penetrate the public sphere and shape political thought. New ideas never have the chance to take root, because they are razed quite immediately after inception. Of course, talking head pundits are nothing new, but at least years ago families could discuss news together over dinner, waiting to read the paper or see the news the next day. Now, The President says &amp;quot;yadayadayada&amp;quot; at 6pm, and John Boehner is able to issue a responsive speech at 8pm through twitter or youtube. You&#039;re right to point out the increased splintering of the parties, but where that meets the internet is now each of those factions has methods to connect to their support bases, issue videos, etc on a constant and consistent basis -- a change that surely helps to solidify and expand their support, further polarizing the country. I think its important that we focus on how the internet is used in correlation to politics, rather than focus on the people doing the using and whether or not we agree with them. It keeps discussion more clear and concise. [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 17:37, 30 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of the internet and our digital technologies has changed how we look at society and how we participate in it. For example social outlets such as Facebook and Twitter allows us to express any thought or feeling and connect with people all over the world. This gives us the ability to form connections and relationships with people that would not have been possible otherwise. With the internet always evolving information has become more and more accessible. Anything that we can imagine we can find through the Internet whether that be current events, a movie review, or personal information just to name a few. Search engines and online encyclopedias such as Google and Wikipedia have changed how we learn and search for information. Furthermore the internet has changed the way we do business . Now we are able to purchase products through websites like Amazon and any other retail site. We also can conduct business through the internet through trading which adds a new dimension to the business world. Our advancements in the internet and digital technologies added another wrinkle in how we view information and the economy as well as many other areas. [[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 15:07, 27 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As a distance student, participation has been possible in many HED classes with students world wide from Singapore, Malaysia, Great Britain, Indonesia, and Australia as well as the United States.  The advantages the internet and exponential expansion of digital constantly creates awe in realizing what has become possible in a relatively short period of time. &lt;br /&gt;
&lt;br /&gt;
It is possible to access historical and current information from the Internet from each of the categories listed above almost instantaneously whether it be cultural, political or economic or social.  The online Wikipedia information saves gong to the library or an encyclopedia with each query…..which in the case of the library has advantages as well as disadvantages.  For lovers of books, there is nothing like thumbing through the pages of a book….and reading the first and last chapter while standing in front of a bookshelf. &lt;br /&gt;
&lt;br /&gt;
Shopping - it is possible to view the price and merchandise of a particular brand or manufacturer with a few keystrokes.  A person can shop locally or nationwide or overseas for particular items. [[User:Rgrasser|Rgrasser]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I like many of the posts above, and I think they&#039;re on the mark. My first thought on changes ushered in has to do with Wesley&#039;s comments on instant gratification - we can access information and purchase goods instantaneously, but being connected means we are always on-call. A text/SMS comes to our phones on our bodies, we don&#039;t want to be behind on emails or miss a post on Facebook, etc. The new, immediate connectedness of the turn of the century, it seems to me, is significantly notable, both in our ability to connect and the possibility of always being connected to.&lt;br /&gt;
&lt;br /&gt;
This new connection brings me to my second thought, the new possibilities of surveillance. Typically conversation focuses on government censorship and the ability to monitor for unwanted speech. I would add that our new, ongoing connectedness also provides an increasingly continuous history of our identities. This history can be used to market specific products, tailor our searches, and generally show us content that will keep us connected more often. To be connected means to be watched, sometimes directly, sometimes passively. Many have written on how this leads us to begin policing ourselves.&lt;br /&gt;
&lt;br /&gt;
This self-policing brings me to third major development I see, which also has much to do with Wesley&#039;s thoughts on how his friends&#039; political views are continually fed. A variety of technologies now exist to keep us more within our preconceptions than before. Our identity and self-understanding is produced and maintained in a different and more controlled way in the past. It doesn&#039;t seem to me that there is (necessarily) a (wo)man behind the curtain, but the implementation and effect of these technologies remain the same.&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 17:42, 27 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Internet access has changed the way information flows while increasing social and economic participation. As internet and digital technology continues to develop, it has changed the nature of how organizations market themselves to targeted their targeted consumers. Traditional methods of newspaper/magazine advertisements and email listservs no longer are the primary avenue of increasing consumer engagement. Social media platforms have expanded consumer outreach as companies use Twitter to tweet to their customers and smartphone apps to keep their consumers connected. This connectectivity has impacted the roles of employees as many of their job descriptions are now requiring evidence of technological competencies.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The internet and technologies has allowed the progression of global connectivity by creating meaningful experiences through intentional dialogue and engagement. Internet and digital technologies allows for access to consumer services previously limited due to geographic location. Historically, a fitness coach was someone typically found within your local community or an athlete was required to travel to the gym/sports facility. With the expansion of technology, people now have access to some of the best coaching in the world through the use of current technologies. As an example, I am now a posing coach for athletes throughout the USA, Canada and the UK. &lt;br /&gt;
&lt;br /&gt;
People are now able to engage in a global experience without crossing international borders. [[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 18:57, 27 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While reflecting on the Internet and the significant changes it has spread, I ironically type and post the following comments while flying on an airplane. Who would have imagined using internet on a plane 20 years ago?  Yet, walking through the airport before boarding my flight I could see the changes the Internet and digital technologies has had on our society: customers ordering food via an iPad in the airport cafe; an older couple Skyping, what looked like their grandson, on a laptop; teenagers idly staring at their smart phones while their parents talk at them; the many airline passenger who boarded their flights by merely pulling up an image on their iPhones. Internet and digital technologies are everywhere...and it has changed every aspect of our lives. &lt;br /&gt;
&lt;br /&gt;
The most significant of those changes I find is the globalized world we now live in. Post World War II, the international community entered an era of connectedness, and the Internet has only exacerbated this connectedness. The ability to share, like, post, tweet, retweet, reblog, blog, etc. has birthed a generation of globally connected citizens. It only takes a couple of clicks on Twitter to see or read about happenings half way around the world - in real time. This environment has created a more involved international community, especially when reviewing Twitter trending topics, for instance the events that happened in Ferguson, MO last year. Massive marches, stand ins, protests and rallies were organized across the globe - orchestrated primarily on social media. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the possibilities of outreach and global awareness is boundless. Internet and digital technologies now offer a tool for social good. &lt;br /&gt;
A recent article [http://www.information-age.com/technology/mobile-and-networking/123457289/facebook-launches-bid-to-bring-cheap-internet-to-the-developing-world] discussed how internet has become vital to survival for those living in the poorest of countries. Facebook, for example, launched a program with efforts to bring internet to lower income countries or rural areas who need the assistance with technology to better living conditions. The implementation of these technologies are ongoing, and it is unclear if they are helping more than they are hurting, but the social change of internet is here to stay.  &lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 07:35, 28 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ok, speaking of internet morons, this is the third time I’m posting and I still don’t see it. Any tech has any hints as to why this is happening, I’m making a copy of this in a separate doc, please tell me where to send it.&lt;br /&gt;
My comment is as follows: 1) Since the advent of the internet people are interacting with devices and technology more often than they used to and as a result there have been some measurable changes in children’s cognitive development. I will find the resource later on. I think it also affects adults, especially those who are already predisposed to HDHD. 2) since it is very hard to tell when you’re blogging whether you’re speaking to only three people or three thousand, the power of bloggers should be taken with a generous dose of skepticism. 30 Innovation does not necessarily make us more effective, it merely makes us busier. Exhibit A: Facebook (A complete waste of time, and a truly distracting way of communicating with other people. Absolutely hate it.) Hromero[[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 15:01, 28 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Reflecting how the world has changed in the last few years is impressive, many things that could not be dreamed to be done in any other way that would have been physical, now in our current times, are possible. &lt;br /&gt;
&lt;br /&gt;
Socially, the interaction of people on facebook and other social networks, like blogs, etc, have become from informational, to a way how people can meet one another, interact, and even date. This in the past was never thought, and now relationships, interaction of groups, like chats are very common. Social networks have &lt;br /&gt;
&lt;br /&gt;
Culturally, it is important to see that there is a subculture, mostly in teenagers and younger people, the subculture, of the I Pad, and tablet, and aps people who are identified, by their cell phones, ring tones, and other characteristics of technology. This differs from the older generation that would not do monetary transactions, meet people, or even gather around a computer, this older folks may prefer to go to the bank, gather with friends, and bring a guitar and play. The culture has been subdivided.&lt;br /&gt;
&lt;br /&gt;
Economically, Pay pawl, and other providers like e-bay, has become very popular in the market, aps for real estate and westlaw, for the legal field, has caused a huge impact, on people and their economy, it is taken over many jobs, and also has make people gain a lot o money, people needed to physically be instructed by someone or by reading, and now there is more accessibility through the internet, where most people can find the answers the they need most of the time. The economy is being monopolized by the electronic era. (Edwin Duque)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I agree with my colleagues contributions above. There is no doubt that we&#039;ve had significant social, cultural, political, and economic changes associated with the spread of the Internet and digital technologies throughout the years in both spheres personal and professional. &lt;br /&gt;
&lt;br /&gt;
Regarding the personal impacts, one example is that if we think about the new generation of people that is part of what they call &amp;quot;Generation Z&amp;quot;, instead of playing with the traditional toys that we had in our childhood, when they are kids their main entertainment are the electronic devices with Internet access. A one-two year old child currently simply grab their parent&#039;s iPads/tablets or smartphones and play with apps. It&#039;s impressive how quickly they get used to those devices. Some years later they start interacting with people all over the world through online games, social media, Skype, whatsapp, blogs and others, as we are all able to do nowadays. Besides that, with the Internet we started having access to a variety of information, books, history, news, we can shop through it, take online courses provided by schools/institutions in several countries, we can make a reservation at a restaurant wherever we want, we can compare prices and quality of products and services, we can be always updated about what is happening in any part of the world, all without leaving home. In addition, basically we register &amp;quot;our lives&amp;quot; in those devices, which have become more and more multifunctional, as we use our cell phones to make calls, as an agenda, to take pictures and record videos, to message our contacts, everything to make life more practical. &lt;br /&gt;
&lt;br /&gt;
So, the Internet really broke barriers and made our lives much easier, also in the professional sphere, as for instance we can attend online meetings, what also economically saying the companies can save money that would be invested in trips, we can have more flexibility when the home office is allowed, the companies can storage their data and also their client&#039;s in those devices and the physical archive has been practically extinguished etc.&lt;br /&gt;
&lt;br /&gt;
However, in both spheres people and companies have been facing problems regarding privacy matters, cyber crimes, as it occurred recently with Sony Pictures, cyber espionage, also between countries, what has a political impact, and the legislation hasn&#039;t been able to follow the technological advancement in the same speed. &lt;br /&gt;
&lt;br /&gt;
Therefore, one of the most important topics currently, which is a global concern and that is in the spotlight is Cyber Security. &lt;br /&gt;
[[User:Natasha Jalbut|Natasha Jalbut]] ([[User talk:Natasha Jalbut|talk]]) 00:21, 30 January 2015 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internet, and with it the information age, has vastly changed the world and will continue to do so for the foreseeable future. I believe the internet has both managed to make the world smaller and at the same time individual&#039;s interaction with the world larger. &lt;br /&gt;
&lt;br /&gt;
On a Social level anyone can make an immediate connection with anyone else in the world provided they both have access to the internet. This breaks down many barriers in itself from where we were only a few decades ago where individual towns and neighborhoods became a cocoon for anyone who did not or could not venture out. Today those same towns have citizens who are in relationships with people they may never have met through dating websites and other forms of communication. Distance is no longer an issue for many. &lt;br /&gt;
