Assignment 2 Submissions: Difference between revisions

From Technologies and Politics of Control
Jump to navigation Jump to search
 
(UTurn to 1303516799)
 
(344 intermediate revisions by 74 users not shown)
Line 1: Line 1:
==Put Your Name And Pitch Here==
<div class="editsection noprint editlink plainlinksneverexpand" align="right" style="float: right; margin: 5px; background:#eeeeff; color:#111111; border: 4px solid #dddddd; padding: 5px; text-align: left;">
<big>'''Assignments'''</big>


Ernest Owens
'''[[Assignment 1 Details and Reporting]]''' | [[Assignment 1 Submissions|Submissions]]<br />
''Due February 8''


Pitch: Tech Branding: The Technology Impact on social creativity and  Innovation
'''[[Assignments#Assignment_2:_Prospectus| Assignment 2]]''' | [[Assignment 2 Submissions|Submissions]]<br />
''Due February 22''


Technology is a key component in establishing a brand.  Many individuals have a personal brand on myspace, facebook, twitter and many other social websites.  Socially its almost imperative that you are connected to a social site.  Information Technology is vital when branding innovation.  If a company is not exactly connected to new media their position can deteriorate due to a lack of progressive maneuvering in technology.  My project will focus on how technology is used to create awareness of a brand and also spark innovation.  Areas of concentration will magnify on the social creativity of youth in their educational endeavors.  Explore how branding can impact socially and how brand innovation such as a music artist adjusts to new media trends.  I will explore how President Obama's campaign impacted his road to presidency by utilize technology to assist him.
'''[[Assignments#Assignment_3:_Project_Outline| Assignment 3]]''' | [[Assignment 3 Submissions|Submissions]]<br />
''Due March 22''


Technology has a way to assist or harm a brand.  This project will focus on the use of technology in branding and creative ways to innovate.
'''[[Assignment 4 Details and Links]]''' | [[Assignment 4 Submissions|Submissions]]<br />
''Due April 12''


Reference
'''[[Final Project]]''' | [[Final Projects|Submissions]]<br />
Changing Culture in Music
''Due May 10''
Obama and Technology
2.0


</div>


* Name: Alek Sudan
===Distribution of Grades===
* Pitch: Integrated Educational Technologies
[[Image:Assignment2_distribution.png‎|400px]]


===Submission Instructions===
This assignment is due on February 22.  Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).


I would like to better understand how the application of Web 2.0 technologies may affect a small middle school’s education, community, and culture; examining both positive and adverse effects which may arise. There are three primary questions I would like to ask:
Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else's assignment. ''The '''upload file''' link is to the left, under '''toolbox'''.''  Once you've uploaded your file, please link to it following the format below:


*Name:
*Prospectus title:
*Link to prospectus: (the file you uploaded)


· How do you excite and enable children to learn?
If you have trouble finding the file you uploaded, check the [http://cyber.law.harvard.edu/is2011/Special:ImageList list of uploaded files].


· How do you excite and enable parents to participate and get involved?
===Comments===
Everyone will receive an additional participation grade for this assignment. You should read through everyone's proposals after they are uploaded and add constructive comments below the proposal on which you're commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. ('''Remember to sign your comments!''')


· How can you maintain and grow a sense of school culture online?
===Submissions===


----


* ''Understanding a Student’s “Sense of Responsibility” and School Culture''
====Name: Gagan Panjhazari --[[User:Gpanjhazari|Gpanjhazari]] 07:34, 26 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">The Role of Censorship Of the Internet in the Egypt and Libya</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt
*Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times.  Might be helpful on your first topic.  <<[[User:Sjennings|sjennings]] 00:48, 1 March 2011 (UTC)>>
**Comment: Gagan, I find both of your topic choices interesting.  I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two.  It is such an important question, the answer to the question will frame our national security for the future.  With either topic, I look forward to reading your findings. [[User:Coreymacd|Coreymacd]] 01:10, 1 March 2011 (UTC)
*Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn't a whole lot of detail here, but it might be a useful place to start. [[User:BrandonAndrzej|BrandonAndrzej]] 02:57, 5 March 2011 (UTC)
http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&utm_medium=grid&utm_source=grid
*''Comment:'' I like the second topic.  It would be interesting to see if the treason charges are somehow being used to:
# silence Julian Assange
# scare others from doing the same thing
#*One thing you might look up for precedence is the [http://en.wikipedia.org/wiki/Pentagon_Papers Pentagon Papers]  [[User:Rakundig|Rakundig]]
**Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak.  This is a fascinating narrative to be sure.  Here are a few links about a European  internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. [https://www.eff.org/deeplinks/2011/02/egypts-internet-blackout-highlights-danger-weak|Egypt's Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links], [http://werebuild.eu/wiki/Egypt/Main_Page | werebuild.eu the Egyptian project page], [http://werebuild.eu/wiki/Libya/Main_Page | werebuild.eu, the Libyan project page], and [http://telecomix.org/ | telecomix.org] [http://globalvoicesonline.org/ | Global Voices]has done  an outstanding job of covering these events as well. Best of luck![[User:Deinous|Deinous]] 01:53, 5 March 2011 (UTC)
**Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt's Internet kill switch decision rather ignited people's movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --[[User:Yu Ri|Yu Ri]] 10:47, 6 March 2011 (UTC)
**[[http://www.economist.com/node/18112043 The Economist: Reaching for the kill switch]]
**Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. [[Kristina Meshkova]], 5 March 2011.
**Comment: Gagan, great subjects!  You should stick with the subject that interests you most.  I suppose its the first one that you wrote about, the role of social media and networking in the revolutions.  This is definitely a broad subject, but that doesn't mean you should throw it out, it means you should narrow it to a point that is achievable.  A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into.  (i.e. the role that Facebook users played in the Egyptian revolution.)  Then you need to think about what you will investigate.  This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events.  This might be in the form of friending as many of the users who were involved in a particular event on Facebook.  This should be a great project for you! [[User:Smithbc|Smithbc]] 05:06, 6 March 2011 (UTC)
**Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper.  It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find 'clear' answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...[[User:VladimirTrojak|VladimirTrojak]] 10:43, 6 March 2011 (UTC)
**Comment: I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--[[User:Elishasurillo|Elishasurillo]] 04:40, 7 March 2011 (UTC)
**Comment: This is a very serious and evolving topic that should be very fun and interesting to work on. It is very important to study the internet's effect on these countries because it could quite possibly happen to other countries. Just like the revolutionary furry spread from Egypt to Libya, it could easily spread to other countries either for the better of for the worse.--[[User:Joshuasurillo|Joshuasurillo]] 05:07, 7 March 2011 (UTC)


How important a student values his or her education, provides clues to how they interact, learn, and their sense of responsibility. As a school struggles to meet the individual needs across the broad range of students, a curriculum “blanket” lowers the possible outcome.


Providing students, not only high-achievers or special needs, with the ability to develop a sense of responsibility may provide for an educational advantage. Integrating technology for guided learning (highly interactive, guided lessons) could benefit students. Tailoring this system to a student’s current lifestyles (faster paced), may prove beneficial for content retention and understanding.
----


Secondly, after small observations of freshman and sophomore high school students using social-networking websites, it is my belief, that incorporating tools and features of such websites into a school’s community may also prove beneficial: possibly integrating educational materials (teacher updates, school news [Facebook notifications]), providing easier, less challenging methods  of peer communications, and incorporating peer accountability (using such things as “karma” points – monitored by faculty).
* ''Understanding Parent Involvement''
To begin, I will be analyzing the current level of parental involvement in a school: how many parents know what is going on around the school? How many parents are involved in the school? How many parents would like to be involved? And lastly, how many parents are unsure of where to start and/or feel as if there is a “barrier” of involvement.
A higher parental involvement in a student’s education process may help improve a student’s success. Also, involving parents into a school’s community, not simply limited to volunteering, may develop a richer culture and spirit.


====Name: Saam Batmanghelidj --'''[[User:Saambat|Saambat]] 10:00, 23 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc
**Comment: Hi Saam, I think your topic of synthetic or virtual worlds.  I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago.  It's a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar).  Some interesting things about it: uses public/private encryption keys, it's completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it's anonymity and cannot be tracked creates a security of privacy for the purchaser and seller.  This also means could could be exploited by people not wanting transactions to be recorded.  This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency.  This is just a top end look at it.  It's already in use and some places accept this currency including some non-profit agencies for donation purposes.  It also opens an easy way to laundry dirty money.  Regards Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)
**Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?”  So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis  into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. [[Kristina Meshkova]], 5 March 2011.
**Comment: Saam, you've picked a fascinating topic.  You've identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored.  Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section.  I look forward to reading this project! [[User:Smithbc|Smithbc]] 05:15, 6 March 2011 (UTC)
**Comment: Hi Saam...Great topic. I agree with Smithbc comments. I am not sure whether we should study smething mere via reporting the book and blog. As I said, I am not sure and at this time you should have already had a feedback so you probably know better. Good luck with the project and looking forward for reading final version. [[User:VladimirTrojak|VladimirTrojak]] 21:54, 8 March 2011 (UTC)
----


References:
====Name: Kimberly Nevas --'''[[User:KimberlyNevas|KimberlyNevas]] 02:17, 23 February 2011 (UTC)====
* Integrating Technology Into the Curriculum (Frei)
*'''Prospectus Title: <span style="color:#FF0080">Can the U.S. Prosecute Julian Assange?</span>'''
* Future of the Internet (Zittrain)  
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf
* Interpersonal Effects in Computer-Mediated Interaction (Communication Research, Walther)
**Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, [[User:Yu Ri|Yu Ri]] 03:12, 7 March 2011 (UTC)
**Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange.  Does his legal situation make these sites feel more confident regarding avoiding prosecution? <<[[User:Sjennings|sjennings]] 00:56, 1 March 2011 (UTC)>>
**Comment: Your statement, "In this respect, Assange cannot be considered any more liable than the New York Times." is a bold one, which some might strongly disagree with, given Assange's postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free.  I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. [[User:Coreymacd|Coreymacd]] 01:15, 1 March 2011 (UTC)
**Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question.  Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? [[Kristina Meshkova]], 5 March, 2011.
**Comment: Kimberly, you have the beginnings of a good project here.  I am interested in what you choose to use as your methodology and what you will choose to "observe" as part of this case study.  One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange's information. [[User:Smithbc|Smithbc]] 05:34, 6 March 2011 (UTC)
**Comments: Kimberly, that is an explosive topic! I bet you'll have lots of material! The qusetion is where did he commit the crimes if any. If in Australia, can they prosecute him? Or because they are U.S. cables, does the U.S.A. have jurisdiction? And who has the right to tell him he can or cannot post and release? The U.S.A. has to clearly stae how he broke the law. As far as I know, treason can only be a crime if commited by a citizen. Good work! --[[User:Elishasurillo|Elishasurillo]] 04:53, 7 March 2011 (UTC)
**Comment: Yes, very timely and interesting topic.  One thing you might look up for precedence is the [http://en.wikipedia.org/wiki/Pentagon_Papers Pentagon Papers]  [[User:Rakundig|Rakundig]]




----
----


====Name: Jamil Buie====
*'''Prospectus Title: <span style="color:#FF0080">Profiteering via "Public Privacy" The use/misuse of your data</span>'''
*'''Link to prospectus:'''http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf
**Comment: Hi Jamil, For me this is a an extremely important issue, I'm glad to see you're looking at it.  I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008.  Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar.  Also, it appears that ComCast is looking to implement it here in the US.  It deals with deep level packet inspection.  Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection.  It is suppose to be done anonymously, however, it's invasive to the nth degree.  Another technology that you might want to look at is the Evercookie.  This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system.  In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)
**Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html  or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices?  you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. [[Kristina Meshkova]], 5 March 2011.
**Comment: Jamil, we have similar interests and research topics.  You are looking at the broad trail of information left by a typical internet user and the ways that trail is used.  I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer's perceptions of risks.  If you are interested, I'd be willing to trade notes and help each other shape up the final project.  Since we are doing similar topics, I would really appreciate your comments on my prospectus as well.  Best, Brian [[User:Smithbc|Smithbc]] 05:42, 6 March 2011 (UTC)
**Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I'd share an extremely thorough [http://online.wsj.com/article/SB10001424052748703940904575395073512989404.html study] the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:57, 7 March 2011 (UTC) 
**Comment: Another very ineresting topic. I believe, most consumers are not aware. I was surprised when I blocked cookies and then wanted to log in to facebook.  Following message occured: 'Cookies are not enabled on your browser. Please adjust this in your security preferences before continuing.'. Seems like they are not interested in someone using their service without getting access to information about me so they can get paid:)I am still not aware of all information they can easily get about me. Good luck with project.[[User:VladimirTrojak|VladimirTrojak]] 09:03, 13 March 2011 (UTC)


'''Name:'''    Traci E. Thomas


'''Pitch:'''    Entreprenuers, Private Industries, and Corporations Are Attracted To Advertising Upon Online Radio Stations
----


'''Summary:'''  Those wishing to market, sell, and introduce their goods or services deem successful advertising upon online radio stations opposed to traditional radio. Moreover, potential customers are less distracted by daily activities: driving, household chores, parenting children, or attending to personal hygiene while viewing and or listening to   commercialsTherefore, advertising expenses are decreased dramactically with high returns.
====Name: Uduak Patricia Okon====
*'''Prospectus Title: <span style="color:#FF0080">Web Pages/Blog Sites: Rights and Limitations-How free are you?</span>'''  
*'''Link to prospectus:'''  http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf
**Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful.
**Re:
***In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?
***Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.
***I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.
***It's important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they're getting paid. Formally employed journalists can't bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.
***You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).
**Comment: Uduak, very interesting subject.  As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official "legal findings" of what bloggers can/cannot do vs. b) the unoffical "codes of conduct" being developed in the world of bloggingI think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger.  One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge.  I'll look for the URL to send you.  I look forward to reading your project. [[User:Smithbc|Smithbc]] 05:54, 6 March 2011 (UTC)


                                    ''' PROPOSAL
'''
Despite the media's "spin" of  a global recession, I beg to differ.  Our means of selling, distributing, and transporting goods and services has modified.  Sustaining storefronts is obsolete and counterproductive, as holding a lease in commercial real estate is too costly.  With the exceptions of restaurants, drug stores, fast food chains, hotels and motels, physician's offices, and airports successful businesses do better by coordinating transactions via the Internet.  A simple and efficient website serves well to retain reoccurring sales. The objective is to eliminate overhead costs by advertising online to an infinite audience. Therefore, online radio stations are ideal for sellers desiring to connect with buyers.


----


''Politics and Technology:''             Unlike traditional radio, online stations are not limited to content and subject matterThe topics are rarely monitored nor regulated by broadcasting standardsConversations may be inappropriate and offensive depending upon one's morals, values, and beliefs; nonetheless, the options for advertising are unmeasurableOne must determine which dialoges, music, and interviews are acceptable as shows are rated.   A seller may investigate the shows upon an online radio network and decipher which audience suits best for the company's product or serviceMost online radio communities are owned collectively by the hosts; therefore, the protocol is limitedThe airwaves are "free for expression;" therefore, numerous listeners tune in regularly.   
====Name: Yaerin Kim [[User:Quill80|Quill80]] 02:17, 23 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc
**Comment: Hi Yaerin, I think this is a great topicBeing a part of F/OSS environment has pushed forward a number of wonderful software innovationsScratch is an example of MIT's commitment to OCW.  Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming.  I'm sure there are tons of other open source software that would interest youI would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint. Then you can take a look at the rich repository of software that is completely free to install and use.  Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear.  Anything that came from MIT would also give credit to that source even if it's been morphed.  Best regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)
**Comment: Yaerin, you've nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goalsIn the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide itWhat are they and the users missing out on?  We've already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your projectBest, Brian [[User:Smithbc|Smithbc]] 07:28, 6 March 2011 (UTC)
**Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --[[User:Yu Ri|Yu Ri]] 10:57, 6 March 2011 (UTC)


''New Economic Models:''                  With a new mentality available to sellers, the Internet becomes a great ally.  Consumers are spared additional costs on products and services as there`are no longer inventory, storage, and insurance fees added to thier purchases.  Products may be shipped directly from a warehouse to thier location.  Online banners upon radio station webpages are affordable and logical.  Sellers pay only for clicks which lead to their website's  homepage; therefore, the click-to-sale ratio is favorable.  Savings are accrued by both buyers and sellers.


