<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cyber.harvard.edu/is2015/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RMarkow</id>
	<title>Technologies and Politics of Control - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cyber.harvard.edu/is2015/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=RMarkow"/>
	<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/Special:Contributions/RMarkow"/>
	<updated>2026-04-13T05:04:58Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4388</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4388"/>
		<updated>2015-05-13T00:19:38Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;[http://www.extension.harvard.edu/course-evaluations HES course evaluations are now live. Please go here to fill it out.]&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Also, the course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in to the HES website] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Erika L Rich&lt;br /&gt;
&lt;br /&gt;
Title: Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board&lt;br /&gt;
&lt;br /&gt;
Link: [[File:LSTU_E120_Erika_Rich_FINAL_PAPER.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 21:51, 10 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name:  Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
Title: Final Project: Analyzing the Regulatory Constraints and Chilling Effects of YouTube’s Content ID Sweep through a Representative Survey of the Nintendo Let’s Play Community &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:52, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
Name: MattK&lt;br /&gt;
&lt;br /&gt;
Title: Does the Hammer Ring True?: Assessing John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:MattK_Assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 18:43, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Batjarks&lt;br /&gt;
&lt;br /&gt;
Title: Mobile Alliance for Maternal Action&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:BrookeTjarksFINAL.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 21:30, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Hernando Romero &amp;amp; Michelle Byrne&lt;br /&gt;
&lt;br /&gt;
Title: Privacy in Online Forum AfterSilence.org:  Balancing Privacy for Victims of Sexual Crimes with Opportunity for Support&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 12:42, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: ChanelRion&lt;br /&gt;
&lt;br /&gt;
Title: We The Judges: &amp;quot;SiteJabber&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Assignment4_Final_Draft.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 12:57, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Title: Buycott: Empowering Political Consumption Under A Veil of Political Neutrality&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly_Wilson_Final.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 13:50, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis&lt;br /&gt;
&lt;br /&gt;
Title: /r/TwoXChromosomes: The challenges of maintaining a female-centric space on Reddit&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Beccalew_assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 14:33, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Title: Exploring The Complexity of Rapidly Evolving Information in a bodybuilding, the Challenges of Quality Assurance &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Final_Project.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:17, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Title: BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Barstool_Politics_of_Control_FINAL.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 15:32, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei&lt;br /&gt;
&lt;br /&gt;
Title: Influence of Reddit on Kickstarter Campaigns&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Samaei1_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 16:18, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: JosefinS&lt;br /&gt;
&lt;br /&gt;
Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being an empowering environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinS_Kidzworld.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 16:21, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: AlexanderH&lt;br /&gt;
&lt;br /&gt;
Title: How Do You Regulate User Content?: Instagram and the 4th Trimester Bodies Project&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:AlexanderH_-_Final_Project.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 17:13, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: RMarkow&lt;br /&gt;
&lt;br /&gt;
Title: Analyzing three news sites with very different controls, on the same day as each of their respective communities engage in heated political debate on the same topic.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/R_Markow_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 20:19, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4387</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4387"/>
		<updated>2015-05-13T00:19:10Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;[http://www.extension.harvard.edu/course-evaluations HES course evaluations are now live. Please go here to fill it out.]&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Also, the course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in to the HES website] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Erika L Rich&lt;br /&gt;
&lt;br /&gt;
Title: Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board&lt;br /&gt;
&lt;br /&gt;
Link: [[File:LSTU_E120_Erika_Rich_FINAL_PAPER.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 21:51, 10 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name:  Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
Title: Final Project: Analyzing the Regulatory Constraints and Chilling Effects of YouTube’s Content ID Sweep through a Representative Survey of the Nintendo Let’s Play Community &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:52, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
Name: MattK&lt;br /&gt;
&lt;br /&gt;
Title: Does the Hammer Ring True?: Assessing John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:MattK_Assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 18:43, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Batjarks&lt;br /&gt;
&lt;br /&gt;
Title: Mobile Alliance for Maternal Action&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:BrookeTjarksFINAL.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 21:30, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Hernando Romero &amp;amp; Michelle Byrne&lt;br /&gt;
&lt;br /&gt;
Title: Privacy in Online Forum AfterSilence.org:  Balancing Privacy for Victims of Sexual Crimes with Opportunity for Support&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 12:42, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: ChanelRion&lt;br /&gt;
&lt;br /&gt;
Title: We The Judges: &amp;quot;SiteJabber&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Assignment4_Final_Draft.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 12:57, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Title: Buycott: Empowering Political Consumption Under A Veil of Political Neutrality&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly_Wilson_Final.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 13:50, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis&lt;br /&gt;
&lt;br /&gt;
Title: /r/TwoXChromosomes: The challenges of maintaining a female-centric space on Reddit&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Beccalew_assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 14:33, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Title: Exploring The Complexity of Rapidly Evolving Information in a bodybuilding, the Challenges of Quality Assurance &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Final_Project.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:17, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Title: BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Barstool_Politics_of_Control_FINAL.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 15:32, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei&lt;br /&gt;
&lt;br /&gt;
Title: Influence of Reddit on Kickstarter Campaigns&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Samaei1_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 16:18, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: JosefinS&lt;br /&gt;
&lt;br /&gt;
Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being an empowering environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinS_Kidzworld.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 16:21, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: AlexanderH&lt;br /&gt;
&lt;br /&gt;
Title: How Do You Regulate User Content?: Instagram and the 4th Trimester Bodies Project&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:AlexanderH_-_Final_Project.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 17:13, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: RMarkow&lt;br /&gt;
&lt;br /&gt;
Title: Analyzing three news sites with very different controls, on the same day as each of their respective communities engage in heated political debate on the same topic.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/R_Markow_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
****&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4386</id>
		<title>Final Projects</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Final_Projects&amp;diff=4386"/>
		<updated>2015-05-13T00:18:29Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;[http://www.extension.harvard.edu/course-evaluations HES course evaluations are now live. Please go here to fill it out.]&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Instructions ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Final,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Final.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or Pseudonym:&lt;br /&gt;
*Title:&lt;br /&gt;
*Link:&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;big&amp;gt;&amp;lt;big&amp;gt;&#039;&#039;&#039;Also, the course evaluation is now live. [http://www.extension.harvard.edu/course-evaluations Log in to the HES website] to complete the evaluation.&#039;&#039;&#039;&amp;lt;/big&amp;gt;&amp;lt;/big&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submissions ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Erika L Rich&lt;br /&gt;
&lt;br /&gt;
Title: Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board&lt;br /&gt;
&lt;br /&gt;
Link: [[File:LSTU_E120_Erika_Rich_FINAL_PAPER.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 21:51, 10 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name:  Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
Title: Final Project: Analyzing the Regulatory Constraints and Chilling Effects of YouTube’s Content ID Sweep through a Representative Survey of the Nintendo Let’s Play Community &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:52, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
Name: MattK&lt;br /&gt;
&lt;br /&gt;
Title: Does the Hammer Ring True?: Assessing John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:MattK_Assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 18:43, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Batjarks&lt;br /&gt;
&lt;br /&gt;
Title: Mobile Alliance for Maternal Action&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:BrookeTjarksFINAL.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 21:30, 11 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Hernando Romero &amp;amp; Michelle Byrne&lt;br /&gt;
&lt;br /&gt;
Title: Privacy in Online Forum AfterSilence.org:  Balancing Privacy for Victims of Sexual Crimes with Opportunity for Support&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 12:42, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: ChanelRion&lt;br /&gt;
&lt;br /&gt;
Title: We The Judges: &amp;quot;SiteJabber&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Assignment4_Final_Draft.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 12:57, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Title: Buycott: Empowering Political Consumption Under A Veil of Political Neutrality&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly_Wilson_Final.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 13:50, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis&lt;br /&gt;
&lt;br /&gt;
Title: /r/TwoXChromosomes: The challenges of maintaining a female-centric space on Reddit&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Beccalew_assignment5.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 14:33, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Title: Exploring The Complexity of Rapidly Evolving Information in a bodybuilding, the Challenges of Quality Assurance &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Final_Project.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 15:17, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Title: BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Barstool_Politics_of_Control_FINAL.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 15:32, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei&lt;br /&gt;
&lt;br /&gt;
Title: Influence of Reddit on Kickstarter Campaigns&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Samaei1_Final.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 16:18, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: JosefinS&lt;br /&gt;
&lt;br /&gt;
Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being an empowering environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinS_Kidzworld.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 16:21, 12 May 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: AlexanderH&lt;br /&gt;
&lt;br /&gt;
Title: How Do You Regulate User Content?: Instagram and the 4th Trimester Bodies Project&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:AlexanderH_-_Final_Project.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 17:13, 12 May 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: RMarkow&lt;br /&gt;
&lt;br /&gt;
Title: Analyzing three news sites with very different controls, on the same day as each of their respective communities engage in heated political debate on the same topic.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/R_Markow_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:R_Markow_Final_Project.pdf&amp;diff=4385</id>
		<title>File:R Markow Final Project.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:R_Markow_Final_Project.pdf&amp;diff=4385"/>
		<updated>2015-05-13T00:13:38Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: A comparison of three communities on the same day as they engage in  active debates on the same political topic&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A comparison of three communities on the same day as they engage in  active debates on the same political topic&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_4_Submissions&amp;diff=4290</id>
		<title>Assignment 4 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_4_Submissions&amp;diff=4290"/>
		<updated>2015-04-28T20:42:22Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This assignment is due before class on April 28th.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment4,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment4.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your rough draft here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;If you&#039;d like peer feedback on an updated version of your rough draft, you can submit it here: [[Assignment 4 Peer Review]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment4.doc) to avoid overwriting someone else&#039;s assignment. Please follow the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Project title: &lt;br /&gt;
*Link to rough draft: (add your link here)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Erika L Rich&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; [[Media:LSTU_E120_Erika_Rich_Assignment_4.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 12:08, 28 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; MattK&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Does the Hammer Ring True? Assessing John Scalzi&#039;s Mallet of Loving Correction.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:MattK_Assignment4.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 20:31, 20 April 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Assignment 4: Draft- Analyzing the Regulatory Constraints and Chilling Effects of YouTube’s Content ID Sweep through a Representative Survey of the Nintendo Let’s Play Community &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_4.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 15:19, 21 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; HRomero and ChellyByrne&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Balancing Privacy for Victims of Sexual Crimes With Opportunity for Support in Online Forum AfterSilence.org&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Assignment4.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 14:31, 22 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: JosefinS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project title&#039;&#039;&#039;: A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2015/File:Assignment_4.pdf_Klar.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 08:45, 26 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Samaei1&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project title&#039;&#039;&#039;: Influence of Reddit on Kickstarter Campaigns&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2015/File:InternetSocietyFinalDraft.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 13:20, 28 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name&#039;&#039;&#039;: Beccalew&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Project title&#039;&#039;&#039;: /r/TwoXChromosomes: The challenges of maintaining a female-centric space on Reddit&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;: http://cyber.law.harvard.edu/is2015/File:Beccalew_Assignment4.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 14:40, 28 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Mishal R. Kennedy, Gia, Natasha Jalbut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Scam Baiting Within the 419Eater Community: The Challenge of Policing Information Quality &amp;amp; Preventing Abuse.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Assignment_4_%28Internet_Society_-_Technologies_and_Politics_of_Control%29.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:MishalRKennedy|MishalRKennedy]] ([[User talk:MishalRKennedy|talk]]) 4:25, 28 April 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Richard Markow&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; &amp;quot;Comparing and contrasting the ways in which the NYTimes.com, Huffington Post, and FoxNews.com govern their online communities and use technology, rules and the market to deal with unwanted behaviors and help to facilitate social norms that will promote lively debate.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Assignment_4_Draft_of_Final_Project.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:42, 28 April 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Assignment_4_Draft_of_Final_Project.pdf&amp;diff=4289</id>
		<title>File:Assignment 4 Draft of Final Project.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Assignment_4_Draft_of_Final_Project.pdf&amp;diff=4289"/>
		<updated>2015-04-28T20:33:01Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: Assignment 4 R. Markow&amp;#039;s Draft of Final Project&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Assignment 4 R. Markow&#039;s Draft of Final Project&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4168</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4168"/>
		<updated>2015-03-31T21:35:54Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 31st.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [[Special:Upload|Upload file]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