&lt;br /&gt;
From a cultural perspective we are exposed to new lifestyles and languages that you many never have seen otherwise. One great example is the growing &#039;Anime&#039; (Japanese style for animation in television and movies) following. If it wasn&#039;t for the internet many of these popular shows in Asia would not be known in the United States. At the same time this form of information/entertainment sharing can lead to a narrow and specific view of what is a diverse culture in itself. &lt;br /&gt;
&lt;br /&gt;
Politically the internet has created a new powerful platform that politicians need to work with in order to win elections or pass a vote with the public support. A few years ago an internet following might not have made a campaign but today groups like the Human Rights Campaign rely heavily on it and in doing so have made changes in the political landscape. &lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 14:06, 30 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The information age, by way of the Internet, has revolutionized the world exponentially. Socially, the internet was initially utilized to communicate &lt;br /&gt;
via email and to obtain readily available information. Today the use of email has practically bankrupted the United States Postal Service and the internet in some aspects has become the primary source of information enabling proponents of civil unrest to generate support throughout the world. This is an overly generalized outlook on the growth of the internet but as one can see even in these sectors the great impact it has had on society.&lt;br /&gt;
&lt;br /&gt;
Culturally, the evolution of myspace, facebook, twitter and the like has reflected how the young guides the old on this highway. The adaptability of the young and their ability to embrace new arenas in cyberspace dictates how and where their parents socially intermingle on line. Additionally, it also reflects how providers of such social networks have to adapt to the young or become irrelevant such as the case with myspace. The online language that we engage in has become a part of our day to day interpersonal communication with others. Our day to day realities is not concrete reality until it becomes &amp;quot;facebook official&amp;quot;. Sadly, as with any revolution, I fear that legislative policy such as censorship and intermediary provider responsibility will begin to take affect and slow the amazing advances that have been made culturally in this technological era. Case in point, it is beyond my wildest dreams that I have the privilege to participate in a course taught online by Professor Sellars at HES. The paths to education through coursera and edx which are free is an opportunity and path for learning that we never had before. However, with continuing legislation, censorship and/or surveillance the ideas that we formulate from the knowledge that we now have equal access will have a limited capacity to flourish. So I reflect on how that will affect our culture.&lt;br /&gt;
&lt;br /&gt;
Lastly, the political aspect of the internet is one of the primary reasons I registered for the course. As a news junkie, I followed the sony hacking incident closely. I am discombobulated by the fact that a nation state such as North Korea has the power to limit the freedoms of United States Citizens. The reality that the internet can be used as an effective tool for cyber warfare between countries is astounding yet twistedly intriguing.&lt;br /&gt;
Additionally, speeches that were once hard to circulate can be uploaded within seconds and has ended political careers. Most recently, the ramble of Sarah Palin has been looped so many times any serious presidential contention in 2016 is now forgotten. So the political media power of the internet has grown significantly. &lt;br /&gt;
[[User:Mmcasse|Mmcasse]] ([[User talk:Mmcasse|talk]]) 13:30, 31 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Today, internet is all around us and with that, we live in a world where we are constanly connected to family and friends, miles away, whether via our phone, laptop, iPad/etc. Socially, Skype and Facetime allow us real time conversation across oceans and Facebook/Twitter allow us instant gratification whether uploading a status or liking a tweet. Games on phones allow us to challenge an oppenent all only possible with Internet. &lt;br /&gt;
&lt;br /&gt;
Politically speaking, Twitter has created an outlet for involved leaders to voice their opinions while receiving instant “reviews” from followers. This allows people to receive news from figures regarding a wide variety from the birth of Hilary Clintons grandchild to Secretary of State Kerry being fined for not shoveling his walkway. In addiiton, leaders can upload videos and one can watch President Obama give the State of the Union online. &lt;br /&gt;
&lt;br /&gt;
Econimically, the Interent has created online banking. Paper bills are a thing of the past and many of us rely on the Internet to not only pay our bills but to online bank. Accounts are saved on smart phones and bills are set on a recurring cycle to be paid online, many times without the payer even having to log in for a transcation to be complete. [[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 21:28, 31 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Significant changes are visible all around us. Socially, the internet has become our connection to many people we would otherwise never meet be it through online dating, an internet job search, or any one of the shared economy apps or sites we now use like Uber or Airbnb. We are easily connected to people directly without much hassle or obstacle. Another social change is that we no longer have to wait for an audience, we can just throw things out there and sit back and see how people react without any direct implications. Some sites and apps even allow us to do this anonymously like YikYak or Reddit causing an even greater cushion of safety to the speaker. This can be good or bad, in some cases giving people the freedom to seek support or help for a problem anonymously, or by giving predators an easy way to track down their prey and slanderers an easy way to disseminate harmful information. These things were possible in the past, but never before have they been so freely at our fingertips. &lt;br /&gt;
&lt;br /&gt;
Economically, the Internet has completely altered the landscape of enterprise. If a business doesn’t have a website it is considered obsolete. In large cities, it goes further, a business needs to have an app to stay relevant. Then there’s the matter of online shopping. I can’t remember the last time I went shoe shopping at a physical store. I would feel it’s a waste of time because online I have so much more information on the products available to me and usually at a better price. We also have working from home. Many tech companies offer this option and there are other companies which solely have remote employees due to the ubiquity of internet access in major cities in the U.S. and the nature of the work. For personal affairs we can do online banking, pay bills online, order food online, and the list goes on. &lt;br /&gt;
&lt;br /&gt;
Culturally, people have greater exposure to the outside world. This has caused some to become more diverse and open and yet others to try to close themselves off even more and fight the compromise of their own culture. Western culture is spreading to less developed countries at an alarming rate causing younger people in those countries to reject many cultural norms such as respect for authority figures, arranged marriages, and religion. There is also much positive dispersal of cultural information, such as in the form of languages. Programs for learning languages are offered on many websites, sometimes for free as in the case of livemocha.com. Even on youtube.com there are many videos offered for learning just about any language.&lt;br /&gt;
&lt;br /&gt;
Politically, we now have more avenues than ever before to voice our opinions. No more letters to the editor or opinion columns in local newspapers, we can now holler our opinions far and wide using the help of social media sites, opinion polls, debate forums, and much much more. That’s not to say that we’ve become more intelligent politically, that’s a whole different story. More information is available at our fingertips, the only problem is that we only click on the things that reinforce the opinions we already have. But updates about political activity are available literally 24/7 which keeps the race ruthless and tireless. Furthermore, a politician’s online presence can make or break their career. There are no more secret affairs or fetishes. Though people may get away with these things still, they must be much more careful because one slip up could mean their last. ([[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 22:37, 31 January 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The proliferation of the internet and social media, have facilitated the spread of information, from viral marketing campaigns to political campaigns.  Both the 2008 and 2012 Presidential elections, demonstrated the importance of digital technologies for cultivating grass-roots support and financial contributions. Since then the appeals from political campaigns, for supporter contributions have become continuous, and hard to avoid.  &lt;br /&gt;
&lt;br /&gt;
Social media has helped to disseminate opinions, of both high profile people and those in one&#039;s own social circle, more widely than they might otherwise have been, and perhaps also more quickly than desirable.  It is now very easy to write ill considered words, which then get disseminated and dissected, potentially causing a media controversy. Equally, digital technology has had a great impact on the notion of privacy.  Julian Assange, Wikileaks and the proliferation of online activism, has renewed the civil liberties debate and discussions about privacy.  The internet continually reaffirms how interconnected the world now is, and how tangible something that begins in cyberspace can be. [[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:13, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
First of  all, I  would like to say I  find all  posts very interesting to read  and  judging by them, it is obviously that we all agree on the fact that Internet has a  huge  impact on our  lives. Every aspect of our everyday activity is somehow  connected online - communication  with  friends is going through social networks, chats, almost any  type of business has its website which has become more important than the business card. When we are choosing  provider of any kind,  the first thing to do is to  check him online, his website, some reviews  in the forums if possible. Leisure and free time, of course - movies, music, computer games  and  so on, picnics and  walks in the park are  getting  behind somehow.  It has even become an obsession for many people to be online 24/7 and not being connected makes them feel uncomfortable.&lt;br /&gt;
&lt;br /&gt;
From cultural stand point, I  would  rather say that  there are more  positive  effects  than negative. I would point out  Google Cultural Institute as my favourite cultural, on-line invention. It is  amazing  that people from everywhere could actually explore cultural treasures from all around the  world in the smallest details and for free. This as well as free e-books projects, like Project Gutenberg, are priceless gifts for our generations, showing that information and knowledge most of all, could be accessible to everyone who desires. I very  much like  the  example Josefin has  given in her post, saying  that the  mere  existence  of this  online course and our  participation in it is a proof enough  how  Internet helps  us  achieving things, that some  years  ago would  have  been  impossible for many of  us. This being said, I would not like to ignore the fact that  the endless  ocean  of  information Internet is, could very  easily  become a danger, especially for children which without a  proper   control over the online activities, could easily be endangered or at least loos themselves in the immense quantity of information without getting the real knowledge.&lt;br /&gt;
&lt;br /&gt;
The political sphere has not stayed untouched. Many of the political changes now a days, would have been impossible without the Internet “contributing”. The snow ball phenomenon  Arab  Spring, for example, is showing  that  Internet  is a powerful tool for people to connect, organize, share  ideas and act.  The nature of Internet is combining the features and tools of radio, television  and  newspapers. Therefor if media are  defined as an alleged fourth power, I dare say Internet should  be defined as the fifth. Another good  example of  the  influence  over  the political live would be the electronic  voting, more precisely  the remote e-voting, exercised via Internet. This is an innovation some countries like  Australia,Belgium, Brazil, Canada, Estonia , have already  implemented.&lt;br /&gt;
&lt;br /&gt;
Talking about the economy, if only we take a look at the numbers Forbes has forecasted saying that &amp;quot;&#039;&#039;&#039;By 2017 eMarketer estimates that there will be $440 billion in sales for a compound annual growth rate (CAGR) of 13.8% (...)&#039;&amp;quot;&#039;&#039; (Chuck  Jones, Forbes,10/02/2013) , we would easily understand why  expressions like &amp;quot;Cyber Monday”, were forged, referring to the  online sales following the Black Friday sales. There are many other examples of how Internet has become a factor in the economy like the stock exchange market, which would not be the same as we know it without the net, the Bitcoin, the payment processing business and many others.  ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 11:31, 2 February 2015 (EST))&lt;br /&gt;
-----&lt;br /&gt;
Socially, I am that group of parents that drove my children away from FaceBook.   I have over 500 friends, including my children, high school and college classmates, work friends, my mom and aunts and uncles and cousins.   I also use LinkedIn, which provides another means of social networking and getting your name and resume out to business colleagues.   I believe it is a great means of reconnecting with old friends and staying in touch with what is going on around us.   But I also understand how we get pigeonholed into a group of people and content that we already agree with.&lt;br /&gt;
   &lt;br /&gt;
Politically, I doubt there is a person alive who could stand up to the scrutiny brought on by all the sound bites.  (The example of Sarah Palin someone mentioned above).   I am sure there are talented people who would be great as President but dare not run because of the heartache and humiliation brought on by posts and opinions on the internet.  &lt;br /&gt;
&lt;br /&gt;
Economically, I love that I can schedule all my bills to be paid automatically and I don’t even know how much my electric bill is!  I have done my Christmas shopping online before they coined the phrase “Black Friday”.   With all our internet transactions, we have less and less privacy.  I hired a new plow company for these snowstorms and he called me to describe my house and driveway.   Google Earth.&lt;br /&gt;
&lt;br /&gt;