''Peer Production and Collaboration:''      Online radio encourages all nationalities, genders, ages,  and ethnicies to participate in common interests and concerns.  All are invited to  contribute their thoughts and ideas.  This is the perfect "interaction intersection" for a company's display of productsor services.
----


"Citizen Media:"                           Advertisers are content with the open and candid platforms online stations offerInformation and commentaries are unbiased as individuals are many times anonymousCitizens voice true feelings and emotions; therefore, true characters are heard throughout the stationsDemocratic and liberal codes suggest that all are involved in the network's material.
====Name: William Bauser --[[User:Wnb|Wnb]] 23:55, 22 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">Modern Web Design and Civic Engagement: Access to Information and Community Development</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf
**Comment: This is an interesting topic -- you have a lot of avenues to explore!  Among the sites you list, some are clearly partisan while others seem more altruistic.  I would be interested to learn the contrast of methods used by each type.  For example, what are the membership requirements?  Does the site encourage a particular philosophy?  Does a certain amount of selective cocooning take place?  On the other side, how can an Internet based civic community be both neutral and vital?  If it is only fact based then it won't be interestingHow does is promote community discussions without advocating a position?  I'm sure you'll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. [[User:ChrisSura|-Chris Sura]] 01:26, 1 March 2011 (UTC)
**Comment: Hi William: Sounds like a very interesting subject.  I have two comments.  First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn't seem to fitIt seems like you'd also like to look at how effective they are in increasing the transparency of the political process as well and you'd have to clarify how those fit together. (IMO, engagement =/= transparency.)  Second, I'd be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.) All the best, Brian [[User:Smithbc|Smithbc]] 07:53, 6 March 2011 (UTC)
**Comment: I think this sounds interesting, particularly as scholars are emerging to study the implications of the internet, web 2.0 and social networking on politics. I think there's going to be a lot of research into how these tools (and many of the sites you mentioned, particularly sites like change.org or moveon.org) are contributing to the distribution of social capital/political capital among the population. I think your topic is timely, and interesting. My guess is that you will need to hone in on a few specific sites and some specific aspects of them in order to make solid comparisons and broad analysis. Best of luck! [[User:Acrowe|Acrowe]] 16:22, 8 March 2011 (UTC)


Traditional and physical radio stations are becoming obsolete.  Sadly, those holding degrees in Mass Communication, Marketing, Economics, and Public Relations are subject to reeducating themselves with technology and innovation.  Many tradional Advertising Sales Representatives , Disk Jockeys, Event`Planners, and Celebrity Managqers are fastly becoming unemployed.  Businesses and establishments are selecting online media as a generous means to reward their marketing efforts.
----


                                    '''References:'''
====Name: Brian Smith [[User:Smithbc|Smithbc]] 23:47, 22 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">Location-Based Services: Implications and Awareness of Effects on Consumer Privacy</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf
**Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --[[User:VladimirK|VladimirK]] 20:03, 24 February 2011 (UTC)
***'' Response: Thank you, Vladimir - these are really helpful comments.  I might ping you back for more details as I go through them each.  Best, Brian'' [[User:Smithbc|Smithbc]] 07:56, 6 March 2011 (UTC)


**Comment: Brian, the location of a caller is also one of the key pieces of information that is used by public safety officials when responding to emergencies. There is a long history of regulation related to the use of location information in the Enhanced 9-1-1 system. I know the location services that you are talking about in your paper are based upon the GPS capabilities in mobile devices, but you may benefit from understanding the history of location as you look at some of the politics surrounding these new services. There has been some recent political maneuvering related to the location information provided by telecommunications carriers for the purpose of Enhanced 9-1-1 since many have determined, as you say in your prospectus, that location information is a marketable commodity.


Here is a short explanation of how location is determined in Enhanced 9-1-1. If you were to need to dial 9-1-1 in an emergency, when your call is answered at the Public Safety Answering Point (PSAP) a software application retrieves information about your location from the Automatic Location Information (ALI) database. The ALI database – there are actually over 3,000 ALI databases in the US, but from a local jurisdiction only one is important -  that is/are maintained on behalf of the government by various on-contract third parties. How information about your location gets populated in that database depends upon the device originating your call. For a traditional wired phone, the phone company is responsible to update your location when your phone is installed.


Blog Talk Radio.   www.blogtalkradio.com
When you are calling from a mobile phone, there are actually two ways that your location is determined. One is GPS, but many mobile devices today still either don’t have GPS chips or the users don’t turn the GPS on for reasons that range from prolonging battery life to a belief that they are protecting their privacy (something that you may next see is an illusion). One way wireless location is determined is by the triangulation of two or more cell towers. A mobile phone is almost always in communication with two or more towers and an estimate can be made of your location by measuring distance as a function of signal strength.  The other way is to integrate the GPS chip. For Enhanced 9-1-1, this actually turns out not to be as straight forward as one might think.  This is because the GPS information is carried in the data channel of a phone. For many phones it isn’t possible to have both a concurrent voice call and a data transmission. This means that in order to retrieve the GPS data, the PSAP needs to disconnect the caller. Not the best situation in an emergency.  [http://www.fcc.gov/cgb/consumerfacts/wireless911srvc.html The FCC’s Wireless 911 Rules] currently specify that the phone carrier is required to be able to locate you within, “50 to 300 meters depending upon the type of location technology used.


There is also a separate system for determining the location of a caller who is using a VoIP device (as in Skype) and another process for determining the location of a caller from within an enterprise organizations (such as a PBX extension).


Brown, Rita.      WBLS FM New York,  NY. Personal Interview.   February 17, 2009.
Hope you find this of use. Let me know if I may clear up and points or answer any additional questions. --[[User:Gclinch|Gclinch]] 01:55, 8 March 2011 (UTC)


Manu, Sam.        Host.  Live From L.A.  Personal Interview.    February 20, 2009.
----


Watts, Tim.       WWIN FM Baltimore, MDPersonal Interview.   February 11, 2009.
====Name: Yu Ri Jeong -- [[User:Yu Ri|Yu Ri]] 22:22, 22 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.</span>'''
*'''Link to Prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc
**Comment:  This is a really interesting topic!  I hadn't known that South Korea had so strongly resisted the dominance of Wikipedia.  I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia. Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creationI also wonder what this means for Wikipedia. As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society?  I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! [[User:Mcforelle|Mcforelle]] 19:39, 5 March 2011 (UTC)
**Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC) 
**Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. [[User:Quill80|Quill80]] 22:07, 5 March 2011 (UTC)
**Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)
**Comment: Yu Ri: This is a solid proposal for the project.  I like how you've used the course themes as your areas of investigation and how you've narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities.  The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms & governance, membership, limits on expression, and national law.)  If you can do all of those, then that's great, but you might think of narrowing to a smaller set.  Otherwise, this proposal seems strong.  Have fun!  Brian [[User:Smithbc|Smithbc]] 08:07, 6 March 2011 (UTC)
**Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --[[User:Yu Ri|Yu Ri]] 03:44, 7 March 2011 (UTC)




*Name: Bhim P. Upadhyaya
----
*Pitch:
--An Impact Assessment of Open Source Software Certification in
Warranty Domain--


====Name: La Keisha Landrum [[User:llandrum|llandrum]] 21:48, 22 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">Building a Sustainable News Org</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc
**Comment: Hi La Keisha, It's good to see you're approaching this hot topic.  I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years.  The newspaper companies came to late to the Internet forum and due to their lack of response they lost the "first-to-line" efforts in advertising & classified revenues.  Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars.  Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting.  Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)
**Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck![[User:Quill80|Quill80]] 22:34, 5 March 2011 (UTC)
**Comment: Hi La Keisha, Bravo for taking on this topic.  I like the fact that you are exploring success stories in online journalism.  While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear.  The newspaper existed for so long because, I believe, there is strong consumer demand for quality information.  Just because the business model for supplying news is undergoing transformation doesn't mean that that demand is gone.  My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out.  There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting!  It's just that they won't all be delivered by the same company, in the same vehicle, nor with the same business model anymore.  As a side note for a case study check out the Seattle Post-Intelligencer. I'm not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff.  Best, Brian [[User:Smithbc|Smithbc]] 08:30, 6 March 2011 (UTC)
**Comment: Enjoyed reading your prospectus! Just read an article in [http://www.guardian.co.uk/commentisfree/cifamerica/2011/mar/05/huffington-post-aol The Guardian] that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of 'content farming,' and thought I'd reiterate an example I brought up in class, [http://www.demandmedia.com/ Demand Media]. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 18:55, 6 March 2011 (UTC)
**Comment: I really enjoy the topic of your proposal. I think it's a timely and meaningful investigation. I think in comparing what makes these online media outlets successful, it is important to create a measure of which are and which are not successful. There are Nielsen ratings for websites, but I don't recall where to find them... and I believe Alexa does a web index ranking as well. It is probably worthwhile to be sure that the parallels you're drawing are across the most successful models. Many blogs that are popular are not lucrative business models, and as you seem poised to compare your results with the decline in financially-stable, traditional media, this will be an important distinction. It seems like a great jumping off point! Good luck! [[User:Acrowe|Acrowe]] 16:34, 8 March 2011 (UTC)


While researching during first assignment (Wiki editing) I noted that there is a huge interest in open source, also there are various big communities for this (e.g. http://www.opensource.org/). Further, I noted that some of the organizations like Red Hat have already introduced certification in their open source server technologies. Red Hat Linux grew up as an open source server technology till its 8th version, later they decided to release an enterprise version supported by a basic community version. Its desktop version is known as Fedora Core, currently in its tenth version. The certification information can be found in the Red Hat site (http://www.redhat.com/certification/).
----


Today, there are numerous open source technologies that a product company can choose from. There are both advantages and disadvantages of open source uses. So far as product companies are concerned, usually they have an architect-team that contains the core technical skills which are not only required to design and to development software systems but also to maintain and to extend such systems. This team spends enormous amount of time to make choices on technologies, it becomes even harder while carrying out this process for open source as there is not much support available in terms of services. It becomes largely a research activity if we discover a bug and wanted to fix that bug before we adapt a particular open source technology.
====Name: Jillian York [[User:Jyork|Jyork]] 21:48, 22 February 2011 (UTC)====
*'''Prospectus Title: <span style="color:#FF0080">Understanding "Lesbanon": Lebanon's Online Lesbian Community</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc
**Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country's customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --[[User:Yu Ri|Yu Ri]] 03:29, 7 March 2011 (UTC)
**Comment: Hey Jillian, I think this is such a great paper topic.  I love how secretive communities can still operate out in the public through using the internet. The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out.  I had no idea that "Lesbanon" existed but it really does make perfect sense.  Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms.  Otherwise, I think your question is quite reigned in and manageable in scope.  I look forward to reading this paper when you're finished. [[User:Saambat|Saambat]] 18:42, 3 March 2011 (UTC)   
**Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but '''power''' for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. [[User:Myra|Myra]] 19:22, 6 March 2011 (UTC)


Current trend for open source certification is largely distributed i. e. each product releasing company (like Red Hat) have their own standards for certification. These standards vary widely across such companies. Moreover, it becomes a strategy to attract open source community to enterprise solution- streams. This research also aims to separate the standards between community versions (truly open source) and enterprise versions, as a result, open source technology does not have to rely on enterprise versions.
**Comment: I am sorry if I am posting belated remarks but it seems that your topic, along with many other topics related to this type of mental state, overlooks the origins of the same sex attraction for males, that is, pederasty, which by nature can affect the mind set of the near situated females. It is widely argued in the world, may be not in the entire U.S., that the same sex attraction among men is not a genetic phenomenon, but rather it is the bodily stigma imposed either during the childhood or during the adultery. In the majority of cases, I refer to the child molestation cases with a few exceptions, neither adult nor a child is able to recall the first same sex sexual experience, which decisively suggests on the unconscious intercourse under the influence of a sedative and/or somnolent substance. In the scholarly papers similar to this, you may find the old and new findings that can explain both the political and biological causes of mental and physical attraction in the same sex: http://www.ched.uq.edu.au/index.html?page=39750&pid=0 It is no doubt that the nature has produced hermaphrodites, but their amount is nothing in comparison to what America or Lebanon has. Hence, it is not the nature that produces majority of them. Overall, you have very intelligent approach to tackle the puzzle of how homosexuals are created in a society with many religious denominations like Lebanon and the U.S.. As far as I know, it is a scientific fact that in order to have stigma a body should have most of its sensitive erogenous zones irritated. The next piece of the puzzle: by coincidence, the amount of child molestation cases among Jehova Witnesses exceeds the amount of all sexual scandals among Catholic, Muslim, and Orthodox religions. So, here is the Bingo - the amount of religious sects which are striving to get your trust and intimacy and visit you at home and may be have a "drink" or "dinner" with you is equally proportional to the amount of homosexuals in the society. So, the taboo is coming from the kind of common sense I mentioned above; unfortunately or may be fortunately for many Jews in Lebanon, not everyone is able to crunch this trust game puzzle in reality right away. May be your project will help to make this devastating syndrome that originates from the terrible crime disappear from any society. --[[User:VladimirK|VladimirK]] 06:10, 13 March 2011 (UTC)
----


An ideal situation in open source would be to have a global standard, also a global standard in certification. As with everything else this industry is also influenced by market policies. Sometimes the influence is so high that we loose the feeling of openness. Openness entirely becomes a way to reach to a closeness. A direction toward the ideal global standard would be to do case studies for various product-companies that are using open source technologies in their specific products. Once this impact analysis is done for substantially large number of products around the world, we can find commonalities (a particularists approach of finding knowledge, Dr. Pritchard – What is this thing called knowledge) and then aggregate that to form a global standard for open source. This can be applied for open source certification as well.
====Name:  Caroline McLoughlin [[User:Camcloughlin|Camcloughlin]] 21:44, 22 February 2011 (UTC)====
*'''Prospectus title: <span style="color:#FF0080"> Privacy and Society</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf
**Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work. If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites. Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[[[User:Sjennings|sjennings]] 21:18, 27 February 2011 (UTC)]]
**Comment: Hi Caroline, we are interested in the same privacy subjects. Similar to Sjennings feedback, I tried to make mine more about observing a community, specifically consumers using location-based services, and less about policy. If you've got the understanding already to get into issues and policy, though,  then it sounds like a great project. As I mentioned to Jamil Buie above, if you are interested, I'd be willing to trade notes and help each other shape up the final project.  Since we are doing similar topics, I would really appreciate your comments on my prospectus as well. Best, Brian [[User:Smithbc|Smithbc]] 05:39, 7 March 2011 (UTC)


An enforcement of such global standards is hard to achieve but since software technologies have a lot of flexibility, in my opinion, enforcement should be inherent in the product itself. There should be quality related assertions (CAR Hoare – Unifying Theories of Programming, Oxford University Computing Laboratory) that would fail if a product does not meet specified standards and hence denial of such products during composite product-composition. This would technically stop low quality open-source products from being in the service of community. Now the question is who enforces such assertions? Ultimately, it should be mandated by a governing body.


This research aims to contribute in the direction of ideal open source standards by carrying out an impact assessment of open source certification in a global warranty-product (software) development company (http://www.4cs.com, we have around 18 very large vehicle manufacturing companies including some of the world's largest, like John Deere headquartered in quad cities, IL/IA; DTNA/Freightliner headquartered in Portland, OR). The result of this research reveals a feasibility of such ideal open standards in practice. It will also suggest a constructive direction to take without adding significant cost on the part of such companies. The whole thing will allow open software tools being developed and distributed over Internet without a compromise in quality and service.
----


In third assignment, I plan to do a mind-map picture that will become a part of final paper. I will email outline of the paper for professors' review.
====Name:Anthony Crowe [[User:Acrowe|Acrowe]]====
*'''Prospectus title: <span style="color:#FF0080">Tagging and Metadata on the Internet and in New Media</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc
*Comments:
**Comment: I like that you've identified another means of content organization for study.  I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures.  I don't really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research.  The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply.  I feel like a thorough study of tagging on the three main sites you've identified, which are pretty major sites, in addition to the other examples you'll be incorporating, will be more than enough data and analysis for a great paper. Unless perhaps I'm not understanding the particular lens through which you'll be approaching the superuser question? [[User:Mcforelle|Mcforelle]] 19:49, 5 March 2011 (UTC)
**Comment: I think this is a really fascinating and relatively untouched subject; I'm curious to learn the myriad ways tagging is used, both for public sharing and for semi-private sharing (e.g., cleverly devised tags that only a particular group is aware of) -- but I agree with the above commenter in that I'm not sure how the question of superusers fits in here; I think you might be better off narrowing the subject just to the question of tagging.[[User:Jyork|Jyork]] 16:16, 7 March 2011 (UTC)


------------


*Name:'''Adriana T. Albuquerque'''
----
*Pitch: '''Free Music Downloads over the Internet'''


The theme of my pitch will be related to free music downloads over the internet. Should people be allowed to download music from the internet for free?  My answer is yes. Besides iTunes and some other music aggregation where we must pay to download a song, I believe that there should be another way where we could legally download any song from the internet without being fined by the authorities. Besides Napster and some other illegal download sources of free music, we don’t really have an option but pay for a song on Itunes or buy a cd from the store. Even though the song costs 0.99 cents on iTunes, if you decide to buy more than 15 songs from the same artist, it should cost you more than a cd would cost in the storeOn-line music downloads are very popular and it is growing quickly. According to the music industry, music downloads tripled during 2005. 
====Name: Vladimir Kruglyak --[[User:VladimirK|VladimirK]] 21:13, 22 February 2011 (UTC)====
*'''Prospectus title: <span style="color:#FF0080">A Transparency of the U.S. Government in the Socio-Cyber Environment</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc
**Comment: Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of "conspiracies" from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a "popular" topic, blurring the "secret" component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that's on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the "accused" by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the "right cause", that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don't you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]] 21:17, 25 February 2011 (UTC)
**Comment: I see a potential flaw in your methodology, and find it potentially invasive of a web surfer's privacy.  Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools.  Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. [[User:Deinous|Deinous]] 04:15, 26 February 2011 (UTC)
**Answer: There is no flaw, it is rather your misunderstanding of the software functionality: 1) collecting data of the visiting traffic by IP from a domain is not a crime and often the consent is given by the owner of a domain; 2) WhoIs database traces the domain's information from the server such as registration expiration date and the contact information of the domain's owner. In addition, there is a way to detect the Tor user and toss those IP out from the sample. In my survey, I will target users with average knowledge who do not use anonymous proxy services or encrypted networking channels.
***Vlaidmir: Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --[[User:VladimirK|VladimirK]] 20:05, 5 March 2011 (UTC)
**Comment: Vladimir, I apologize if I said anything to upset or discouraged you in any way.  I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers.  U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned.  However, with a large enough sample you could perhaps get a general feel for regional traffic[http://www.ethereal.com | Ethereal]is a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.[[User:Deinous|Deinous]] 21:30, 5 March 2011 (UTC)


Hilary Rosen the chief executive of the Recording Industry Association of America stated that, "Analysts report that just one of the many free downloading systems in operation is responsible for over 1.8 billion unauthorized downloads per month".  She also mentioned that “Music sales are already suffering from the impactin the United States, sales decreased by more than 10% in 2001." I believe, someday, not far from today, everybody will have access to the internet, and music stores will no longer exist. As Janis Ian a Grammy award-winning American songwriter stated on an interview that, "The internet and downloading, is here to stay... Anyone who thinks otherwise should prepare themselves to end up on the slagheap of history."