You can use the same bullet format if you wish:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Abby McHugh (Amchugh)&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039;Thinspiration and the Regulation of Unhealthy Online Weight Loss Content&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Amchugh_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Erika L. Rich&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:LSTU_E120_Erika_Rich_Assignment_3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;http://cyber.law.harvard.edu/is2015/File:Assignment_3_Barstoolsports.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Chanel Rion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; We the Judges: Sitejabber -- Navigating Challenges of User-Generated Review Sites &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Assignment3_Project_Outline.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; MattK&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Does the Hammer Ring True? Assessing the Effectiveness of John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:MattK_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 21:52, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Emily MacIntyre&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Analyzing the Legal Challenges and Chilling Effects of the Nintendo Creator Program through a Representative Survey of Let’s Play Videos and Vlogs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 22:56, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; JosefinS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:JosefinS_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:18, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name or pseudonym&#039;&#039;&#039;: Group: Ginka Todorova, Mishal Kennedy and Natasha Jalbut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;: PROJECT OUTLINE &amp;quot;The impact of the 419Eater.com community on the fight against scam baiting&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to your outline:&#039;&#039;&#039; (the file you uploaded) http://cyber.law.harvard.edu/is2015/sites/is2015/images/Natasha_Mishal_Gia_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User Group:&#039;&#039;&#039; Chelly.Byrne and HRomero&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Balancing Privacy for Victims of Sexual Crimes With Opportunity for Support in Online Forum AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 09:43, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Becca Lewis&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; /r/TwoXChromosomes: Promoting Feminism on Reddit While Upholding the Values of Privacy and Free Speech&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Beccalew_Assignment3.docx&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Alex Samaei&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; The Cyber Curtain Between Creators and Backers On Kickstarter&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039;  http://cyber.law.harvard.edu/is2015/File:InternetFinalOutline.pdf&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Gary Brown&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Crowdsourcing Geospatial Data for Search and Rescue, Disasters, Emergency Operations, and Social Objectives: Tomnod.com&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Gary_Brown_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
Caroline B&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:The_Study_of_Privacy,_Accuracy_%26_Order_on_InsideNova_Website_and_Moving_%E2%80%98Little_Sites%E2%80%99_Up.docx &lt;br /&gt;
&lt;br /&gt;
The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:47, 31 March 2015 (EDT)&lt;br /&gt;
--------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Mhoching&lt;br /&gt;
&lt;br /&gt;
#itooamHarvard: A Case Study of Social Activism through Media Photos &lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/sites/is2015/images/Mhoching_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:40, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
User: batjarks&lt;br /&gt;
Title: Mobile Alliance for Maternal Action: privacy in the context of mobile technology and an internationally accessible reproductive health forum&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:BatjarksAssignment3REAL.pdf&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 16:24, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
User: Rich Markow&lt;br /&gt;
Title: How the differing approaches of the Times, HuffPo and Fox create three very different online communities&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/sites/is2015/images/Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 17:32, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Caelum&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reddit’s Constant Conflict between Freedom of Speech and their Censorship of Hate Speech and Personal Attacks in it’s Conspiracy Sub-category&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Caelum_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 16:59, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
User: Tasha&lt;br /&gt;
&lt;br /&gt;
Title:Exploring the complexity of communication in a bodybuilding forum and the impact on social capital&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Internet_and_Technology_Assignment_3.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 17:06, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: AlexanderH&lt;br /&gt;
&lt;br /&gt;
Title:Managing the Petitions of Change.org: B Corps, Social Enterprise and Transparency&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:AlexanderH_Assignment_3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 17:10, 31 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4167</id>
		<title>Assignment 3 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_3_Submissions&amp;diff=4167"/>
		<updated>2015-03-31T21:32:42Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 31st.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point). &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please name your file &amp;quot;wikiusername_Assignment3,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment3.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Upload your file here: [[Special:Upload|Upload file]]&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Once you&#039;ve uploaded your file, please link to it following the format below:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym:&lt;br /&gt;
*Description:&lt;br /&gt;
*Link to your outline: (the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Submission Instructions==&lt;br /&gt;
&lt;br /&gt;
You can use the same bullet format if you wish:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Description: &lt;br /&gt;
*Link to your outline: &lt;br /&gt;
&lt;br /&gt;
Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Submissions==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Abby McHugh (Amchugh)&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039;Thinspiration and the Regulation of Unhealthy Online Weight Loss Content&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Amchugh_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Erika L. Rich&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reputation Management and Ethical Considerations for Members of the Warrior Forum Message Board &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:LSTU_E120_Erika_Rich_Assignment_3.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; BarstoolSports.com’s Civil War: An Evaluation of the “Success” of the Comment Section regulations&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link&#039;&#039;&#039;http://cyber.law.harvard.edu/is2015/File:Assignment_3_Barstoolsports.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Chanel Rion&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; We the Judges: Sitejabber -- Navigating Challenges of User-Generated Review Sites &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Assignment3_Project_Outline.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; MattK&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Does the Hammer Ring True? Assessing the Effectiveness of John Scalzi&#039;s Mallet of Loving Correction&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:MattK_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 21:52, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name:&#039;&#039;&#039; Emily MacIntyre&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Analyzing the Legal Challenges and Chilling Effects of the Nintendo Creator Program through a Representative Survey of Let’s Play Videos and Vlogs&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 22:56, 30 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; JosefinS&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:JosefinS_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 07:18, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Name or pseudonym&#039;&#039;&#039;: Group: Ginka Todorova, Mishal Kennedy and Natasha Jalbut&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Description&#039;&#039;&#039;: PROJECT OUTLINE &amp;quot;The impact of the 419Eater.com community on the fight against scam baiting&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link to your outline:&#039;&#039;&#039; (the file you uploaded) http://cyber.law.harvard.edu/is2015/sites/is2015/images/Natasha_Mishal_Gia_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]))&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User Group:&#039;&#039;&#039; Chelly.Byrne and HRomero&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Balancing Privacy for Victims of Sexual Crimes With Opportunity for Support in Online Forum AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:HRomero_ChellyByrne_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 09:43, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Becca Lewis&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; /r/TwoXChromosomes: Promoting Feminism on Reddit While Upholding the Values of Privacy and Free Speech&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/File:Beccalew_Assignment3.docx&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Alex Samaei&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; The Cyber Curtain Between Creators and Backers On Kickstarter&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039;  http://cyber.law.harvard.edu/is2015/File:InternetFinalOutline.pdf&lt;br /&gt;
----&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Gary Brown&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Crowdsourcing Geospatial Data for Search and Rescue, Disasters, Emergency Operations, and Social Objectives: Tomnod.com&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Gary_Brown_Assignment3.docx&lt;br /&gt;
&lt;br /&gt;
----------&lt;br /&gt;
Caroline B&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:The_Study_of_Privacy,_Accuracy_%26_Order_on_InsideNova_Website_and_Moving_%E2%80%98Little_Sites%E2%80%99_Up.docx &lt;br /&gt;
&lt;br /&gt;
The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:47, 31 March 2015 (EDT)&lt;br /&gt;
--------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Mhoching&lt;br /&gt;
&lt;br /&gt;
#itooamHarvard: A Case Study of Social Activism through Media Photos &lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/sites/is2015/images/Mhoching_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:40, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
User: batjarks&lt;br /&gt;
Title: Mobile Alliance for Maternal Action: privacy in the context of mobile technology and an internationally accessible reproductive health forum&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:BatjarksAssignment3REAL.pdf&lt;br /&gt;
[[User:Batjarks|Batjarks]] ([[User talk:Batjarks|talk]]) 16:24, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
User: Rich Markow&lt;br /&gt;
Title: How the differing approaches of the Times, HuffPo and Fox create three very different online communities&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 17:32, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;User:&#039;&#039;&#039; Caelum&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Title:&#039;&#039;&#039; Reddit’s Constant Conflict between Freedom of Speech and their Censorship of Hate Speech and Personal Attacks in it’s Conspiracy Sub-category&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Link:&#039;&#039;&#039; http://cyber.law.harvard.edu/is2015/sites/is2015/images/Caelum_Assignment3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 16:59, 31 March 2015 (EDT)&lt;br /&gt;
----&lt;br /&gt;
User: Tasha&lt;br /&gt;
&lt;br /&gt;
Title:Exploring the complexity of communication in a bodybuilding forum and the impact on social capital&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Internet_and_Technology_Assignment_3.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 17:06, 31 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: AlexanderH&lt;br /&gt;
&lt;br /&gt;
Title:Managing the Petitions of Change.org: B Corps, Social Enterprise and Transparency&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:AlexanderH_Assignment_3.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 17:10, 31 March 2015 (EDT)&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Project_outline.pdf&amp;diff=4166</id>
		<title>File:Project outline.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Project_outline.pdf&amp;diff=4166"/>
		<updated>2015-03-31T21:31:01Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: How the differing approaches of the Times, HuffPo and Fox create three very different online communities&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;How the differing approaches of the Times, HuffPo and Fox create three very different online communities&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3963</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3963"/>
		<updated>2015-03-09T04:10:07Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Facebook &amp;amp; Big Data vs. Your Privacy&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Prospectus_FB_and_privacy_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:06, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Intentions and Outcomes of Youtube’s Copyright and Coding Regulations&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_prospectus03.03.15.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 15:51, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Comments on Olivia&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Hi Olivia, &lt;br /&gt;
&lt;br /&gt;
Let me start by saying I think that Youtube is a great source for your project.  I’m not saying that just because I am doing my paper on Youtube.  I find the creative ways that people are using it fascinating.  Much more so than some of the other platforms.&lt;br /&gt;
&lt;br /&gt;
If I may summarize, you plan to discuss how legal pressures forced Youtube to introduce technologies that changed the user experiences, like Copyright ID.  You also mentioned some other (possibly voluntary) technologies that are part of the user experience with the intent to discuss how they impact users.  I think they are good ideas and good concepts to write about.  &lt;br /&gt;
&lt;br /&gt;
As you rightly point the Youtube community is one of the largest communities on the Internet.  I wonder if it might not be taking on too much to try to examine Youtube as a whole.  I would suggest selecting a small group that is susceptible to the effects of the technologies you are reviewing.  Describe who the group is and how certain characteristics of their make-up or user experience make them particularly sensitive to the technologies you will focus on.&lt;br /&gt;
&lt;br /&gt;
For example I will be focusing on hobbyist inventors.  Guys that spend their weekends in the garage putting “junk” together and posting videos about their “inventions” on Youtube.  Their content is all original so they are not impacted by Copyright ID.  There is very little thumbs up/down.  They are a much more “expressive” crowd as the comments indicate.&lt;br /&gt;
&lt;br /&gt;
I’m not trying to discourage you.  I think if you pick the right group and tell us why you picked them, it can very interesting.  I hope that is helpful.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 19:47, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
•  Erika L Rich&lt;br /&gt;
&lt;br /&gt;
•  Title: Reputation Management and Ethical Considerations for Members of the Internet Marketing Super Friends (IMSF) Facebook Group&lt;br /&gt;
&lt;br /&gt;
•  Link: [[File:LSTU_E120_Erika_Rich_Assignment_2.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 15:22, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Emily, &lt;br /&gt;
&lt;br /&gt;
Great job on your prospectus! It is very well organized, and your citations sources are well researched. I found your research really enticing because I had never heard of this sweep, and I consider myself an avid youtube visitor. I think you are on to a great research project. Although the topic is remarkably fascinating, I wonder if investigating and juxtaposing the different types of monitoring will be too large or too abstract for the limit of the project. I also read up on the PewDiePie character cited, and I think it is really fascinating to see that he has 35 mil subscribers, yet chose to turn off his commenting feature because of how volatile he claimed the space was becoming. His specific youtube channel then does not have a community to investigate. But it would be interesting to examine someone or a specific youtube channel that has a similar following as the case study to better help zone in on collecting and investigating data. Thank you for this topic, I am currently reading more about the youtube actions in 2008 and 2013 because I had little to no prior knowledge of both events. &lt;br /&gt;
&lt;br /&gt;
Good luck on your project!&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:09, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
RE: Mhoching,&lt;br /&gt;
&lt;br /&gt;
Thank you for your comment. I very much like your prospectus topic as well as you can see from my comments below. With regards to my final project, I thought I should reiterate and clarify that my community is the YouTube contributors that concentrate on making Let’s Plays and video game reviews. While it is helpful to find a video with an active comment section, where other users further explain how the ID sweep influences their output choices,  in the case of PewDiePie, his decision to turn off his comment section does in part illustrate how YouTube has rapidly evolved. Since Google began catering to commercial enterprises over the original volunteer contributors, some of the volunteer contributors have become increasingly more frustrated and they exhibit their frustration in a variety of ways.      &lt;br /&gt;
&lt;br /&gt;
Thanks Again,&lt;br /&gt;
 &lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:37, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Matt,&lt;br /&gt;
&lt;br /&gt;
I am particularly interested in your topic because I believe it is a very small example of what the internet could become or arguably is becoming in regards to free speech. I am very intrigued by the notion of &amp;quot;knowledge is power&amp;quot;. What I mean relative to your project is that I believe that those who can control what &amp;quot;knowledge&amp;quot; people receive therefore posses great power. In your case, Scalzi&#039;s blog is equipped with a comment section where total control is given to Scalzi on what to allow others to see. By censoring whatever Scalzi sees as &amp;quot;offensive&amp;quot; he is limiting a voice, whether good or bad, and therefore limiting knowledge. I would argue that there&#039;s no question that the term knowledge here is used very loosely and there are obvious comments on these sorts of forums which provide no overall good at all, but more importantly the question I think of is how dangerous it would be for one person to posses this sort of &amp;quot;editorial power&amp;quot; to simply delete anything they see unfit. What would happen if other sites also used this sort of policy where whatever is subjectively deemed unworthy of being a comment was deleted? Are there infact other online sites and forums that take this approach? What implications does this approach have for the audience of the site? Does it discourage participation as a sort of chilling effect? It is a scary world to imagine where one party possess the power of what information to provide and what to censor. In this specific case what if the comments are simply against Scalzi and are a disagreement with what he writes? What is to stop him from simply deleting something. I&#039;m curious to know what sort of checks and balances or accountability Scarzi&#039;s editorial powers has. I think your subject bears the question of where to draw the line between free speech and productive censorship, an enormously tricky and potentially dangerous distinction.&lt;br /&gt;