Bottom line, this generation has grown up with the internet, and I imagine could not fathom life without it. I have known life on both sides…. I know most of my family, work and doctors’ phone numbers – from memory.   I can drive from here to New York and beyond without a GPS, (we actually had map books!)   I also think the internet has a life of its own and has grown beyond our social ability to manage it.  I have a particular interest in bullying, and the internet has given huge and dangerous power to the bullies.  I look forward to the exchanges in class and here on the discussion board![[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 22:11, 2 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I can describe a personal experience that illustrates how the Internet and digital technologies changed our social life. In 2001, I spend six months in New Zealand and all my connection with family and friends in Brazil were via Internet. It was very effective but it was not in real time as it is nowadays. The social medias such as Facebook and Instagram combined with several apps that we can download to our smartphones created a virtual world where we can be in touch with every one in real time. We are able to interact and live the moment that the person in the other side of the line is living. So, when you are far away from home, like I am, you do not feel you are losing so many moments with your family and friends as it used do be. In some way, connected, we get ourselves closer.&lt;br /&gt;
In addition, I think that the stock markets are much more sensitive of any changes and news, so the speculation game is faster and dynamic. In a few minutes, every thing can change so it is imperative to be connected. That defines who earn and who lost money.   [[User:Lucasrio|Lucasrio]] ([[User talk:Lucasrio|talk]]) 10:02, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Information and its more cultured offspring – knowledge -- will always be the unquenchable and unending journey and destination for man and the society he builds. The Internet is, at its essence, a reflection of this yearning -- the Internet and its related digital technologies are merely vehicles expressing a most animal desire; the pursuit of more. &lt;br /&gt;
&lt;br /&gt;
1.	An Outlet To Play God: The Social Change&lt;br /&gt;
&lt;br /&gt;
And tricked by our own early dream&lt;br /&gt;
And need of solace, we grew self-deceived,&lt;br /&gt;
Our making soon our maker did we deem,&lt;br /&gt;
And what we had imagined we believed.&lt;br /&gt;
--God’s Funeral, T. Hardy&lt;br /&gt;
&lt;br /&gt;
From the Goldsmith and Wu article on Digital Borders, Net use was dominated initially by English-speakers who “…created the Net in their image.”&lt;br /&gt;
&lt;br /&gt;
This line stuck out above the rest and seemed to not only brightly elaborate on the fact at hand, but at a generally applicable trend that the Internet has graced us with; the trend of power-granting – or at least lending us with the illusion of power. We have created in the Internet our perfected selves: it knows everything, it socializes brilliantly, it possesses a strange but alluring appearance of being infinite. Before, man might have turned to the divine for his answers. Now he “Googles” it. &lt;br /&gt;
&lt;br /&gt;
With this tendency, there is also this funny but simultaneous dimension where man knows that not only does he have an alternative to what his ancestors once believed in, modern man has created this entity. The Internet has become at once, a strange kind of divine – unknowable in its vastness, knowable in its man-made fragments.&lt;br /&gt;
&lt;br /&gt;
2.	Cheapening of Privacy: The Cultural Change&lt;br /&gt;
&lt;br /&gt;
We now sign sixty, hundred-twenty, two-hundred page software or user agreements just to have the privilege of sharing our entire photographed lives with what we think are a select few eyes – of for some people, not even that. A picture sharing website will usually have some kind of clause saying they have the right to use your picture from an album for “advertising purposes” (Picasa, a few years ago), or the blatant example, Facebook – who is not in the business of social media, rather, it is in the business of information. More specifically, the selling of information – more specifically, the selling of your personal information. &lt;br /&gt;
&lt;br /&gt;
With the rise of the Internet and the software platforms it makes possible, we are now raising a generation of people who have desensitized themselves from any sense of privacy. Any arguments as to the intrusiveness of the likes of Google or Facebook is mostly met with a shrug of “I’ve nothing to hide…. Let them have my information.” Translation: My information, the data that constitutes my persona, my self, my identity, is free for the taking – I have no use for it.”  &lt;br /&gt;
&lt;br /&gt;
3.	Headless Ubiquity: The Political Change&lt;br /&gt;
&lt;br /&gt;
The structuring of people, the organizing people, the mobilizing of people, and the dividing and unifying of people has been forever changed by the Internet’s introduction of a new management model. The Starfish model. &lt;br /&gt;
&lt;br /&gt;
Brafman and Beckstrom’s “The Starfish and the Spider” is a book about leaderless organizations and their power. They use the Internet as prime example of the omnipotent “Starfish” – a headless creature that moves and lives and in a way, cannot be destroyed. One limb moves and the others follow. Cut a limb and another grows in its place. It has no “brain” it has no “leader” – every piece of itself is self-reliant, self-initiated, yet entirely synchronized. Brafman and Beckstrom compare the starfish with the “Spider – a system of governing people in which there is a clear “head” and there are legs and a body. If the head (president, leader) is cut off the whole thing dies. The Internet has no head (unless we want to get technical here and argue that literal energy is the “head” but technicalities aside...). The Internet is all-powerful while having no single source of its power – if Google dies tomorrow, Yahoo will take its place. &lt;br /&gt;
&lt;br /&gt;
This has powerful implications in our understanding of politics. In our understanding of power. From Twitter-feeds to start a revolution (Arab Spring and Egypt) to the rise of the viral video to satirize and ridicule the previously fearful or the potentially powerful and render them powerless – literally laughing leaders off the political stage. The Internet has become the world’s newest, headless dictator. It is the first dictator without a head but with a body that is all dictator. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the most interesting, and significant, changes that I think we can attribute to the spread of digital technologies is the toppling of various totalitarian regimes across the Middle East. In 2011, Hosni Mubarak was forced to resign as President of Egypt after only a few months of non-stop protests. The protesters managed to mobilize the Egyptian people on the Internet, through mobile devices and social media, even as they were being censored by the Egyptian government. I believe the experience in Egypt has taught us that, even with censorship of the mainstream media, the Internet can still be used as a weapon against tyrannical dictatorships. &lt;br /&gt;
&lt;br /&gt;
This leads me to another interesting point that I would like to talk about, and that is the question of privacy and the internet. With the evolution of the Internet and its supporting digital technologies, privacy has become a thing of the past. Companies and government agencies often spy and tap into our personal data ostensibly to show us show us adds that we may like and, according to authorities, to protect us from those who may wish to do us harm. But with the recent NSA spying debacle, and with controversy over whether or not the IRS has been using personal data to target certain groups because of their political beliefs, I believe that there should be a limit to how much data people allow the government and private companies to see. Unless we act now, I believe that a lack of privacy will become a major problem for future generations. &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 12:38PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I think the greatest economic change (since I&#039;m in finance) that occurred due to the internet is that things became very efficient. We&#039;re talking about transparency efficiency and the availability of information that was not previously available. We have lower spreads in stocks, and quicker executions. Trading volume went up, and it&#039;s easier for the little guy to be part of the market. This meant that economic indicators could also be reflected instantaneously. In general, the way the world seems to have developed is to make things more efficient. We went from a lack of efficiency during paleolithic humans till now. The invention of spears for hunting, or fire for cooking. Wool for warmth, shelter for protection. Efficiency has dictated whether we humans will advance as a civilization or not. The boom of the internet has increased our efficiency tremendously and sets the stage for the next step in inventions. &lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 05:02, 16 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the more recent ways in which the Internet is shaping our sociopolitical discourse is through the creation of strong cyber networks for more marginalized communities.  For example, the rise of feminist blogs and message boards or hashtags such as #blacklivesmatter can be used in connecting online activity and writing to other forms of non-cyber activism and understanding.&lt;br /&gt;
&lt;br /&gt;
In terms of economic changes prompted by the Internet, online capitalist competition has facilitated the growth of huge online sellers of a variety of goods with versatile virtual purveyors like Amazon. ([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 13:30, 3 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
One major change the Internet has brought is the democratization of media narratives.  I know my classmates have mentioned above a few negative aspects of Internet media and the way it&#039;s shaping our political behaviors, but I find the swell of larger contributions by the online public to be incredibly empowering and exciting.  For example, after the shootings in Isla Vista, California last spring, when traditional media outlets were largely ignoring the misogynistic motives of the killer, female Twitter users posted millions of tweets with the hashtag #YesAllWomen in order to redirect the narrative and share their experiences of sexism and abuse.  Similarly, after the events in Ferguson, Missouri, social media was a cathartic and powerful outlet for the public to rally together, using the hashtag #BlackLivesMatter.  Citizen-driven stories like this can even play a large role in political events - back in 2012 when Romney made the comment about &amp;quot;binders full of women,&amp;quot; it was social media outlets that exploded, generated a meme, and ultimately shaped the public perception of Romney.  The tangible effects of these conversations may be tough to measure, but mass participation in social discussions have been cropping up all throughout the year online.&lt;br /&gt;
&lt;br /&gt;
I&#039;m also fascinated by the social progress the Internet has helped usher in, as well as the intense backlash it has sometimes produced.  For example, I think it could be argued that the Internet was at least partially responsible for how swiftly the gay marriage debate has shifted in the past several years.  Online campaigns like &amp;quot;It Gets Better&amp;quot; and &amp;quot;No H8&amp;quot; have gone viral and reached ears that might otherwise not have been willing to listen.  On the other hand, incidents like Gamergate show the danger of anonymity and lack of regulation online, and the way it can impact groups like women.  As a personal note, the experience of women online is something that fascinates me greatly and one of the big reasons I enrolled in this course.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:56, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Indelibly, electronic commerce has changed the way the world purchases goods.  Whether for personal or business use, the model of internet purchasing has created a subgenre of the way economic business is transacted.  For example, large companies use intranets (modeled from the internet, for internal purchasing) which streamline purchasing and can allow the company to be for fiscally efficient.&lt;br /&gt;
&lt;br /&gt;
The internet is a boon to introverts. The timid and shy have a vehicle for clearly expressing him or herself with very little risk to their person; visually creative with design, literally with blogs and other form of written communication, or even purchasing- avoiding crowds, unnecessary conversation or aggressive sales persons.&lt;br /&gt;
&lt;br /&gt;
It is interesting to note that with the advancement of how much the internet is used; adept users develop tools to help others exploit every measure of that success to enable it to grow further.  For example the use of filters when shopping: gone are the days when one sat at the computer screen scrolling through all options in order to view a specific type of garment or car.  Another example can be the use of customizations in items that are rather hard to customize in reality, i.e. cars, homes, shoes.  I think it is often forgotten how far internet technology has advanced in such a short period of time as 20 years. &lt;br /&gt;
&lt;br /&gt;
Economic – Social [[User:JGadson|JGadson]] ([[User talk:JGadson|talk]]) 14:24, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Great conversation everyone. One aspect of the spread of the internet that I find particularly fascinating is the decentralization of journalism. Like when digital cameras - and then camera phones  -  turned almost every amateur on the street into a photographer, the internet gave everyone who can write and type (and has access to a computer) a platform for broadcasting their thoughts, opinions, and experiences. No printing press, copy editor, or delivery boy needed. &lt;br /&gt;
&lt;br /&gt;
You would think that with so many people putting their thoughts into the marketplace of ideas, we’d be better off. But with everything that’s now on the internet, it’s constant information overload and that makes it all too tempting to pick news sources that reinforce preexisting beliefs, rather than listen to anyone who might call into question or expand our thinking. &lt;br /&gt;
&lt;br /&gt;
What I find more dangerous than humans boxing themselves into ideological corners, however, is when coders box people into ideological corners, especially without their knowledge. Google searches, for example, are no longer created equal; we see results that google thinks we want to see. Facebook no longer shows us all our friends’ posts but rather just the ones it thinks we’ll like most. The internet is trying to be a golden retriever and just please us, but that’s not what we need it to do or be. &lt;br /&gt;
 &lt;br /&gt;
Another significant change associated with the spread of the internet has been the normalization of invasions of privacy. We have come to expect and even joke about how visiting a site like WikiLeaks has put us on “a list somewhere.” We’ve accepted that that’s just the cost of having a “free” internet. &lt;br /&gt;
&lt;br /&gt;
All that said I believe the internet has become critically important for information sharing and gathering, for maintaining social networks, and for social justice movements.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 14:39, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The individualized nature of current social media, springing from initial mediums like personalized web pages and blogs, finds an unusual home in current political trends and more specifically uprisings. The Arab Spring is typically pointed to as an unprecedented example of utilizing Facebook and Twitter to organize mass demonstrations, even coining the term “Twitter Revolution” to help explain what modern physical protests actualized through an interconnected social platform look like. The internet also impacts the accessibility of stories taking place across the globe. The 2011 Egyptian Revolution and the 2014 invasion of Crimea by Russian forces are examples of highly visible events whose influence in the social media sphere permeated traditional media and coverage. The advent of crowdsourcing, which has seen particular growth in the last five years has managed to leverage online spaces to send aid or relief to less advantaged people not only in the communities of its users, but across the world as well. So while many of the readings we did for this week and videos we watched online offered a slightly more pessimistic view of how we have potentially stumbled into misuse of the enormous resource the internet is, many of the largest sociopolitical upheavals of the 21st century so far owe a great debt to its ability to connect people to pertinent and rapidly shifting information.  &lt;br /&gt;