I believe that more and more people are refusing to pay to download a song, which is why illegal downloading of music is still popular. Internet music downloads also offer the advantage of accessing many songs that are only available online and not available in stores, such as live music or an acoustic version of the same song. While a small percentage of the artists make a living off of selling downloads of their music off the internet, I believe that my solution would benefit the artist and the consumers.  Many artists already make a lot of money by playing live concerts, selling posters and merchandise such as T-shirts and etc.  Free download providers are not only good for us, but for the Musicians who can also enjoy the advantages provided by the internet to promote their work. 
----
In summary, I believe that everyone should be able to download free music off the internet.  It benefits the consumer and the musician. The musician will become more popular, they will make more exciting live concerts and everybody will have easier access to their work, and certainly they will still be making the same or even more amount of money as they always have. We as a consumer will expend less money buying CD’s and songs and we will have easier and better access to our favorite bands anytime, anywhere and for free.


====Name:Corey MacDonald [[User:Coreymacd|Coreymacd]] 20:28, 22 February 2011 (UTC)====
*'''Prospectus title: <span style="color:#FF0080">Fringe Forums for the Under-represented</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc
**Comments:  Wow!  This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions.  So many of the conversations we've had in class have centered around how to best facilitate legal social interactions.  I'm excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums.  I'd be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites?  Are any extra precautions taken to protect the anonymity of contributors?  [[User:Mcforelle|Mcforelle]] 20:34, 5 March 2011 (UTC)
**Comments: Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available.
Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html  [[User:Ltconnell|Ltconnell]] 20:36, 5 March 2011 (UTC)


'''References:'''
Janis Ian, during a live European radio interview. 9-1-98----http://news.bbc.co.uk/1/hi/technology/4474143.stm----Hilary B. Rosen, A letter to the Honorable Rick Boucher, Congressman, February 28, 2002. 


------------
----


*Name: '''Murkin Martinez Beltran'''
====Name: Richard (Rick) Kundiger --[[User:Rakundig|Rakundig]] 19:38, 22 February 2011 (UTC)====
*Pitch: '''Patents and Innovation'''
*'''Prospectus title:<span style="color:#FF0080"> The Role of Bittorrent in the Internet Society</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf
**Comment: This is a great example of "code is law."  You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes.  Your investigation of the different interests for and against its deployment should provide an excellent case study.  Does a company or government have more of a right than an individual to control the protocols in use?  Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? [[User:ChrisSura|-Chris Sura]] 01:53, 1 March 2011 (UTC)
**Comment: Hi Rick, I also like this topic.  One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype.  This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today.  VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion.  Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad.  It's also amazing that the record industry had enough lobby power to take down some of the most famous P2P services.  There's also the aspect that businesses deal with a very real threat of employees using bittorrent technologies.  The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat.  Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world.  Hope my comments have given you some help in this area of interest.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)


The general question to be explored will be, "How is the Public/Consumer Affected by Current Patent Law?"


In 1999, Amazon filed suit against BarnesandNoble.com for infringing on it's 1-Click purchasing patent. This patent '''allows a customer to purchase an item on Amazon's website by clicking on only one link/button''' (assuming a profile was previously created). Ten years later, the patent continues to be fought in the courts. There have been several reasons proposed for rejecting this patent. They range from court submissions of "prior art" to judges commenting that the idea of "1-Click" purchasing was "obvious to a person having ordinary skill".
----


In January of 2009, Palm announced their next generation smartphone, the Palm Pre. Not only was it full featured, it appeared to answer, point for point, many of the perceived short comings of Apple's iPhone. Additionally, it mimicked many of the iPhone's touch-based actions possible via its touch-screen interface. Patented innovations such as '''swiping down a screen to scroll through a list''' worked in nearly the exact same way as on the iPhone. Within days, Apple spoke publicly of "going after" any company that were to "rip off our intellectual property". Palm responded, "we have the tools necessary to defend ourselves." Soon after, it was discovered that Google had specifically removed certain touch capabilities from its Android OS phone, a Linux-based device, in order to stem any conflicts with or litigation by Apple.
====Name: Mary Van Gils====
*'''Prospectus title: <span style="color:#FF0080">Yelp Case Study - Freedom of Expression</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc
**Comment:  Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp. If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[[[User:Sjennings|sjennings]] 15:53, 3 March 2011 (UTC)]]
**Comment: Hi Mary - This is a fascinating subject - the tension between freedom to express opinions and libel as well as the possible manipulations. Your decision to use Yelp forums as a focal point is also a good idea.  What is not clear to me what exactly you will be observing about the forums.  It would be great to not only observe instances of the tension points, but also to find instances where free expression has been limited by external sources (not sure if you'll be able to get access to this if it's happened.)  I really look forward to reading your project.  Best, Brian [[User:Smithbc|Smithbc]] 06:04, 7 March 2011 (UTC)
**Comment: I think Yelp makes a really interesting case study for freedom of expression, but, as mentioned above, Yelp doesn't exactly seem ripe for external limiting of free expression (in the forums at least; reviews are a separate issue), rather, I would venture to guess that the vast majority of limiting speech on the site is in the interest of the TOS. Nevertheless, I think there's a fascinating question here, and plenty of existing evidence, particularly to the question of reviews/slander.[[User:Jyork|Jyork]] 16:19, 7 March 2011 (UTC)


In September of 2008, the Wall Street Journal published an article (and subsequent editorial/blog posts) discussing a company named Intellectual Ventures (IV). IV and other companies like it such as Acacia, do not develop any products, nor do they generate innovations themselves, instead they either buy or service pre-existing patents and monetize them through licensing, or profit through litigation or threat of litigation. They are businesses in an emerging market which sees patents as an asset class to be bought en masse.


These examples will serve as example cases upon which my research will be based. I also intend to use some of the themes covered in the assigned readings of Lessig's Code 2.0.
----


'''Outline''':  
====Name: Susan Jennings [[[[User:Sjennings|sjennings]] 15:46, 22 February 2011 (UTC)]]====
*'''Prospectus title: <span style="color:#FF0080">Annuity Companies' Social Media Communities</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc
**Comments: Hi Susan, your subject area appears well-defined and methodology seems systematic.  In addition to surveying the companies' online activities, I would really encourage you to speak to the compliance person or even a marketing person in those companies to see how their efforts are going.  [You might find the marketing person easier to reach out to :) and get a response.]  Additionally, is there any way to bring in the actual federal regulators in order to get their perspective on how new social media plays in their framework for regulation?  It would be interesting to see if and how they are adapting to the new technologies.  Have fun!  Brian [[User:Smithbc|Smithbc]] 07:24, 7 March 2011 (UTC)


I. Current Events: Patent Law and Intellectual Property<br>
a. Amazon.com: 1-Click Patent<br>
b. Approaches to Multi-touch Technology (Apple, Google, Palm)<br>
c. Patent Licensing and Litigation (Acacia & Intellectual Ventures)<br>


II. Governments as<br>
a. Representatives of the public<br>
b. Defenders of the public good.<br><br>
III. Innovation<br>
a. Societal change, progress, and improvement. <br>
b. Linear vs. Generative innovation. <br>
c. Technology as force for innovation.<br><br>
IV. Ways to Promote Progress/Improvement/Innovation in Society<br>
a. Patents (History, Pros & Cons)<br>
b. The "Commons" (History, Pros & Cons)<br><br>


'''Keywords''':
----


Multi-touch, patent protection, cross-patent licensing, intellectual property, litigation play (aka patent troll), commons, innovation, generative
====Name: Alan Davies-Gavin & Alex Solomon====
*'''Prospectus title: <span style="color:#FF0080">Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf
**Comment: Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff "Jazzed.com" which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn't all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the "single and ready to mingle."Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it'll be an exciting project, I'm looking forward to what you find! ([[User:Lewtak|Lewtak]] 21:31, 1 March 2011 (UTC))
*** '' Response: Thanks Tym.  I like your observations and I think they may well contribute to our research and final content.  It's a good perspective that you bring to light.  Alan'' --[[User:Adavies01|Adavies01]] 03:49, 5 March 2011 (UTC)


'''Sources''':
----


*[http://industry.bnet.com/technology/1000770/jobs-inventor-in-more-than-one-out-of-ten-apple-patents-since-2000/ Jobs Inventor In More Than One Out of Ten Apple Patents Since 2000]
*[http://www.maximumpc.com/article/news/new_apple_patent_could_spell_trouble_multitouch_smartphones New Apple Patent Could Spell Trouble for Multitouch Smartphones]
*[http://industry.bnet.com/technology/1000741/can-apples-multi-touch-patent-withstand-scrutiny-or-challenge/ Can Apple’s Multi-Touch Patent Withstand Scrutiny  or Challenge?]
*[http://news.cnet.com/8301-13579_3-10150436-37.html?part=rss&subj=news&tag=2547-1_3-0-5 Apple awarded key iPhone multitouch patent]
*[http://www.precentral.net/palm-ceo-ed-colligan-talks-pre-investors Palm CEO Ed Colligan Talks Pre with Investors]
*[http://www.engadget.com/2009/01/30/another-pre-hands-on-video-with-palms-vp-of-design/ Another Pre hands-on video with Palm's VP of design]
*[http://www.pcworld.com/article/157084/apple_iphone_palm_pre.html?tk=rss_news Smartphone Smackdown: Apple iPhone vs. Palm Pre]
*[http://www.engadget.com/2009/01/31/switched-on-with-pre-palm-breaks-from-the-storm/ Switched On: With Pre, Palm breaks from the Storm]
*[http://www.engadget.com/2009/01/15/what-apple-could-learn-from-palms-webos/ What Apple could learn from Palm's webOS]
*[http://www.pcworld.com/article/158239/apple_sue_palm_pre.html?tk=rss_news Apple Could Sue Palm Over Pre]
*[http://www.osnews.com/story/20826/Apple_Hints_at_Legal_Action_Against_Palm Apple Hints at Legal Action Against Palm]
*[http://www.engadget.com/2009/01/21/apple-on-smartphone-competition-if-others-rip-off-our-intellec/ Apple on smartphone competition "if others rip off our intellectual property, we will go after them." ]
*[http://www.engadget.com/2009/01/23/palm-responds-to-apples-veiled-threat-over-pre/ Palm responds to Apple's veiled threat: "we have the tools necessary to defend ourselves"]
*[http://news.cnet.com/8301-13579_3-10148931-37.html?part=rss&subj=news&tag=2547-1_3-0-5 Palm, Apple posture over iPhone IP]
*[http://www.engadget.com/2009/01/28/apple-vs-palm-the-in-depth-analysis/ Apple vs. Palm: the in-depth analysis]
*[http://www.engadget.com/2009/02/15/new-meet-pre-video-demonstrates-new-functionality-incredible/ New "Meet Pre" video demonstrates new functionality, incredible calming effect]
*[http://www.pcworld.com/article/151460/google_htc_android.html?tk=rss_news Google and HTC Spent 3 Years on Android, Handsets]
*[http://www.appleinsider.com/articles/09/02/10/multi_touch_omitted_from_android_at_apples_request_report.html Multi-touch omitted from Android at Apple's request: report]
*[http://venturebeat.com/2009/02/09/apple-asked-google-not-to-use-multi-touch-in-android-and-google-complied/ Source: Apple asked Google not to use multi-touch in Android, and Google complied]
*[http://patentbaristas.com/archives/2007/07/05/doj-us-needs-more-prior-user-rights/ DOJ: US Needs More Prior User Rights]
*[http://seekingalpha.com/article/121632-acacia-research-corp-acacia-technologies-q4-2008-earnings-call-transcript?page=6 Acacia Technologies Q4 2008 Earnings Call]
*[http://blogs.wsj.com/law/2007/11/12/innovative-invention-company-or-giant-patent-troll/ Innovative Invention Company Or Giant Patent Troll? (Intellectual Ventures)]
*[http://commdocs.house.gov/committees/judiciary/hju28201.000/hju28201_0.HTM#81 Patent Trolls: Fact or Fiction?]
*[http://rss.slashdot.org/~r/Slashdot/slashdot/~3/sZOUEDPovvE/article.pl 1-Click Smacked Down Again, While Reexam Languishes]
*[http://news.cnet.com/8301-10784_3-9799269-7.html?part=rss&subj=news&tag=2547-1_3-0-5 Amazon 1-Click patent rejected]
*[http://yro.slashdot.org/article.pl?sid=07/05/15/002238&from=rss USPTO Examiner Rejected 1-Click Claims As "Obvious"]
*[http://news.cnet.com/Amazon-wins-1-Click-patent-case/2110-1030_3-5967945.html?part=rss&tag=5967945&subj=news Amazon wins 1-Click patent case]
*[http://oreilly.com/news/amazon_patents.html Bezos and O'Reilly Spearhead Call for Patent Reform]
*[http://phx.corporate-ir.net/phoenix.zhtml?c=176060&p=irol-newsArticle&ID=502842&highlight= Federal District Judge Acts to Protect Amazon.com's Patented 1-Click(R) Technology; Bars Online Competitor from Infringing on It]


====Name: Kristina Meshkova====
*'''Prospectus title: <span style="color:#FF0080">A music sharing site - Grooveshark, Soundcloud, MySpace.</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf
*Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let's chat tonight if you have any interest in potentially working together [[User:Alex|Alex]] Bryan 14:31, 1 March 2011.
**Comment: Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,[[User:lorenabuin|lorenabuin]] 12:00, 6 March 2011.


------------


*Name:  Claudette Goyanes
----
*Pitch:  Applying the psychology of Privacy Regulation mechanisms to the virtual world


I would like feedback on whether this topic seems related enough to what he have discussed; I believe it extends the discussions of the class on Peer Collaboration and the one on Privacy. As a psychology major, I can't help but observe most of our discussions from that point of view.
====Name:Vladimir Trojak-- [[User:VladimirTrojak|VladimirTrojak]] 20:01, 20 February 2011 (UTC) ====
*'''Prospectus title: <span style="color:#FF0080">Are different language groups consistent in what topics are permitted and what is removed?</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf
**Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --[[User:SCL|SCL]] 03:06, 22 February 2011 (UTC)
Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as 'neutral point of view', 'verifiability'. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.[[User:VladimirTrojak|VladimirTrojak]] 18:11, 1 March 2011 (UTC)


Environmental psychology considers the effects of environmental factors on human behavior and stress levels, and how humans adapt their behavior to reduce anxiety or stress in an environment by regulating their psychological privacy.  For example it considers the effect of having someone sit at the same table as you in the library when there are other tables open and how long on average it will take you to leave the table due to the low-level stress caused by their improper seat choice; it considers the effects of crowds and crowded spaces such as a subway car, and how humans might counter the imposition on our personal space by regulating our psychological space by not making eye contact with anyone; it considers at what distance and from what direction someone approaching us causes the most stress, and how we counter those stressors by reorienting ourselves; it considers how there is a universal understanding of personal space and how the average distance between two people in conversation under normal circumstances is understood by almost all members of a culture without ever being verbalized.   


Within the virtual world, studies have shown that very soon after a new technology is developed, individuals develop distinct social expectations for behavior, and soon find ways to regulate their psychological privacy by using features of the technology to keep people at a certain psychological distance.  For example, studies have shown that there are behavioral expectations for cell phone use:  If you have a cell phone, there is often an expectation that you will generally be available for calls and if you are unreachable for even a couple of hours, there can be social consequences from a friend, parent or partner.  And when a person thinks you purposely hit Ignore when you saw their incoming call (who hasn't gotten the dreaded one ring and suddenly you're sent to voicemail and thought "Hey! That jerk ignored my call!) they may be offended, even though everyone has a right to determine when they can or can't talk.  So how do humans counter the virtual privacy intrusion they experience as a result of having a cell phone?  Are the mechanisms similar to those we use for privacy regulation in our physical space?  One answer can be found in the growing popularity of text messaging.  It's a way of being instantly available to interact with someone while holding back information (as unimportant as it may be) as a way of balancing the feeling of intrusion.  They may need an answer to their question right now and you may feel pressure to respond, but in responding they will not hear that your voice is scratchy from just waking up or hear the background noise that gives away your location and current activity. 
----
 
For my project, I would like to compare privacy regulation mechanisms utilized in personal space and find corresponding mechanisms developed in a virtual environment that almost everyone is familiar with:  the instant message.  Widespread instant messaging programs started as very simple programs and as a result of their growth in popularity, over time have developed many features and styles of usage which serve to regulate privacy and can be correlated to similar mechanisms used in real space.  In my paper, I would discuss elements of instant messaging ettiquette, instant message program features, and common behaviors, and relate them to theories of environmental psychology.
Some examples include use of the Away message, font color and size options, alert sounds, availability expectation, appropriate methods of approach, the use of the invisible sign on, etc.


Does this sound like an acceptable topic?  
====Name: Faye Ryding [[User:FMRR|FMRR]] 23:59, 21 February 2011 (UTC)====
Thanks,
*'''Prospectus title:<span style="color:#FF0080"> Trolls and vandals on Epinions.com</span>'''
Claudette
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc
**Comments: Hello Faye, I read your prospectus but had the following thought. What if the person belives they are in the right? Does that make them still a vandal? And can you outline excatly what recourses one can take against such offenders? What authority can someone make a complaint to? That last question brings us to a much bigger, more complex one. Who has the soveriegn rights over the web? The government? A trade federation? Or individual users? --[[User:Elishasurillo|Elishasurillo]] 04:46, 7 March 2011 (UTC)
** Facebook recently launched an "anti-troll" algorithm that reduces troll comments by ~50%. Perhaps Epinions.com has implemented a similar algorithm too, and a comparison could be made. [[User:Deinous|Deinous]] 20:04, 8 March 2011 (UTC)


------------


*Name: Arthur Kasdan
----


*Pitch: Software companies like CISCO, Microsoft, Adobe, and others who produce expensive software (or any commercial software for that matter) stand to lose (and have lost) large amounts of money to piracy.
====Name: [[User:Alex|Alex]] Bryan 16:59, 21 February 2011====
*'''Prospectus title: <span style="color:#FF0080">Groooveshark music application</span>'''
*'''Link to prospectus''': http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf
**Comments: Hi, Alex. Sorry that didn't answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let's discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com [[Kristina Meshkova]], 5 March 2011.
**Comment: Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina's project, I think both of your prospects are very interesting, I will be following them. Good luck [[User:lorenabuin|lorenabuin]] 12:06, 6 March 2011 (UTC)


Hotline Connect, released in 1997 (I was 8), was the first software in my experience that was often used to pirate software. An underground community developed in which certain people would download the Server edition and host chat rooms which could easily share files they chose on their computer. Many of these turned into black markets of a sort for software and pornography; one would often be required to upload one valuable program before being given an account on one of these servers. Many of these servers contained thousands of dollars of software easily obtainable by being nice to the administrator, at best, and uploading something of your own at worst. And things have gotten much easier from there.