&lt;br /&gt;
These are just a few thoughts I had, in any case best of luck it&#039;s a great topic. &lt;br /&gt;
&lt;br /&gt;
Thanks,&lt;br /&gt;
Ryan Hurley&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 18:55, 8 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
---- &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Hi Edwin, &lt;br /&gt;
&lt;br /&gt;
I  like the way you structured your idea. I  think that the copyright issue is  very  interesting and it  is  worthed  spending  some more  time on it.  Exploring the nature of  a Facebook post – whether  it  could  be  consider  as an “idea”, in the Copyright Act specifically states that In no case does copyright protection for an original work of authorship extend to any idea, regardless of the form in which it is described. Or  it  could  be  considered  as  an “original works of authorship” fixed by the author in a tangible way, in which case it would be covered by copyrights. The issue of re-posting someone else’s post with commercial purposes  could  be interesting to mention as well. It is just  an idea,  but saying some words about  the  case  with the  famous Facebook post “In response to the new Facebook guidelines…. “ might  be  interesting too. I think  that  you  could  also easily  link your work to the “right to  be  forgotten” issues   we  discussed  in  class.&lt;br /&gt;
&lt;br /&gt;
Here  are  some links  you  might  find  useful. Good  luck!&lt;br /&gt;
&lt;br /&gt;
http://www.nyccounsel.com/business-blogs-websites/who-owns-photos-and-videos-posted-on-facebook-or-twitter/&lt;br /&gt;
http://plato.stanford.edu/entries/ethics-social-networking/&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 20:54, 8 March 2015 (EDT))&lt;br /&gt;
-------&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Chanel,&lt;br /&gt;
&lt;br /&gt;
The subject of customer generated reviews is certainly huge on the internet.   It is beneficial for consumers to get an opinion of a product or restaurant from other people over just what the advertising says.  But as you point out, there is a lot of opportunity for libel or slander – especially people just having an ax to grind.   It would be interesting to see how Yelp or Sitejabber are being responsible and making an effort to regulate content and protect places being reviewed from harassing content.  I like how your approach includes researching any legal cases brought against them; it would be interesting to see if any of them prevail.   Also, how do they actually calculate the ratings?  Is it an average of overall ratings?   Or could bad reviews be hidden away if there become lots of positive reviews?  Are businesses sandbagging to increase their ratings?  &lt;br /&gt;
 &lt;br /&gt;
Overall, this is a great community to look into and I wish you success!&lt;br /&gt;
&lt;br /&gt;
Michelle aka (Chelly)&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 15:43, 7 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
RE: Michelle&lt;br /&gt;
&lt;br /&gt;
Hi Michelle,&lt;br /&gt;
&lt;br /&gt;
Thank you for your comments and feedback. I too, am especially interested in the legal angles to this community and I am glad to know I&#039;m not the only one. I will certainly be watching and reviewing and seeking the answers to these questions and also to your specific concerns. All intensely pertinent to how businesses and communities are going to manage tensions with each other -- tensions that have always been here, but are now revolutionized in simply the sheer and complete access that the Internet provides to all of us.&lt;br /&gt;
&lt;br /&gt;
Looking forward to starting this seek and find. Thank you for highlighting questions and focuses, they should prove helpful for such a broad category. &lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
Chanel&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 16:49, 8 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Becca!&lt;br /&gt;
I absolutely love the theme of your project, it is an exceptional live issue since feminism has been discussed much more this past year than it has been for many years. Therefore, it´s really important to examine the forums in which people have the opportunity to discuss the subject. Great!&lt;br /&gt;
&lt;br /&gt;
I also found it cool that you are thinking about recording a podcast for the project. If you do so, you might consider including an interview with someone active in the specific forums, a professor in gender studies or perhaps two people with different views on the issue?&lt;br /&gt;
&lt;br /&gt;
I have a question about the subreddits you talked about though. You wrote about a ”safe space” for women. Are those subreddits only for women or are they open for anyone who want to discuss feminism and gender roles? If it is a women-only forum, you might also discuss the consequences on that. If not, maybe that has consequences as well. Maybe you should discuss self censorship in the feminism subreddits as well (which is very interesting since Reddit-as you said-values free speech above almost all else)?&lt;br /&gt;
&lt;br /&gt;
Good luck!&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 10:39, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Comments on Gary&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Gary,&lt;br /&gt;
&lt;br /&gt;
Great topic!  I hope to be going out to for crowdfunding by the end of the May.  So I will follow your Wiki with interest.  (In your proposal you link to crowdfunded.  I think you meant community funded. You may want to look at that.) &lt;br /&gt;
&lt;br /&gt;
You mentioned the stated purpose of Communityfunded.  But you did not mention their reason for existing.  In other words, what started crowdfunding and why would individuals seek funds for their projects from the public and not other traditional sources.  Why are people like me willing to go online (to communityfunded) to ask for money, as opposed to going to another site or pitching a Venture Capitalist or a bank?  Why would people fund a project on line versus invest in the stock market or Bank CDs?&lt;br /&gt;
&lt;br /&gt;
I think that the answer to those questions goes to the heart of crowdfunding.  It also is germane to the “troublesome obstacles” you refer to in your prospectus. &lt;br /&gt;
&lt;br /&gt;
When you mention failed projects, I would suggest that not all failures are the same.  I might be willing to invest money in a project I consider socially redeeming even if I thought it had very little chance of success.  Where as, if I were investing in some Harvard wiz-kids that profess to have the next Facebook, I might have very different feelings if they went belly up.  So you may want to include categories of projects, or claims/expectations in your discussions.  As well as any risk factor ratings.&lt;br /&gt;
&lt;br /&gt;
You also mentioned building and keeping trust of supporters.  One of the areas that interests me is the ways that Fundraisers generate funding support.  Do they rely solely on the site?  In other words, is there a pool of would be investors just waiting for the right idea to come around so they can invest.  Or is a fundraiser expected to go outside the community and raise interest and drive that interest back to the site?  How does that impact the “trust” factor?  If I am a one-time fundraiser does it matter all that much what people think about me after I’ve got my money?  &lt;br /&gt;
&lt;br /&gt;
You discuss how you will break down funded projects, etc.  Is there a way to figure out what various fundraiser did to get funded?  Marketing may prove to be more of a factor than the project or its worthiness.  &lt;br /&gt;
&lt;br /&gt;
It would certainly be worthwhile to compare and contrast crowdfunding before and after changes in regs that made it easier for the public to invest.  And how post reg trends may lead to new regs/controls.&lt;br /&gt;
&lt;br /&gt;
I look forward to reading your paper.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 20:45, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Meagan,&lt;br /&gt;
&lt;br /&gt;
Every aspect of your prospectus is incredibly interesting to me. I am especially intrigued by how well you have matched up the readings to your topic. &lt;br /&gt;
&lt;br /&gt;
After I read your section on Norms I thought about how you point out that “the gaming system is very competitive” and it made me wonder, if Valve placed more restrictions to prevent bullying could it potentially take some of the pleasure of competition out of the mix.  If so, then would some users leave the game because they like the hostile environment, which may be why they chose to play in it in the first place.  Keeping this line of thought in mind, perhaps you could find another similar community that has more strict modes of control in place to observe the differences between them.&lt;br /&gt;
&lt;br /&gt;
I thoroughly enjoyed reading your prospectus and I look forward to seeing your finished product.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:25, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Meagan!&lt;br /&gt;
&lt;br /&gt;
What an interesting and relevant subject! &lt;br /&gt;
&lt;br /&gt;
I think that it was a very good idea of you to use the Dot Model with the components ”Market”, ”Architecture”, ”Norms” and ”Law”, it makes everything much more clear. I agree with Emily that it would be a good idea to compare DOTA 2 with another game, preferably from another website than STEAM and with another system of regulation. I would find it really interesting to see the result of a such a study and if norms, the language, the members of the site, etc. differ between the two games. &lt;br /&gt;
&lt;br /&gt;
I´m looking forward to see the result! Good luck!&lt;br /&gt;
&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 10:16, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Meagan!&lt;br /&gt;
&lt;br /&gt;
I think this is a very fascinating topic and one I too almost pursued. I am a bit of a gamer myself and although I don&#039;t play DOTA, I do regularly play many different sports games which I have found to have similar issues of harassment and &amp;quot;bullying&amp;quot;. I hadn&#039;t heard of the STEAM website you&#039;re focusing on until I read your assignment, but for anyone who has read really a comment section/forum anywhere, one second you&#039;re talking about a video game, the next you have gone down a path of hate and overall disgust of anyone different minded not to mention if it is a competitive game which stirrs up some hostile emotions toward an adversary. I find this particularly interesting when it comes to video games because many people who don&#039;t play video games believe that &amp;quot;it&#039;s just a game&amp;quot; but on the contrary for many gamers, one can find their self emotionally invested into a game you are taking part in. You feel this overwhelming sense of dedication to it and attachment to what happens in it where you can essentially lose yourself in the game. It is because of this hardwired competitive and primitive feeling and this element of motivation that I believe is so deeply rooted in many gamers that it would be near impossible to ever completely outlaw the harassment or trash talk because it will never stop. However perhaps there is some sort of way to outlaw the harassment that crosses a line by creating real consequence while still allowing some competitive jabbing but that I will be curious to see from your project. I will be also curious to hear what your research finds about the website in particular, I would venture to guess that it is probably similar for communities like the PSN and xboxlive. &lt;br /&gt;
&lt;br /&gt;
I might suggest on top of all this to take a look at games which do not have a competitive nature with other users. This may be difficult to find but I&#039;d be curious to see whether it is harassment you find on forums with these sort of games or rather a cooperative dialogue intended to help one another. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Good Luck!&lt;br /&gt;
- Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:26, 8 March 2015 (EDT)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:1_Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Hi Jan,&lt;br /&gt;
&lt;br /&gt;
This is a really interesting community to build your case study around. Prior to today I have only been on the site a few times to look at subreddits that relate to topics that I am interested in, and since I am not a member I have not considered how the site protects the user’s privacy. &lt;br /&gt;
&lt;br /&gt;
Today I decided to look at the IAmA subreddit to get a better handle of the scope of your project. Consequently, I came across and interesting and fairly benign thread started by an employee of a movie theater and it brought to mind, how does the site handle issues of privacy, libel or defamation against a company or a consumer when an employee engages in what appears at first glance as an anonymous tell all blog that highlights how he/she has witnessed vulgar and perhaps even criminal activity. &lt;br /&gt;
&lt;br /&gt;
Considering your topic and direction you want to take, I think you might want to blend together aspects of the readings from our classes on privacy with the readings for next week’s class on free expression, information, and unwanted speech.&lt;br /&gt;
&lt;br /&gt;
I am looking forward to seeing your completed final project. I am sure it will be very informative.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
P.S. (Here is the link to the AMA I referenced: http://www.reddit.com/r/IAmA/comments/2xz6nb/iama_movie_theater_employee_and_ive_seen_the/)&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 13:04, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei (Samaei1)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The Framework of Projects and Backers on Kickstarter&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Samaei1_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 15:37, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Alex! &lt;br /&gt;
&lt;br /&gt;
I&#039;m so happy you picked this website because I&#039;ve donated to various projects on this website, but never took into account the structure of the website and complications due to misappropriating of funding. I find it hard to try to quantify what is appropriate to fundraise, because the topic is subjective. Of course I don&#039;t think it would be appropriate to fundraise to support hate speech (if that&#039;s what someone is fundraising for), yet I don&#039;t find it appropriate to fundraise for movies about starving children, when that money can go to feeding starving children. I hope I&#039;m communicating the subjectiveness of trying to find what would be considered appropriate to raise money for and how it varies from person to person. &lt;br /&gt;
&lt;br /&gt;
But speaking in regards to the Lessig&#039;s Dot Model I think the website can be broken down into different sections to address some of the issues you raise. For example, how does the structure of kickstarter promote accountability on the artist/person asking for money? On the donation page for example, a vast amount of information about the artist is available, as well as avenues in which you can contact the fundraiser. So if kickstarter has provided this as a requirement for people to submit or provide when asking to be funded, is it then up to the donor to hold that person accountable? I have the tools on that page to ask the fundraiser for that specific information and continue to follow up on that information. I think once you start looking at specific/deliberate aspects of kickstarter, it will start to inform or control behavior. &lt;br /&gt;
&lt;br /&gt;
I hope this helps! Look forward to reading the final project; happy researching and writing!&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:35, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Gia&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Chivalry online&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Gia_Assignment2.docx&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 15:46, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Hi Gia,&lt;br /&gt;
&lt;br /&gt;
This topic is definitely flushing out the seedier side of the internet!  I have never heard of this site 419eater, but we all know the dangers of scammers and how they use the internet.   How do they find their victims?   Some scams are so realistic as to mention names of loved ones in danger and demand money be expedited.  The scam baiters you’re talking about here must be trolling similar sites and circles to identify culprits they need want to go after.  But in doing so, are they just as much at fault as the original scammers?   Is there any regulation of the members? I can definitely see an ethical dilemma, as you point out, of some possibly unscrupulous members.  And your question of whether they have extended their existence outside the online world is a very interesting consideration.&lt;br /&gt;
&lt;br /&gt;
You a have a lot of good sources listed regarding scams (white collar crime and Ponzi schemes too!).   Good luck, this is an intriguing subject!&lt;br /&gt;
&lt;br /&gt;
Michelle&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 15:57, 7 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Re: Michelle&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thanks for the comments, Michelle. I definitely intend to explore the  subject from both sides, because there could be really two, maybe even more , points of  view. Regarding the legal regulation, there is a lot  to be said – interned jurisdiction. The self-regulation of the web community  which is  evolving with the  time is  also a nice starting  point. &lt;br /&gt;
Thank again for the ideas and good luck  to  you  too with  your  work!&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 20:54, 8 March 2015 (EDT))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Mishal R. Kennedy&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Enforcing Guidelines Without Harming User Contributions&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mishal_R._Kennedy_Assignment2.rtf&lt;br /&gt;
([[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 15:51, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Hi  Mishal,&lt;br /&gt;
&lt;br /&gt;
The  subject you have  chosen  is very interesting and gives great opportunities  for  discussions and analyses. I would   directly  make  a reference  to  the  Lawrence Lessig, Code 2.0, which we discussed during “Paradigms for Studying the Internet’ class.  You could explore the methods  used by the moderators and administrators as a way  of  self regulation of  the  community. The  question  you asked  whether  these  methods  are  causing  more  bad  than  good, is right  to the point. &lt;br /&gt;
I would  suggest you explain in more details the  different  methods  of control used  my the moderators  and perhaps compare them with the ones used by other communities. You could also take a  look  if  it is explicitly listed in the Terms  of  Use   of the  website  in which case what measure is taken? Is there a higher authority than the moderator to  whom  a sanctioned  user  could  complain? Could  such  a  decision  “be appealed” or  it  is  final and definitive? Is there at all a hierarchy in the administration of the website?&lt;br /&gt;
Here  are  some  sources  which  might  help. Good  luck!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
https://www.academia.edu/3079184/COAT_Collaborative_Outgoing_Anti-Spam_Technique&lt;br /&gt;
http://www.yildiz.edu.tr/~aktas/courses/CE-0114890/g8-p3.pdf&lt;br /&gt;
http://www4.ncsu.edu/~kksivara/sfwr4c03/projects/4c03projects/CGLucas-Project.pdf&lt;br /&gt;
http://www.aaai.org/ocs/index.php/ICWSM/ICWSM11/paper/viewFile/2780/3296&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 20:54, 8 March 2015 (EDT))&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Richard Markow&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The YouTube video-sharing platform &amp;amp; The Community of Alternative Heating Systems and Appliance Inventors&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Rich_Markow_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:03, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name AlexanderH&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Managing the Petitions of Change.org: B Corps, Social Enterprise and Transparency&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2015/File:AlexanderH_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:10, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name: Meredith Blake&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:Identifying Avenues of Recourse for Businesses on Yelp &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Meredith_Blake._Assignment_2.docx&lt;br /&gt;