[[User:Meredithmblake|Meredith]] ([[User talk:Meredithmblake|talk]]) 15:46, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
As a young person who has grown up with the internet I have witnessed first-hand how powerful and life-altering the internet and digital technologies have become. Some of my friends have built their lives around the internet. For example, one of my friends is a filmmaker and a musician and he started using the internet as an avenue to pursue his interests as a child. Before he even turned 18, he was already generating a significant income from selling his music and becoming one of the first YouTube partners. Today, one of his YouTube videos has more than 180,000,000 hits and he has 410,701 subscribers. Clearly, he is not alone in his pursuits. He is just one of a vast number of people in the world who have experienced significant economic success from the internet. More recently, it came to light in both the mainstream news and internet media that YouTube user, DisneyCollectorBR’s estimated income after YouTube’s 45% cut was $5.06 Million this year and the only thing she does is post videos of herself, without showing her face, unboxing Disney toys. Now, that’s what I call a significant economic gain.&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 14:21, 4 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Internet has shaped our world and culture in many ways. Our social circles are closer than they have ever been thanks to tools such as Facebook and texting, yet they are strangely distant as well -- no longer do people stop by to say &amp;quot;hi&amp;quot; or see how you&#039;re doing, they can just see it on Facebook! The &amp;quot;Internet culture&amp;quot; has spread far and wide, and memes are commonplace in everyday society now. One was even featured in a super bowl commercial! Politically, it&#039;s still just as easy to be spoonfed whatever you choose to believe in, but all the arguments from everyone&#039;s side are available for easy viewing on the Internet -- if you know where to find them. Also, electronic voting machines are incredibly commonplace, and the vulnerabilities reported in them should make anyone worry. Perhaps the most significant area of interest, however, is the economic impact of the Internet. The ability to buy and sell goods from the comfort of your home should not be understated, but that&#039;s just the tip of the iceberg. Two thirds of all US searches are done through Google, and their targeted advertising makes them billions of dollars. Delivering goods virtually is also a huge market right now - Netflix and Steam are booming, while Blockbuster and Gamestop are busting. There are even virtual currencies now, and Bitcoin has a wide reach. Restaurants in major cities all over the country are beginning to accept Bitcoins!&lt;br /&gt;
&lt;br /&gt;
We are barely scraping the surface of what the Internet has to offer, in all aspects of life. The rapid flow of data is what makes the human brain function, after all, and the Internet looks more and more like a neural network every day. The possibilities the future hold are endless. [[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 21:35, 4 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=3685</id>
		<title>Politics and Technology of Control: Introduction</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Politics_and_Technology_of_Control:_Introduction&amp;diff=3685"/>
		<updated>2015-02-16T10:00:54Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&#039;&#039;&#039;January 27&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Class was cancelled on this day due to snow. Please see the class video for day 2 for the discussion of this material.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The Internet at its core is simply an expression of a technological protocol that allows for a particular way of sharing information. But its role has never been this understated. The Internet has great potential for “good” (e.g. innovation, economic growth, education, and access to information), and likewise is a great platform for the bawdy, tawdry and illegal. So is this platform about fundamental social, political and economic change, or about access to solipsistic blogging, pornography, cheap pharmaceuticals, free music, and poker at home? This question leads us to a host of interesting issues that weave their way through the course related to openness, access, regulatory control, free speech, anonymity, intellectual property rights, democracy, transparency, norms and values, economic and cultural change, and cyber- terrorism, as well as scamsters and thieves.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;There is a small assignment to do before class. See [[#Preparation (Assignment &amp;quot;Zero&amp;quot;)|Assignment Zero]] below.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Preparation (&amp;quot;Assignment Zero&amp;quot;) ==&lt;br /&gt;
&lt;br /&gt;
Reflect on what you believe are the most significant social, cultural, political or economic changes associated with the spread of the Internet and digital technologies.  In a few sentences, please offer 2-3 examples in the [[#Class Discussion|Class Discussion]] section below and be prepared to discuss them during class.&lt;br /&gt;
&lt;br /&gt;
== Readings/Watchings ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;What is the Internet?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=V2QdEj8UjBc Ethan Zuckerman, History of the Internet] (approx. 7 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [https://www.youtube.com/watch?v=whmMNRHktX8 Jonathan Zittrain, How the Internet Works] (approx. 4 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How does the Internet change governance?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [https://projects.eff.org/~barlow/Declaration-Final.html John Perry Barlow, A Declaration of the Independence of Cyberspace]&lt;br /&gt;
&lt;br /&gt;
:* You can hear Barlow read this [http://departmentofrecords.co/dor1.html here].&lt;br /&gt;
&lt;br /&gt;
* [http://www.legalaffairs.org/issues/January-February-2006/feature_goldsmith_janfeb06.msp Jack Goldsmith &amp;amp; Tim Wu, Digital Borders (Legal Affairs)]&lt;br /&gt;
&lt;br /&gt;
* [http://blog.ericgoldman.org/archives/2009/03/the_third_wave.htm Eric Goldman, The Third Wave of Internet Exceptionalism]&lt;br /&gt;
&lt;br /&gt;
* [https://medium.com/@internetmonitor/platforms-and-policy-e9984e1be4c6 Rob Faris and Rebekah Heacock, Platforms and Policy] (from the [http://thenetmonitor.org/research/2014/ &#039;Internet Monitor&#039; 2014 annual report])&lt;br /&gt;
&lt;br /&gt;
* [http://www.ted.com/talks/rebecca_mackinnon_let_s_take_back_the_internet.html Rebecca MacKinnon, Let’s Take Back the Internet! (TED.com)] (approx. 15 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Who governs the Internet?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://www.icann.org/sites/default/files/assets/governance-2500x1664-13jan14-en.png ICANN, Who Runs the Internet?] (infographic)&lt;br /&gt;
&lt;br /&gt;
* [http://ubiquity.acm.org/article.cfm?id=1071915 Alex Simonelis, A Concise Guide to the Major Internet Bodies] (skim, but focus on ICANN, IETF, IANA, and W3C)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Who is the Internet? Who is it not? What can we do about it?&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [http://www.webuse.org/pdf/Hargittai-DigitalDivideWhatToDo2007.pdf Eszter Hargittai, The Digital Divide and What to Do About It (New Economy Handbook)] (focus on Sections I-III)&lt;br /&gt;
&lt;br /&gt;
:* Hargittai’s data is from 2003. For more recent data, see [http://pewinternet.org/~/media//Files/Reports/2013/PIP_Offline%20adults_092513_PDF.pdf Pew Internet &amp;amp; American Life Project, Who&#039;s Not Online and Why] (read the summary, skim the sections).&lt;br /&gt;
&lt;br /&gt;
* [http://www.youtube.com/watch?v=mNHkG7w2IA8 Ethan Zuckerman, Why Our Webs Are Rarely Worldwide, And What We Can Do About It] (approx. 14 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
== Optional Readings ==&lt;br /&gt;
&lt;br /&gt;
* [http://advocacy.globalvoicesonline.org/2013/12/04/video-who-controls-the-internet/ Ellery Biddle, Who Controls the Internet? (&#039;&#039;Global Voices&#039;&#039;)] (video in Spanish with English subtitles, 10 mins., watch all)&lt;br /&gt;
&lt;br /&gt;
* [http://www.cluetrain.com Chris Locke, Doc Searls &amp;amp; David Weinberger, Cluetrain Manifesto] (just the manifesto); and [http://cluetrain.com/newclues/ New Clues]&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1752415 Tim Wu, Is Internet Exceptionalism Dead?]&lt;br /&gt;
&lt;br /&gt;
* [http://www.ethanzuckerman.com/blog/2012/12/05/good-and-bad-reasons-to-be-worried-about-wcit/ Ethan Zuckerman, Good and Bad Reasons to be Worried About WCIT]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/onlyinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Videos Watched in Class ==&lt;br /&gt;
&lt;br /&gt;
== Links From Adobe Connect Session ==&lt;br /&gt;
&lt;br /&gt;
== Class Discussion ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Welcome to Internet and Society: Technologies and Politics of Control! This is the section of the page where you should add your comments to complete &amp;quot;assignment zero.&amp;quot; Once you have registered an account, just click the &amp;quot;[edit]&amp;quot; button at the upper right hand corner of this section to add text! You can add a divider between comments by typing four hyphens (&amp;lt;nowiki&amp;gt;----&amp;lt;/nowiki&amp;gt;) in an empty line between comments. &#039;&#039;&#039;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution. This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] ([[User talk:Andy|talk]]) 09:50, 21 January 2015 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
One of the more significant social and economic changes that I have not only experienced but seen, is the ability to find things out instantly. Whether it be news or education, sports or politics, we now have the ability to informed immediately about anything and everything. This is both a blessing and a curse.[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 17:06, 3 February 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
The most significant social change resulting from the spread of the Internet is simply the opportunity for the average person (whoever that may be) to establish two way connections with people, businesses, information, and governments around the world in other than a physical environment. Having two way communication, even if indirectly, is empowerment. I grew up in a world of listeners and watchers, from newspapers, to magazines, radio, broadcast television, and brochures. The Internet has given us a world filled with conversation. &lt;br /&gt;
&lt;br /&gt;
The most significant economic change is online sales of goods and services. I can buy just about anything on the Internet and never leave my home, my office, or the beach. I can’t imagine where I would have to physically go to buy, or how I would even locate, a 2 kilogram box of Scharfenberger cocoa without the Internet. I just would not take the time to locate it, and for that reason I would not buy it. More to the point, it would not be sold.&lt;br /&gt;
&lt;br /&gt;
Culturally, email is the big change. Of course, instant messaging and social media are gaining ground, but it was email that changed our culture to the right now work and personal environments, even before it was being delivered on the cell phone.  Wait, maybe the cell phone is a bigger change. [[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:51, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
There is some fascinating discussion taking place “below the line.” It makes me excited for this semester. To my mind, the internet and associated digital technologies remain the most influential invention of our time. They have been the facilitator of countless zeitgeists including the crumbling of oppressive kingdoms and the exploration of alternative currencies, as well as the breeding ground for unique forms of intellectual and social collaboration- be they twitter, Jstor journals, or your average online message board. This interconnectivity is, of course, not without its side-effects. While the relationship between various exchange and interest rates pre-dates the proliferation of the internet, I feel that such technologies have allowed the more unsavory characteristics of these economic relationships to be felt much more acutely by the average person.[[User:Jmerryma0287|Jmerryma0287]] ([[User talk:Jmerryma0287|talk]]) 14:39, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
One of the more recent ways in which the Internet is shaping our sociopolitical discourse is through the creation of strong cyber networks for more marginalized communities.  For example, the rise of feminist blogs and message boards or hashtags such as #blacklivesmatter can be used in connecting online activity and writing to other forms of non-cyber activism and understanding.&lt;br /&gt;
&lt;br /&gt;
In terms of economic changes prompted by the Internet, online capitalist competition has facilitated the growth of huge online sellers of a variety of goods with versatile virtual purveyors like Amazon. ([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 13:33, 3 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Digital technologies have changes many aspects of life and society. One example is the fact that I can participate in this class even though I live in Europe. That is just one example of how digital technologies have played a huge part in globalization. Even though I live in Sweden, I can still study at an American university, easily stay in touch with my best friend who lives in Missouri, I can follow the life of a stranger in Australia through his or her blog, and I can connect and share my thoughts with other people who think like me but who live in other parts of the world. As a young person of today, I do not only identify myself as a citizen of a particular city, but also as European or as a ”global citizen”. &lt;br /&gt;
&lt;br /&gt;
What is also important to reflect on is how we can influence and affect others through the Internet and digital media. (And of course how we are influenced and affected by others.) One out of many possible examples on this matter is blogs. I use the Swedish blog &#039;&#039;blondinbella.se&#039;&#039; as my example. ”Blondinbella” is one of the most popular blogs in Sweden with over 1 million unique readers each week. Sweden a country with only about 10 million citizens, and that one blog reach more people than many newspapers do is very interesting and worth reflecting about. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 03:40, 26 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I completely agree with what Josefin said above. The generation that is now entering adulthood is inheriting a much smaller, more connected world than their parents did. &lt;br /&gt;
	I think it&#039;s important to reflect on the possible downsides of the ever increasing invasiveness of the internet. We are a generation that can ask Siri how badly the Patriots beat the Seahawks in the Superbowl — and she’ll tell us almost immediately that the Patriots won in a landslide. Or what song is playing on the radio. Or what the largest star in the Milky Way is. Or if Pixar is ever going to make a sequel to the Incredibles (they are, finally). You get the point. We are used to being able to find out almost anything, almost anywhere, at almost anytime. &lt;br /&gt;