P2P programs that many are familiar with now are widely used, from Limewire to BitTorrent applications. Software, licensed multimedia of all kinds and any other copyrighted digital material is available to anyone who takes the time to look it up on Google.
----


How can this be prevented- or at least discouraged- while respecting the rights and privacy of users?
====Name: Robert Cunningham====
*'''Prospectus title: <span style="color:#FF0080">The Archive Team</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf
**Comment: Hi Robert!  Interesting subject, you've narrowed down nicely on one particular group and your areas of interest should cover nicely what the group is and does nicely.  Also, your methods seem achievable and will allow you to experience the group, not just observe it (one of the core challenges for many of the projects, including mine.)  The one counsel I would give is to go back to the course material we've been discussing to tie the Archive Team back into the course themes.  As examples, you could look at the incentive system for contributors, the group hierarchy and governance for control and decision-making, the architecture of the online tools they use, or the merging of offline and online worlds.  Have fun! [[User:Smithbc|Smithbc]] 07:13, 7 March 2011 (UTC)


        What effective approaches have been taken or proposed here or in other countries?


Does the ability to legally download software decrease the amount of illegal downloading of that software?
------------


*Name: Meredith Whittaker
----
 
*Pitch: '''RIAA stops suing individuals, partners with ISPs to punish pirates (and why this is fascinating!)'''
 
'''Synopsis'''
 
In mid-December, the Wall Street Journal reported that the Recording Industry Association of America (RIAA) was set to switch from suing those suspected of illegal file sharing, to partnering with an undisclosed list of Internet service providers (ISPs) to target suspected music pirates with warning letters and, potentially, suspension of Internet service.
 
The RIAA sees this new strategy as a better and more friendly deterrent to music pirating: a lighter punishment more frequently, and more publicly administered.
 
While this move doesn't preclude additional lawsuits, it marks a sea change from the RIAA's litany of suits, which has done little to stem the tide of file sharing while painting the RIAA to many as a litigious, mean-spirited dinosaur.
 
As part of the agreement, ISPs would be asked to send warning emails to users whom the RIAA identifies as making music available for illegal download. An undisclosed number of warnings, possibly accompanied by slowed Internet speeds, would be sent before punishment, identified vaguely as a reduction in service, and not precluding the possibility of service suspension, took effect.
 
The ISPs would not be asked to divulge details about the users to the RIAA or others.
 
Due process for those wrongly accused is still being worked out.
 
'''All this makes us ask... (Or, what I'll research)'''
 
*What are the effects when "intermediaries", in this case ISPs, are asked to police content?
*What are the effects of taking the punishment for alleged infringement out of the public, judicial realm, and making it a private matter decided by means of a private enforcement regime?
*What are the general implications of a cozy relationship between content distributors and (some, but not other) content creators and providers?
*With the precedent of this kind of enforcement, will some il/legal activity be monitored, and punished, more severely than other il/legal activity due to deals between ISPs and the activities' purported victims?
*Protracting out from this specific case, if ISPs are asked (as they have been in the past, notably by the Motion Picture Association of America) to actively police content via filtering technologies, what becomes of fair use? What rights to privacy should those accessing content via an ISPs "tubes" retain? Is impartiality a quality that should be preserved in intermediaries (ISPs)?
*Is Internet access a right that should be protected? Or, what other rights are infringed upon when Internet access is revoked?
*''And others suggested by you! (Please, feel free to add your questions here.)''
 
'''Sources so far'''


*[http://online.wsj.com/article/SB122966038836021137.html:Music Industry to Abandon Mass Suits - WSJ (12/19/08)]
====Name: [[Joshuasurillo]]====
*[http://news.cnet.com/8301-1023_3-10127050-93.html?tag=newsLeadStoriesArea.1:Copy of RIAA's New Enforcement Notice to ISPs - C-Net (12/19/08)]
*'''Prospectus title: <span style="color:#FF0080">The effect of government transparency websites- Wikileaks</span>'''
*[http://news.cnet.com/8301-1023_3-10126914-93.html?tag=mncol;txt:RIAA drops lawsuits; ISPs to battle File Sharing - C-Net (12/19/08)]
*'''Link to prospectus:'''http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc
*[http://news.cnet.com/8301-13506_3-10127017-17.html?tag=mncol;txt:Lawsuits of not, the RIAA still doesn't understand us - C-Net (12/19/08)]
**Comment: Joshua, I am very much looking forward to your final product. Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus. I wonder if you will reach an opinion as to where to draw the line on "free speech," or if no line should be drawn?  My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus. If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that?  If not, what else would you feel would be "going to far?" I look forward to reading more from you.  [[User:Coreymacd|Coreymacd]] 01:25, 1 March 2011 (UTC)
*[http://news.cnet.com/Should-ATT-police-the-Internet/2100-1034_3-6226523.html?tag=mncol;txt:Should AT&T police the Internet? - C-Net (1/17/08)]
**Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--[[User:Joshuasurillo|Joshuasurillo]] 01:32, 7 March 2011 (UTC)
*[http://news.cnet.com/8301-1023_3-10127313-93.html?tag=mncol;txt:RIAA president: no talk of blacklisting file sharers - C-Net (12/19/08)]
*[http://arstechnica.com/old/content/2007/12/mpaa-head-content-filtering-in-isps-best-interests.ars:MPAA head: content filtering in ISPs best interest - ArsTechnica (12/05/07)]
*[http://arstechnica.com/old/content/2007/06/att-willing-to-spy-for-nsa-mpaa-and-riaa.ars:AT&T announces plan to filter "pirated" content from its network - ArsTechnica (6/07)]
*[http://arstechnica.com/old/content/2008/03/canadian-isps-furious-about-bell-canadas-traffic-throttling.ars:Canadian ISPs furious about Bell Canada's traffic throttling - ArsTechnica (3/25/08)]
*[http://arstechnica.com/old/content/2008/03/mpaa-hopes-to-unclog-the-tubes-verizon-wants-no-plumber.ars:Verizon wants fat pipes, not a badge; MPAA urges filters - ArsTechnica (3/28/08)]
*[http://news.cnet.com/8301-10784_3-9905266-7.html:MPAA to broadband providers: pull the plug on piracy - C-Net (3/28/08)]
*[http://blog.wired.com/27bstroke6/2008/12/mpaa-urging-oba.html:MPAA urges Obama to embrace Internet filtering - Wired (12/10/08)]
*[http://www.eff.org/deeplinks/2008/12/riaa-v-people-turns-lawsuits-3-strikes:RIAA v. the people turns from lawsuits to three strikes - EFF (12/19/08)]
*[http://www.berr.gov.uk/consultations/page47141.html:Consultation on legislative options to address P2P file sharing - Dept for business, enterprise and regulatory reform (UK) (3/10/08)]
*[http://www.eff.org/deeplinks/2008/04/european-parliament-sarkozy-no-three-strikes-here:European parliament to Sarkozy: no "three strikes" here - EFF (4/10/08)]
*[http://www.eff.org/wp/riaa-v-people-years-later:RIAA v. the people: five years later - EFF (9/08)]
   
   
--[[User:Meredith|Meredith]] 21:28, 22 February 2009 (UTC)


------------
----
Name: '''William Alexander Duke'''


Pitch: '''Privacy you must fight for it'''
====Name: Susan Lemont====
*'''Prospectus title: <span style="color:#FF0080">Why do people cultivate large online networks?</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc
*Comments:
**Comment: Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, "reputation", and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook 'friends' of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to 'friending' vs. those which were made as a result of meeting virtually via facebook.) [[User:BrandonAndrzej|BrandonAndrzej]] 04:34, 5 March 2011 (UTC)
**Comment: Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don't know why you have more than 200 friends. I will be following your work with interest, good luck! [[User:lorenabuin|lorenabuin]] 11:53, 6 March 2011 (UTC)
***Response: Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:


Privacy on the web and in the physical world is receding. We see more and more of where people have windows in their lives through information. Because information can be knowledge and knowledge can be power we have an imminent need to protect privacy of our information. An assault on our privacy can come from private, commercial, or governmental avenues. As an adult does anyone have the right to know what you do, say and where you go at any moment and otherwise have your life dissected? I don't think so, but yet we see technology creeping up and stripping away privacy.
The main items that need to be addressed is that all information is property with respect to ownership. Meaning a data owner or creator by action has the right to all data they create and it is considered their property. In addition to that anonymity and privacy should be inviolate with respect to voluntary identification. Meaning that a person can choose to identify themselves online, but is never forced.


In a case in New York an Event Data Recorder (EDR) showed that a man was speeding at the time of an accident; however the data was obtained without the driver's permission or a warrant. I find that to be unreasonable, as the data of the EDR is a part of the vehicle and is created by the actions of the driver and could be construed as property of the owner. The data was seized without regard to it being private property that was not in "plain view" and nor was data contraband. This violates the exclusionary rule in my opinion, as data is property. A New York court did not see it that way and ruled that data was not property.
====Name: Susan Lemont --[[User:SCL|SCL]] 20:23, 6 March 2011 (UTC)====
* '''Prospectus title: <span style="color:#FF0080">What conditions are conducive to successful commons based peer production?</span>'''
On the reverse we see cases involving Recording Industry Association of America (RIAA) bringing to bear lawsuits for copyright infringement for downloading or distributing music through peer-to-peer sharing software, it is considered a felony. How in one context can data be a protected and considered property and in another that classification is irrelevant? Where is equal protection under the law? Data is property.
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc
**Comments:  Hi Susan. I like the way you tie the course readings into your project and your "test" of the theoretical writings on a real-life subject.  So much of what we study is based on the success stories but we often can learn more from the failures. It will be interesting to know whether some of Benckler's or Zittrain's critical success factors were missing or whether they were all there and the project did not succeed for other reasons. I look forward to reading more about this in your projects. Best, Brian [[User:Smithbc|Smithbc]] 07:39, 7 March 2011 (UTC)
Everything you do on the internet leaves a trail, one that could be traced back to you and gives whomever a window into your life. Does someone have a right to know that you have three kids? Where they go to school? What credit cards you have? What groceries are in your home? Your sexual preferences? No, they do not.
I propose that there never be any restrictions on anonymizing software, proxy and anonymous remailer services or other means of keeping your identity or information of your choosing private.
Mail has nothing but a lock made of paper, Attorney-client privilege is a lock made of vibrated air and belief. A lock made of ones and zeros should be respected as well.


'''References'''
Abelson, Ledeen, Lewis, Blown to Bits, Chapter 2: Naked in the Sunlight: Privacy Lost, Privacy Abandoned


------------
----


Name: '''Paul Lester'''


Pitch: '''The changing face of journalism'''
====Name: Chris Sura [[User:ChrisSura|-Chris Sura]] 03:13, 22 February 2011 (UTC)====
*'''Prospectus title: <span style="color:#FF0080">The Java Community Process: How Does It Really Work?</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf
**Comment: Admittedly, I knew nothing of JCP prior to reading your prospectus, but it's a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! [[User:Myra|Myra]] 23:24, 6 March 2011 (UTC)




The theme for my final project is how the Internet is changing the face of journalism. The rise of the Internet has dramatically altered how we define journalists, our consumption of media and how news organizations generate revenue streams.
----


In Merriam-Webster’s dictionary, the first definition of news is [http://www.merriam-webster.com/dictionary/news “a report of recent events.] As technology becomes more accessible, the line between those who report recent events and the audience has blurred.
====Name:  Ed Arboleda    [[User:Earboleda|Earboleda]] 04:42, 22 February 2011 (UTC)====
* '''Prospectus title: <span style="color:#FF0080">Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf
**Comments: Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html [[User:Ltconnell|Ltconnell]] 20:49, 5 March 2011 (UTC)


In the mid-1990s, blogging became a popular method for people to publish their ideas and observations. Far from being online diaries, bloggers actually broke or enhanced the news.  For instance, shortly after CBS aired Dan Rather’s "60 Minutes" segment alleging George Bush received special treatment during his service in the Texas National Guard, [http://dir.salon.com/story/opinion/feature/2005/03/09/rather/ bloggers quickly debunked the report] by pointing out key documents used in the story were forgeries.


The Internet has spawned an entirely new genre of story telling known as citizen journalism.  In 1999, activists who were protesting the World Trade Organization meetings in Seattle wanted their experiences documented. Frustrated by the scant exposure from traditional media outlets, the [http://www.indymedia.org/en/static/about.shtml activists started Indymedia], where they posted stories, video and photos of their demonstrations. Wikinews allows everyday people to write news articles on any topic for a large audience.  On a [http://www.washingtonpost.com/wp-dyn/articles/A46519-2004Dec8.html smaller scale], [http://www.ibrattleboro.com/ iBrattleboro.com], a community news site in Brattleboro, Vermont, contains news articles posted only by residents of the town.
----


Even large media companies are engaging in participatory journalism. [http://www.cnn.com/ireport/ CNN’s iReport] and [http://news.bbc.co.uk/2/hi/talking_point/default.stm BBC’s Have Your Say] are just two examples of news organizations asking for users to contribute stories, video, photos and other content.
====Name: Elisha Surillo====
* '''Prospectus title:<span style="color:#FF0080"> The Tea Party and Internet Freedom</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc
**Comment: I'm confused.  This link does not seem to take me to the correct prospectus?  Elisha, could you update this to make sure I can access yours?
**Comment: Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha's file is the second link.  Sorry for any confusion. [[User:Deinous|Deinous]] 02:33, 6 March 2011 (UTC)
**Comment: I don't believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--[[User:Joshuasurillo|Joshuasurillo]] 04:34, 7 March 2011 (UTC)
***'' Response: Sorry I would change the name but I don't know how. Sorry for the confusion!'' --[[User:Elishasurillo|Elishasurillo]] 04:48, 7 March 2011 (UTC)


Technological advances in social networking sites such as [http://qik.com/ Quik], [http://flickr.com/ Flickr] and [http://twitter.com/ Twitter] are making it easier for users to break news faster than any television channel can.  [http://www.telegraph.co.uk/scienceandtechnology/technology/twitter/4269765/New-York-plane-crash-Twitter-breaks-the-news-again.html Janis Krums] was one of the first people to post an online photo of the US Airways plane that landed in the Hudson River. While television helicopters and print photographers were scrambling to determine a game plan for covering the story, Krums, who was standing on a ferry that was en route to rescue passengers and crew of the ditched plane, snapped a photo of the scene with his iPhone. He then sent the picture to Twitter via [http://twitpic.com/135xa Twitpic] along with a [http://twitter.com/jkrums/status/1121915133 status update] reading “There's a plane in the Hudson. I'm on the ferry going to pick up the people. Crazy.”


The consumption of news has changed as a result of Really Simple Syndication (RSS). Instead of waiting for our morning paper for the day’s headlines, we now use RSS readers to aggregate news from multiple sources from around the world and have it delivered to us as soon stories are posted.
----


Newspapers across the country are [http://people-press.org/report/479/internet-overtakes-newspapers-as-news-source suffering a slow death] as a result of the Internet. Revenue has declined as newsstand sales, advertising and print subscriptions dry up. Papers are being forced to find new business models in order to survive.
====Name: Brandon A. Ceranowicz - [[User:BrandonAndrzej|BrandonAndrzej]] 08:29, 22 February 2011 (UTC)====
* '''Prospectus title:<span style="color:#FF0080"> A Comparative Study of Open Source Licenses</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_Assignment_2_-_Prospectus_BAC.doc
**Comment: Hello Brandon! I think your topic can be very interesting.  However I think it would be important for you to have a specific focus since the topic seems so broad. I don’t know how relevant this would be, but I suggest that you take a look at the Open Content License. (http://www.opencontent.org/opl.shtml) Good luck! [[User:Quill80|Quill80]] 22:49, 5 March 2011 (UTC)


Some newspapers, like the Detroit Free Press and Christian Science Monitor, are either making large cuts to their print product or scrapping them altogether. One experimental method to help generate money for newspaper websites is called micropatronage, which is how open source projects like spot.us fund their journalistic endeavors. The idea is that the public will donate cash to fund stories they are interested in. Newspapers are also considering using some sort of [http://www.time.com/time/business/article/0,8599,1877191,00.html micropayment system] to charge readers for content. However, no news organization has figured out a way to make this system work.