[[User:Meredithmblake|Meredith]] ([[User talk:Meredithmblake|talk]]) 16:13, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
Hello Meredith!&lt;br /&gt;
&lt;br /&gt;
I think this is a great topic and you have a very interesting approach.  I haven’t really looked into Yelp and the lawsuit angle, but they certainly have a lot of influence on the internet.   Out of curiosity, I just Googled about 10 different restaurants in this area and the results had the Yelp review either as the second or third site listed!   So potential customers are seeing the Yelp rating almost before the actual websites in a couple of cases!   There is little recourse for them, and as you show by the Sia example, a disgruntled customer can reach out and cause a flood of terrible reviews, from people who weren’t even customers!   Caelum makes a good point in the summary at the bottom that reviews are either one end of the spectrum or the other… disgruntled customers wanting to air their displeasure or someone extremely happy who wants to rave about it.&lt;br /&gt;
   &lt;br /&gt;
It is good to take a targeted approach to such a large community, and looking into the recourse that businesses may have as well as existing lawsuits sounds like a good approach.  If a suit is successful, what are the actual outcomes?   Does Yelp take down reviews or adjust the ratings?   I think people who expound on sites that give a platform are really missing the spirit of free speech.   I don’t think your approach is that unpopular, not that free speech needs to be regulated, but that there should be some modicum of self-restraint and freedom to say anything is not absolutely protected.&lt;br /&gt;
&lt;br /&gt;
Good luck on this, you’ve got some really good ideas!&lt;br /&gt;
&lt;br /&gt;
Michelle&lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:14, 7 March 2015 (EST)&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Wesley Verge&lt;br /&gt;
&lt;br /&gt;
Prospectus Title : Scrolling into Darkness -- An investigation into the regulatory forces at work in Youtube&#039;s comment section&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Wesley_Verge_Prospectus.txt&lt;br /&gt;
&lt;br /&gt;
 [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 16:19, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi Wesley!&lt;br /&gt;
&lt;br /&gt;
I am very intrigued by the &amp;quot;solutions&amp;quot; there are to change the culture of the comment sections. It is really an intriguing phenomenon that one could be watching a video about puppies and suddenly 4 comments down glance over an argument that Obama was sent by satan himself to destroy the world. I&#039;ve always been curious as to how this has not been regulated more strictly. I think you raise great points why and the concerns Google is faced with. If I were doing this project I might also attempt to compare this to other sites as well that must face similar challenges. For example you suggest in your assignment that youtube channels direct traffic to sites like Reddit, but is that really an escape for the channel as this implies? Can these &amp;quot;trolls&amp;quot; not go over to reddit to promote their hate just as easily, or do they have different solutions in play that regulate these sorts of issues better? As far as I know both are anonymous to an extent so with this anonymity many of these trolls have &amp;quot;keyboard muscles&amp;quot; as I like to call them. I can understand twitter because many times it is much more personal but even there people can create fake accounts and troll all the same, just see Jimmy Kimmels skit on celebrity reading mean tweets. &lt;br /&gt;
&lt;br /&gt;
I really like your focus on famous YouTubers I just think it may also be beneficial and worth mentioning how other sites with the same prevalent issue have tried to combat trolling. Also from a legal side, are all of these comments protected by the law and free speech? Perhaps because of the enormity of all the comments and comment sections, it is simply impossible to regulate what is said in every section from a legal perspective. Food for thought, but in any case great project idea.&lt;br /&gt;
&lt;br /&gt;
Best of luck,&lt;br /&gt;
Ryan&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:56, 8 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Knocking the Wind out of Whistleblowers: The US&#039; response to the growing threat from WikiLeaks &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly.WilsonAssignment_2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 16:38, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Hi Kelly,&lt;br /&gt;
&lt;br /&gt;
Interesting topic.  There are a couple of perspectives you may want to consider about when defining what you mean by Whistleblower and the response in each situation.  1) Exposing illegal acts.  2) Exposing immoral acts.  3) Exposing Acts designed to embarrassed your political opponents or as retribution.&lt;br /&gt;
&lt;br /&gt;
Should they all be treated the same and afforded equal protection?  &lt;br /&gt;
&lt;br /&gt;
Good luck!&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 00:10, 9 March 2015 (EDT)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Exploring the Complexity of Rapidly Evolving Information in a Bodybuilding Forum and the Challenges of Quality Assurance&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 17:12, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
Hi Tasha,  &lt;br /&gt;
&lt;br /&gt;
I  like a lot  your  choice  of  community  . It  is  unusual and  at  the  same  time  you  could  find  a lot  of  things  to explore-both  from  legal  and ethical stand  point. &lt;br /&gt;
I would  say  that your  questions and  reflections are  on the right track. I think  that one of the issues  you  could explore is  the fact that  they  are  often used  as  a platform  for  unlicensed  sell of  drugs. If  you choose  to go  for this, you should have  to take  a  good  look  on the definitions  in order  to  differ  “Drugs”  for  “Nutrition Supplements” because  this is  the  tricky  moment. How the  website  is  protecting  itself  from  such  kind  of  activity (by  its  Terms  of  use  or  in other  ways) , might  be interesting  as well.&lt;br /&gt;
Above you could find two links that might be of some use. Good  luck!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first is little bit old but interesting:&lt;br /&gt;
http://www.hhs.gov/asl/testify/t000525b.html&lt;br /&gt;
&lt;br /&gt;
http://health.wusf.usf.edu/post/unlicensed-pharmacies-selling-compounded-drugs-online&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 20:54, 8 March 2015 (EDT))&lt;br /&gt;
&lt;br /&gt;
__________&lt;br /&gt;
&lt;br /&gt;
Name: Josefin Sasse&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinSasse.pdf&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 17:26, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Josefin!&lt;br /&gt;
&lt;br /&gt;
I find your topic utterly intriguing. I had no idea such a website existed and it&#039;s been quite fascinating just poking around the website a little bit. I think it is a very valid point to raise about &amp;quot;who monitors Kidzworld&amp;quot;, because there doesn&#039;t seem to be much of a screening process to ensure the user that is signing up for an account is in fact between the ages of 9-17. Also, I see you have cited the Pew Research Center study from the readings, which is a great resource for dissecting the demographics and statistics of harassment, but the study was done on &amp;quot;young adults&amp;quot; ranging from 18-29, and &amp;quot;young women&amp;quot; between the ages of 18-24 years old. Which I hope illuminates, rather than complicates, the issue of doing research on a demographic ranging from 9-17, but more so how do you set up  a website that serves a population that would need adult consent to participate in almost everything they do. Along with privacy issues, I think the question of who is responsible for what and for whom is a great aspect you have raised in your paper! I would love to stay in touch and see the developments of your paper if that would be okay. I think this is the perfect website to investigate for this project.  &lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 00:10, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Hi Josefin,&lt;br /&gt;
&lt;br /&gt;
I think you picked a great online community to explore for your final project, not only because it is a social space for a specific group, but also because there seems to be some fairly strict regulations in place to maintain a safe environment for kids. &lt;br /&gt;
&lt;br /&gt;
It might be interesting if you could find some weakness in its structure. For example can kids go into private chats or are all the chats and comment sections being screened. If they are being screened, is it by a computer generated logarithm or real people? &lt;br /&gt;
&lt;br /&gt;
Another question that you could delve into is, how do the site’s administrators know the users are minors.  Do they require parents’ permission? If so how do they prove it is actually a real parent?  &lt;br /&gt;
  &lt;br /&gt;
I hope these suggestions are helpful. I am looking forward to seeing your finished project. &lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
Emily&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 00:13, 5 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name:   Brooke Tjarks&lt;br /&gt;
&lt;br /&gt;
Prospectus:   Art. Business. Fans. (...) How this collaborative space shapes mass visual media production and worldwide distribution&lt;br /&gt;
&lt;br /&gt;
Link:   http://cyber.law.harvard.edu/is2015/File:Prospectus.Brooke.Tjarks.pdf&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Abby McHugh&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: From #Thinspiration to “Low Carb Friends”: The Regulation of Online Weight Loss Content&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Amchugh_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Hi Abby!&lt;br /&gt;
&lt;br /&gt;
Okay, so I really wich I had chosen this issue. It is great that you did!&lt;br /&gt;
&lt;br /&gt;
To facilitate the work, I would recommend that you are more specific in which websites you are going to explore since there is so much #thinspo content out there. But Twitter, Tumbler, Pinterest, and Instagram are great platforms to explore, together with blogs like you said. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Other things you might want to discuss are:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
What makes the most harm: #thinspo/pro-ana blogs and posts or limitations on freedom of speech by regulating such content? (On my part, I am determined in my opinion that #thinspo is devastating and that regulation in this case is a good thing.)&lt;br /&gt;
&lt;br /&gt;
Who is active in this community?&lt;br /&gt;
&lt;br /&gt;
Could pro-ana be illegitimate harassment? Compare it the possibility of a pro-cancer or a pro-aids community (deadly diseases just like anorexia).&lt;br /&gt;
&lt;br /&gt;
What effects could/does the sometimes lack of regulation have on the community online and offline?&lt;br /&gt;
Good luck! You´ve chosen a very interesting subject!&lt;br /&gt;
&lt;br /&gt;
/Josefin&lt;br /&gt;
&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 11:08, 5 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Note: If I’m a little direct in the comments, I really mean the best. Hope it doesn’t offend anyone. &lt;br /&gt;
&lt;br /&gt;
Ryan Hurley: I think professor said stay away from these huge websites. Perhaps you could discuss with the professors if Facebook is the right website to focus on? &lt;br /&gt;
&lt;br /&gt;
Olivia Brinich: I think you’re asking a lot of questions to be answered here.  &lt;br /&gt;
&lt;br /&gt;
“How does it Pind and protect information, how do copyrighters choose to deal with the individual cases of copyright infringement, and what happens when a clip is wrongfully targeted for copyright violation, i.e., the adverse unintended consequences of Content ID?”&lt;br /&gt;
&lt;br /&gt;
Perhaps you should just focus on one main thesis and explore on that. For example, focusing on how copyrighters deal with copyright infringement, and how that eventually influenced youtube to introduce copyright ID system.&lt;br /&gt;
&lt;br /&gt;
One last issue is whether youtube is too big of a website to focus on. Perhaps you could narrow it down to say, copyright issues for music on youtube. &lt;br /&gt;
&lt;br /&gt;
Erika L. Rich: I think it’s a very broad term to discuss the ethical considerations. Perhaps if you narrowed it down to 1 or 2 main issues you find extremely compelling about the website and community? Or maybe I have simply mistaken your train of thought. &lt;br /&gt;
&lt;br /&gt;
Emily MacIntyre: I like how you had such conviction to talk about youtube that despite its size, its still worth researching about. I think you could also talk a little bit about how these game commentators earn their living by commenting on games. PewDiePie is estimated to earn millions every year. It could show a greater perspective on things if we could see their earnings as well. South Park actually has a very funny episode about commentators commenting on commentators commenting on games on youtube. &lt;br /&gt;
&lt;br /&gt;
Matt K: Do you think that changing the title to reflect your research would make it easier for the reader? (Just a thought) I think its interesting how you mentioned “democratic instrument”, bringing politics into the way his blog is ran. According to the quote you took, Scalzi has indeed used some controls over potential commentators. Furthermore, you should consider that if it’s a blog about all sorts of things, with John’s comments on it, he should also be open to listen to commentators reply to this, especially if its about sensitive topics. If he’s going to filter away those he “considers” as offensive, then perhaps he shouldn’t comment on other things either. (unless the comment really does not have a valid point and is not related to the topic) &lt;br /&gt;
&lt;br /&gt;
Edwin Duque: Good to see you in this class too. I think you should just focus on one website. I’d do JuryX instead of Facebook as professor said big websites aren’t good. Also, you’d need a stronger thesis to connect what the real question is. Is it about allowing free sharing? Or is it about limiting what gets shared? I’m a little confused with your thesis. &lt;br /&gt;
&lt;br /&gt;
Chelly Byrne: I think you have a strong thesis here. The contradictions between sharing information on the internet, and the fear of being exposed would be very interesting. I think you can even go into the subscription process. I assume the website allows anyone to join. This means that even predators could read up on what victims write. Unfortunately, they probably get quite the entertainment from reading it, or pretending to ask “leading” questions. As you said, just a tiny bit of excessive information leaked out could result in a victim being violated again. I guess you could talk about that.&lt;br /&gt;
&lt;br /&gt;
Chanel Rion: Since you’re talking about Yelp and reviews, I’d like to share what I learned from another class. Most of these reviews are at the ends of the spectrum. Unless someone is a regular of Yelp and does a review for every restaurant, the rest of them would be people who had great experiences or really bad experiences. They won’t be bothered to write a review about a mediocre or average restaurant. It’s not worth their time. You could also mention that. Also, do you think there are fake reviews too? I’d go for siteJabbar. &lt;br /&gt;
&lt;br /&gt;
Becca Lewis: Firstly its interesting how you’re talking about Reddit because I’m talking about Digg. I think new beliefs takes time to be adapted by the masses. Feminism isn’t very old, and its on going. I think it takes time for people to adapt to it, so for the short term I won’t be surprised if the discussion board sees a lot of anti-feminism people. But also do bare in mind that these are “beliefs”, just like “liberalism” (which is quite similar to feminism, fighting for individual rights, etc). Not everyone believes in these values, so some disagreements should be expected. I guess an interesting way could be to examine if people become more offensive when they are shown as anonymous. My thoughts are that it is. You could look at reddit discussions compared with the core values of Wikipedia, and why it worked for Wikipedia, but a little hard for Reddit. &lt;br /&gt;
&lt;br /&gt;
Gary Brown: Are there any data on the selection process, or ventures that were rejected? It’s hard to associate it with discrimination if there is no evidence. Since you can’t prove or disprove this, it means “site controls” cannot be determined. Therefore you need to make a new thesis that really reflects the paper. &lt;br /&gt;
&lt;br /&gt;
Meagan Moana HoChing: DOTA is a fun game. My initial response is that with huge amounts of ego on the line, that’s how bullying start. Haha. From what I read and know, it is the architecture that is dominantly the issue. This structure allows the audience to exploit it. I think you could also investigate is how is “harassment” identified as? Calling someone a “loser”? Do note that a lot of cyber bullying are to kids that people know in real life. So can we causally say trash talking is the same as harassing? When NBA players trash talk one another, I don’t think they considered it as harassing. So I guess this definition needs to be very clear.&lt;br /&gt;
&lt;br /&gt;
Caroline B: Perhaps you could mention NPOV as one of their values they used in order to keep readers like yourself going to the website. &lt;br /&gt;
&lt;br /&gt;
Jan Yburan: Second Reddit I saw today. Haha. I think you need to be weary of the upvote system. More popular and famous people would get a self –fulfilling upvote treatment, where as more niche people or radical ones would get less. This way of identifying success might be a little questionable. &lt;br /&gt;
&lt;br /&gt;
Alex Samaei: I’d be more interested in how kickstarter protects pledgers from potential false projects. This seems like a very good question for privacy and control. &lt;br /&gt;
&lt;br /&gt;
Gia: &lt;br /&gt;
“New scambaiters can request to be assigned a &amp;quot;mentor&amp;quot; to assist them in learning how to bait.”&lt;br /&gt;
&lt;br /&gt;
I think this is really cool. &lt;br /&gt;
&lt;br /&gt;
“. In the past, scammers were tricked into sending money themselves, which was later given to charity.”&lt;br /&gt;
&lt;br /&gt;
That’s crazy. Not sure who the scammer is now. I’d spend more time discussing the aspect about scammers being scammed by scambaiters, and the moral and ethical implications of it. &lt;br /&gt;
&lt;br /&gt;
Mishal R. Kennedy: I think you have a legit question there. Looking at whether deleting an old post or controlling spambots to be more important. You could also consider that perhaps it was the ease of registration that led to the spambots. Deleting the old posts doesn’t actually go to the root of the problem. I guess you could also talk more about the ease of registration. &lt;br /&gt;
&lt;br /&gt;
Richard Markow: I think you should just talk about 1 or 2 points out of the 5. Don’t think you have enough space to write that much. &lt;br /&gt;
&lt;br /&gt;
Alexander H: Do you think you could also go into the ease of account creation? To attain legitimacy, the website would need real personal data to determine that the petition is signed by a real person. If so the privacy concerns would be the biggest. A deeper look at the terms and agreement is a must. &lt;br /&gt;
&lt;br /&gt;
Meredith Blake: That’s an interesting take on Yelp. I do believe that the reviews are either from the ones who enjoyed the restaurant the most, or the ones that hated it. The ones in the middle won’t be bothered to write a review. &lt;br /&gt;
&lt;br /&gt;
Wesley Verge: Personally I think it is an inevitable part of anonymity and high view count. There’s bound to be a few trolls, but that too is what makes youtube entertaining. I think youtube just needs to make a better flagging system. &lt;br /&gt;
&lt;br /&gt;
Kelly Wilson: You could talk about how the internet might influence more people to be whistleblowers, or even anonymous whistleblowers.&lt;br /&gt;