	There may be a subtle danger in adapting an entire generation to instant gratification. As we put more and more of our lives into our phones and computers, we stop relying on our own mental faculties. For example, my grandfather has a razor sharp memory, and he knows all the phone numbers of our immediate and extended family by heart. If I lost my phone, I might remember my mom’s number, but my whole contact book would be lost if it wasn&#039;t for iCloud. I’m certainly not exercising my memory on a daily basis to make calls like my grandfather. Will that hurt me in the long run? Probably not — but it’s an interesting thought. &lt;br /&gt;
&lt;br /&gt;
	Another aspect of the internet that I sometimes reflect on is its contribution to political close-mindedness here in the US, if not the world over. I worked for a long time in DC, and have friends and family all over the political spectrum — even a tea party uncle in Texas, and I can say with certainty that I’ve witnessed a trend where my highly conservative friends will follow and subscribe to conservative news sources or blogs that produce news that corresponds with their pre-existing beliefs, and like-wise for my liberal friends. Constant exposure to “news” written or spun to enforce and vindicate your beliefs serves to cement your views, and lessens the amount of meaningful debate that takes place. I would say this definitely serves to further polarize the political climate here in the US. Sean Hannity, Rush Limbaugh, Jon Stewart, Stephan Colbert, all have large followings of people who watch their shows, listen to their radio stations, and subscribe to their social media outlets. The political influence of these individuals can, in some cases, easily shape the political landscape more than many politicians do. Interesting to consider. [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 23:46, 26 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wesley Verge. The polarization of American Politics on the internet reflects popular attitudes, and at times exacerbate the problem. I think the problem has to do with journalistic standards. Remember those? They used to exist up until about the 1990&#039;s, or more precisely, since Rupert Murdoch bought Fox News -- and that&#039;s when the bar was lowered for everyone. With such a wide reach, high profits, and such obvious bias on all the publications under his ownership, journalistic standards went out the window in the pursuit of sensationalism and profit margin. And sadly, those who didn&#039;t adapt to this new way of selling news were left behind. The Philadelphia Inquirer comes to mind, but R. Murdoch&#039;s purchase of the Wall Street Journal is another good example. U.S. Politics have been in a sad state of affairs since G.W decided to invade Iraq, and the rancor and indignation that followed those years has still to subside. There are other factors that affect the current state of politics in the U.S, and two of those are geography and the diversity of demographics throughout the country. Notice that there isn&#039;t really a traditional democratic and republican party?  Despite the fact that the two party system is still dominant in voting patterns, there are many factions within those two large groups. Hromero [[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 12:41, 29 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hromero. You make valid points, though I would point out that they differ slightly from the point I was trying to make. To elaborate a little further, I was speaking only of how the internet plays a large role in exacerbating the political polarization of the country. You correctly point out that the shift in media tactics marked a shift towards increased polarization. I&#039;m saying that the internet provides access to sensationalist news and propaganda, on both sides of the spectrum, to anyone with a connection or a smart phone. People no longer have to be challenged in their thinking. If the President says &amp;quot;yadayadayada&amp;quot;, rather than reflect upon and come to consensus, people are bombarded with sound bites that penetrate the public sphere and shape political thought. New ideas never have the chance to take root, because they are razed quite immediately after inception. Of course, talking head pundits are nothing new, but at least years ago families could discuss news together over dinner, waiting to read the paper or see the news the next day. Now, The President says &amp;quot;yadayadayada&amp;quot; at 6pm, and John Boehner is able to issue a responsive speech at 8pm through twitter or youtube. You&#039;re right to point out the increased splintering of the parties, but where that meets the internet is now each of those factions has methods to connect to their support bases, issue videos, etc on a constant and consistent basis -- a change that surely helps to solidify and expand their support, further polarizing the country. I think its important that we focus on how the internet is used in correlation to politics, rather than focus on the people doing the using and whether or not we agree with them. It keeps discussion more clear and concise. [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 17:37, 30 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The evolution of the internet and our digital technologies has changed how we look at society and how we participate in it. For example social outlets such as Facebook and Twitter allows us to express any thought or feeling and connect with people all over the world. This gives us the ability to form connections and relationships with people that would not have been possible otherwise. With the internet always evolving information has become more and more accessible. Anything that we can imagine we can find through the Internet whether that be current events, a movie review, or personal information just to name a few. Search engines and online encyclopedias such as Google and Wikipedia have changed how we learn and search for information. Furthermore the internet has changed the way we do business . Now we are able to purchase products through websites like Amazon and any other retail site. We also can conduct business through the internet through trading which adds a new dimension to the business world. Our advancements in the internet and digital technologies added another wrinkle in how we view information and the economy as well as many other areas. [[User:Jan.Yburan|Jan.Yburan]] ([[User talk:Jan.Yburan|talk]]) 15:07, 27 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As a distance student, participation has been possible in many HED classes with students world wide from Singapore, Malaysia, Great Britain, Indonesia, and Australia as well as the United States.  The advantages the internet and exponential expansion of digital constantly creates awe in realizing what has become possible in a relatively short period of time. &lt;br /&gt;
&lt;br /&gt;
It is possible to access historical and current information from the Internet from each of the categories listed above almost instantaneously whether it be cultural, political or economic or social.  The online Wikipedia information saves gong to the library or an encyclopedia with each query…..which in the case of the library has advantages as well as disadvantages.  For lovers of books, there is nothing like thumbing through the pages of a book….and reading the first and last chapter while standing in front of a bookshelf. &lt;br /&gt;
&lt;br /&gt;
Shopping - it is possible to view the price and merchandise of a particular brand or manufacturer with a few keystrokes.  A person can shop locally or nationwide or overseas for particular items. [[User:Rgrasser|Rgrasser]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I like many of the posts above, and I think they&#039;re on the mark. My first thought on changes ushered in has to do with Wesley&#039;s comments on instant gratification - we can access information and purchase goods instantaneously, but being connected means we are always on-call. A text/SMS comes to our phones on our bodies, we don&#039;t want to be behind on emails or miss a post on Facebook, etc. The new, immediate connectedness of the turn of the century, it seems to me, is significantly notable, both in our ability to connect and the possibility of always being connected to.&lt;br /&gt;
&lt;br /&gt;
This new connection brings me to my second thought, the new possibilities of surveillance. Typically conversation focuses on government censorship and the ability to monitor for unwanted speech. I would add that our new, ongoing connectedness also provides an increasingly continuous history of our identities. This history can be used to market specific products, tailor our searches, and generally show us content that will keep us connected more often. To be connected means to be watched, sometimes directly, sometimes passively. Many have written on how this leads us to begin policing ourselves.&lt;br /&gt;
&lt;br /&gt;
This self-policing brings me to third major development I see, which also has much to do with Wesley&#039;s thoughts on how his friends&#039; political views are continually fed. A variety of technologies now exist to keep us more within our preconceptions than before. Our identity and self-understanding is produced and maintained in a different and more controlled way in the past. It doesn&#039;t seem to me that there is (necessarily) a (wo)man behind the curtain, but the implementation and effect of these technologies remain the same.&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 17:42, 27 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Internet access has changed the way information flows while increasing social and economic participation. As internet and digital technology continues to develop, it has changed the nature of how organizations market themselves to targeted their targeted consumers. Traditional methods of newspaper/magazine advertisements and email listservs no longer are the primary avenue of increasing consumer engagement. Social media platforms have expanded consumer outreach as companies use Twitter to tweet to their customers and smartphone apps to keep their consumers connected. This connectectivity has impacted the roles of employees as many of their job descriptions are now requiring evidence of technological competencies.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The internet and technologies has allowed the progression of global connectivity by creating meaningful experiences through intentional dialogue and engagement. Internet and digital technologies allows for access to consumer services previously limited due to geographic location. Historically, a fitness coach was someone typically found within your local community or an athlete was required to travel to the gym/sports facility. With the expansion of technology, people now have access to some of the best coaching in the world through the use of current technologies. As an example, I am now a posing coach for athletes throughout the USA, Canada and the UK. &lt;br /&gt;
&lt;br /&gt;
People are now able to engage in a global experience without crossing international borders. [[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 18:57, 27 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
While reflecting on the Internet and the significant changes it has spread, I ironically type and post the following comments while flying on an airplane. Who would have imagined using internet on a plane 20 years ago?  Yet, walking through the airport before boarding my flight I could see the changes the Internet and digital technologies has had on our society: customers ordering food via an iPad in the airport cafe; an older couple Skyping, what looked like their grandson, on a laptop; teenagers idly staring at their smart phones while their parents talk at them; the many airline passenger who boarded their flights by merely pulling up an image on their iPhones. Internet and digital technologies are everywhere...and it has changed every aspect of our lives. &lt;br /&gt;
&lt;br /&gt;
The most significant of those changes I find is the globalized world we now live in. Post World War II, the international community entered an era of connectedness, and the Internet has only exacerbated this connectedness. The ability to share, like, post, tweet, retweet, reblog, blog, etc. has birthed a generation of globally connected citizens. It only takes a couple of clicks on Twitter to see or read about happenings half way around the world - in real time. This environment has created a more involved international community, especially when reviewing Twitter trending topics, for instance the events that happened in Ferguson, MO last year. Massive marches, stand ins, protests and rallies were organized across the globe - orchestrated primarily on social media. &lt;br /&gt;
&lt;br /&gt;
Furthermore, the possibilities of outreach and global awareness is boundless. Internet and digital technologies now offer a tool for social good. &lt;br /&gt;
A recent article [http://www.information-age.com/technology/mobile-and-networking/123457289/facebook-launches-bid-to-bring-cheap-internet-to-the-developing-world] discussed how internet has become vital to survival for those living in the poorest of countries. Facebook, for example, launched a program with efforts to bring internet to lower income countries or rural areas who need the assistance with technology to better living conditions. The implementation of these technologies are ongoing, and it is unclear if they are helping more than they are hurting, but the social change of internet is here to stay.  &lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 07:35, 28 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ok, speaking of internet morons, this is the third time I’m posting and I still don’t see it. Any tech has any hints as to why this is happening, I’m making a copy of this in a separate doc, please tell me where to send it.&lt;br /&gt;
My comment is as follows: 1) Since the advent of the internet people are interacting with devices and technology more often than they used to and as a result there have been some measurable changes in children’s cognitive development. I will find the resource later on. I think it also affects adults, especially those who are already predisposed to HDHD. 2) since it is very hard to tell when you’re blogging whether you’re speaking to only three people or three thousand, the power of bloggers should be taken with a generous dose of skepticism. 30 Innovation does not necessarily make us more effective, it merely makes us busier. Exhibit A: Facebook (A complete waste of time, and a truly distracting way of communicating with other people. Absolutely hate it.) Hromero[[User:Hromero|Hromero]] ([[User talk:Hromero|talk]]) 15:01, 28 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Reflecting how the world has changed in the last few years is impressive, many things that could not be dreamed to be done in any other way that would have been physical, now in our current times, are possible. &lt;br /&gt;
&lt;br /&gt;
Socially, the interaction of people on facebook and other social networks, like blogs, etc, have become from informational, to a way how people can meet one another, interact, and even date. This in the past was never thought, and now relationships, interaction of groups, like chats are very common. Social networks have &lt;br /&gt;
&lt;br /&gt;
Culturally, it is important to see that there is a subculture, mostly in teenagers and younger people, the subculture, of the I Pad, and tablet, and aps people who are identified, by their cell phones, ring tones, and other characteristics of technology. This differs from the older generation that would not do monetary transactions, meet people, or even gather around a computer, this older folks may prefer to go to the bank, gather with friends, and bring a guitar and play. The culture has been subdivided.&lt;br /&gt;
&lt;br /&gt;