Although there are many more ways the Internet is changing journalism, I hope to concentrate my efforts on the topics listed above. However, after conducting more research, I may find that just one of the issues (such as social networking and journalism) warrants my entire focus of the project.  --[[User:Paulglester|Paulglester]] 22:12, 22 February 2009 (UTC)
----




------------
====Name: Lorena Abuín====
* '''Prospectus title: <span style="color:#FF0080">Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf
**Comment: I noticed that there is a lot of crossover between our topics.  We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here.  Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is.  They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous.  In other words, Anonymous is a concept more than an identifiable specific group.  I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published.  It could simply be the rantings of teenager enamored with the publicity of their antics and activity.  The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized.  There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal.  Good luck, and I look forward to watching your project develope! -----=:) [[User:Deinous|Deinous]] 23:28, 23 February 2011 (UTC) for the #datalove   
**Comment: I found that some of your research objectives coincide with mine. I can assure you that people do use what is called "hacktivism" to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler's Army is not a secret nowadays because of the "hacktivism", although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the "wrong way" is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the "uniformed criminals" employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&task=view&id=17&Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers' dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --[[User:VladimirK|VladimirK]] 10:29, 25 February 2011 (UTC) 
**Comment: Hai.  Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers.  Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker.  In a nutshell, hackers create things and crackers break things.  Most hackers look down upon crackers and dismiss them as technological bugs.  Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once.  Pastebin happens to not be one used for documents all that much though.  It is mainly used to send larger pieces of  text into chat protocols such as IRC without flooding the channel.  Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it.  Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society.  I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, "[http://www.catb.org/~esr/faqs/hacker-howto.html  How to Become a Hacker]" describes the difference quite well. [[User:Deinous|Deinous]] 03:11, 26 February 2011 (UTC)
**Comment: Hi Lorena.  I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas.  I think the comments I made under Deinous' posting are applicable here as well.  It's good to see this topic having such strong discussion.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 04:06, 5 March 2011 (UTC)
***'' Response: Hi, Alan, thanks a lot for your interest! I can't find your comments below deinous' prospect, and I would really like to check them.'' [[User:lorenabuin|lorenabuin]] 12:12, 6 March 2011 (UTC)
**Comment: I too went in search of Allen's comments and were unable to find them :(  [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)


*Name: Zeeshan ALi
----
*Pitch: Internet: a Foe!!
I would like to discuss matters over the increasing use of internet that can affect the human life in various ways. Our dependency for day-to-day work on the internet is certainly on the rise. I would like to spread my topic in three main points:
1). CYBERCRIME: in today’s world, internet banking is preferred to most people where they can easily access to their bank accounts, transfer money and purchase goods etc etc. But with increasing hacktivism, there is more probability of theft of intellectual property & money. Money alone is not the issue; personal stuff from the internet can be stolen not knowing whether it ever existed.
2).  Copyright: Another major issue with the internet is that there is illegal downloading of music, movies and software. Though the internet filtering police has done much to stop illegal downloading but the use of torrents is still very common in the UK and America. One cannot say that innovation in internet filtering is stopping illegal access to websites because juxtapose the technology innovation, there is improvement in hacking methods and it will continue to pursue. Also, illegal music downloading is very common but it is wrong for the musicians as they work hard on their albums and they should earn every penny of royalty by legal purchase of music.
3). General harms of internet on human beings.


I have based my topic only on the harmful effects of internet and i will make a mind-map on these points with references for assignment 3.
(note: I am not totally against the INTERNET but i would like to enlighten people about the Augmenting harms of the internet)
------------
*Name: '''Jay Eberhard'''
*Pitch: '''Information in the public record: Who really owns the data that forms your identity?'''


Information in the public record has always been freely accessible to all; however, the access of such information was restricted by physical barriersThe internet has removed those barriersInterested individuals now have tremendous power in the collection and aggregation of sources on the internet which act as a vendor for this informationPersonal information that resides in the public record is certainly an asset, but who really owns it? I will look at the issue of ownership of public information, from both a traditional economic standpoint and from a technological standpoint, since both are of equal importance.   
====Name: Margaret Tolerton [[User: deinous|deinous]]====
* '''Prospectus title:<span style="color:#FF0080"> Jailbreaking appliance based gadgets and game consoles: the legal and generative implications</span>'''
* '''Link to prospectus:'''http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc
**Comment: Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about "hacktivism", I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every "hacktivist" action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called "cyber-crimes" that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: "Happy to help others who are not as advanced?". I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don't hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín.  --[[User:lorenabuin|lorenabuin]]  21:00, 25 February 2011 (UTC)
**Comment: LOL, I don't know how privileged my point of view is.  I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations.  Telecomix is very open about their work, and does not engage in illegal actions.  Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment "happy too help others who are not as advanced" is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problemFor example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know  how to fix the problems will jump in and start coaching with many lulz along the way.[[User:Deinous|Deinous]] 03:45, 26 February 2011 (UTC)  
**Comment: Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where "I can do this, I can do that" type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus's sources can prove, but take a look at National Security Agency [http://www.nsa.gov/] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --[[User:VladimirK|VladimirK]] 06:14, 3 March 2011 (UTC)
***'' Response: Thank you for your response and comments.  I will certainly take them into considerationHowever, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking.  I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them.  As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use.  Over this past year we have watched  the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use.  Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and  homebrewed games.  I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it. As for an original angle, I am still waffling a bit, and welcome any further comments.====:)'' [[User:Deinous|Deinous]] 17:36, 3 March 2011 (UTC)
**Comment: Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of [http://en.wikipedia.org/wiki/Tivoization Tivoization] (if you have note already considered such).  The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate.  --[[User:Gclinch|Gclinch]] 16:54, 5 March 2011 (UTC)
***'' Response: Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again.'' [[User:Deinous|Deinous]] 19:50, 5 March 2011 (UTC)
**Comment: Margaret, I am very glad you found my suggestion helpful.  I look forward to your final output. It’s a really intriguing topic.  Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright)My colleague [http://www.youtube.com/watch?v=qiYi3iEBJNM Arn Hyndman] is the chief architect.


Economically, information is an intangible good, meaning that if someone purchases information it does not cease to exist.  Information is a public or non-rival economic good.  Yet even information in the public domain is valuable and vulnerable, and currently almost entirely without protection. Beyond Google, there are vast amounts of public information available, either for sale or for the taking, which individuals retain little if any control over and are easily exploited.  A new section of economic activity is thus opened by the sale of public information, a good that was once freeTo what extent should public information be protected from such activity? What ethics should such vendors follow when conducting their business?
Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study groupWould you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework. 


From a technological standpoint, the information systems that house public record information are an additional asset aside from the information itselfWithin each system are separate policies, different responsibilities and roles and security measures for the same information. Should a common framework for access of public record information be established to ensure that policies and procedures in place at the original organization have their enforcement maintained, even as the data migrates to the systems of other organizations? What might such a framework mandate in the rights of the information while allowing the owners of the technological assets to retain ownership of their information systems?
Also, anyone who is working as a group in developing their project can use it to collaborate virtuallyThere are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --[[User:Gclinch|Gclinch]] 23:06, 6 March 2011 (UTC)
***'' Response: Guy, I think using web.alive as a platform for a study group is a great idea. Perhaps you can make an announcement in class this week.''  [[User:Deinous|Deinous]] 00:59, 7 March 2011 (UTC)


The question which I seek to answer essentially is "Who owns public information?" which is essentially the question asked by Anne Branscomb asked, but her analysis is quite dated, as her book on the broader subject was published 15 years ago, and much has changed since then.  I would like to provide a contemporary update to this question for the area of public record information.
--[[User:Jeberhard|Jeberhard]] 20:37, 23 February 2009 (UTC)


----
----


Name: Hilary
====Name: Guy Clinch -- [[User:Gclinch|Gclinch]] 13:22, 22 February 2011 (UTC)====
* '''Prospectus title (updated Mar 20): <span style="color:#FF0080">The Transition to Next Generation 9-1-1 in North America</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Internet_and_Society_Assingment_2_%28revised_Mar_20%29.pdf


Pitch:  
*To my Classmates: As of March 20 I have changed the title and subject of my finalk project proposal. --[[User:Gclinch|Gclinch]] 01:28, 21 March 2011 (UTC)


The open and free availability of data in science is seen by many as necessary for ensuring reproducibility of results, diversity of analysis, and promoting open inquiry. The Internet provides a low-cost way for scientists to distribute and share data and several major funding organizations such as the NIH have issued statements designed to promote sharing [http://grants.nih.gov/grants/policy/data_sharing/data_sharing_guidance.htmHowever, many researchers in the biomedical sciences are hesitant to share data online. .[http://jama.ama-assn.org/cgi/content/full/287/15/1939]
*It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore.  http://apex.avayalive.com/715/html
I look forward to reading your ideas. Thank you. --[[User:Gclinch|Gclinch]] 19:24, 3 March 2011 (UTC)
**Comment: Hai Guy! I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application.  Very well designed indeed.  Were you one of the developers?  I'm afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. [[User:Deinous|Deinous]] 18:32, 6 March 2011 (UTC)


In a previous study, I examined whether genetics and bioinformatics researchers are using intellectual property controls to assert rights in online databases in order to control the use or redistribution of their data. I looked at databases mentioned in the Nucleic Acids Research database issue [http://nar.oxfordjournals.org/content/vol37/suppl_1/index.dtl] to see if they included copyright notices or licenses governing use of the data. I found that almost half of online scientific databases surveyed contain notices claiming copyright (the majority of those claiming copyright claim copyright by the institution) and a significant minority use custom licenses intended to restrict use of online scientific databases. 33% of the 40 databases randomly selected from the 2009 NAR Database issue contain notices attributing copyright to the institution. 35% of the databases randomly selected from the 2009 NAR Database issue also used licenses, with 26% using custom "browse-wrap" or terms of service licenses.  Of these custom licenses, more than half included "non-commercial" terms.


For example, the Deja Vu project contains the following notice:
----
"''This software and data are provided to enhance knowledge and encourage progress in the scientific community and are to be used only for research and educational purposes. Any reproduction or use for commercial purpose is prohibited without the prior express written permission of the University of Texas Southwestern Medical Center. Please be aware that you are transmitting your data on an unsecured link and UTSW is not responsible for the security of that data. Copyright 1999-2007 by University of Texas Southwestern Medical Center All Rights Reserved''" [http://spore.swmed.edu/dejavu/disclaimer/]


There are three issues I am interested in. First, it is not clear that one can assert copyright in databases [http://carrollogos.blogspot.com/2009/02/copyright-in-databases.html] and I wonder if the use of copyright notices on databases creates a "chilling effect" thereby discouraging other researchers from using the workSecond, it is generally assumed by academics that their works are exempt from the "work-for-hire" clause in the Copyright Act. [http://www.aaup.org/AAUP/protect/legal/topics/copy.htm] However, several recent cases have challenged this exemption. [http://www.ipfrontline.com/depts/article.asp?id=15376&deptid=4] Any formal challenges to this would have significant implications for licensing agreements signed by the researchers. I am curious to find out whether the use of copyright notices attributing copyright to the institution are indicative of a shift in attitudes by researchersThird, since the majority of databases with licenses have non-commercial terms, I would like to investigate researchers' attitudes towards commercial use. 21% of geneticists surveyed by Campbell et al. [http://jama.ama-assn.org/cgi/content/abstract/287/4/473] stated concerns about protecting the commercial value of results as a reason for withholding results.I would like to understand what applications researchers see as "commercial" uses of their work and what their concerns are regarding commercial re-use.
====Name: Syed Yasir Shirazi [User: syedshirazi]====
* '''Prospectus title: <span style="color:#FF0080">Online Group Buying - Newly Emerging Business Model or Fad?</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf
**Comment: Syed, this is a really interesting topic, but I am concerned that it may be too broad. I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre!  Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial.  It might even be interesting to compare the twoOr, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide?  Just some ideas to help you get this topic down to something manageable. Does this help at all? [[User:Mcforelle|Mcforelle]] 21:05, 5 March 2011 (UTC)
***'' Response: Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about 'websites that allow users to decide which company they want to solicit coupons from' has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir ''  ~~[[User:syedshirazi|syedshirazi]] 22:14, 06 March 2011


-- [[User:Hilary|Hilary]] 06:27, 24 February 2009 (UTC)


----
----


*Name: Devon K. Lind
*Pitch: '''Creative iTransparency'''
<p>
*<div style="color:#003399">Creative property released through the vehicle of transparency will reclaim the inherent right of the creator and supersede government confiscation because: an idea, once released is incapable of confinement.</div></p>
<blockquote><blockquote>Creative iTransparency will:<blockquote>
<li>Redefine creative property rights.
<p>
<li>Provide an open and accountable environment for authors and artists to cultivate the creative culture of literary and artistic works.
::[In the same counterintuitive way that the ''unlocked'' generativity of open source and wikis has succeeded.]
</p></blockquote></blockquote></blockquote>


:*'''Project in two parts''':
====Name: Jessica Sanfilippo - [[User:Jsanfilippo|Jsanfilippo]] 16:03, 22 February 2011 (UTC)====
:::<dd>I. Map online creative commons ecosystem, based primarily around the case studies of the [http://creativecommons.org Creative Commons].
* '''Prospectus title: <span style="color:#FF0080">Transparency and Participation in Crowd Funding</span>'''
<p>
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc
:::<dd>IIEvaluate Creative iTransparency through online creative commons ecosystem to investigate if "open and accountable" systems exist and are potentially demonstrating transparency and visibility.  I plan on taking the best of the collected specimens to assess each system as a model of Creative iTransparencyIf these systems turn out to provide enough transparency they would thereby be capable of providing visibility through being an "open" platform available and accessible to all. Accountability would then fall on the visibility and equal "citizenship" of the environment and ideally would extend to the observers/outsiders to the environment. My hypothesis is that if all of the above line up accordingly protection of the work will rely less on the legality of copyright as we now know it and will be provided through iTransparencyIn the absence of a working model I will lay out the research as to why a model is not [yet] possible or not [yet] present and will then build a hypothetical model to present what I think would work according to the downfalls of the observed non-working models.</p>
**Comment: Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point outMicro Loans and sites such as Kiva.com are also wonderful examples of crowd funding.  I am probably over reaching, but I  noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow?  What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site? Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).
**Comment: Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir ~~[[User:syedshirazi|syedshirazi]] 21:24, 06 March 2011


:*'''The Shortcomings of Copyright''':<blockquote>“No good case exists for the inequality of real and intellectual property, because no good case can exist for treating with special disfavor the work of the spirit and the mind.” (Helprin, 2007)<ref name="Helprin2007">Helprin, Mark [http://www.nytimes.com/2007/05/20/opinion/20helprin.html?_r=1&pagewanted=print A Great Idea Lives Forever. Shouldn’t Its Copyright?], [http://www.nytimes.com NYTimes.com] May  2007</ref></blockquote>
<blockquote>'''Duration''': Once the limited duration of copyright runs out (50 years after death in most countries, 70 years in the U.S.) the creative property enters a sort of economic exploitive limbo passing over the descendants of the creator to remain under the “protection” of the publishers, executives and businesses connected to the work.</blockquote>
<blockquote>'''Invisability & Convolution''': The legal protection of literary and artistic works under copyright prevents only unauthorized use of the expressions of ideas, ''not the ideas themselves''.  The law can be – and in most countries is – simply declaratory. So a created work is considered protected as soon as it exists without any public register of copyright (as in the instance of industrial property).<ref name="WIPO">[http://www.wipo.int/about-ip/en What is Intellectual Property?], [http://www.wipo.int WIPO]</ref>  Economic and moral infringement of copyright is therefore easy, and if without means of visibility, difficult to prove.</blockquote>
<blockquote>Intellectual property defined:<p>
Intellectual property is divided into two categories: ''Industrial property'', which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and ''Copyright'', which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs. (World Intellectual Property Organization)<ref name="WIPO">[http://www.wipo.int/about-ip/en What is Intellectual Property?], [http://www.wipo.int WIPO]</ref></p></blockquote>
--[[User:Devonklind|Devonklind]] 16:40, 25 February 2009 (UTC+8)
--Revised [[User:Devonklind|Devonklind]] 19:40, 7 March 2009 (UTC+8)
:*References:
<blockquote><references/></blockquote>


----
----


*Name:'''Jan-Carlo De Hoyos'''
*Pitch: '''Legal and Free Music sharing'''
A great network has transpired in which massive amounts of media are vastly transferred and exchanged between many people.  Through Peer-to-Peer networks, and even simpler methods, such as file hosting, or even a simple e-mail attachment, "copyrighted" and "protected" media is shared between one or more parties, alleviating each recipient of any and all financial input.
It is not at all uncommon to find a person who has a great media library, filled with lots of albums from almost every artist they have ever listened to, and their favorite movies and films, almost none of which were paid for. To some, this is considered immoral, wrong, and possibly even tragic.  But can you really blame these people? This material is all readily available through the P2P softwares and BitTorrents, and when it comes down to it, everybody is looking for the cheapest price.  What price could be cheaper than free?


There are benefits for the those who are involved in marketing the music. By providing the media online and free, physical production costs for the media would be greatly reduced.  Reduced amounts of CD cases, CDs, cover printing, and the lack of mass production would lead to less shipping to each and every store that will carry the product. In the long run, they could take a look at where they are spending those finances, and use it for something else, like developing new clothing and shoe lines, jewelry, stickers, patches, or any other form of product placement representing the artist.  This way, fans can purchase something unique and personalized while still advertising for the artist.  In addition, curious observers of these products can simply look up the artist, obtain and listen to their songs for free, and possibly become fans themselves.


With the general prices of CDs currently ranging from 10 to 20 dollars, it can get expensive to purchase more than one cd. and with the general price of an online song at 99 cents, buying individual songs can eventually, at times, cost more than the CD itself.  For the consumer, the benefits of free music sharing are quite obvious. The music that they all know and love is readily available, alleviating the costs of purchasing CDs or even paying iTunes downloads as well as other services. The costly expenses of CDs can be redirected towards buying the various clothes and other products provided by their favorite artists.
====Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [([[User:Anna|Anna]] 17:03, 22 February 2011 (UTC))]====
*'''Prospectus title: <span style="color:#FF0080">Analysis of E-Government Practices in Brazil</span>'''
*'''Link to prospectus:'''http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf
**Comment: Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing  subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).
The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper.  ~~[[User:syedshirazi|syedshirazi]] 21:21, 03 March 2011 (UTC)
**Comment: Hi, I believe you should also compare other countries E- Government practices to Brazil's. It might be interesting to see if there are any other governments polices similar to Brazil's. There might be a government with similar statistics, and by comparing them you might see another variable that might be affecting Brazil. --[[User:Joshuasurillo|Joshuasurillo]] 04:57, 7 March 2011 (UTC)


There are also benefits beyond the simple ones that I have already stated. For example, copyrights on music would be much more lenient.  Lawsuits over sampled material would be scarce, and thus, artists such as Kanye West and Daft Punk would not have to deal with the legal aspect of making their music. They would simply make it.  There would be no limitation due to artists refusing their request to allow the samples to be used in their tracks.  this would allow artists such as these to put out everything that they make, without hassle.