&lt;br /&gt;
Tasha: I think to begin with you need to bare in mind that a lot of fitness people already know the difference between science and bro-science. I further believe that bodybuilding.com would just allow people to say whatever they want knowing full well it is just a forum. As long as they don’t endorse it, they shouldn’t be liable. But as such, you should also talk about the privacy of fitness people on the website. A lot of them post photos up too, and their diet and schedules.&lt;br /&gt;
&lt;br /&gt;
Josefin S: Nice logo. I don’t really like the age range for kidzworld.com. It doesn’t make sense for 9 year olds to interact with 17 year olds. Furthermore, I wouldn’t want my 9 year old kid to socialize with 17 year old kids and being taught 17 year old stuff. So my biggest concern, as you also mentioned, is how do they keep content separate between different ages to prevent the younger kids to learn the wrong stuff? Or do they not do this at all?&lt;br /&gt;
&lt;br /&gt;
Brooke Ashley Tjarks: Yes, I’d agree with you that IMDB is a good balance between the other two websites. I think by becoming a member, the legitimacy of the votes would become higher. There’s bound to be some sort of influence between people regardless of the platform, so I think IMDB is an interesting one to investigate further.&lt;br /&gt;
&lt;br /&gt;
Amchugh: I think you could go into internet being free also has its consequences. Since the internet could edit and post something online in a matter of seconds, it becomes very vulnerable for unintended things to hit the net. The filtering has to either occurred before the posting, or after it has been up. When it’s up already, it’s hard to say whether the rest of them would oblige, or would they prefer to continue the troll game. You could talk about the reasons for why Twitter would take it down (assuming that it does not violate Twitter’s policies). &lt;br /&gt;
&lt;br /&gt;
Note: Good luck everyone!&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 13:43, 6 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Hi Caelum, &lt;br /&gt;
&lt;br /&gt;
Thanks for your comments. There are a  lot of interesting  issues, both legal and ethical  and  the  subject is controversial  for  sure. Good  luck with your project as well!&lt;br /&gt;
&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 20:54, 8 March 2015 (EDT))&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3927</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3927"/>
		<updated>2015-03-05T01:45:21Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Facebook &amp;amp; Big Data vs. Your Privacy&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Prospectus_FB_and_privacy_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:06, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Intentions and Outcomes of Youtube’s Copyright and Coding Regulations&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_prospectus03.03.15.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 15:51, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Comments on Olivia&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Hi Olivia, &lt;br /&gt;
&lt;br /&gt;
Let me start by saying I think that Youtube is a great source for your project.  I’m not saying that just because I am doing my paper on Youtube.  I find the creative ways that people are using it fascinating.  Much more so than some of the other platforms.&lt;br /&gt;
&lt;br /&gt;
If I may summarize, you plan to discuss how legal pressures forced Youtube to introduce technologies that changed the user experiences, like Copyright ID.  You also mentioned some other (possibly voluntary) technologies that are part of the user experience with the intent to discuss how they impact users.  I think they are good ideas and good concepts to write about.  &lt;br /&gt;
&lt;br /&gt;
As you rightly point the Youtube community is one of the largest communities on the Internet.  I wonder if it might not be taking on too much to try to examine Youtube as a whole.  I would suggest selecting a small group that is susceptible to the effects of the technologies you are reviewing.  Describe who the group is and how certain characteristics of their make-up or user experience make them particularly sensitive to the technologies you will focus on.&lt;br /&gt;
&lt;br /&gt;
For example I will be focusing on hobbyist inventors.  Guys that spend their weekends in the garage putting “junk” together and posting videos about their “inventions” on Youtube.  Their content is all original so they are not impacted by Copyright ID.  There is very little thumbs up/down.  They are a much more “expressive” crowd as the comments indicate.&lt;br /&gt;
&lt;br /&gt;
I’m not trying to discourage you.  I think if you pick the right group and tell us why you picked them, it can very interesting.  I hope that is helpful.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 19:47, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
•  Erika L Rich&lt;br /&gt;
&lt;br /&gt;
•  Title: Reputation Management and Ethical Considerations for Members of the Internet Marketing Super Friends (IMSF) Facebook Group&lt;br /&gt;
&lt;br /&gt;
•  Link: [[File:LSTU_E120_Erika_Rich_Assignment_2.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 15:22, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Comments on Gary&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Gary,&lt;br /&gt;
&lt;br /&gt;
Great topic!  I hope to be going out to for crowdfunding by the end of the May.  So I will follow your Wiki with interest.  (In your proposal you link to crowdfunded.  I think you meant community funded. You may want to look at that.) &lt;br /&gt;
&lt;br /&gt;
You mentioned the stated purpose of Communityfunded.  But you did not mention their reason for existing.  In other words, what started crowdfunding and why would individuals seek funds for their projects from the public and not other traditional sources.  Why are people like me willing to go online (to communityfunded) to ask for money, as opposed to going to another site or pitching a Venture Capitalist or a bank?  Why would people fund a project on line versus invest in the stock market or Bank CDs?&lt;br /&gt;
&lt;br /&gt;
I think that the answer to those questions goes to the heart of crowdfunding.  It also is germane to the “troublesome obstacles” you refer to in your prospectus. &lt;br /&gt;
&lt;br /&gt;
When you mention failed projects, I would suggest that not all failures are the same.  I might be willing to invest money in a project I consider socially redeeming even if I thought it had very little chance of success.  Where as, if I were investing in some Harvard wiz-kids that profess to have the next Facebook, I might have very different feelings if they went belly up.  So you may want to include categories of projects, or claims/expectations in your discussions.  As well as any risk factor ratings.&lt;br /&gt;
&lt;br /&gt;
You also mentioned building and keeping trust of supporters.  One of the areas that interests me is the ways that Fundraisers generate funding support.  Do they rely solely on the site?  In other words, is there a pool of would be investors just waiting for the right idea to come around so they can invest.  Or is a fundraiser expected to go outside the community and raise interest and drive that interest back to the site?  How does that impact the “trust” factor?  If I am a one-time fundraiser does it matter all that much what people think about me after I’ve got my money?  &lt;br /&gt;
&lt;br /&gt;
You discuss how you will break down funded projects, etc.  Is there a way to figure out what various fundraiser did to get funded?  Marketing may prove to be more of a factor than the project or its worthiness.  &lt;br /&gt;
&lt;br /&gt;
It would certainly be worthwhile to compare and contrast crowdfunding before and after changes in regs that made it easier for the public to invest.  And how post reg trends may lead to new regs/controls.&lt;br /&gt;
&lt;br /&gt;
I look forward to reading your paper.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 20:45, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:1_Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei (Samaei1)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The Framework of Projects and Backers on Kickstarter&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Samaei1_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 15:37, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Gia&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Chivalry online&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Gia_Assignment2.docx&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 15:46, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Mishal R. Kennedy&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Enforcing Guidelines Without Harming User Contributions&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mishal_R._Kennedy_Assignment2.rtf&lt;br /&gt;
([[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 15:51, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Richard Markow&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The YouTube video-sharing platform &amp;amp; The Community of Alternative Heating Systems and Appliance Inventors&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Rich_Markow_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:03, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name AlexanderH&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Managing the Petitions of Change.org: B Corps, Social Enterprise and Transparency&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2015/File:AlexanderH_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:10, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name: Meredith Blake&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:Identifying Avenues of Recourse for Businesses on Yelp &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Meredith_Blake._Assignment_2.docx&lt;br /&gt;
[[User:Meredithmblake|Meredith]] ([[User talk:Meredithmblake|talk]]) 16:13, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Wesley Verge&lt;br /&gt;
&lt;br /&gt;
Prospectus Title : Scrolling into Darkness -- An investigation into the regulatory forces at work in Youtube&#039;s comment section&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Wesley_Verge_Prospectus.txt&lt;br /&gt;
&lt;br /&gt;
 [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 16:19, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Knocking the Wind out of Whistleblowers: The US&#039; response to the growing threat from WikiLeaks &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly.WilsonAssignment_2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 16:38, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Exploring the Complexity of Rapidly Evolving Information in a Bodybuilding Forum and the Challenges of Quality Assurance&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 17:12, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Josefin Sasse&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinSasse.pdf&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 17:26, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name:   Brooke Tjarks&lt;br /&gt;
&lt;br /&gt;
Prospectus:   Art. Business. Fans. (...) How this collaborative space shapes mass visual media production and worldwide distribution&lt;br /&gt;
&lt;br /&gt;
Link:   http://cyber.law.harvard.edu/is2015/File:Prospectus.Brooke.Tjarks.pdf&lt;br /&gt;
&lt;br /&gt;
--------&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3926</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3926"/>
		<updated>2015-03-05T00:47:54Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Ryan Hurley&lt;br /&gt;
&lt;br /&gt;
Facebook &amp;amp; Big Data vs. Your Privacy&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Prospectus_FB_and_privacy_Assignment_2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 16:06, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Intentions and Outcomes of Youtube’s Copyright and Coding Regulations&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_prospectus03.03.15.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 15:51, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Comments on Olivia&#039;s Prospectus:&lt;br /&gt;
&lt;br /&gt;
Hi Olivia, &lt;br /&gt;
&lt;br /&gt;
Let me start by saying I think that Youtube is a great source for your project.  I’m not saying that just because I am doing my paper on Youtube.  I find the creative ways that people are using it fascinating.  Much more so than some of the other platforms.&lt;br /&gt;
&lt;br /&gt;
If I may summarize, you plan to discuss how legal pressures forced Youtube to introduce technologies that changed the user experiences, like Copyright ID.  You also mentioned some other (possibly voluntary) technologies that are part of the user experience with the intent to discuss how they impact users.  I think they are good ideas and good concepts to write about.  &lt;br /&gt;
&lt;br /&gt;
As you rightly point the Youtube community is one of the largest communities on the Internet.  I wonder if it might not be taking on too much to try to examine Youtube as a whole.  I would suggest selecting a small group that is susceptible to the effects of the technologies you are reviewing.  Describe who the group is and how certain characteristics of their make-up or user experience make them particularly sensitive to the technologies you will focus on.&lt;br /&gt;
&lt;br /&gt;
For example I will be focusing on hobbyist inventors.  Guys that spend their weekends in the garage putting “junk” together and posting videos about their “inventions” on Youtube.  Their content is all original so they are not impacted by Copyright ID.  There is very little thumbs up/down.  They are a much more “expressive” crowd as the comments indicate.&lt;br /&gt;
&lt;br /&gt;
I’m not trying to discourage you.  I think if you pick the right group and tell us why you picked them, it can very interesting.  I hope that is helpful.&lt;br /&gt;
&lt;br /&gt;
Best,&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 19:47, 4 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
•  Erika L Rich&lt;br /&gt;
&lt;br /&gt;
•  Title: Reputation Management and Ethical Considerations for Members of the Internet Marketing Super Friends (IMSF) Facebook Group&lt;br /&gt;
&lt;br /&gt;
•  Link: [[File:LSTU_E120_Erika_Rich_Assignment_2.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 15:22, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:1_Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei (Samaei1)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The Framework of Projects and Backers on Kickstarter&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Samaei1_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 15:37, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Gia&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Chivalry online&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Gia_Assignment2.docx&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 15:46, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Mishal R. Kennedy&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Enforcing Guidelines Without Harming User Contributions&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mishal_R._Kennedy_Assignment2.rtf&lt;br /&gt;
([[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 15:51, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Richard Markow&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The YouTube video-sharing platform &amp;amp; The Community of Alternative Heating Systems and Appliance Inventors&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Rich_Markow_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:03, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name AlexanderH&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Managing the Petitions of Change.org: B Corps, Social Enterprise and Transparency&lt;br /&gt;
&lt;br /&gt;
Link:http://cyber.law.harvard.edu/is2015/File:AlexanderH_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
[[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:10, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Name: Meredith Blake&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:Identifying Avenues of Recourse for Businesses on Yelp &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Meredith_Blake._Assignment_2.docx&lt;br /&gt;
[[User:Meredithmblake|Meredith]] ([[User talk:Meredithmblake|talk]]) 16:13, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Name: Wesley Verge&lt;br /&gt;
&lt;br /&gt;
Prospectus Title : Scrolling into Darkness -- An investigation into the regulatory forces at work in Youtube&#039;s comment section&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Wesley_Verge_Prospectus.txt&lt;br /&gt;
&lt;br /&gt;
 [[User:WesleyVerge|WesleyVerge]] ([[User talk:WesleyVerge|talk]]) 16:19, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Name: Kelly Wilson&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Knocking the Wind out of Whistleblowers: The US&#039; response to the growing threat from WikiLeaks &lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Kelly.WilsonAssignment_2.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[User:Kelly.wilson|Kelly.wilson]] ([[User talk:Kelly.wilson|talk]]) 16:38, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
Name: Tasha&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: Exploring the Complexity of Rapidly Evolving Information in a Bodybuilding Forum and the Challenges of Quality Assurance&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:Tasha_Assignment_2_Prospectus.docx&lt;br /&gt;
&lt;br /&gt;
Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 17:12, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name: Josefin Sasse&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: A case study on the children&#039;s website Kidzworld and how they deal with threats against being a safe environment for children.&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:JosefinSasse.pdf&lt;br /&gt;
[[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 17:26, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
--------&lt;br /&gt;
&lt;br /&gt;
Name:   Brooke Tjarks&lt;br /&gt;
&lt;br /&gt;
Prospectus:   Art. Business. Fans. (...) How this collaborative space shapes mass visual media production and worldwide distribution&lt;br /&gt;
&lt;br /&gt;
Link:   http://cyber.law.harvard.edu/is2015/File:Prospectus.Brooke.Tjarks.pdf&lt;br /&gt;
&lt;br /&gt;
--------&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Group_Project_Page&amp;diff=3921</id>
		<title>Group Project Page</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Group_Project_Page&amp;diff=3921"/>
		<updated>2015-03-04T00:46:31Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: /* Group Project Proposals/Requests */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Students have the option of working in groups for [[Assignments|Assignments 2-4 and the Final Project]].&#039;&#039;&#039; Working in a group can be fun and productive and should enable the participants to take their topic farther than an individual. Students should also consider the time required to coordinate their activities and potential complications of group work. A majority of students in previous classes have had a good experience working in groups.&lt;br /&gt;
&lt;br /&gt;
The maximum group size is three. For those that choose to work in a group, it is essential to come to a clear understanding within the group how the work will be shared. There is an additional class requirement for those that work in a group: each group must submit a statement that describes the contribution of each member of the group.&lt;br /&gt;
&lt;br /&gt;
Looking to form a group or join a group? Need a partner? Submit your information below.&lt;br /&gt;
&lt;br /&gt;
==Group Project Proposals/Requests==&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
I submitted a proposal to write about the issues surrounding content creators on Youtube.  I am focusing on non-professional inventors in part because I invented a product but more to the point of this class I think they pose a unique issue -- product liability for the content of their videos.  If anyone has follow the Mtv show Jackass, you&#039;ll know they got into a lot of hot water for performing stunts that had the potential to be very dangerous.  In the show that acted as it the stunts were spontaneous and without aid of special effects.  Kids started trying them at home and getting seriously injured.  One of the questions I&#039;d like to explore is the liability to Youtube and the channel owner if a video depicts a product as being safe when it is reality very dangerous?&lt;br /&gt;