Economically, Pay pawl, and other providers like e-bay, has become very popular in the market, aps for real estate and westlaw, for the legal field, has caused a huge impact, on people and their economy, it is taken over many jobs, and also has make people gain a lot o money, people needed to physically be instructed by someone or by reading, and now there is more accessibility through the internet, where most people can find the answers the they need most of the time. The economy is being monopolized by the electronic era. (Edwin Duque)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I agree with my colleagues contributions above. There is no doubt that we&#039;ve had significant social, cultural, political, and economic changes associated with the spread of the Internet and digital technologies throughout the years in both spheres personal and professional. &lt;br /&gt;
&lt;br /&gt;
Regarding the personal impacts, one example is that if we think about the new generation of people that is part of what they call &amp;quot;Generation Z&amp;quot;, instead of playing with the traditional toys that we had in our childhood, when they are kids their main entertainment are the electronic devices with Internet access. A one-two year old child currently simply grab their parent&#039;s iPads/tablets or smartphones and play with apps. It&#039;s impressive how quickly they get used to those devices. Some years later they start interacting with people all over the world through online games, social media, Skype, whatsapp, blogs and others, as we are all able to do nowadays. Besides that, with the Internet we started having access to a variety of information, books, history, news, we can shop through it, take online courses provided by schools/institutions in several countries, we can make a reservation at a restaurant wherever we want, we can compare prices and quality of products and services, we can be always updated about what is happening in any part of the world, all without leaving home. In addition, basically we register &amp;quot;our lives&amp;quot; in those devices, which have become more and more multifunctional, as we use our cell phones to make calls, as an agenda, to take pictures and record videos, to message our contacts, everything to make life more practical. &lt;br /&gt;
&lt;br /&gt;
So, the Internet really broke barriers and made our lives much easier, also in the professional sphere, as for instance we can attend online meetings, what also economically saying the companies can save money that would be invested in trips, we can have more flexibility when the home office is allowed, the companies can storage their data and also their client&#039;s in those devices and the physical archive has been practically extinguished etc.&lt;br /&gt;
&lt;br /&gt;
However, in both spheres people and companies have been facing problems regarding privacy matters, cyber crimes, as it occurred recently with Sony Pictures, cyber espionage, also between countries, what has a political impact, and the legislation hasn&#039;t been able to follow the technological advancement in the same speed. &lt;br /&gt;
&lt;br /&gt;
Therefore, one of the most important topics currently, which is a global concern and that is in the spotlight is Cyber Security. &lt;br /&gt;
[[User:Natasha Jalbut|Natasha Jalbut]] ([[User talk:Natasha Jalbut|talk]]) 00:21, 30 January 2015 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The internet, and with it the information age, has vastly changed the world and will continue to do so for the foreseeable future. I believe the internet has both managed to make the world smaller and at the same time individual&#039;s interaction with the world larger. &lt;br /&gt;
&lt;br /&gt;
On a Social level anyone can make an immediate connection with anyone else in the world provided they both have access to the internet. This breaks down many barriers in itself from where we were only a few decades ago where individual towns and neighborhoods became a cocoon for anyone who did not or could not venture out. Today those same towns have citizens who are in relationships with people they may never have met through dating websites and other forms of communication. Distance is no longer an issue for many. &lt;br /&gt;
&lt;br /&gt;
From a cultural perspective we are exposed to new lifestyles and languages that you many never have seen otherwise. One great example is the growing &#039;Anime&#039; (Japanese style for animation in television and movies) following. If it wasn&#039;t for the internet many of these popular shows in Asia would not be known in the United States. At the same time this form of information/entertainment sharing can lead to a narrow and specific view of what is a diverse culture in itself. &lt;br /&gt;
&lt;br /&gt;
Politically the internet has created a new powerful platform that politicians need to work with in order to win elections or pass a vote with the public support. A few years ago an internet following might not have made a campaign but today groups like the Human Rights Campaign rely heavily on it and in doing so have made changes in the political landscape. &lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 14:06, 30 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
The information age, by way of the Internet, has revolutionized the world exponentially. Socially, the internet was initially utilized to communicate &lt;br /&gt;
via email and to obtain readily available information. Today the use of email has practically bankrupted the United States Postal Service and the internet in some aspects has become the primary source of information enabling proponents of civil unrest to generate support throughout the world. This is an overly generalized outlook on the growth of the internet but as one can see even in these sectors the great impact it has had on society.&lt;br /&gt;
&lt;br /&gt;
Culturally, the evolution of myspace, facebook, twitter and the like has reflected how the young guides the old on this highway. The adaptability of the young and their ability to embrace new arenas in cyberspace dictates how and where their parents socially intermingle on line. Additionally, it also reflects how providers of such social networks have to adapt to the young or become irrelevant such as the case with myspace. The online language that we engage in has become a part of our day to day interpersonal communication with others. Our day to day realities is not concrete reality until it becomes &amp;quot;facebook official&amp;quot;. Sadly, as with any revolution, I fear that legislative policy such as censorship and intermediary provider responsibility will begin to take affect and slow the amazing advances that have been made culturally in this technological era. Case in point, it is beyond my wildest dreams that I have the privilege to participate in a course taught online by Professor Sellars at HES. The paths to education through coursera and edx which are free is an opportunity and path for learning that we never had before. However, with continuing legislation, censorship and/or surveillance the ideas that we formulate from the knowledge that we now have equal access will have a limited capacity to flourish. So I reflect on how that will affect our culture.&lt;br /&gt;
&lt;br /&gt;
Lastly, the political aspect of the internet is one of the primary reasons I registered for the course. As a news junkie, I followed the sony hacking incident closely. I am discombobulated by the fact that a nation state such as North Korea has the power to limit the freedoms of United States Citizens. The reality that the internet can be used as an effective tool for cyber warfare between countries is astounding yet twistedly intriguing.&lt;br /&gt;
Additionally, speeches that were once hard to circulate can be uploaded within seconds and has ended political careers. Most recently, the ramble of Sarah Palin has been looped so many times any serious presidential contention in 2016 is now forgotten. So the political media power of the internet has grown significantly. &lt;br /&gt;
[[User:Mmcasse|Mmcasse]] ([[User talk:Mmcasse|talk]]) 13:30, 31 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Today, internet is all around us and with that, we live in a world where we are constanly connected to family and friends, miles away, whether via our phone, laptop, iPad/etc. Socially, Skype and Facetime allow us real time conversation across oceans and Facebook/Twitter allow us instant gratification whether uploading a status or liking a tweet. Games on phones allow us to challenge an oppenent all only possible with Internet. &lt;br /&gt;
&lt;br /&gt;
Politically speaking, Twitter has created an outlet for involved leaders to voice their opinions while receiving instant “reviews” from followers. This allows people to receive news from figures regarding a wide variety from the birth of Hilary Clintons grandchild to Secretary of State Kerry being fined for not shoveling his walkway. In addiiton, leaders can upload videos and one can watch President Obama give the State of the Union online. &lt;br /&gt;
&lt;br /&gt;
Econimically, the Interent has created online banking. Paper bills are a thing of the past and many of us rely on the Internet to not only pay our bills but to online bank. Accounts are saved on smart phones and bills are set on a recurring cycle to be paid online, many times without the payer even having to log in for a transcation to be complete. [[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 21:28, 31 January 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Significant changes are visible all around us. Socially, the internet has become our connection to many people we would otherwise never meet be it through online dating, an internet job search, or any one of the shared economy apps or sites we now use like Uber or Airbnb. We are easily connected to people directly without much hassle or obstacle. Another social change is that we no longer have to wait for an audience, we can just throw things out there and sit back and see how people react without any direct implications. Some sites and apps even allow us to do this anonymously like YikYak or Reddit causing an even greater cushion of safety to the speaker. This can be good or bad, in some cases giving people the freedom to seek support or help for a problem anonymously, or by giving predators an easy way to track down their prey and slanderers an easy way to disseminate harmful information. These things were possible in the past, but never before have they been so freely at our fingertips. &lt;br /&gt;
&lt;br /&gt;
Economically, the Internet has completely altered the landscape of enterprise. If a business doesn’t have a website it is considered obsolete. In large cities, it goes further, a business needs to have an app to stay relevant. Then there’s the matter of online shopping. I can’t remember the last time I went shoe shopping at a physical store. I would feel it’s a waste of time because online I have so much more information on the products available to me and usually at a better price. We also have working from home. Many tech companies offer this option and there are other companies which solely have remote employees due to the ubiquity of internet access in major cities in the U.S. and the nature of the work. For personal affairs we can do online banking, pay bills online, order food online, and the list goes on. &lt;br /&gt;
&lt;br /&gt;
Culturally, people have greater exposure to the outside world. This has caused some to become more diverse and open and yet others to try to close themselves off even more and fight the compromise of their own culture. Western culture is spreading to less developed countries at an alarming rate causing younger people in those countries to reject many cultural norms such as respect for authority figures, arranged marriages, and religion. There is also much positive dispersal of cultural information, such as in the form of languages. Programs for learning languages are offered on many websites, sometimes for free as in the case of livemocha.com. Even on youtube.com there are many videos offered for learning just about any language.&lt;br /&gt;
&lt;br /&gt;
Politically, we now have more avenues than ever before to voice our opinions. No more letters to the editor or opinion columns in local newspapers, we can now holler our opinions far and wide using the help of social media sites, opinion polls, debate forums, and much much more. That’s not to say that we’ve become more intelligent politically, that’s a whole different story. More information is available at our fingertips, the only problem is that we only click on the things that reinforce the opinions we already have. But updates about political activity are available literally 24/7 which keeps the race ruthless and tireless. Furthermore, a politician’s online presence can make or break their career. There are no more secret affairs or fetishes. Though people may get away with these things still, they must be much more careful because one slip up could mean their last. ([[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 22:37, 31 January 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The proliferation of the internet and social media, have facilitated the spread of information, from viral marketing campaigns to political campaigns.  Both the 2008 and 2012 Presidential elections, demonstrated the importance of digital technologies for cultivating grass-roots support and financial contributions. Since then the appeals from political campaigns, for supporter contributions have become continuous, and hard to avoid.  &lt;br /&gt;
&lt;br /&gt;
Social media has helped to disseminate opinions, of both high profile people and those in one&#039;s own social circle, more widely than they might otherwise have been, and perhaps also more quickly than desirable.  It is now very easy to write ill considered words, which then get disseminated and dissected, potentially causing a media controversy. Equally, digital technology has had a great impact on the notion of privacy.  Julian Assange, Wikileaks and the proliferation of online activism, has renewed the civil liberties debate and discussions about privacy.  The internet continually reaffirms how interconnected the world now is, and how tangible something that begins in cyberspace can be. [[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:13, 1 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
First of  all, I  would like to say I  find all  posts very interesting to read  and  judging by them, it is obviously that we all agree on the fact that Internet has a  huge  impact on our  lives. Every aspect of our everyday activity is somehow  connected online - communication  with  friends is going through social networks, chats, almost any  type of business has its website which has become more important than the business card. When we are choosing  provider of any kind,  the first thing to do is to  check him online, his website, some reviews  in the forums if possible. Leisure and free time, of course - movies, music, computer games  and  so on, picnics and  walks in the park are  getting  behind somehow.  It has even become an obsession for many people to be online 24/7 and not being connected makes them feel uncomfortable.&lt;br /&gt;
&lt;br /&gt;
From cultural stand point, I  would  rather say that  there are more  positive  effects  than negative. I would point out  Google Cultural Institute as my favourite cultural, on-line invention. It is  amazing  that people from everywhere could actually explore cultural treasures from all around the  world in the smallest details and for free. This as well as free e-books projects, like Project Gutenberg, are priceless gifts for our generations, showing that information and knowledge most of all, could be accessible to everyone who desires. I very  much like  the  example Josefin has  given in her post, saying  that the  mere  existence  of this  online course and our  participation in it is a proof enough  how  Internet helps  us  achieving things, that some  years  ago would  have  been  impossible for many of  us. This being said, I would not like to ignore the fact that  the endless  ocean  of  information Internet is, could very  easily  become a danger, especially for children which without a  proper   control over the online activities, could easily be endangered or at least loos themselves in the immense quantity of information without getting the real knowledge.&lt;br /&gt;