----
----
*Name: '''Jennifer C. Olds'''
*Pitch: '''New Opportunities for Education
'''


Without thought, we turn on our computers and connect to the internet, we then decide where we want to go on the internet; do we finish writing assignment 2 for our class on Tuesday, should we quickly get on facebook and say hi to our eight hundred or so friends, or should we get on webMD and ask about that strange lump in our leg? I know this sounds so simple; but, we are given a choiceFor many people within the United States, even across the world there is nothing to turn on (PC), nothing to connect to (internet), and most of all no assignment to turn in (education) no choice.
====Name: Laura Connell [[User:Ltconnell|Ltconnell]] 18:15, 22 February 2011 (UTC)====
*''' Prospectus title: <span style="color:#FF0080">Does providing a legal alternative act as a deterrent to internet piracy?</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Laura_Connell_Assignment_2_Prospectus.pdf
**Comment: Laura, here is a link to a recent study that you may find of use:
[http://documents.envisional.com/docs/Envisional-Internet_Usage-Jan2011.pdf Envisional - Technical report: An Estimate of Infringing Use of the Internet] <br> Hope you find this helpful --[[User:Gclinch|Gclinch]] 03:47, 1 March 2011 (UTC)
**Comment: Hi Laura, glad to see this topic on the list.  It's a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM'ed materials.  At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of contentManufacturers of CD and DVD technology has traditionally tried to work with the "Hollywoods" of the world only to be thwarted by the hacker.  There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content).  I think we're moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away.  Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit.  It's a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight.  Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM'ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material.  Regards, Alan Davies-Gavin--[[User:Adavies01|Adavies01]] 03:45, 5 March 2011 (UTC)


You know the human mind constantly seeks answers, we ask “Why?” And who is it that we are asking? We are asking each other, communicating. We are looking for the best advice and not a one-sided bias opinion.  So, my question is this; what happens when someone asks a question and they’re cut off from the world? Whose advice or opinion are they receiving, and is it correct?


Several new opportunities for education have blossomed in some very unlikely areas and are now available to students all across the world. Apples iTunes U has opened a gateway for students to learn “anytime and anywhere”. “Apple hosts ITunes U as a free service” that allows professors, teachers, and “affiliates” to distribute educational media to students and with a simple push of the button, students can download lectures, send and receive homework, get their email, and browse the web. In Alaska’s Yukon the geographical barrier to a better education was torn down by a high speed network called DeltaNet. DeltaNet has boosted academic scores for three years running. Australia “The Outback” The school of the Air and remote learning has created a classroom for children hundreds of kilometers apart using a satellite link and a transreceiver.  No excuses for missing class now. Here in the United States cutting edge Universities are already utilizing distant education in order to reach untapped potential across the world.  Adult education is on the rise, now that a forum for the 30’s, 40’s, 50’s, even 90 somethings has been created. These dedicated individuals can take classes in the comfort of their own home while cooking dinner. Let’s not forget the disabled, all the new opportunities in education have granted them a new life as well. The bedbound can earn a degree via distant education; the blind can have the text read to them with the aid of software. In my opinion the possibilities are endless; so, who is affected by these innovations in emerging /technology  everyone.
Finding new opportunities for education is an ongoing worldwide effort, with broadband speed being a major player in the game.  The downfall, economically challenged countries simply do not have the technology or the capability of gaining access to the information. 


Thanks to the efforts of private funds, organization and government grants, and volunteers; new educational opportunities are emerging very rapidly helping not only our children, but adults looking to attain a degree, the disabled, and the geographically challenged. Without this effort society, culture, and the world as we know it could succumb to someone’s, very dangerous bias opinion.
----


References :
*http://www.speedmatters.org/blog/high-speed-internet-opens-educational-opportunities.html
*http://www.speedmatters.org
*http://www.apple.com/education/mobile-learning/
*http://www.cultureandrecreation.gov.au/articles/schoolofair/


====Name: Alokika Singh [[User:Singh singh|Singh singh]] 19:32, 22 February 2011 (UTC)[[User:Singhsingh]]====
*'''Prospectus title:<span style="color:#FF0080"> Online Political Activism in India</span>'''
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf
**Comment: Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India?  A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India. Looking forward to reading your final analysis.~~[[User:syedshirazi|syedshirazi]] 20:36, 27 February 2011 (UTC)




----
______________________________________________________________________________
'''
*Name: '''Tessa L. McCue.'''


*Pitch: '''Finding the balance between E-learning and Traditional Learning
====Name: Don Hussey [[User:Donaldphussey|Donaldphussey]] 19:47, 22 February 2011 (UTC)====
''''''
* '''Prospectus title: <span style="color:#FF0080">Online Crowd-Sourcing of Starbucks Product Development</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc
**Comment: Don, this is a really ambitious project.  I think it's a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works!  My only concern with this project is that you are only focusing on the corporate side of this venture.  Is there any way you can include information from participants or contributors to this site?  Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~[[User:mcforelle|mcforelle]] 18:39, 27 February 2011 (UTC)
**Comment: Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)
http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK
you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business  performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! [[User:Myra|Myra]] 20:16, 6 March 2011 (UTC)
**Comment: Re: methodology, [http://socialmention.com Social Mention] is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 03:19, 7 March 2011 (UTC)


Education in today’s society has surpassed the classroom. While there is still the traditional classroom setting for learning, E- learning as emerged, creating new venues. E-learning is defined as, “the use of digital technologies and media to deliver, support and enhance teaching, learning, assessment and evaluation” (A Guide for Learning Technologies 2003).  The ever growing benefits with E-learning are evident, yet we still need to acknowledge the values of traditional education. Challenges are abundant though. For example, there are credibility issues and limited understanding of the digital world on behalf of some populations, and more. Our society has much embrace in its journey to blend E-learning and traditional education.
Defining E-learning can be daunting and overwhelming as technology alone as opened doors to many opinions and theories. The numerous web sites visited thus far are a link to fairy tale-land of sorts with numerous definitions. Ironically, E-learning is being practiced with this assignment. It is learning done through the computer with the delivery of content given through the internet, or by digital or electronic tools. This technology can be viewed as more efficient and more accommodating to one’s life style, work schedule or comfort zone.
It’s an exciting time working and learning with today’s technology, guiding and directing society. Benefits of E-learning are many, such as tapping into all your senses, which enhances memory (The Psychology of Learning). Benefits can also include reduced spending, more efficient learning time, and consistent delivery, to name a few. (The Benefits and Drawbacks of e-Learning). Benefits with traditional classroom settings cannot be ignored though. One-on-one interaction allows development and growth of interpersonal communication skills while providing mentoring and directed guidance.
Trying to summarize the benefits of each learning environment create challenges just as there are many challenges to having a successful E-learning experience. Exposing people to new technology is challenging as they typically latch on to what is familiar, displaying a natural resistance to change. I personally have witnessed technology and its ever changing options and opportunities. With E-learning, there is no teacher at the head of the class to talk the student through each step. More so, these teachers need to be ahead of their game. The responsibility lies with the educators; teachers need to be students themselves to keep up with technology. Whereas, the challenges in a traditional classroom are the lack of an engaging teacher, the inability to tap into one’s senses enough, and the risk of outdated material being presented.
What’s important in any educational setting is that the journey is not a path of isolation. No student should be left alone. An inherent connection is critical for a sense of belonging to a community. The evidence of the benefits of E-learning is undeniable; however, without the responsible use of the tools and exposure and proper training, there can be catastrophic results. I believe it is imperative there be a blending of E-learning and the traditional learning environment. This is essential for a quality of life and a successful education.
--[[User:TLeeMQ|TLeeMQ]] 17:51, 24 February 2009 (UTC)


----
----
*Name: '''Steve Kurlowecz'''
*Pitch: '''Microlicensing of Internet content
'''


One thing I find problematic with the Internet is the difficulty in identifying ownership/licensing information for very small pieces of content (e.g, Web pages, parts of Web pages, graphics, icons, small pieces of code) published on the Web.  I propose to explore the concept of microlicensing - simplified and automated licensing of very small Internet content/works via tagging (by the owner/copyright holder) of the Internet content with owner and licensing/usage rights information.  As with the analogous microloaning concept, where lending such small amounts of money was seen as impractical from an accounting point of view and ineffective from an entrepreneurial point of view, but been shown to be both practical and effective, I propose to study the practicality and effectiveness of microlicensing of Internet content.


Some commercial entities are pursuing patents on aspects of microlicensing, but they are  often focused on charging royalty payments for small calculated usages. See Microsoft's published US Patent Application, US20090006225A1, for “DISTRIBUTION CHANNELS AND MONETIZING” (Published 1/1/09, Filed 6/29/07) and Aries Systems' US Patent, US 6,119,108, for a “Secure electronic publishing system” (Issued 9/12/2000).  Additionally, iCents.net is touting a scheme to pay for premium content on websites using microsubscriptions and micropayments in a way that does not disrupt the user experience on those websitesACAP (Automated Content Access Protocol) is a non-proprietary, global permissions tool that purports to address some of these issues as well (http://www.the-acap.org/Home.aspx.  There exist some Internet content/software certification/signing schemes, but these tend to be fairly heavyweight and not appropriate for very small, especially non-commercial, Internet content. There are also analogies in the analog world of music royalty payments that appear to work and that might influence an Internet content microlicensing scheme (see http://www.bmi.com).
====Name: Tym Lewtak [[User:lewtak|lewtak]] 21:31, 22 February 2011 (UTC)====
* '''Prospectus title: <span style="color:#FF0080">User Generated Sites: Defining Superusers and Their Monetization</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf
**Comment: Tymoteusz, I find you topic very interesting. <p> I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools.  That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities.  Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time? <p>It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --[[User:Gclinch|Gclinch]] 03:26, 1 March 2011 (UTC)
***'' Response: Gclinch, Thanks for all of your input! I initially didn't think to so much as include corporations, but taking a second glance at the subject you're right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I'd like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the "ball game" with individuals following. I suspect the latter isn't true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity.''  ([[User:Lewtak|Lewtak]] 21:20, 1 March 2011 (UTC))
**Comment:  One thing that is very interesting about internet communities is the ability of certain super users to arise.  You will find it in all communities from IRC to blogs to forums to games and so on.  Normally these are the folks to spend 60+ hours a week on their system (might want to look up references on hours as it relates to superusers) and this is their exposure to the "outside" world.  There are different kinds of super users as well. There are the mentors who want to help the community evolve and guide users in the right direction, gently correct them when they are wrong, and are just generally helpful.  There are also the dictatorial power mongers who will ban, delete, disparage, etc... anything they don't like, no matter how small the violation or mistake may be. There are many super user personalities in between as well.  These individuals do it because they want to do it, not because of pay.  Sites that can entice a user community to police itself significantly reduces their overhead costs and still, normally, maintains a good site with good content and a happy user community. Unless, of course, they select a powerMAD person to be the superuser in which case everyone will eventually get upset and move to greener pastures. [[User:Rakundig|Rakundig]]


What I have not found is any focus on the use of open standards to enable content (Rich Internet Application or otherwise) generation tools (e.g., Adobe Dreamweaver, Wordpress) to easily, efficiently and automatically tag created content with owner/licensing information.  The owner/licensing information might take the form of Web cookie-like data embedded into the Internet content – retrievable by content display tools (e.g., Web browsers).  I also found no open source projects that appear to have development underway of such a tool.  I would like to explore the feasibility of initiating such an effort.
----
--[[User:Skurlowecz|skurlowecz]] 18:02, 24 February 2009 (UTC)


------------
====Name: Denise Reed--[[User:Dreed07|-dreed07]] 21:40, 22 February 2011 (UTC)====
*Name: '''Wade R.'''
* '''Prospectus title: <span style="color:#FF0080">A comparative study of user behavior on Chinese social networking sites with that of United States social networkers</span>'''
*Pitch: '''Social, Cultural and Psychological Effects of The Internet
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc
'''
**Comment: Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. [[User:BrandonAndrzej|BrandonAndrzej]] 03:57, 5 March 2011 (UTC)
**Comment: I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries' different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that.
--[[User:Yu Ri|Yu Ri]] 03:27, 6 March 2011 (UTC)   


The internet continues to grow at an alarming rate which astounds me.  Every day, new articles are published, new blogs are created, torrents are uploaded, websites are developed – the list goes on.  Being an information junkie, I strive and struggle to keep up with what is happening and what is new.  This never ending online quest for knowledge has left me with a myriad of questions (socially, culturally and psychologically) that I am in a quest to find answers for.  By the end of my project, there most likely (almost definitely) will still not be a perfect answer but there will hopefully be '''progress''' towards one.  With so much information being generated every day and made available to anyone with a computer and an internet connection, does all this access to infinite information lead to us being '''empowered''' or '''overloaded?'''  Social networking websites such as Facebook, Myspace and Twitter are increasing their member bases every day.  A big question is do these online communities increase '''social participation''' or '''social isolation?'''  At what point does web browsing or 'online researching' turn into mindless '''procrastination?'''  Blogs such as zenhabits.net and lifehacker.com encourage productivity and promote different productivity techniques as well as a variety of productivity softwares.  With all this information and software available are we really more productive?  Technology is intended to make our lives easier so how does our generations stress and life satisfaction compare to previous generations?  The iPhone and Blackberry (amongst other PDA's) make instant email, 24/7 internet access and always being available a reality – the blackberry has even been dubbed the 'crackberry' by many of its devotees.  I sleep with my iPhone on my pillow!  Newspaper reports have even suggested that Barack Obama is addicted to his 'crackberry'.  But what are the implications socially and personally behind being 'available' at all hours of the day?  What is the correct etiquette to replying to messages when the sender KNOWS that you have a sleek PDA that pings every time they want to tell you something or send you a funny youtube link?  Does web time make up for face time socially?


I rely on the internet for more things than I can possibly list and I am a huge advocate for it.  However, like any invention, the internet has its advantages and disadvantages.  Some examples from my ever growing list of what I use the internet for include keeping in touch with friends, watching my favorite shows, being a distance education student all the way from London and checking my RSS feeds WAY too often.  For my topic, I wish to explore both the '''positive and negative aspects of internet usage''' on us as a society and global community.  '''How much is it helping us and how much is it hurting us?'''  I wish to explore this broad topic by looking closer at the six following topics/subject of conversation:
----
 
-The Paradox of Productivity.
 
-Social 'Networking' – is it '''net'''-working or '''not'''-working?
 
-How much of '''Face'''book is '''Fake'''book?  The creation of online personas on social networking websites.
 
-Should we be as available as the information on the internet?  Scarcity vs Availability in online communications.
 
-'Ctrl+C and Ctrl+V,' the complexities of privacy on the internet.
 
-'Just google it.'  Information overload and internet ADD.
 
The conclusion of my project will explore the issue of '''balancing an online life with real life''' including my own personal steps together with suggestions made by professionals (online of course!)
 
Please, if you are so inclined, leave me any '''feedback''' and '''suggestions''' that I can take on board.  Also if you would be so kind as to complete my self-created, very short '''online survey''' for this project, it would really help me narrow the focus and weighting of my project.  Thank you:
 
http://www.surveymonkey.com/s.aspx?sm=6sBWo03lc2N0w1oRUI7yCQ_3d_3d
 
Articles of interest:
 
*http://www.foxnews.com/story/0,2933,499105,00.html
 
*http://www.guardian.co.uk/uk/2009/feb/24/social-networking-site-changing-childrens-brains
 
*http://www.cnn.com/2009/TECH/02/19/db.happy.online/
 
*http://www.telegraph.co.uk/news/newstopics/religion/4602058/Workers-who-lose-jobs-will-escape-Crackberry-culture.html
 
*http://news.bbc.co.uk/1/hi/education/7902323.stm?lss
 
*http://news.cnet.com/8301-13846_3-10161861-62.html
 
*http://technology.timesonline.co.uk/tol/news/tech_and_web/article5733600.ece


====Name: Michelle Forelle  [[User:mcforelle|mcforelle]] 21:56, 22 February 2011 (UTC)====
* '''Prospectus title: <span style="color:#FF0080">Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism</span>'''
* '''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf
**Comment: Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let's see what you discover! [[User:Myra|Myra]] 21:03, 6 March 2011 (UTC)
**Comment: Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the "sight, sound and motion" element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client's campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I'll be very curious to read your completed report! Also thought I'd share a helpful resource that summarizes the online video landscape (it's slightly dated, but you might find their case studies to be useful to your cross-analysis): [http://www.emarketer.com/blog/index.php/emarketer-webinar-evolving-online-video-landscape/ eMarketer]. Good luck! - Jessica [[User:Jsanfilippo|Jsanfilippo]] 01:29, 7 March 2011 (UTC)
**Comment: I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --[[User:Joshuasurillo|Joshuasurillo]] 04:26, 7 March 2011 (UTC)


--[[User:Wade|Wade]] 19:49, 20 March 2009 (UTC)
------------
*Name: '''Samuel Saidel Goley'''
*Pitch: '''How social networks are changing the face of business'''
The internet has changed how we conduct business. It has spurred the growth of new markets and expansion of existing ones but, even more importantly, it has provided corporations and individuals with the ability to communicate in ways never before possible. This increased level of interaction has led directly to economic growth. The ability of suppliers, manufacturers, distributors, and consumers to remain in constant contact has improved companies production models and has cut down on the time and effort required to produce goods.
The internet's ability to connect people has changed the dynamics of business in other ways as well. Social networking sites such as Facebook are dramatically changing the way in which professionals are interacting with clients and colleagues. These networking programs, originally designed as social applications which allows you to stay in contacts with friends and family, have taken on a new role as a corporate tool useful in promotional advertising, public relations, event planning, and many others. In addition, an industry of “Facebook experts” and similar advisors have grown around the increased demand of businesses for knowledge and advice in the use of social networks as corporate tools.
My project will analyze the effects of social networks, particularly Facebook, on business. I will examine how such networks are being used in the corporate world by both non-profit and for-profit corporations. My research will evaluate the following:
*How the gap between the company and the customer is growing smaller due to online social networks, and who is benefiting from this.
*If brand loyalty has increased do to such things as Facebook’s “fan” pages.
*Types of strategies implemented by companies and professionals when using networks like Facebook.
*How business etiquette is being reformed to deal with these changes. 
*Subsequent questions arising from these issues.
This area of investigation is relatively unexplored and very pertinent as the use of social networks by corporations and professionals is on the rise.