&lt;br /&gt;
There are other issues related to this class that can also be explored in depth.&lt;br /&gt;
&lt;br /&gt;
If someone is interested in partnering, I am open to having a discussion.&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 19:46, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=User_talk:Samaei1&amp;diff=3906</id>
		<title>User talk:Samaei1</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=User_talk:Samaei1&amp;diff=3906"/>
		<updated>2015-03-03T21:11:35Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: Created page with &amp;quot;Alex,  I like your idea for a project.  I recently patented a product and hope to be presenting at TechCrunch in New York in May.  I am also considering crowd funding.  I will...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Alex,&lt;br /&gt;
&lt;br /&gt;
I like your idea for a project.  I recently patented a product and hope to be presenting at TechCrunch in New York in May.  I am also considering crowd funding.  I will be anxious to see what you come up with.&lt;br /&gt;
&lt;br /&gt;
Rich Markow&lt;br /&gt;
RMarkow&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3899</id>
		<title>Assignment 2 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_2_Submissions&amp;diff=3899"/>
		<updated>2015-03-03T21:03:56Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: /* Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
===Submission Instructions===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please note that we have updated the [[Final_Project#Frequently_Asked_Questions|final project page&#039;s FAQ section]] based on some student questions that have come to us over the past week.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This assignment is due on March 3rd.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).&lt;br /&gt;
&lt;br /&gt;
Please name your file &amp;quot;wikiusername_Assignment2,&amp;quot; where &amp;quot;wikiusername&amp;quot; is replaced with your username, to avoid overwriting someone else&#039;s assignment or causing errors in the Wiki by including forbidden characters.&#039;&#039; So if your username is &amp;quot;jdoe&amp;quot; and your file is a Word document your file should be named &amp;quot;jdoe_Assignment2.doc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Upload your rough draft here: [[Special:Upload|Upload file]]. If you have trouble finding the file you uploaded, check the [[Special:ImageList|list of uploaded files]].&lt;br /&gt;
&lt;br /&gt;
In the submissions section below please post the following information:&lt;br /&gt;
&lt;br /&gt;
*Name or pseudonym: &lt;br /&gt;
*Prospectus title: &lt;br /&gt;
*Link to prospectus: (add your link here)&lt;br /&gt;
&lt;br /&gt;
==Comments==&lt;br /&gt;
&lt;br /&gt;
Everyone will receive an additional participation grade for this assignment. You should read through everyone&#039;s proposals after they are uploaded and add constructive comments below the proposal on which you&#039;re commenting. Comments should be submitted by March 10th so you have time to incorporate them, if applicable, into your project outline. &#039;&#039;&#039;Please remember to sign your comments by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post.&#039;&#039;&#039; If we don&#039;t know who you are we can&#039;t give you credit for finishing this assignment!&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Intentions and Outcomes of Youtube’s Copyright and Coding Regulations&lt;br /&gt;
&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_prospectus03.03.15.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 15:51, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•  Erika L Rich&lt;br /&gt;
&lt;br /&gt;
•  Title: Reputation Management and Ethical Considerations for Members of the Internet Marketing Super Friends (IMSF) Facebook Group&lt;br /&gt;
&lt;br /&gt;
•  Link: [[File:LSTU_E120_Erika_Rich_Assignment_2.docx]]&lt;br /&gt;
&lt;br /&gt;
[[User:ErikaLRich|ErikaLRich]] ([[User talk:ErikaLRich|talk]]) 15:22, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre (EmiMac)&lt;br /&gt;
&lt;br /&gt;
•	Prospectus title:  A Case Study on the Unintended Legal Consequences and Chilling Effects of YouTube’s Content ID Sweep on its Video Game Commentator Community&lt;br /&gt;
&lt;br /&gt;
•	Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Emily_MacIntyre_Assignment_2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 09:41, 2 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
•	MattK&lt;br /&gt;
&lt;br /&gt;
•	Home of the Mallet of Loving Correction: John Scalzi&#039;s Blog, &amp;quot;Whatever&amp;quot;&lt;br /&gt;
&lt;br /&gt;
•	http://cyber.law.harvard.edu/is2015/File:MattK_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:MattK|MattK]] ([[User talk:MattK|talk]]) 22:01, 2 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Edwin Duque (Edwinduque)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title:The copyright, privacy and organization challenges that online communities such as Facebook and The Jury Deliberation in the cyber space are faced with &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Edwinduque_Assignment_2.doc&lt;br /&gt;
&lt;br /&gt;
([[User:Edwinduque|Edwinduque]] ([[User talk:Edwinduque|talk]]) 22:10, 2 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Balancing privacy for victims of sexual crimes with &lt;br /&gt;
opportunity for support in online forum  AfterSilence.org&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment2.pdf &lt;br /&gt;
&lt;br /&gt;
[[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 07:54, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Chanel Rion (ChanelRion)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;&#039;&#039;We the Judges: &amp;quot;Sitejabber&amp;quot;, &amp;quot;Yelp&amp;quot;, and Communities of User-Generated Business Reviews.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Assignment2_Prospectus_Rion.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 11:21, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Becca Lewis (beccalew)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: &#039;&#039;&#039;/r/TwoXChromosomes and /r/feminism: The challenges of promoting feminism on Reddit while upholding the values of privacy and free speech&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Final_Project_Prospectus_Becca_Lewis.docx &lt;br /&gt;
&lt;br /&gt;
[[User:Beccalew|Beccalew]] ([[User talk:Beccalew|talk]]) 13:15, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Gary Brown (Gary Brown)&lt;br /&gt;
&lt;br /&gt;
Prospectus Title: The Effects of Site Controls on Community Objectives: communityfunded.com&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 13:18, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Meagan HoChing (mhoching) &lt;br /&gt;
&lt;br /&gt;
Title: Online Gaming Harassment: All fun and games? &lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mhoching_Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 13:50, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Caroline B&lt;br /&gt;
&lt;br /&gt;
Title: The Study of Privacy, Accuracy &amp;amp; Order on InsideNova Website and Moving ‘Little Sites’ Up&lt;br /&gt;
&lt;br /&gt;
Link: http://cyber.law.harvard.edu/is2015/File:1_Caroline_B.docx&lt;br /&gt;
&lt;br /&gt;
[[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 14:45, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Reddit.com/r/IAmA its Controls on Privacy and Content&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Jan.Yburan.Assignment2.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Eric Yuk Lun Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The vulnerable voting structure of Digg.com and the gradual&lt;br /&gt;
collapse of its popularity and voting legitimacy&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Caelum_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Caelum|Caelum]] ([[User talk:Caelum|talk]]) 15:11, 3 March 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Name: Alex Samaei (Samaei1)&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The Framework of Projects and Backers on Kickstarter&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Samaei1_Assignment2.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:Samaei1|Samaei1]] ([[User talk:Samaei1|talk]]) 15:37, 3 March 2015 (EST)&lt;br /&gt;
----&lt;br /&gt;
Name: Gia&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Chivalry online&lt;br /&gt;
&lt;br /&gt;
Link to prospectus: http://cyber.law.harvard.edu/is2015/File:Gia_Assignment2.docx&lt;br /&gt;
([[User:Gia|Gia]] ([[User talk:Gia|talk]]) 15:46, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
Name: Mishal R. Kennedy&lt;br /&gt;
&lt;br /&gt;
Prospectus title: Enforcing Guidelines Without Harming User Contributions&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Mishal_R._Kennedy_Assignment2.rtf&lt;br /&gt;
([[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 15:51, 3 March 2015 (EST))&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Name: Richard Markow&lt;br /&gt;
&lt;br /&gt;
Prospectus title: The YouTube video-sharing platform &amp;amp; The Community of Alternative Heating Systems and Appliance Inventors&lt;br /&gt;
&lt;br /&gt;
Link to Prospectus: http://cyber.law.harvard.edu/is2015/File:Rich_Markow_Assignment_2_Prospectus.pdf&lt;br /&gt;
&lt;br /&gt;
[[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 16:03, 3 March 2015 (EST)&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Rich_Markow_Assignment_2_Prospectus.pdf&amp;diff=3898</id>
		<title>File:Rich Markow Assignment 2 Prospectus.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Rich_Markow_Assignment_2_Prospectus.pdf&amp;diff=3898"/>
		<updated>2015-03-03T20:59:23Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: The YouTube video-sharing platform &amp;amp;The Community of Alternative Heating Systems and Appliance Inventors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The YouTube video-sharing platform &amp;amp;The Community of Alternative Heating Systems and Appliance Inventors&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Assignment_1_Submissions&amp;diff=3716</id>
		<title>Assignment 1 Submissions</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Assignment_1_Submissions&amp;diff=3716"/>
		<updated>2015-02-17T20:58:30Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: /* Submissions */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{AssignmentCal}}&lt;br /&gt;
&lt;br /&gt;
=Submission Instructions=&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This section of the website is crawled by search engines. If you do not want your name to appear in a search connected with your writing, use your class wiki username as a pseudonym.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Please make sure the name of your file includes your name or pseudonym (example: Name_Assignment1.doc) to avoid overwriting someone else&#039;s assignment.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (final deadline: Tuesday, February 10, 5:30pm ET).&lt;br /&gt;
&lt;br /&gt;
Upload your file here: [http://cyber.law.harvard.edu/is2015/Special:Upload Upload file]. After you upload your file, please post a link to it in the &amp;quot;Submissions&amp;quot; section below in the following format:&lt;br /&gt;
&lt;br /&gt;
* Your Name or Chosen Pseudonym:&lt;br /&gt;
* Link to rule: (URL of the Wikipedia editing policy you chose)&lt;br /&gt;
* Link to article: (URL of the Wikipedia article you edited)&lt;br /&gt;
* Link to report: (URL of the file you uploaded)&lt;br /&gt;
&lt;br /&gt;
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2015/Special:ImageList list of uploaded files].&lt;br /&gt;
&lt;br /&gt;
Need help editing?  [http://en.wikipedia.org/wiki/Wikipedia:How_to_edit_a_page Check out this guide]&lt;br /&gt;
&lt;br /&gt;
=Submissions=&lt;br /&gt;
Please post your link to your report below:&lt;br /&gt;
&lt;br /&gt;
Olivia Brinich&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Swing_(dance)&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Oliviabrinich_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Rida Qazi &lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Lahore&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Rida_Qazi_Assignment_1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Andrew C. (Andrew Costanzo)&lt;br /&gt;
 &lt;br /&gt;
Wiki pseudonym:  Chase120&lt;br /&gt;
&lt;br /&gt;
Rule:  https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article:  https://en.wikipedia.org/wiki/Iraq_War_troop_surge_of_2007&lt;br /&gt;
&lt;br /&gt;
Report:  http://cyber.law.harvard.edu/is2015/File:Chase120_Assingment_1.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
Beccalew (Becca Lewis)&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Crimson_Hexagon&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Becca_Lewis_Assignment_1.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Rhurls (Ryan H.)&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability#Self-published_sources&lt;br /&gt;
&lt;br /&gt;
Article:https://en.wikipedia.org/wiki/Sports_law#Academic_Aspects_of_Sports_Law&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1_internet_law.docx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------&lt;br /&gt;
ErikaLRich&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Blairsville,_Georgia&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/LSTU_E120_Erika_Rich_Assignment_1.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
JosefinS&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Century_High_School_(Hillsboro,_Oregon)&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:JosefinS_Assignment1.pdf&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
ChanelRion&lt;br /&gt;
&lt;br /&gt;
Rule:&lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Verifiability#Notability&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Edward_Stratemeyer#Death&lt;br /&gt;
&lt;br /&gt;
Rion Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:WikipediaReport_Assignment_1_RION.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Eric Kwong (Caelum)&lt;br /&gt;
&lt;br /&gt;
Rule: &lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view#Common_objections_and_clarifications&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Joshua_Wong_(activist)&lt;br /&gt;
&lt;br /&gt;
Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:LSTUE120_ekwong_Assignment1.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Caroline Borek&lt;br /&gt;
&lt;br /&gt;
Rule:&lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:No_original_research&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Intellectual_property&lt;br /&gt;
&lt;br /&gt;
Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Assignment_1_Borek.docx&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
Edwin Duque Edwinduque Elduquews&lt;br /&gt;
&lt;br /&gt;
Rule:&lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article:&lt;br /&gt;
https://en.wikipedia.org/wiki/Health_law&lt;br /&gt;
&lt;br /&gt;
Report:&lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Assignment_1.doc&lt;br /&gt;
&lt;br /&gt;
---------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
•	Emily MacIntyre&lt;br /&gt;
&lt;br /&gt;
•	Link to rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
•	Link to article: https://en.wikipedia.org/wiki/Meetinghouse_Common_District&lt;br /&gt;
&lt;br /&gt;
•	Link to report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/MacIntyre_Emily_Assignment_1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
Samaei1&lt;br /&gt;
&lt;br /&gt;
Rule: &lt;br /&gt;
https://en.wikipedia.org/wiki/Wikipedia:Verifiability#What_counts_as_a_reliable_source&lt;br /&gt;
&lt;br /&gt;
Article: &lt;br /&gt;
https://en.wikipedia.org/wiki/Young_Justice#In_other_media&lt;br /&gt;
&lt;br /&gt;
Report: &lt;br /&gt;
http://cyber.law.harvard.edu/is2015/File:Assignment_1_Samaei1.pdf&lt;br /&gt;
&lt;br /&gt;
-----&lt;br /&gt;
Mhoching&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Mt._Baker_Sesh_Up&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1.docx&lt;br /&gt;
-----&lt;br /&gt;
MeredithB&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Alliance_for_an_Open_Europe&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Meredith_Blake._Assignment_1.rtf&lt;br /&gt;
-----&lt;br /&gt;
Mishal R. Kennedy:&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/M15/42_tank&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Essay_(Internet_and_Politics,_Assignment_1)_Mishal_Kennedy.rtf&lt;br /&gt;
-----&lt;br /&gt;
&lt;br /&gt;
Jan.Yburan&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Swimming_(sport)#Collegiate_Swimming&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Jan_Yburan.Assingment1.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Gia&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Anonymity&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Wikipedia_Assignment_1.docx&lt;br /&gt;
----&lt;br /&gt;
Gary Brown (Intor1 on Wikipedia)&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Legal_aspects_of_computing#Internet_Law&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Gary_Brown_Assignment1.docx&lt;br /&gt;
----&lt;br /&gt;
Michelle Byrne (Chelly.Byrne)&lt;br /&gt;
&lt;br /&gt;
Rule:  https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article:  https://en.wikipedia.org/wiki/Bim_Skala_Bim&lt;br /&gt;
&lt;br /&gt;
Report:  http://cyber.law.harvard.edu/is2015/File:ChellyByrne_Assignment1.pdf&lt;br /&gt;
----&lt;br /&gt;
MattK&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Articles: https://en.wikipedia.org/wiki/Psychological_resilience&lt;br /&gt;
http://en.wikipedia.org/wiki/Color_blindness_%28race%29_in_the_United_States&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:MattK_WikiEdits_LSTU120.docx&lt;br /&gt;
----&lt;br /&gt;
Tasha&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Tinder_(application)&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1_NPOV_Tasha.docx&lt;br /&gt;
-----&lt;br /&gt;
Kelly.Wilson&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Neutral_point_of_view&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Digital_divide#Infrastructure&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/KellyWilsonAssignment1.txt&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Njalbut&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Governance,_risk_management,_and_compliance &lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Harvard_Extension_School_-_Assignment_One_-_Report_-_Wikipedia_-_Njalbut.docx#file&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
AlexanderH&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/French_campaign_in_Egypt_and_Syria&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:AlexanaderH_Assignment_1.odt&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Wesley Verge&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Student_syndrome&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Assignment_1.pdf#filelinks&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Brooke Tjarks&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Assistant_director&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/File:Batjarks.Assignment1.txt&lt;br /&gt;
----&lt;br /&gt;
Phoenix Vaughn&lt;br /&gt;
&lt;br /&gt;
Psuedonym: Mmcasse&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Court&lt;br /&gt;
&lt;br /&gt;
Report:http://cyber.law.harvard.edu/is2015/File:Mmcasseakaphoenixvughn.docx&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Psuedonym: Ayy5978&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Digital_identity#Policy_aspects_of_digital_identity&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Ayy5978_Assignment_1.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
RMarkow (Richard Markow)&lt;br /&gt;
&lt;br /&gt;
Wiki Pseudonym: RCM578&lt;br /&gt;
&lt;br /&gt;
Rule: https://en.wikipedia.org/wiki/Wikipedia:Verifiability&lt;br /&gt;
&lt;br /&gt;
Article: https://en.wikipedia.org/wiki/Pellet_fuel&lt;br /&gt;
&lt;br /&gt;
Report: http://cyber.law.harvard.edu/is2015/sites/is2015/images/Richard_Markow_Assignment_1.pdf&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=File:Richard_Markow_Assignment_1.pdf&amp;diff=3715</id>
		<title>File:Richard Markow Assignment 1.pdf</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=File:Richard_Markow_Assignment_1.pdf&amp;diff=3715"/>