&lt;br /&gt;
The political sphere has not stayed untouched. Many of the political changes now a days, would have been impossible without the Internet “contributing”. The snow ball phenomenon  Arab  Spring, for example, is showing  that  Internet  is a powerful tool for people to connect, organize, share  ideas and act.  The nature of Internet is combining the features and tools of radio, television  and  newspapers. Therefor if media are  defined as an alleged fourth power, I dare say Internet should  be defined as the fifth. Another good  example of  the  influence  over  the political live would be the electronic  voting, more precisely  the remote e-voting, exercised via Internet. This is an innovation some countries like  Australia,Belgium, Brazil, Canada, Estonia , have already  implemented.&lt;br /&gt;
&lt;br /&gt;
Talking about the economy, if only we take a look at the numbers Forbes has forecasted saying that &amp;quot;&#039;&#039;&#039;By 2017 eMarketer estimates that there will be $440 billion in sales for a compound annual growth rate (CAGR) of 13.8% (...)&#039;&amp;quot;&#039;&#039; (Chuck  Jones, Forbes,10/02/2013) , we would easily understand why  expressions like &amp;quot;Cyber Monday”, were forged, referring to the  online sales following the Black Friday sales. There are many other examples of how Internet has become a factor in the economy like the stock exchange market, which would not be the same as we know it without the net, the Bitcoin, the payment processing business and many others.  ([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 11:31, 2 February 2015 (EST))&lt;br /&gt;
-----&lt;br /&gt;
Socially, I am that group of parents that drove my children away from FaceBook.   I have over 500 friends, including my children, high school and college classmates, work friends, my mom and aunts and uncles and cousins.   I also use LinkedIn, which provides another means of social networking and getting your name and resume out to business colleagues.   I believe it is a great means of reconnecting with old friends and staying in touch with what is going on around us.   But I also understand how we get pigeonholed into a group of people and content that we already agree with.&lt;br /&gt;
   &lt;br /&gt;
Politically, I doubt there is a person alive who could stand up to the scrutiny brought on by all the sound bites.  (The example of Sarah Palin someone mentioned above).   I am sure there are talented people who would be great as President but dare not run because of the heartache and humiliation brought on by posts and opinions on the internet.  &lt;br /&gt;
&lt;br /&gt;
Economically, I love that I can schedule all my bills to be paid automatically and I don’t even know how much my electric bill is!  I have done my Christmas shopping online before they coined the phrase “Black Friday”.   With all our internet transactions, we have less and less privacy.  I hired a new plow company for these snowstorms and he called me to describe my house and driveway.   Google Earth.&lt;br /&gt;
&lt;br /&gt;
Bottom line, this generation has grown up with the internet, and I imagine could not fathom life without it. I have known life on both sides…. I know most of my family, work and doctors’ phone numbers – from memory.   I can drive from here to New York and beyond without a GPS, (we actually had map books!)   I also think the internet has a life of its own and has grown beyond our social ability to manage it.  I have a particular interest in bullying, and the internet has given huge and dangerous power to the bullies.  I look forward to the exchanges in class and here on the discussion board![[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 22:11, 2 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I can describe a personal experience that illustrates how the Internet and digital technologies changed our social life. In 2001, I spend six months in New Zealand and all my connection with family and friends in Brazil were via Internet. It was very effective but it was not in real time as it is nowadays. The social medias such as Facebook and Instagram combined with several apps that we can download to our smartphones created a virtual world where we can be in touch with every one in real time. We are able to interact and live the moment that the person in the other side of the line is living. So, when you are far away from home, like I am, you do not feel you are losing so many moments with your family and friends as it used do be. In some way, connected, we get ourselves closer.&lt;br /&gt;
In addition, I think that the stock markets are much more sensitive of any changes and news, so the speculation game is faster and dynamic. In a few minutes, every thing can change so it is imperative to be connected. That defines who earn and who lost money.   [[User:Lucasrio|Lucasrio]] ([[User talk:Lucasrio|talk]]) 10:02, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Information and its more cultured offspring – knowledge -- will always be the unquenchable and unending journey and destination for man and the society he builds. The Internet is, at its essence, a reflection of this yearning -- the Internet and its related digital technologies are merely vehicles expressing a most animal desire; the pursuit of more. &lt;br /&gt;
&lt;br /&gt;
1.	An Outlet To Play God: The Social Change&lt;br /&gt;
&lt;br /&gt;
And tricked by our own early dream&lt;br /&gt;
And need of solace, we grew self-deceived,&lt;br /&gt;
Our making soon our maker did we deem,&lt;br /&gt;
And what we had imagined we believed.&lt;br /&gt;
--God’s Funeral, T. Hardy&lt;br /&gt;
&lt;br /&gt;
From the Goldsmith and Wu article on Digital Borders, Net use was dominated initially by English-speakers who “…created the Net in their image.”&lt;br /&gt;
&lt;br /&gt;
This line stuck out above the rest and seemed to not only brightly elaborate on the fact at hand, but at a generally applicable trend that the Internet has graced us with; the trend of power-granting – or at least lending us with the illusion of power. We have created in the Internet our perfected selves: it knows everything, it socializes brilliantly, it possesses a strange but alluring appearance of being infinite. Before, man might have turned to the divine for his answers. Now he “Googles” it. &lt;br /&gt;
&lt;br /&gt;
With this tendency, there is also this funny but simultaneous dimension where man knows that not only does he have an alternative to what his ancestors once believed in, modern man has created this entity. The Internet has become at once, a strange kind of divine – unknowable in its vastness, knowable in its man-made fragments.&lt;br /&gt;
&lt;br /&gt;
2.	Cheapening of Privacy: The Cultural Change&lt;br /&gt;
&lt;br /&gt;
We now sign sixty, hundred-twenty, two-hundred page software or user agreements just to have the privilege of sharing our entire photographed lives with what we think are a select few eyes – of for some people, not even that. A picture sharing website will usually have some kind of clause saying they have the right to use your picture from an album for “advertising purposes” (Picasa, a few years ago), or the blatant example, Facebook – who is not in the business of social media, rather, it is in the business of information. More specifically, the selling of information – more specifically, the selling of your personal information. &lt;br /&gt;
&lt;br /&gt;
With the rise of the Internet and the software platforms it makes possible, we are now raising a generation of people who have desensitized themselves from any sense of privacy. Any arguments as to the intrusiveness of the likes of Google or Facebook is mostly met with a shrug of “I’ve nothing to hide…. Let them have my information.” Translation: My information, the data that constitutes my persona, my self, my identity, is free for the taking – I have no use for it.”  &lt;br /&gt;
&lt;br /&gt;
3.	Headless Ubiquity: The Political Change&lt;br /&gt;
&lt;br /&gt;
The structuring of people, the organizing people, the mobilizing of people, and the dividing and unifying of people has been forever changed by the Internet’s introduction of a new management model. The Starfish model. &lt;br /&gt;
&lt;br /&gt;
Brafman and Beckstrom’s “The Starfish and the Spider” is a book about leaderless organizations and their power. They use the Internet as prime example of the omnipotent “Starfish” – a headless creature that moves and lives and in a way, cannot be destroyed. One limb moves and the others follow. Cut a limb and another grows in its place. It has no “brain” it has no “leader” – every piece of itself is self-reliant, self-initiated, yet entirely synchronized. Brafman and Beckstrom compare the starfish with the “Spider – a system of governing people in which there is a clear “head” and there are legs and a body. If the head (president, leader) is cut off the whole thing dies. The Internet has no head (unless we want to get technical here and argue that literal energy is the “head” but technicalities aside...). The Internet is all-powerful while having no single source of its power – if Google dies tomorrow, Yahoo will take its place. &lt;br /&gt;
&lt;br /&gt;
This has powerful implications in our understanding of politics. In our understanding of power. From Twitter-feeds to start a revolution (Arab Spring and Egypt) to the rise of the viral video to satirize and ridicule the previously fearful or the potentially powerful and render them powerless – literally laughing leaders off the political stage. The Internet has become the world’s newest, headless dictator. It is the first dictator without a head but with a body that is all dictator. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the most interesting, and significant, changes that I think we can attribute to the spread of digital technologies is the toppling of various totalitarian regimes across the Middle East. In 2011, Hosni Mubarak was forced to resign as President of Egypt after only a few months of non-stop protests. The protesters managed to mobilize the Egyptian people on the Internet, through mobile devices and social media, even as they were being censored by the Egyptian government. I believe the experience in Egypt has taught us that, even with censorship of the mainstream media, the Internet can still be used as a weapon against tyrannical dictatorships. &lt;br /&gt;
&lt;br /&gt;
This leads me to another interesting point that I would like to talk about, and that is the question of privacy and the internet. With the evolution of the Internet and its supporting digital technologies, privacy has become a thing of the past. Companies and government agencies often spy and tap into our personal data ostensibly to show us show us adds that we may like and, according to authorities, to protect us from those who may wish to do us harm. But with the recent NSA spying debacle, and with controversy over whether or not the IRS has been using personal data to target certain groups because of their political beliefs, I believe that there should be a limit to how much data people allow the government and private companies to see. Unless we act now, I believe that a lack of privacy will become a major problem for future generations. &lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 12:38PM, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I think the greatest economic change (since I&#039;m in finance) that occurred due to the internet is that things became very efficient. We&#039;re talking about transparency efficiency and the availability of information that was not previously available. We have lower spreads in stocks, and quicker executions. Trading volume went up, and it&#039;s easier for the little guy to be part of the market. This meant that economic indicators could also be reflected instantaneously. In general, the way the world seems to have developed is to make things more efficient. We went from a lack of efficiency during paleolithic humans till now. The invention of spears for hunting, or fire for cooking. Wool for warmth, shelter for protection. Efficiency has dictated whether we humans will advance as a civilization or not. The boom of the internet has increased our efficiency tremendously and sets the stage for the next step in inventions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the more recent ways in which the Internet is shaping our sociopolitical discourse is through the creation of strong cyber networks for more marginalized communities.  For example, the rise of feminist blogs and message boards or hashtags such as #blacklivesmatter can be used in connecting online activity and writing to other forms of non-cyber activism and understanding.&lt;br /&gt;
&lt;br /&gt;
In terms of economic changes prompted by the Internet, online capitalist competition has facilitated the growth of huge online sellers of a variety of goods with versatile virtual purveyors like Amazon. ([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 13:30, 3 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
One major change the Internet has brought is the democratization of media narratives.  I know my classmates have mentioned above a few negative aspects of Internet media and the way it&#039;s shaping our political behaviors, but I find the swell of larger contributions by the online public to be incredibly empowering and exciting.  For example, after the shootings in Isla Vista, California last spring, when traditional media outlets were largely ignoring the misogynistic motives of the killer, female Twitter users posted millions of tweets with the hashtag #YesAllWomen in order to redirect the narrative and share their experiences of sexism and abuse.  Similarly, after the events in Ferguson, Missouri, social media was a cathartic and powerful outlet for the public to rally together, using the hashtag #BlackLivesMatter.  Citizen-driven stories like this can even play a large role in political events - back in 2012 when Romney made the comment about &amp;quot;binders full of women,&amp;quot; it was social media outlets that exploded, generated a meme, and ultimately shaped the public perception of Romney.  The tangible effects of these conversations may be tough to measure, but mass participation in social discussions have been cropping up all throughout the year online.&lt;br /&gt;
&lt;br /&gt;
I&#039;m also fascinated by the social progress the Internet has helped usher in, as well as the intense backlash it has sometimes produced.  For example, I think it could be argued that the Internet was at least partially responsible for how swiftly the gay marriage debate has shifted in the past several years.  Online campaigns like &amp;quot;It Gets Better&amp;quot; and &amp;quot;No H8&amp;quot; have gone viral and reached ears that might otherwise not have been willing to listen.  On the other hand, incidents like Gamergate show the danger of anonymity and lack of regulation online, and the way it can impact groups like women.  As a personal note, the experience of women online is something that fascinates me greatly and one of the big reasons I enrolled in this course.&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:56, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Indelibly, electronic commerce has changed the way the world purchases goods.  Whether for personal or business use, the model of internet purchasing has created a subgenre of the way economic business is transacted.  For example, large companies use intranets (modeled from the internet, for internal purchasing) which streamline purchasing and can allow the company to be for fiscally efficient.&lt;br /&gt;