----
----
* Name:  '''Joshua Kapelman'''
* Pitch: '''Internet Censorship and Governance'''
:::<dd>'''I. Premise'''
The internet is an amorphous ever-changing creature that has changed the world, as we have known it.  It has connected previously unconnected peoples, spawned new debates, and allowed people to collaborate in a way that the crafters  of the internet never dreamed.  The question then becomes, in this new and wonderful age known as globalization, is how do we try to control something, which seems to be purely chaotic? 
The issues that arise are that the openness and freedom of information creates an environment  for illegal activities such as child pornography, terrorist activities, and online gambling.  Thus, many throughout the world support internet governance or blocking of these websites, which give rise to an age-old argument about censorship.  By allowing governments to control who can access what site, we are surrendering rights of free speech.  Medical sites, anti-government political sites, discussions on euthanasia, or even abortions could all suddenly become unreachable.  Instead of the internet becoming a tool for communication and cooperation, it becomes inaccessible.  Furthermore, many countries have already begun censoring what their citizens can and cannot view on the internet.  OpenNet Initiative, a group dedicated to investigating filtering practices, has recently come out with a list of countries that are the most pervasive in filtering the internet.  It is no surprise that they are in fact not merely filtering for inappropriate content, but filtering to maintain power and control over their citizens.  For example, Iran, Syria and China are just three examples of countries that pervasively attempt to filter the internet to prevent political discussion.
There is however, a substantial case for filtering.  With access to the internet spreading, parents are having significantly harder times controlling what their children see and to whom they talk.  In a recent article ChildWise CEO Bernadette McMenamin, stated, “In late 2006 Child Wise commissioned AC Neilson to conduct a survey of 1497 Australian internet users over the age of 18.  The key outcomes of the survey were that 83 per cent believe that ISP’s should block all child pornography, 76 per cent would change to an ISP that blocked child pornography and 64 per cent are not confident that home based internet filters are effective.”  If the majority of the country wants filtering, maybe it is needed.
:::<dd>'''II. Case Study'''
Australia, has become a pivotal case that deserves significant study, surrounding this very issue.  In late 2008, Australia mandated internet filtering.  They have also denied requests to make their internet blacklist public, thus furthering the censorship argument.  Thus, the sites that are blocked by them are completely unknown.  Furthermore, when Australia enacts these filters, the quality of service will decrease dramatically.  Therefore, Australia will provide a terrific case in which further study will be warranted.
:::<dd>'''III.   Internet Governance'''
Going forward, the question that needs to be answered is what if any role governments should have in controlling (or attempting to control) the internet, a land where no one state holds sovereignty.  Thus, this will be the question I seek to investigate and analyze.  For assignment 3, I plan on creating a global map based on current method of internet regulation per country.
Sources Quoted
*http://www.australianit.news.com.au/story/0,24897,25010836-5013046,00.html
Articles of Interest
*http://opennet.net
*http://www.misaustralia.com/viewer.aspx?EDP://1234424275139&section=news
*http://www.australianit.news.com.au/story/0,24897,25068568-5013046,00.html
*http://en.wikipedia.org/wiki/Internet_censorship
*http://en.wikipedia.org/wiki/Internet_governance
*http://www.internetgovernance.org/




--[[User:JoshK|JoshK]] 21:04, 24 February 2009 (UTC)
====Name: Myra Garza [[User:Myra|Myra]]====
*'''Prospectus title: <span style="color:#FF0080">Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses</span>'''
*'''Link to prospectus:'''http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc
**Comment: Myra, this is a really interesting topic!  I feel like this is exactly as narrow a case study as the professors were asking for.  I'm jealous that you were able to identify such an relevant topic, lol!  I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I'm eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process.  I'm also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use.  I'm curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too.  Great prospectus, I really look forward to reading your paper! [[User:mcforelle|mcforelle]] 18:02, 27 February 2011 (UTC)
**Comment: I, too, think this is going to be a very interesting paper.  There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers.  I would be interested in what the career objectives are for the clients of these two organizations.  Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields?  <<[[User:Sjennings|sjennings]] 01:05, 1 March 2011 (UTC)>>
**Comment: Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and "catch" the millenial generation.  I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community?  I look forward to seeing how this plays out.  [[User:Coreymacd|Coreymacd]] 01:35, 1 March 2011 (UTC)
**Comment: Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica [[User:Jsanfilippo|Jsanfilippo]]
***'' Response: Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks!''  [[User:Myra|Myra]] 22:50, 6 March 2011 (UTC)




----
----
* Name:  '''Jason Parsons'''
* Pitch: '''The right to mash-up'''
Lawrence Lessig argues in Free Culture that “[u]sing the Internet and its archives, musicians are able to string together mixes of sound never before imagined; filmmakers are able to build moves out of clips on computers around the world  All of these creations are technically illegal.”
Lessig and others argue that the current state of the law makes it nearly impossible for ordinary people to secure rights to legally use copyrighted clips in their creations.  Even exercising fair use rights guaranteed under the law is tricky business – as Lessig notes, fair use is “nothing more than the right to hire a lawyer.”
I propose to document the process of making a “legal” remix of the type Mr. Lessig describes.  I will approach several media owners and ask for licensing to use their media in a YouTube “mashup”.  I will attempt to track down owners of copyrighted materials, get in touch with the appropriate staff, and secure rights to use their media.  I will further enquire as to my rights of fair use, documenting the process along the way.
For my final project, I expect to carry forward the lessons learned in this endeavor.  I will make recommendations on potential policy changes that may allow for more creativity without compromising the rights of artists.  I will reference the proposals of Mr. Lessig and others as applied to my attempt to create a “mashup”.
The biggest challenge in this project will be getting in touch with the right folks in a timely manner.  The results might well be that I’m unable to even get the right person on the phone – which would be telling in itself. 
Edit - I give up on making citations work in mediawiki.  Some of the template:citation core is missing; I tried to add it with poor results.  Citations are as follows:
1.  Lessig, L. (2004). Free Culture (p. 106). New York: The Penguin Press.
2. Lessig: "Fair Use is The Right to Hire a Lawyer", from "Andy Carvin's Waste of Bandwidth": http://www.andycarvin.com/archives/2007/05/lessig_fair_use_is_the_right_to_hire_a_l.html
--[[User:Jparsons|Jparsons]] 21:13, 24 February 2009 (UTC)
-------
*  Dave Panzarino
*  Elevator Pitch
For my project, I would like to create illustrative, self-reflexive, works about copyright and intellectual property. 
The idea is to either actually create or to propose the construction of media which test the limits of current law.  Good source material would include "Remix" by Lawrence Lessig, "Wealth of Networks" by Yochai Benkler, the Copyright Act of 1976, the Digital Millennium Copyright Act, the Audio Home Recording Act, section 8 of the U.S. Constitution, many instances of case law including Kahle v. Gonzales, Golan v. Gonzales, Folsom v. Marsh, Sony Corp. v. Universal City Studios, and websites devoted to this subject like the Swarthmore Coalition for the creative Commons and the Chilling Effect Clearinghouse . 
The copyright and intellectual property questions come from the user's perspective and from the creator's perspective.  I want to figure out when a person is breaking the law by using what information, and how they might use it, and also to ask how someone can reasonably expect to maintain control over information of their own making, and what qualifies information as such.  These issues would require exploration of such ideas as transformation, derivation, parody, satire, mashup, spinoffs, sampling, notice and takedown, file-sharing, public domain, and commercial use.
In the context of "generativity," I would like to summarize what the law defines as an original creation.  Is there a discrepancy between what is original and what a creator can own or exclusively monetize?  What is illegal information?  I think the most efficient approach to this project would be an essay accompanied by a series of poems.  I am making a song built from media samples for my media project, but limiting to small text pieces could isolate the conceptual and legal content nicely -for example, have a short poem which I could distribute to class, but couldn't sell, and have the subject be about why that is, and then have a poem that I could sell, but not in Utah, or one that could be uploaded but not downloaded, depending on its content.  There might be poems I couldn't even take outdoors!
--[[User:Dpanzar|Dave]] 24 February 2009 (UTC)
----------
Name : Portia Darby
Pitch: Technology, Religion and the End Times
For many years people have been predicting the outcome of the end of time and the chronological order of signs that will lead up to that day  through series of events . As time evolve slowly but certainly  the human species is loosing it power and ability to govern and maintain control over and of our productivity . Technology has been evolving and leading the way through deveopments and science.
Could this be th end of time for human activity and authority?
Technology has evovled so rapidly that it replaces jobs that humans once could operate . Technonology forms a sytem that pre arranges order and obtians its significant amount of control . The development of technology is so systematicaly organized that it forms forms its own entity , or must I say society with no rules , boundaries, and have many stakes that come along with it such as the invation of privacy.
The world of technology may just be envading and taking over this real biological planet earth , and it may just be the ending of human productivy , and ability to sustain without the use of technology . which  could possiblity serve as a monitoring instrument used to monitor human activity along with tracking , to keep everything systematicaly organize leading to a one world solution .
Would it be safe to say that onday technology would control the human species.
Though many people and philosophers have there opinion to whats to happen during the end times chronicals , could we be living in the latter days of a One power One government ruling of all nations through this magnificant development of technology?
There’s evidence all around us that these could be our ladder days of the appraoching times , but in addition  to this case work religious faiths will evaluated along with political attempt to influence or control.
Reference:
http://www.mt.net/~watcher/
http://www.city-data.com/forum/religion-philosophy/330615-fascination-end-times-12.html
http://www.watchmanbiblestudy.com/Topics/EarthChanges.htm
http://www.mt.net/~watcher/april30.html
--[[User:Portia Darby|Portia Darby]] 22:05, 24 February 2009 (UTC)Portia D
----------------------------------------------------------
*Name: David Cooperstein
*Pitch: Despite much evidence to the contrary, John Perry Barlow's vision of the internet is still a viable concept.
I would like to examine the current state of the internet in relation to the vision presented by John Perry Barlow in 1996. Although his vision may appear to be short sighted and idealistic, I believe that a purely pragmatic analysis would reveal that his ideas are completely viable. I would also go so far as to say that the ideas set forth in his writing are both inevitable and necessary to maintain a stable and productive internet.
I intend to disprove two of the main branches of censorship ideology to illustrate that Barlow's claims were neither shortsighted nor unrealistic. The two areas of focus will be the level of need to censor the internet and the level of ability that governments, private entities, and other special interests have to effectively censor the internet. I see neither need nor ability in regard to censoring the internet. Among the many areas of the application of censorship that I will examine, there are a few extremely notable cases.
One of the most pertinent cases is the self defeating campaign that is being waged by various copyright enforcement groups. The examples presented by the bulk of the data on these groups relates to both government entities as well as private entities just as it reflects on both the necessity of censorship alongside the ability to censor. I see these cases as one exhibit of proof in John Perry Barlow's conclusion that interference with this new self governing, global entity is merely inconvenient and not of a permanent nature.
I also intend to focus on another notable example of internet intervention that has been the subject of much hype and little result. This example is the excessive fear mongering over safety that is used to encourage parents to restrict children's access to this great new resource that just happens to threaten the rule of conventional authorities.  Despite all evidence of greater dangers and ineffective measures to limit the danger at hand, there is still a great emphasis on keeping kids off of the internet for their safety. The efforts that have been used to “protect” children at the expense of freedom and information are flawed in concept and ineffective in execution. They are merely ploys to distract attention from real problems and attract a popular consensus that the internet can and must be censored.
I feel that by examining issues such as those above, there is a very reasonable rational backing Barlow's ideas. The internet is difficult to censor, and the causes that call for censorship are weak. I see a scattered field of isolated calls for censorship that are vague attempts to gather public support for private causes, not public good. Despite isolated instances of censorship, Barlow's ideas have so far remained largely intact. Although his ideas seem idealistic, I feel that the above instances prove his theory on the overall longevity of the free internet.
---------
*Name: Lincoln
*Pitch: legal language on the internet
The last time you gave your name to a website, did you read the terms of use? Did you even skim it? I bet you did the First time you signed up for one of these things, but everyone I know stopped even skimming after round two. The vastness o the internet has caused an immense amount of people to begin agreeing to these complex legal documents over quite trivial matters. I know I have. But their complex nature means that even if we did read them, it is probable that we wouldn’t understand even if we did read them. However, as markets and databases and everything else progresses on the internet, it will become increasingly important and necessary for normal people to be able to easily understand these documents.
Unfortunately, the forces that cause it to be necessary for us to know them also cause them to be complex. So the easy solution of making them simpler won’t work (legal language in the united states is more exact than anywhere else. Ever heard the joke “How many Americans does it take to screw in a light bulb?” “THAT’S NOT FUNNY! I’M SUEING!”). I believe that the internet must and will create a new kind of legal language that will have a basis in the long, complex speech of the present, but will be more accessible to those who aren’t fluent in legal speech.
----------
* Name:    William Traylor
* Pitch:    Net Neutral Municipal Wireless with Commerical Differentiated IP Transit
My project will hinge on the confluence of open source wireless spectrum and the notion of net neutrality.  I will likely argue for a partially democratized internet. The network policy would follow a local/inter-city model similar to what happened to the Bell system after divestiture in 1984.  The argument will also align the broadband policy recommendations that the new president ushered in with his campaign.
Localized wireless metro networks funded federally, along with municipal money. There would be 3 tiers of metro wireless network (big city, mid city, rural coop) and these would be operated by a national oversight and monitoring relationship with the CTO office within Homeland security. The city based wireless networks would be net neutral, open access, and available to all. Although homeland security, telemedicine, universities, schools, government, and K-12 educational entities would have preferential access. General Citizens could gain access but would be afforded available bandwidth after these agencies and organizations were provided use.
These wireless metro networks would be tied together with commercial access or IP transit from the carriers (AT&T/Verizon/Sprint).


There is a wealth of coverage for these items as separate function or policy recommendations. Net neutrality is a heated item over the last few years. Municipal wireless is an idea or policy that never fully took root. There were a few city governments that delivered pilot deployments, but never really made them a commercial reality.
====Name: Jose Uscanga====
*'''Prospectus Title: <span style="color:#FF0080">Cummunity reporting or social activism?  The New Age of media reporting in Mexico.</span>''' 
*'''Link to prospectus:'''  http://cyber.law.harvard.edu/is2011/Image:Jose_Uscanga_Assignment_-2.doc
**Comment: Jose, you have identified a truly compelling topic.
When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.”  Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press?  I’ll be looking forward to reading your conclusions.  
I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved. It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts.  Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved?  Thanks for taking on such an interesting and challenging topic. --[[User:Gclinch|Gclinch]] 02:57, 1 March 2011 (UTC)


I will take the best of breed thought leadership in these spaces to deliver a compelling recommendation that blends government interest, citizen access, commercial interests, and the proper evolution of technolgy.
References:


----
----
* Name: Anteneh Baymeta
* Pitches: This project will evaluate claims on the negative and positive impact of internet filtering policy with reference to Ethiopia.


Internet technologies are  good for less developed countries (LDCs), both in terms of their prospects for political democratization and in relation to economic development and equality because inequity is often perpetuated and worsened by their debt burden, by wealthy countries’ unfair trade policies, by limited aid and by a generally unequal power relationship with the West. Their economic struggle is a result of colonization, which left behind a legacy of dependency and instability. This is true even in Ethiopia, where the case in favour of this argument seems most contentious. This Project will evaluate claims on the negative and positive impact of internet filtering policy with reference to Ethiopia.
I argue that internet technologies need to be enhanced if poverty is to be reduced and other social targets are to be achieved. Similarly, development requires major changes in policies and institutions at the global, as well as at the national level. Therefore, Internet technologies are good for LDC’s, both in terms of their prospects for political democratization and in relation to economic development and equality.


To support this argument, first I will explain the telecommunications reform in Ethiopia. Second, I will discuss the contexts in which access regulation, and internet technologies adoption in Ethiopia. Finally, I will conclude on the implication of internet technologies in Ethiopia’s prospects for political democratization and economic development.
====Name: karishma Goenka--[[User:Karishma goenka|Karishma goenka]] 09:27, 8 April 2011 (UTC)====
 
*'''Prospectus Title: <span style="color:#FF0080">Is India geared up to face the challenges that accompany the rapid advancement of the information age?</span>'''
Bibliography
*'''Link to prospectus:''' http://cyber.law.harvard.edu/is2011/Image:Assignment-2_Karishma_Goenka.pdf
 
* Alemayehu, Kibret. 1985. ''Price Policy and Revenue Effectiveness of Tariff Rates'' in the Ethiopian Telecommunication Authority. Addis Ababa.
 
* Coglianese, Cary. “''The Internet and Public Participation in Rulemaking''.” Regulatory Policy Program, Cambridge, MA: John F. Kennedy School of Government, 2003.
 
* Lessig, Lawrence. ''Code and Other Laws of Cyberspace''. New York: Basic Books, 1999
 
* Norris, Pippa. Digital Divide: ''Civic Engagement, Information Poverty'', and the Internet Worldwide, Cambridge, U.K.: Cambridge University Press, 2001.
 