		<updated>2015-02-17T20:51:37Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: LSTO E-120 Spring Semester Assignment 1  Report of choice of rules - Verifiability&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;LSTO E-120 Spring Semester Assignment 1  Report of choice of rules - Verifiability&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
	<entry>
		<id>https://cyber.harvard.edu/is2015/?title=Privacy_Part_1:_Corporate_Data_Gathering_and_Intrusions_by_the_Public&amp;diff=3683</id>
		<title>Privacy Part 1: Corporate Data Gathering and Intrusions by the Public</title>
		<link rel="alternate" type="text/html" href="https://cyber.harvard.edu/is2015/?title=Privacy_Part_1:_Corporate_Data_Gathering_and_Intrusions_by_the_Public&amp;diff=3683"/>
		<updated>2015-02-13T22:21:49Z</updated>

		<summary type="html">&lt;p&gt;RMarkow: /* Class Discussion */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ClassCalendar}}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;February 10&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&#039;&#039;Note: Harvard Extension has cancelled classes on February 10th due to snow. A makeup is now scheduled for February 13th, same time, same place.&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
A persistent fear throughout all of the Internet’s operation is the Internet’s treatment of a person’s privacy. We have a hard time defining the term, much less determining what role it should play in deciding the whos, whats, and hows of Internet control. Nevertheless, the Internet’s present evolution indicates that unless we spend time contemplating the reinforcing privacy online, our interests may fall to the interests of profitability, online behavior regulation, and cybersecurity. Over the next few weeks we&#039;ll look at privacy, beginning with general concepts of privacy, how data is measured and gathered on the web, and some specific legal responses to privacy concerns raised by corporations gathering data on people online and what happens when highly private information about a person finds its way online.&lt;br /&gt;
&lt;br /&gt;
Our own [http://cyber.law.harvard.edu/people/dobrien David O&#039;Brien] will be leading the class discussion this week.&lt;br /&gt;
&lt;br /&gt;
==Readings==&lt;br /&gt;
&lt;br /&gt;
; Conceptualizing privacy&lt;br /&gt;
&lt;br /&gt;
* [https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127888 Daniel Solove, &#039;&#039;Understanding Privacy&#039;&#039; (Chapter 1)] (skim)&lt;br /&gt;
&lt;br /&gt;
; Privacy and data&lt;br /&gt;
&lt;br /&gt;
* [https://medium.com/internet-monitor-2014-data-and-privacy/data-and-privacy-f7bfa24bbddc Robert Faris and David O&#039;Brien, &#039;&#039;Data and Privacy&#039;&#039;] (from [https://thenetmonitor.org/research/2014/ &#039;&#039;Internet Monitor 2014: Reflections on the Digital World&#039;&#039;])&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/science/discoveries/magazine/16-07/pb_theory Chris Anderson, The End of Theory]&lt;br /&gt;
&lt;br /&gt;
* [http://www.foreignaffairs.com/articles/139104/kenneth-neil-cukier-and-viktor-mayer-schoenberger/the-rise-of-big-data Viktor Mayer-Shoenberger, The Rise of Big Data]&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/politics/security/commentary/securitymatters/2007/12/securitymatters_1213 Bruce Schneier, Why Anonymous Data Sometimes Isn&#039;t]&lt;br /&gt;
&lt;br /&gt;
* Play around with some of the websites by [http://latanyasweeney.org/ Latanya Sweeney]&lt;br /&gt;
&lt;br /&gt;
:* [http://thedatamap.org/ The Data Map]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyride.org/more.html About My Ride]&lt;br /&gt;
&lt;br /&gt;
:* [http://aboutmyinfo.org/ About My Info]&lt;br /&gt;
&lt;br /&gt;
; Corporate data practices&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.wsj.com/digits/2012/12/07/how-dataium-watches-you/ Jeremy Singer-Vine, How Dataium Watches You] &lt;br /&gt;
&lt;br /&gt;
* [http://www.interactually.com/linkedin-creepiest-social-network/ David Veldt, LinkedIn: The Creepiest Social Network]&lt;br /&gt;
&lt;br /&gt;
* [http://blogs.wsj.com/wtk/ play around with the WSJ&#039;s interactive graphics])&lt;br /&gt;
&lt;br /&gt;
==Optional Readings==&lt;br /&gt;
&lt;br /&gt;
* [http://yupnet.org/zittrain/archives/20 Jonathan Zittrain, &#039;&#039;The Future of the Internet and How to Stop It&#039;&#039; (Chapter 9)]&lt;br /&gt;
&lt;br /&gt;
* [http://www.bitsbook.com/wp-content/uploads/2008/12/chapter2.pdf Hal Abelson, Ken Ledeen, and Harry Lewis, &#039;&#039;Blown to Bits&#039;&#039; (Chapter 2)] (pages 36-42)&lt;br /&gt;
&lt;br /&gt;
* [https://www.socialtext.net/codev2/privacy Lawrence Lessig, &#039;&#039;Code 2.0&#039;&#039; (Chapter 7)] (focus on &amp;quot;Privacy in Public: Data&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
* [http://www.zephoria.org/thoughts/archives/2011/11/01/parents-survey-coppa.html danah boyd, Why Parents Help Children Violate Facebook’s 13+ Rule]&lt;br /&gt;
&lt;br /&gt;
* [https://en.wikipedia.org/wiki/Privacy_laws_of_the_United_States Wikipedia, Privacy Laws of the United States]&lt;br /&gt;
&lt;br /&gt;
* [http://www.cato.org/pubs/pas/pa-295.html Solveig Singleton, Privacy as Censorship]&lt;br /&gt;
&lt;br /&gt;
* [https://www.nytimes.com/2011/03/26/business/media/26privacy.html?_r=0 Noam Cohen, It’s Tracking Your Every Move and You May Not Even Know It (&#039;&#039;New York Times&#039;&#039;)]&lt;br /&gt;
&lt;br /&gt;
== Assignment 1 ==&lt;br /&gt;
&lt;br /&gt;
[[Assignment 1 Details and Reporting|Assignment 1]] is due &#039;&#039;before class&#039;&#039; today (i.e., February 10th before 5:30pm ET). You can submit the assignment [[Assignment 1 Submissions|here]].&lt;br /&gt;
&lt;br /&gt;
==Class Discussion==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;background-color:#CCCCCC;&amp;quot;&amp;gt;Please remember to sign your postings by adding four tildes (&amp;lt;nowiki&amp;gt;~~~~&amp;lt;/nowiki&amp;gt;) to the end of your contribution.  This will automatically add your username and the date/time of your post, like so: [[User:Andy|Andy]] 15:12, 7 November 2013 (EST)&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hello All!&lt;br /&gt;
&lt;br /&gt;
Delving into this week’s readings has definitely opened my eyes to the seemingly limitless complexities of defining privacy boundaries in an effort to create adequate laws and policy to address privacy issues in what Chris Anderson calls the “Petabyte Age”. &lt;br /&gt;
&lt;br /&gt;
In our first reading from &#039;&#039;Understanding Privacy,&#039;&#039; Daniel Solove illustrates how difficult it has become for every tier of society “to adequately conceptualize the problems that privacy law is asked to redress” (2). In an effort to offer a solution to this dilemma, Solove proposes a new theory of privacy as a means to “aid the creation of law and policy to address privacy issues” (11). By conceptualizing privacy as pluralistic and contextual Solove creates a “taxonomy of privacy,” which focuses on “the specific activities that pose privacy problems” that bombard us with ever increasing frequency including: information collection, information processing, information dissemination and invasion (10-11).  &lt;br /&gt;
&lt;br /&gt;
The ease at which this data can be invasively collected and disseminated was clearly illustrated to me when I plugged my birthdate and zipcode into Latanya Sweeny’s &#039;&#039;Data Privacy Lab&#039;&#039; search tool. With two simple key strokes I was shown that I am uniquely identifiable. Add this to the “Click-tracking” and “CSS history sniffing” used by companies such as Dataium LLC as discussed in Jeremy Singer-Vine’s article on “How Dataium Watches You,” it is easy to become paranoid. Nonetheless, I am trying to remain as optimistic as possible. In some ways I like it when ads are generated on the internet, geared towards my personal interests. Still I think it should be feasible for consumers to have a choice as to what data is being collected on their habits and how it is being shared. Perhaps there should be an app for that. If there already is one, please let me know where I can get it.&lt;br /&gt;
&lt;br /&gt;
Thanks,&lt;br /&gt;
Emily M.&lt;br /&gt;
&lt;br /&gt;
Works Cited&lt;br /&gt;
&lt;br /&gt;
Anderson, Chris. “The End of Theory: The Data Deluge Makes the Scientific Method Obsolete.” &#039;&#039;Wired Magazine.&#039;&#039; 23 June 2008.&lt;br /&gt;
&lt;br /&gt;
Singer-Vine, Jeremy. “How Dataium Watches You” &#039;&#039;Wall Street Journal.com&#039;&#039; 12 Dec. 2012. &lt;br /&gt;
&lt;br /&gt;
Solove, Daniel. &#039;&#039;Understanding Privacy.&#039;&#039; Cambridge: Harvard University Press. 2008.&lt;br /&gt;
 &lt;br /&gt;
Sweeney, Latanya. “How Unique are You?.” &#039;&#039;Data Privacy Lab.&#039;&#039; Harvard University: Institute for Quantitative Social Science. 2013.&lt;br /&gt;
&lt;br /&gt;
[[User:EmiMac|EmiMac]] ([[User talk:EmiMac|talk]]) 12:22, 6 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The assignment to update a wikipedia page has been challenging!  It took me a few days to come across a page that needed updating and one which I could make a contribution.  I have spent all day verifying sources and editing the page, and I feel like I haven&#039;t made much headway!  I&#039;ll keep at this tonight and all day tomorrow.  How is everyone else doing?   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 17:45, 7 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Hello, Chelly! I had the same feelings in regards to the assignment. I recommend that you find an article that goes over a topic that you know a lot about (in my case, it was military history in regards to armored fighting vehicles.) If you have books on the topic, they will definitely prove helpful! I had plenty of books that went over the rifles used by Finnish troops during the Winter War! (NOTE: Will be creating a second post that goes over the lesson material!) [[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 1:35PM, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Thank you Mishal!   It sounds like you found a really good page to update for yourself!   I came across a “stub” page for a music band started by one of my school mates, so I researched more about their discography and band members.  He was delighted that I was helping with their Wikipedia page.   I will complete the assignment and then do more research in the future to help him out some more!    Good luck on the rest of the work.   I have finished most of this week’s readings and will also post additionally.   [[User:Chelly.byrne|chelly byrne]] ([[User talk:Chelly.byrne|talk]]) 16:28, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Fantastic work, Chelly! I&#039;ve almost gotten done with my page, but have yet to read the lesson material (have a class on Monday, and have to stay up until 2:30 in the morning to attend this, and my class on expository writing [mandatory!]) Good luck on your assignment, and I can&#039;t wait to see you in the classroom! (If you attend the lectures online!) [[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 1:35PM, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi everyone!&lt;br /&gt;
First I want to say that it was nice seeing you guys in class last tuesday. I participated asynchronously but I am hoping to be able to participate online synchronously next time :)&lt;br /&gt;
&lt;br /&gt;
I have always been one of those who really aren´t participating in or are interested in the debate about privacy on the internet. Mostly because I know so little about it, but also because I haven´t considered it being something particularly serious. Or perhaps it´s because it is an issue too wide and complex to dig in to, it is almost like thinking about the universe. Whatever the reason for my previous lack of interest is, this week´s literature made me more curious about the subject. &lt;br /&gt;
&lt;br /&gt;
Privacy on the Internet has been very discussed in society, but my own experience tell me that it isn´t as much anymore. As I’ve mentioned I live in Europe, and during the campaigns for the elections to the European Parliament in 2009, this was an issue several parties focused on throughout the debate. For example, there was one party (Piratpartiet) from my country that had Internet privacy as their only political issue. Pretty much their entire political program was about privacy on the Internet and they ended up getting two seats in the parliament in Brussels. Last year, there was a new election to the European Parliament. This time, Internet privacy was not as discussed in the media nor in society as in 2009, and the party I mentioned above lost both of their seats. &lt;br /&gt;
&lt;br /&gt;
Faris and O´Brien write in ”Data and privacy” that ”…our actions contradict our stated preferences on privacy; when asked in surveys, Internet users express growing concerns over online privacy, yet they continue to share a stunning amount of sensitive information online.”. This is a statement that correspond with my picture of how most people think about privacy on the Internet. Our will to reach access to certain websites is stronger than our fear of an intruded privacy and we are  therefore willing to submit private information to those websites we want to access. &lt;br /&gt;
&lt;br /&gt;
The discussion about what privacy actually is was also interesting. We talk and discuss about something that we can´t even define properly. It is also important to discuss when privacy is good and when it is bad. I take a class at another university and we read classics right now. I read Walter Lippman´s ”Public Opinion” and he says ”Privacy is insisted upon at all kinds of places in the area of what is called public affairs.”. That is something that I would say still is up-to-date, but we can today also say the opposite, that parts of what used to be private now is public. [[User:JosefinS|JosefinS]] ([[User talk:JosefinS|talk]]) 08:21, 10 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;The Self is an Illusion: Chariots of the Internet Gods&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The question of privacy raised in this week’s readings, to me, raised some active discourse regarding what exactly is the Self.  Privacy implies that something is guarded. Before we even understand what the act of privacy even looks like, we must first visualize what it is this guard is protecting. &lt;br /&gt;
&lt;br /&gt;
There is a marvelous parable told in Buddhism about how the self exists and yet it doesn’t… It is a paradox in and of itself and to think otherwise is to blind oneself to the Self. To truly understand something so un-understandable, one must look at all the elements in a very certain way. &lt;br /&gt;
&lt;br /&gt;
Solove’s (and history’s) understandable fumbling with the term, the word, the meaning of “Privacy” was, to me, a revelatory mirror to the parable of the Chariot. &lt;br /&gt;
&lt;br /&gt;
In thinking about this parable in conjunction with some of our readings on what Privacy is, I can but clumsily conclude that one reason privacy is so difficult to define is because it is a shield, a forcefield, a protector of something even more undefineable – or at least debatable and that is, the self. For something so metamorphic, so subjective to each individual it is understandable, if not expected that “privacy” will always be a term never quite captured. We will forever hunt it. It will change with the ebb and flow of the zeitgeist, of the individual, and now, of the technology. &lt;br /&gt;
&lt;br /&gt;
Solove condenses this feeling so well:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Other commentators have lamented that privacy is “protean” and suffers from “an embarrassment of meanings. “Perhaps the most striking thing about the right to privacy,” philosopher Judith Jarvis Thomson has observed, “is that nobody seems to have any clear idea what it is.” (7)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The following dialogue between King Milinda and the Buddhist sage Nagasena examines this concept of the indescribable describable in a way that was revealing to me in conceptualizing “Privacy” and how we might universalize its meaning for more than just one individual in today’s world:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;KING MILINDA AND THE CHARIOT&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
King Milinda asks the sage how he might address him by name, how he is “to be known.“&lt;br /&gt;
&lt;br /&gt;
The sage replies:&lt;br /&gt;
&lt;br /&gt;
&amp;quot;As Nagasena I am known, O Great King, and as Nagasena do my fellow religious habitually address me. But although parents give names such as Nagasena, or Surasena, or Virasena, or Sihasena, nevertheless, this word ‘Nagasena’ is just a denomination, a designation, a conceptual term, a current appellation, a mere name. For no real person can here be apprehended.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
The King scoffs the sage, asking how he can possibly agree that Nagasena is not actually a person. Nagasena responds by asking if the King has a chariot and the King responds that he has. &lt;br /&gt;
&lt;br /&gt;
“What is the chariot?” asks Nagasena. Was it the wheels? The King responds “No.” Was the chariot the spokes, the axle, the seat, the frame, the yoke, the wood? To all of these, the King answers “No” because none of these could be singled out and called a “chariot” individually.&lt;br /&gt;
&lt;br /&gt;
Then is it the collection of these elements? The answer again, is “no” because if they were simply put together in large pile, a chariot the pile does not make. So the chariot cannot be found within this collection of elements – so too, it cannot be found outside this collection of elements. So where and what is the chariot?&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Nagasena:&#039;&#039;&#039; “Then, ask as I may, I can discover no chariot at all.  Just a mere sound is this ‘chariot’. But what is the real chariot? Your Majesty has told a lie, has spoken a falsehood!  There really is no chariot…”&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Milinda:&#039;&#039;&#039;  “I have not, Nagasena, spoken a falsehood.  For it is in dependence on the pole, the axle, the wheels, the framework, the flag-staff, etc., that there takes place this denomination ‘chariot,’ this designation, this conceptual term, a current appellation, and a mere name.”&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Nagasena:&#039;&#039;&#039;  “Your Majesty has spoken well about the chariot.  It is just so with me.  In dependence on the thirty-two parts of the body and the five Skandhas there takes place this denomination ‘Nagasena,’ this designation, this conceptual term, a current appellation, and a mere name.  In ultimate reality, however, this person cannot be apprehended.”&lt;br /&gt;
&lt;br /&gt;
- - - - - - - -&lt;br /&gt;
&lt;br /&gt;
For it is in dependence on all the other elements that constitute Privacy that we are to even begin to conceptualize it. Privacy as the shield of the self – and the self is constantly changing, it is never a constant idea and so, in turn, privacy is constantly changing, our ideas about it, as Solove seems to suggest through history, will never unite to mean any one thing. &lt;br /&gt;
&lt;br /&gt;
[[User:Chanel Rion|Chanel Rion]] ([[User talk:Chanel Rion|talk]]) 12:19, 10 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I personally think that the three most interesting articles in today&#039;s course readings were the articles by David Veldt, by Jeremy Singer (author of the article titled: How Dataium Watches You) and by Robert Faris and David R. O&#039;Brien. Special software programs, like Dataium, track even the smallest little things that we click on. Online social media services, like Facebook and LinkedIn, can make extremely intrusive (and shockingly accurate, as Mr. Veldt found out...) guesses about who we know, and who we are connected with. &lt;br /&gt;
&lt;br /&gt;
I believe that now is the time to act if we as individuals want to live in a world where our right to privacy is honored. If we do not act, it is believe that it is very likely that our children will unfortunately inherit a world where privacy was a luxury from the past.&lt;br /&gt;
&lt;br /&gt;