&lt;br /&gt;
The internet is a boon to introverts. The timid and shy have a vehicle for clearly expressing him or herself with very little risk to their person; visually creative with design, literally with blogs and other form of written communication, or even purchasing- avoiding crowds, unnecessary conversation or aggressive sales persons.&lt;br /&gt;
&lt;br /&gt;
It is interesting to note that with the advancement of how much the internet is used; adept users develop tools to help others exploit every measure of that success to enable it to grow further.  For example the use of filters when shopping: gone are the days when one sat at the computer screen scrolling through all options in order to view a specific type of garment or car.  Another example can be the use of customizations in items that are rather hard to customize in reality, i.e. cars, homes, shoes.  I think it is often forgotten how far internet technology has advanced in such a short period of time as 20 years. &lt;br /&gt;
&lt;br /&gt;
Economic – Social [[User:JGadson|JGadson]] ([[User talk:JGadson|talk]]) 14:24, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Great conversation everyone. One aspect of the spread of the internet that I find particularly fascinating is the decentralization of journalism. Like when digital cameras - and then camera phones  -  turned almost every amateur on the street into a photographer, the internet gave everyone who can write and type (and has access to a computer) a platform for broadcasting their thoughts, opinions, and experiences. No printing press, copy editor, or delivery boy needed. &lt;br /&gt;
&lt;br /&gt;
You would think that with so many people putting their thoughts into the marketplace of ideas, we’d be better off. But with everything that’s now on the internet, it’s constant information overload and that makes it all too tempting to pick news sources that reinforce preexisting beliefs, rather than listen to anyone who might call into question or expand our thinking. &lt;br /&gt;
&lt;br /&gt;
What I find more dangerous than humans boxing themselves into ideological corners, however, is when coders box people into ideological corners, especially without their knowledge. Google searches, for example, are no longer created equal; we see results that google thinks we want to see. Facebook no longer shows us all our friends’ posts but rather just the ones it thinks we’ll like most. The internet is trying to be a golden retriever and just please us, but that’s not what we need it to do or be. &lt;br /&gt;
 &lt;br /&gt;
Another significant change associated with the spread of the internet has been the normalization of invasions of privacy. We have come to expect and even joke about how visiting a site like WikiLeaks has put us on “a list somewhere.” We’ve accepted that that’s just the cost of having a “free” internet. &lt;br /&gt;
&lt;br /&gt;
All that said I believe the internet has become critically important for information sharing and gathering, for maintaining social networks, and for social justice movements.  &lt;br /&gt;
&lt;br /&gt;
--[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 14:39, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The individualized nature of current social media, springing from initial mediums like personalized web pages and blogs, finds an unusual home in current political trends and more specifically uprisings. The Arab Spring is typically pointed to as an unprecedented example of utilizing Facebook and Twitter to organize mass demonstrations, even coining the term “Twitter Revolution” to help explain what modern physical protests actualized through an interconnected social platform look like. The internet also impacts the accessibility of stories taking place across the globe. The 2011 Egyptian Revolution and the 2014 invasion of Crimea by Russian forces are examples of highly visible events whose influence in the social media sphere permeated traditional media and coverage. The advent of crowdsourcing, which has seen particular growth in the last five years has managed to leverage online spaces to send aid or relief to less advantaged people not only in the communities of its users, but across the world as well. So while many of the readings we did for this week and videos we watched online offered a slightly more pessimistic view of how we have potentially stumbled into misuse of the enormous resource the internet is, many of the largest sociopolitical upheavals of the 21st century so far owe a great debt to its ability to connect people to pertinent and rapidly shifting information.  &lt;br /&gt;
[[User:Meredithmblake|Meredith]] ([[User talk:Meredithmblake|talk]]) 15:46, 3 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
As a young person who has grown up with the internet I have witnessed first-hand how powerful and life-altering the internet and digital technologies have become. Some of my friends have built their lives around the internet. For example, one of my friends is a filmmaker and a musician and he started using the internet as an avenue to pursue his interests as a child. Before he even turned 18, he was already generating a significant income from selling his music and becoming one of the first YouTube partners. Today, one of his YouTube videos has more than 180,000,000 hits and he has 410,701 subscribers. Clearly, he is not alone in his pursuits. He is just one of a vast number of people in the world who have experienced significant economic success from the internet. More recently, it came to light in both the mainstream news and internet media that YouTube user, DisneyCollectorBR’s estimated income after YouTube’s 45% cut was $5.06 Million this year and the only thing she does is post videos of herself, without showing her face, unboxing Disney toys. Now, that’s what I call a significant economic gain.&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 14:21, 4 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
The Internet has shaped our world and culture in many ways. Our social circles are closer than they have ever been thanks to tools such as Facebook and texting, yet they are strangely distant as well -- no longer do people stop by to say &amp;quot;hi&amp;quot; or see how you&#039;re doing, they can just see it on Facebook! The &amp;quot;Internet culture&amp;quot; has spread far and wide, and memes are commonplace in everyday society now. One was even featured in a super bowl commercial! Politically, it&#039;s still just as easy to be spoonfed whatever you choose to believe in, but all the arguments from everyone&#039;s side are available for easy viewing on the Internet -- if you know where to find them. Also, electronic voting machines are incredibly commonplace, and the vulnerabilities reported in them should make anyone worry. Perhaps the most significant area of interest, however, is the economic impact of the Internet. The ability to buy and sell goods from the comfort of your home should not be understated, but that&#039;s just the tip of the iceberg. Two thirds of all US searches are done through Google, and their targeted advertising makes them billions of dollars. Delivering goods virtually is also a huge market right now - Netflix and Steam are booming, while Blockbuster and Gamestop are busting. There are even virtual currencies now, and Bitcoin has a wide reach. Restaurants in major cities all over the country are beginning to accept Bitcoins!&lt;br /&gt;
&lt;br /&gt;
We are barely scraping the surface of what the Internet has to offer, in all aspects of life. The rapid flow of data is what makes the human brain function, after all, and the Internet looks more and more like a neural network every day. The possibilities the future hold are endless. [[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 21:35, 4 February 2015 (EST)&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_1_Submissions&amp;diff=3668</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_1_Submissions&amp;diff=3668"/>
		<updated>2015-02-13T02:31:07Z</updated>

		<summary type="html">&lt;p&gt;Caelum: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
=Submission Instructions=&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This section of the website is crawled by search engines. If you do not want your name to appear in a search connected with your writing, use your class wiki username as a pseudonym.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 10, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
=Submissions=&lt;br /&gt;
Please post your link to your report below:&lt;br /&gt;
&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Swing_(dance)&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Rida Qazi &lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Lahore&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Rida_Qazi_Assignment_1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Andrew C. (Andrew Costanzo)&lt;br /&gt;
 &lt;br /&gt;
Wiki pseudonym:  Chase120&lt;br /&gt;
&lt;br /&gt;
Rule:  https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article:  https://en.wikipedia.org/wiki/Iraq_War_troop_surge_of_2007&lt;br /&gt;
&lt;br /&gt;
Report:  http://cyber.law.harvard.edu/is2015/File:Chase120_Assingment_1.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
Beccalew (Becca Lewis)&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Crimson_Hexagon&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Becca_Lewis_Assignment_1.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Rhurls (Ryan H.)&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability#Self-published_sources&lt;br /&gt;
&lt;br /&gt;
Article:https://en.wikipedia.org/wiki/Sports_law#Academic_Aspects_of_Sports_Law&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1_internet_law.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
ErikaLRich&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Blairsville,_Georgia&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/LSTU_E120_Erika_Rich_Assignment_1.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
JosefinS&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Century_High_School_(Hillsboro,_Oregon)&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:JosefinS_Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
ChanelRion&lt;br /&gt;
&lt;br /&gt;
Rule:&lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Verifiability#Notability&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Edward_Stratemeyer#Death&lt;br /&gt;
&lt;br /&gt;
Rion Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:WikipediaReport_Assignment_1_RION.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Eric Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Rule: &lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view#Common_objections_and_clarifications&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Joshua_Wong_(activist)&lt;br /&gt;
&lt;br /&gt;
Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:LSTUE120_ekwong_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Caroline Borek&lt;br /&gt;
&lt;br /&gt;
Rule:&lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Intellectual_property&lt;br /&gt;
&lt;br /&gt;
Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Assignment_1_Borek.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Edwin Duque Edwinduque Elduquews&lt;br /&gt;
&lt;br /&gt;
Rule:&lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Health_law&lt;br /&gt;
&lt;br /&gt;
Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre&lt;br /&gt;
&lt;br /&gt;
•	Link to rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
•	Link to article: https://en.wikipedia.org/wiki/Meetinghouse_Common_District&lt;br /&gt;
&lt;br /&gt;
•	Link to report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/MacIntyre_Emily_Assignment_1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
Samaei1&lt;br /&gt;
&lt;br /&gt;
Rule: &lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Verifiability#What_counts_as_a_reliable_source&lt;br /&gt;
&lt;br /&gt;
Article: &lt;br /&gt;
https://en.wikipedia.org/wiki/Young_Justice#In_other_media&lt;br /&gt;
&lt;br /&gt;
Report: &lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Assignment_1_Samaei1.pdf&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
Mhoching&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Mt._Baker_Sesh_Up&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1.docx&lt;br /&gt;
-----&lt;br /&gt;
MeredithB&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Alliance_for_an_Open_Europe&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Meredith_Blake._Assignment_1.rtf&lt;br /&gt;
-----&lt;br /&gt;
Mishal R. Kennedy:&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/M15/42_tank&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Essay_(Internet_and_Politics,_Assignment_1)_Mishal_Kennedy.rtf&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Swimming_(sport)#Collegiate_Swimming&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Jan_Yburan.Assingment1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Gia&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Anonymity&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Wikipedia_Assignment_1.docx&lt;br /&gt;
----&lt;br /&gt;
Gary Brown (Intor1 on Wikipedia)&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Legal_aspects_of_computing#Internet_Law&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment1.docx&lt;br /&gt;
----&lt;br /&gt;
Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Rule:  https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article:  https://en.wikipedia.org/wiki/Bim_Skala_Bim&lt;br /&gt;
&lt;br /&gt;
Report:  http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment1.pdf&lt;br /&gt;
----&lt;br /&gt;
MattK&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Articles: https://en.wikipedia.org/wiki/Psychological_resilience&lt;br /&gt;
http://en.wikipedia.org/wiki/Color_blindness_%28race%29_in_the_United_States&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:MattK_WikiEdits_LSTU120.docx&lt;br /&gt;
----&lt;br /&gt;
Tasha&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Tinder_(application)&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1_NPOV_Tasha.docx&lt;br /&gt;
-----&lt;br /&gt;
Kelly.Wilson&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Digital_divide#Infrastructure&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/KellyWilsonAssignment1.txt&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Njalbut&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Governance,_risk_management,_and_compliance &lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Harvard_Extension_School_-_Assignment_One_-_Report_-_Wikipedia_-_Njalbut.docx#file&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
AlexanderH&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/French_campaign_in_Egypt_and_Syria&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:AlexanaderH_Assignment_1.odt&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Wesley Verge&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Student_syndrome&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1.pdf#filelinks&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Brooke Tjarks&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Assistant_director&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Batjarks.Assignment1.txt&lt;br /&gt;
----&lt;br /&gt;
Phoenix Vaughn&lt;br /&gt;
&lt;br /&gt;
Psuedonym: Mmcasse&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Court&lt;br /&gt;
&lt;br /&gt;
Report:http://cyber.law.harvard.edu/is2015/File:Mmcasseakaphoenixvughn.docx&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:LSTUE120_ekwong_Assignment1.docx&amp;diff=3667</id>
		<title>File:LSTUE120 ekwong Assignment1.docx</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:LSTUE120_ekwong_Assignment1.docx&amp;diff=3667"/>
		<updated>2015-02-13T02:28:24Z</updated>

		<summary type="html">&lt;p&gt;Caelum: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Caelum</name></author>
	</entry>
</feed>