[[User:Mishal R. Kennedy|Mishal R. Kennedy]] ([[User talk:Mishal R. Kennedy|talk]]) 1:35PM, 8 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As consumers share more and more information through online purchasing, social media and email, companies are collecting information without any explanation on what will be done with it. What Scheiner and Sweeney reiterate is that with certain datasets it is very simple to de-anonymize users. It is very apparent that consumers are becoming very weary of the intrusion of data monitoring and fear has been elevated by numerous data breaches, including Target, Sony Playstation, Chick-Fla and Turbo Tax to name a few. As a consumer that just purchased a Samsung SMART TV, it was very disturbing to find out that third parties have the ability to screen and send conversations through the voice activated TV controls, which was disclosed in their privacy agreement. Samsung responded by stating, consumers’ conversations are only screenable while the control is activated and Wi-Fi is connected. It is fair to say that Samsung’s minimal disclosure of personal data usage creates a level of distrust among consumers.  Veldt’s research into LinkedIn’s practices and data generation peaked my interest, as I too wondered how I received requests and recommendations from individuals without any obvious professional nor personal connections. After reading his article, the privacy settings of my account were promptly adjusted. The constant ‘Big Brother’ consumer monitoring has caused me to become very weary. Tasha[[User:Tasha|Tasha]] ([[User talk:Tasha|talk]]) 18:05, 10 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This weeks reading has been very interesting, defining data, privacy, and their interrelation with one another. The past, present and future have been compared with respect to this topic, to give an idea of the involution of privacy and how it is very ambiguous the way how it is dealt now at days.&lt;br /&gt;
The fourth amendment, first amendment, and fourteenth amendment deal with privacy to the extend of the physical world in which names, property, and activities have privacy rules that protect them and cannot allow to disclose them, search them or act unreasonably invading or breaking these laws.&lt;br /&gt;
&lt;br /&gt;
However the question presented in our time is whether the law of the fourth amendment, first amendment, and fourteenth amendment, or our current laws are equipped enough to deal with our current problems involving privacy, particularly speaking of the cyber world? This question is difficult to answer because of two reasons, first privacy in the cyber world, the world of the internet is an ambiguous concept, it is is difficult to be defined. The second reason is Data, the way how data is handled makes a difficult to enforce and protect privacy issues.&lt;br /&gt;
&lt;br /&gt;
The rule in this case comes from the understanding, that data and privacy work by first data is presented in the internet without deep analysis, with correlation and not causation, what can be found in one website and it is linked to other peace of information it is not analyzed but linked by correlation. Google operates this way. Therefore data is pilled in the web on thousands of ways which makes difficult to track it, and understand it sometimes, but it works towards finding similar things that if do not come from one another&#039;s understanding, they do have something to do with each other.&lt;br /&gt;
 &lt;br /&gt;
Now privacy in this context cannot be defined, because how can thousands of links and posts can have privacy when they intervene with one another, piling data.&lt;br /&gt;
Therefore how can one unreasonably search the web, is there a limit, and that limit is within some scope, and that scope has some rationality. Therefore the general rule is that in the internet privacy is ambiguous and data is humongous to trace.&lt;br /&gt;
&lt;br /&gt;
Therefore it can be concluded that our past laws cannot keep up with the cyber world and if data is enormous, and privacy ambiguous in the web, then there has to be another way to regulate this, how people research of a subject, topic, person, property, etc. How data is reveled, linking property, people, etc without analysis. This is what needs to be solved for a future that entails uncertainty, but promises great communication, knowledge, and relations if this problem is solved.&lt;br /&gt;
&lt;br /&gt;
(Edwin Duque)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When the “Founding Fathers” framed the Bill of Rights, the concept of the internet and shape it would take in regards to mass media, content and privacy would have been unimaginable.  &lt;br /&gt;
The First Amendment applies protecting of one’s information and possessions and the Fourth Amendment protects against unreasonable search-the framework of protecting privacy&lt;br /&gt;
&lt;br /&gt;
However, the concept and defining of privacy itself is always an ongoing debate and seems to allow the practice of one’s data or actions on the internet to be available, monitored etc. to any other person, company or government organization as the definition of privacy itself is not clearly outlined and based more on theory.  &lt;br /&gt;
&lt;br /&gt;
Individuals for example may give a mobile app access to one’s microphone or location service thinking it is for the purpose of utilizing the app.  Meanwhile, the app company may be using this data for other purposes and in turn the government may request this information from companies-in a sense could be argued as unreasonable search and seizure.  &lt;br /&gt;
&lt;br /&gt;
Until privacy and uniformed regulation can be established in regards to collection of data and use, one’s privacy will intrinsically be public.  In essence the only protection of privacy is for one not to provide the data they do not want to be public or collected. [[User:Andrew C.|Andrew C.]] ([[User talk:Andrew C.|talk]]) 17:54, 12 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I really enjoyed the article focusing on LinkedIn. I sometimes wonder how sites match &amp;quot;people you may know&amp;quot; and it was a very interesting take from the author of a thought many of us have-- how LinkedIn/Facebook/etc match us with people we actually do know. In regards to that thought, the Internet tracks us in our daily searches. Especially around the Holidays, there were several times my Internet began advertising gifts I had bought online at Target/etc. Although many people like how that is generated, I find it not likeable and confirming that there truly is no privacy. &lt;br /&gt;
&lt;br /&gt;
The first article had a very interesting quote: &amp;quot;privacy has proven to be a powerful rhetorical battle cry...privacy means so many different things to so many different people that it has lost any precise legal connotation that it might once have had...&amp;quot; It would be a neat assignment to figure out what &amp;quot;privacy&amp;quot; means to each of us-- especially as we grew up in a  world focused on computers and technology and, obviously, have different views from our parents and children of what &amp;quot;privacy&amp;quot; means. It is really such an easy term yet something so hard to explain-- also brining in the idea of &amp;quot;if you don&#039;t want everyone (or anyone) to see, don&#039;t put it on the internet becasue then it is not private&amp;quot; &lt;br /&gt;
&lt;br /&gt;
I read more about Privacy and came across an interesting article some of you may want to glance at:&lt;br /&gt;
&lt;br /&gt;
 http://www.forbes.com/sites/danielnewman/2014/08/20/there-is-no-privacy-on-the-internet-of-things/&lt;br /&gt;
&lt;br /&gt;
About half way down, the article begins speaking on the Privacy Statements online and how many people, including myself, skim over and accept without really reading. [[User:Cbore001|Cbore001]] ([[User talk:Cbore001|talk]]) 19:11, 12 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I found the discussions in the readings on Internet privacy (or the lack thereof) quite daunting. It seems like each attempt to protect privacy is countered with a problem or another breach in that &amp;quot;security&amp;quot;. I was also intrigued by the argument on how everyone talks about Internet privacy and how important it is to them, but their behavior doesn&#039;t reflect those same concerns. Though this seems like a contradiction, I believe it&#039;s more of a lapse in our understanding of what it means to share on the Internet. The Internet being a relatively new resource, we are accustomed to a certain level of choice involved with the sharing of our information and we aren&#039;t yet fully aware of how the Internet removes that element of choice. Unfortunately, a lot of people are learning that lesson the hard way. The Internet and the elusive definition of &amp;quot;Privacy&amp;quot; is something many people have had to deal with in retrospect. Furthermore, we cannot make progress with what it means to protect privacy if we find it impossible to even define what privacy is. Many people opt to refrain from sharing on the internet at all and, while that seems like a solution, it seems wrong that a person should lack some of the benefits the Internet has to offer simply because of a fear of intrusion. Unfortunately, that is the reality that we deal with today, and one wonders if there is even a solution. [[User:Oliviabrinich|Oliviabrinich]] ([[User talk:Oliviabrinich|talk]]) 13:39, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
::Great comment, Olivia - especially your observation about &amp;quot;a lapse in our understanding of what it means to share on the internet.&amp;quot;  I hope we will find a moment to touch on this today. &lt;br /&gt;
&lt;br /&gt;
::[[User:David|David]] ([[User talk:David|talk]]) 16:20, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hi all!&lt;br /&gt;
&lt;br /&gt;
Not sure if i will be able to make class today so I&#039;m posting just in case! &lt;br /&gt;
&lt;br /&gt;
As soon as I read the topic for class I immediately cringed. I have read about our privacy and lack thereof online before and with each new bit of information I sort of shutter thinking about my confident adolescent self on infamous sites like myspace and even high school me on Facebook, where privacy was the least of my concerns and I was happy to show the world every minute of my life. Today the relevance of Facebook in this privacy realm should certainly make people think did I really need to share that one picture or post that one status because truthfully we have this false sense of security with what we share thinking that they are to be seen by our friends but as many of the readings have pointed out and as we have clearly seen in current events, this is most certainly not the case. I really loved how Farris and O&#039;brien put it about our privacy concerns, that essentially we all have a very fuzzy understanding of what privacy even means and although we all express our displeasure with intrusion of our privacy, we seem more than happy to share that video of ourselves on top of the bar singing piano man completely out of key at 3am. They go on to say we &amp;quot;quasi-agree&amp;quot; to sharing this information and forgoing our privacy concerns by accepting the all mighty &amp;quot;terms of agreement/conditions&amp;quot; box which is like a 100 page essay that no one ever reads (Cue the academic icon of South park..trust me when I say click for a good laugh.... https://www.youtube.com/watch?v=MAdu6GHV3tQ ) &lt;br /&gt;
&lt;br /&gt;
Farris and O&#039;brein further paint our over sharing of data in a scary light: &lt;br /&gt;
&amp;quot;Those with the best access to data are the companies with which we have shared this data in a quasi-consensual manner, and the third parties with which they subsequently share the data, and the governments that are able to persuade or coerce the companies to turn over this data to them, and the domestic and foreign governments that are able to monitor communications and hack into computers, and the perpetrators and beneficiaries of successful cyberattacks that precipitate massive data leaks.&amp;quot;  &lt;br /&gt;
&lt;br /&gt;
One story that comes straight to mind is the Target case study involving Andrew pole and a man and his teenage daughter in Minneapolis. To be brief, essentially what happened is the young daughter had used her target customer Id to purchase various items online on the Target store. A man by the name of Andrew Pole was a master statistician and had developed an algorithm to predict, based on what people bought at Target, where they were at in their life and thus what sort of coupons/deals, etc target should send to them to encourage them to come shop at their store. Well long story longer, Target used this algorithm and determined that based on the daughters purchases over the span of about a week, the algorithm said there was an 87% chance the teen was pregnant. Since she was still very young and living at home, her father would receive the mail and couldn&#039;t help but notice all of these coupons geared toward a pregnant mother coming to his house for strollers, cribs, formula etc. The father confronted the manager at a local target irate exclaiming that his wife was certainly not pregnant. Well it turned out that based on the daughter&#039;s purchase history and sharing of this information online, Target had known that this high school girl &#039;&#039;&#039;was in fact pregnant&#039;&#039;&#039; and she was still figuring out a way to tell her father.Unfortunately Target beat her to the punch.&lt;br /&gt;
&lt;br /&gt;
Thanks guys,&lt;br /&gt;
Ryan H (rhurls)&lt;br /&gt;
&lt;br /&gt;
[[User:Rhurls|Rhurls]] ([[User talk:Rhurls|talk]]) 12:37, 13 February 2015 (EST)  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
My post seemed to be in a weird format when I reloaded it so here it is again (sorry for the double-post)&lt;br /&gt;
&lt;br /&gt;
After reading the discussion post beginning with the “self” I began reflecting on the period following the 1965 Supreme Court case Griswold v CT when ideas about a more defined sense of legal privacy came to the forefront.  Arguments around that time articulated privacy more as it relates to the physical body.  Though opinions on reproductive independence are still quite divergent, I believe that Americans on both sides of that argument still hold bodily autonomy and privacy in some form (if not in the form discussed in Griswold) as sacred.  &lt;br /&gt;
&lt;br /&gt;
I can’t remember which author mentions this point (Solove perhaps) but one of the articles briefly describes “thermal imaging” in order to catch drug-related criminals as tantamount to searching a home without a warrant.  I think this kind of example is sort of a middle ground in examining bodily privacy to more abstract ideas about privacy in a technological world. &lt;br /&gt;
&lt;br /&gt;
As we move into looking at strictly online privacy, people willingly give out all kinds of personal information and their views of privacy diverge from their actions (Goldman says an iteration of this in the Solove reading).  If many people think of privacy as “the right to be left alone” what can that mean online?  It is easier to conceive of bodily privacy but I sometimes think the way we still think about privacy rights come from before the inception of the internet. ([[User:Amchugh|Amchugh]] ([[User talk:Amchugh|talk]]) 08:34, 13 February 2015 (EST))&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I am becoming more intrigued with how much net neutrality is becoming more of a headline subject within the news, or it could be that net neutrality has always been in the news and I&#039;m just now paying attention. I think it is a natural to be more sensitive to subjects you are becoming aware of, but it was very serendipitous that while reflecting on net neutrality and all the issues that have come out of the subject matter, CNBC had an interview with AT&amp;amp;T CEO Randall Stephenson in which he cautions the Obama administration about attempting to regulate the internet. &lt;br /&gt;
&lt;br /&gt;
Leading up the FCC&#039;s decision at the end of this month, I think it will be very exciting to continue to follow the story. The issue of regulating the internet is such a complex and permanent action. As we have discussed in class, and the readings have pointed out, the idea of the internet is to have and fully accessible resource. The implications of FCC and some recent events with administration somewhat threaten this idea if they are going to attempt to regulate it. So many more questions will be born with implementation and follow through with decision of regulations. &lt;br /&gt;
&lt;br /&gt;
Here&#039;s a small portion of the interview for anyone who is interested. http://www.cnbc.com/id/102424165#.&lt;br /&gt;
&lt;br /&gt;
[[User:Mhoching|Mhoching]] ([[User talk:Mhoching|talk]]) 15:28, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Two aspects of this week’s readings were particularly interesting to me. Both come from “The Rise of Big Data” and what they term “datafication.”  Speaking of Google’s analysis of search terms and the resulting correlation with flu outbreaks, the article observes such correlations are predictive and not always correct; unrelated outside factors might influence the prediction (4). The article stops short of what seems to me an obvious next step to observe that such outside influences may be either coincidental or intentional.  This point has profound implications when we consider the uses to which big data predictions are being put.  The intentional interference with such predictions seems ripe for discussion. How it might take place and the complications of both trying to affect results and countermeasures against it raise many questions in my mind.&lt;br /&gt;
&lt;br /&gt;
Also, as noted later in the article, big data predictions may be used, for example by government, to make decisions without a full appreciation for or an understanding of the implications on society (7). This “misplaced” reliance on big data predictions could similarly be affected by the gaming or mischievous interference with the data process.[[User:Gary Brown|Gary Brown]] ([[User talk:Gary Brown|talk]]) 15:58, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chris Anderson’s “The End of Theory”, argues for the great potential of using big data, to explore the many facets of our world.  Indeed, the thought of being able to sequence an entire ecosystem is quite amazing. Discovering new species using statistics, rather than direct observation, is an ingenious use of computing power. Yet, when this massive amount of data is derived from people’s internet behaviour, the prospects become murkier. True internet privacy, seems more like a holy grail, than a possible reality, given all of the necessary steps to attain it. David O’Brien and Robert Farris’s article “Data and Privacy” makes the important link between privacy and data security.  It is interesting how many businesses have been slow to focus on data security, when data has become an important source of revenue. The prevalence of cyber attacks, on health insurers like Anthem Blue Cross, or retailers like Target, has created some public awareness, but not sufficiently.&lt;br /&gt;
&lt;br /&gt;
Farris and O’Brien, also raise the issue of the role that laws and regulations should take.   The European model is for greater regulations on privacy.  The European Court of Justice in May 2014 ruled against Google in a case involving the right to be forgotten. This means that search engines must provide a method for people to remove their data from search results. &lt;br /&gt;
Yet, as a legal concept, privacy is hard to pin down, particularly in this digital age. As many of the articles point out, a solution will likely be a hybrid, involving some sort of compromise. An important first step will be insuring that everyone is aware of the data that they create, and how it is being used. [[User:AlexanderH|AlexanderH]] ([[User talk:AlexanderH|talk]]) 16:00, 13 February 2015 (EST) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
  &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
So after reading all the information on data collection, the dimensions of privacy and how easy it is to de-anonymize data I wonder how it all applies to me.  Is someone or something out there collecting info on me and creating a giant datastore that uniquely defines me and sets me apart from everyone else on the globe?  Cause I didn&#039;t get that from anyone of the articles.  Instead it would appear that all these different sources capture trace amount of data representing some specific characteristics about my behavior at a given time and place and use that to try to push info out to me.  Not sure how that translates to what I have always thought of as &amp;quot;my privacy&amp;quot;.  Interested to hear what others think about that?  [[User:RMarkow|RMarkow]] ([[User talk:RMarkow|talk]]) 17:21, 13 February 2015 (EST)&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>RMarkow</name></author>
	</entry>
</feed>