* 2005. ''Comments on the Ethiopian Crisis''. Ethiomedia.com. 14 November. * http://www.ethiomedia.com/fastpress/clapham_on_ethiopian_crisis.html
 
* http://www.internetworldstats.com/af/et.htm
 
 
-- A.Baymeta --[[User:Abyssinia|Abyssinia]] 00:26, 25 February 2009 (UTC)
----------
*Name: Shivaji
*Pitch: Direct Musician Donation Service
 
The music industry in my opinion has experienced pros and cons due to the increase in internet users all across the world. On one hand, people everywhere can accesses their favorite artists website or myspace page to keep up with news and reviews creating new marketing opportunities. As helpful as this has been, it has not been able to overcome the lost revenue caused by listeners downloading the would be purchased album for free.
 
Listeners should have the integrity to support their favorite artist in the store but the fact is that you can go to google and find almost any song or album for free and this doesn't even touch on the simplicity of P2P programs. The problem I see is that this only effects the pockets of certain people. Artists who sell millions of albums, and get plenty of media coverage do not have to worry about some of their fans downloading their albums. The artists who were either independent or were almost famous did not have that luxury during the move to file sharing. Most of the time it is already difficult to find albums by artists under independent record labels and people who have access to the internet would rather get a random song for free then pay for it at the itunes store, if the itunes store even has the song. Also, there are many fans who would like to support the artists directly rather than through record labels who take the majority of revenue.
 
From what I have found on the internet, their is no way to pay any artist directly but I think, with the amount of free music that is on the internet already, artists should be able to collect some money through donation. People do not want to pay $15 for an itunes album but there are probably many who would be willing to donate $5 directly to an artist for access to their music.
 
For my project, I would like to figure out a method where internet-using music fans could access an updated data base with their favorite artists tracks and be able to donate how ever much money they would like. I feel this would not only please music fans and artists, but it would give hope to artists who think they don't want to conform to a record labels wishes.
------------------------------------------------------------------------------------------------
Name: Roberto Soto
Pitch: The evolutions of Online News Media from Tabloids to potential deterrent for white collar crime
 
Imagine for a moment if investors, vendors or employees knew more about a company then what is posted on their site or on news from press releases. Today’s business news is a carefully orchestrated communication releases. That creates a real dilemma for investors, employees and vendors who can not trust the news and as a result can not properly allocate the potential risk associated with doing business.
 
Today business professional read the traditional newspapers such as the Wall Street Journal and a variety of sites including Yahoo finance, Money.com, etc. The information on the paper is good and provides a common vehicle to assess business risk. However, the information comes from carefully selected sources, such as court records, public records and press releases. There is no maverick in the business journalism trying to find the truth. Even during these difficult economic times.
 
As a result of the lack of information companies such as Dealbreaker.com are becoming extremely attractive. Although what they are doing may no seem very important. People, who are in the know and connected, understand their value. Companies such as Dealbreaker.com are providing an outlet for people who are looking for real information about a company. For example, an executive going in out for golf with a vendor may not sound like a big deal, but if you find out that the vendor is a middle of a major contract negotiation that could be a potential risk for the company involved.
 
I believe that the natural evolution of sites like dealbreaker.com from a Wall Street tabloid to the next Wall Street Journal of our generation will be inevitable. I believed that in time, Dealbreaker.com will become important assets to company who are trying to determine the risk of other companies.  
 
Reference:
dealbreaker.com
en.wikipedia.org/wiki/Wall_street_journal
 
----

Latest revision as of 17:57, 17 January 2013

Distribution of Grades

Assignment2 distribution.png

Submission Instructions

This assignment is due on February 22. Grading for this assignment is on a 5-point scale; late assignments will be docked 1 point for each day they are late (assignments submitted 4 days late or later will have a maximum grade of 1 point).

Please make sure the name of your file includes your name (example: Name_Assignment2.doc) to avoid overwriting someone else's assignment. The upload file link is to the left, under toolbox. Once you've uploaded your file, please link to it following the format below:

  • Name:
  • Prospectus title:
  • Link to prospectus: (the file you uploaded)

If you have trouble finding the file you uploaded, check the list of uploaded files.

Comments

Everyone will receive an additional participation grade for this assignment. You should read through everyone's proposals after they are uploaded and add constructive comments below the proposal on which you're commenting. Comments should be submitted by March 6 so you have time to incorporate them, if applicable, into your project outline. (Remember to sign your comments!)

Submissions


Name: Gagan Panjhazari --Gpanjhazari 07:34, 26 February 2011 (UTC)

  • Prospectus Title: The Role of Censorship Of the Internet in the Egypt and Libya
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/GaganPanjhazari-Assignment2.txt
  • Comment: You might want to check the article I posted on the Feb 22 assignment page that appeared in the New York Times. Might be helpful on your first topic. <<sjennings 00:48, 1 March 2011 (UTC)>>
    • Comment: Gagan, I find both of your topic choices interesting. I think the second one, regarding the ability to hold website creators responsible for their content, especially when said content could be considered treasonous, would be the best topic of the two. It is such an important question, the answer to the question will frame our national security for the future. With either topic, I look forward to reading your findings. Coreymacd 01:10, 1 March 2011 (UTC)
  • Comment: Frontline, the PBS program, had an episode about the April 6 Movement in Egypt, including how it used the interent and mobile devices for organization and how it was forced to adapt when access was cut. There isn't a whole lot of detail here, but it might be a useful place to start. BrandonAndrzej 02:57, 5 March 2011 (UTC)

http://www.pbs.org/wgbh/pages/frontline/revolution-in-cairo/?utm_campaign=viewpage&utm_medium=grid&utm_source=grid

  • Comment: I like the second topic. It would be interesting to see if the treason charges are somehow being used to:
  1. silence Julian Assange
  2. scare others from doing the same thing
    • Hai!...I love your idea of covering the censorship and even internet blackouts at times in Egypt and Libya along with the role that social networking and tweeps had in organizing the recent protests, and ousting of Mubarak. This is a fascinating narrative to be sure. Here are a few links about a European internet activist group that has worked to provide low tech communication aid to the protesters. I hope they might be of use to you in your research. Internet Blackouts Highlights Danger of Weak Links, Usefulness of Quick Links, | werebuild.eu the Egyptian project page, | werebuild.eu, the Libyan project page, and | telecomix.org | Global Voiceshas done an outstanding job of covering these events as well. Best of luck!Deinous 01:53, 5 March 2011 (UTC)
    • Comment: I agree with Deinous. Your topic is very time-appropriate and I cannot hide my excitement to read final results of the research! I believe it should be closely examined as an epitome of the Internet censorship by all of us who are taking this class. From my perspective, it seems that Egypt's Internet kill switch decision rather ignited people's movement toward democracy and protests. By the way, your prospectus includes primarily theoretical approaches to the topic. I would love to know which resources you are going to use in the course of the research. Depending on types of media, your research conclusions, I believe, can be various. Below is the article of the Economist that might be useful in your project. Good Luck! --Yu Ri 10:47, 6 March 2011 (UTC)
    • [The Economist: Reaching for the kill switch]
    • Comment: Hi Gagan, both your topics are interesting. According to the description of the Final Project it should be built around one of the theoretical conceptions that we study during the course.So if you think about the conceptions that may apply to your topics, it will help you to chose one of two topics proposed by you and, perhaps, to generate your questions and hypothesis around the theoretical conception as the Final Project demand. Kristina Meshkova, 5 March 2011.
    • Comment: Gagan, great subjects! You should stick with the subject that interests you most. I suppose its the first one that you wrote about, the role of social media and networking in the revolutions. This is definitely a broad subject, but that doesn't mean you should throw it out, it means you should narrow it to a point that is achievable. A suggestion would be to pick one of the countries, and one of the social networks to drill deeper into. (i.e. the role that Facebook users played in the Egyptian revolution.) Then you need to think about what you will investigate. This project is supposed to be empirical, so you should find some way of observing or surveying the users or the events. This might be in the form of friending as many of the users who were involved in a particular event on Facebook. This should be a great project for you! Smithbc 05:06, 6 March 2011 (UTC)
    • Comment: Hi Gagan,I think the same - great topics. I believe both of them are very current and it will be interesting to read your final project. It is very hard to comment your prospectus because it is apparent that you did a deep research and you are clear in what you want to research in final paper. It seems to me that first project seems to be more empirical than second one. Although it would be maybe more or less easier to find 'clear' answers for questions in second project. I do not know. When regards the topics, both of them are very current and you identified the questions very clearly. Good luck with your project...VladimirTrojak 10:43, 6 March 2011 (UTC)
    • Comment: I think thats remarkable. I do think your topic is a bit broad, as is mine, must a great start! This link might help as well-http://www.nytimes.com/2011/01/29/technology/internet/29cutoff.html I wonder what role did social networks play in Egypts revolution. I know the Egyptian consulate in New York cut off web access, but you can still inquire via phone. Will they take this same route in the future?--Elishasurillo 04:40, 7 March 2011 (UTC)
    • Comment: This is a very serious and evolving topic that should be very fun and interesting to work on. It is very important to study the internet's effect on these countries because it could quite possibly happen to other countries. Just like the revolutionary furry spread from Egypt to Libya, it could easily spread to other countries either for the better of for the worse.--Joshuasurillo 05:07, 7 March 2011 (UTC)




Name: Saam Batmanghelidj --Saambat 10:00, 23 February 2011 (UTC)

  • Prospectus Title: The Effect of Synthetic World Communities on Real World Societies, Economies, and Copyright law
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Batmanghelidj_Final_Project_Prospectus.doc
    • Comment: Hi Saam, I think your topic of synthetic or virtual worlds. I had a suggestion that you take a look at BitCoin (http://www.bitcoin.org/), this is an emerging technology that only started up a short time ago. It's a fascinating technology that deals with a new form of money (yes it can be exchanged for real money and is currently trading 1 for 1 with the US dollar). Some interesting things about it: uses public/private encryption keys, it's completely anonymous, it has great potential to circumvent certain banking regulation systems, it can be used to make real purchases, because of it's anonymity and cannot be tracked creates a security of privacy for the purchaser and seller. This also means could could be exploited by people not wanting transactions to be recorded. This technology really opens a virtual door of monetary exchange across the globe where any currency can be exchanged for BitCoins and then exchanged again into a different currency. This is just a top end look at it. It's already in use and some places accept this currency including some non-profit agencies for donation purposes. It also opens an easy way to laundry dirty money. Regards Alan Davies-Gavin--Adavies01 03:45, 5 March 2011 (UTC)
    • Comment: Hi , Saam. The topic is very interesting, but, I’m not sure that questions you want to answer will help you to develop the topic deeply and systemically: the questions are not in a strong correlation with your topic, I think they will not disclose the topic in full and from the main sides of it. You also use such phrase as “virtual property”, what do you mean by this? Is it the same as intellectual property? If yes, I think, it’s better to use the term “intellectual property”. You also pose such question as “How harmful is it for people to sell virtual items for real world monies, and to what extent is it harmful?” So you’ve already decided that it’s harmful, may be, it’s worth to give some arguments in your work why you decided it’s harmful. If you consider “the Synthetic World Communities” as the theoretical concept you want to use in the Final Project, you can try to determine the main features of this concept, then divide your hypothesis into three sphere ( society, economic and copyright law) and pose the main, in your opinion, questions in each of the spheres, regarding the theoretical basis you chose. Kristina Meshkova, 5 March 2011.
    • Comment: Saam, you've picked a fascinating topic. You've identified a rich field and topics; the challenge will actually be in narrowing it down to something observable, rather than reporting on what has already been written and explored. Pick one of the topics like virtual property trades and one of the sites like EVE Online and think through how you can observe what is happening in that cross-section. I look forward to reading this project! Smithbc 05:15, 6 March 2011 (UTC)
    • Comment: Hi Saam...Great topic. I agree with Smithbc comments. I am not sure whether we should study smething mere via reporting the book and blog. As I said, I am not sure and at this time you should have already had a feedback so you probably know better. Good luck with the project and looking forward for reading final version. VladimirTrojak 21:54, 8 March 2011 (UTC)

Name: Kimberly Nevas --KimberlyNevas 02:17, 23 February 2011 (UTC)

  • Prospectus Title: Can the U.S. Prosecute Julian Assange?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Nevas_Kimberly_LSTU_E-120_Assignment_2.pdf
    • Comment: Hi, Kimberly. Your topic is one of the essential questions I myself also want to closely observe and look for answers. Especially, considering the global impacts of Wikileaks, the prosecution of Assange is merely not confined to the jobs of the US Justice Department. Many governments are quite eager to punish him for revealing sensitive political/diplomatic issues, which might have significantly deterred their national agenda. Nonetheless, the 1st Amendment of the US and equivalent provisions existing in each country that guarantee freedom of speech are standing in the way of this very prosecution. So the question always comes down to this: are we going to sacrifice freedom of speech for a greater cause - usually national security? Are there certain limitations that media have to comply with in publishing their articles? I would love to see how this 21th version of the Zenger Trial will turn out. Good luck! Best, Yu Ri 03:12, 7 March 2011 (UTC)
    • Comment: It might also be interesting to see if any other sites purporting to disclose sensitive information whether government or corporate have become more aggressive considering all the confusion about what to do with Julian Assange. Does his legal situation make these sites feel more confident regarding avoiding prosecution? <<sjennings 00:56, 1 March 2011 (UTC)>>
    • Comment: Your statement, "In this respect, Assange cannot be considered any more liable than the New York Times." is a bold one, which some might strongly disagree with, given Assange's postings and his refusal to censor, along with his use or threatened use of yet unreleased information as leverage to keep himself free. I look foward to reading your arguments regarding Assange, freedom of speech and the case law which supports your position. Coreymacd 01:15, 1 March 2011 (UTC)
    • Comment: Hi, Kimberly. The problem you decided to consider in the Prospectus is really important and actual. But I think that the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, that you pose describing the Problem is wider than the Research question. Perhaps, it’s worth to add the question “whether the Justice Department can prosecute Assange without damaging the U.S. free press as we know it”, to your Research question as the main one. And your present research question: Are the distribution methods adopted by Wikileaks for the dissemination of thousands of pages of classified U.S. documents structured so as to arm Julian Assange and his associates with a strong defense to prosecution under U.S. law?” will help you to answer your main question. Your present research question can be also considered as a research frame, so that you can explore the distribution methods of Wikileaks to answer if they really make the obstacles for the Justice Deparment to prosecute Assange and if yes to what extend; are the distribution methods of Wikileaks the main obstacles which do not permit the Justice Department to prosecute Assange or there are the other obstacles (for ex., with respect to the features of free press)? Kristina Meshkova, 5 March, 2011.
    • Comment: Kimberly, you have the beginnings of a good project here. I am interested in what you choose to use as your methodology and what you will choose to "observe" as part of this case study. One suggestion in particular is to look at the particular statements made by the U.S. papers in regards to why they believe their approach to printing the leaks are legal and any justifications they made in regard to accepting Assange's information. Smithbc 05:34, 6 March 2011 (UTC)
    • Comments: Kimberly, that is an explosive topic! I bet you'll have lots of material! The qusetion is where did he commit the crimes if any. If in Australia, can they prosecute him? Or because they are U.S. cables, does the U.S.A. have jurisdiction? And who has the right to tell him he can or cannot post and release? The U.S.A. has to clearly stae how he broke the law. As far as I know, treason can only be a crime if commited by a citizen. Good work! --Elishasurillo 04:53, 7 March 2011 (UTC)
    • Comment: Yes, very timely and interesting topic. One thing you might look up for precedence is the Pentagon Papers Rakundig



Name: Jamil Buie

  • Prospectus Title: Profiteering via "Public Privacy" The use/misuse of your data
  • Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JBProject_Prospectus.pdf
    • Comment: Hi Jamil, For me this is a an extremely important issue, I'm glad to see you're looking at it. I have a few pointers that may help uncover some things that are currently being looked at and something that was done in the UK back in 2008. Do a search for Phorm, BT implemented it in secrecy and it caused a big uproar. Also, it appears that ComCast is looking to implement it here in the US. It deals with deep level packet inspection. Not sure how tech savvy you are, but basically it comes down to an ISP looking at each packet users are sending out over their home connection. It is suppose to be done anonymously, however, it's invasive to the nth degree. Another technology that you might want to look at is the Evercookie. This can be used by websites that a user goes to, this then gathers information about a great number of browsing files that are on a system to ID the system. In the instance that a user cleans up his/her cookies, EverCookie will still be able to quickly identify you and place certain cookies back on your computer being able to keep tabs on the user. Regards, Alan Davies-Gavin--Adavies01 03:45, 5 March 2011 (UTC)
    • Comment: Hi, Jamil. In your Prospectus, you write the following: “While most do understand that they are interacting with a third-party be it a site, search engine, or ISP they remain ignorant to how the data they’re providing is being farmed out or utilized in a commercial vein”. I can agree with you only partly: of course, we could not exclude the situations, when the data we provided are an object of unfair use, but it should be also mentioned that “the main players” of the Internet services do not ignore users, thus they stay uninformed about the way their data are used. For ex., Yahoo Privacy Policy http://info.yahoo.com/privacy/us/yahoo/details.html or Google Privacy http://www.google.com/intl/en/privacy/ In the question: What are the common guidelines and site best practices? you use such phrase as “site best practices”, that is very subjective category, as also the question: “Are consumers truly aware?”. Perhaps, it’s better to avoid such categories in your science research. Kristina Meshkova, 5 March 2011.
    • Comment: Jamil, we have similar interests and research topics. You are looking at the broad trail of information left by a typical internet user and the ways that trail is used. I am going narrower, specifically into the information gathered by location-based services to examine the associated privacy issues and assess the average consumer's perceptions of risks. If you are interested, I'd be willing to trade notes and help each other shape up the final project. Since we are doing similar topics, I would really appreciate your comments on my prospectus as well. Best, Brian Smithbc 05:42, 6 March 2011 (UTC)
    • Comment: Very intrigued by your topic (and somewhat regretting not pursuing it myself!). I used to work as a targeting specialist at Yahoo!, and was floored by the amount of user data we had access to. Thought I'd share an extremely thorough study the WSJ put together not long ago, which summarizes the policies and efficacy of the major players in this space. Looking forward to reading your report on this very controversial and fascinating topic. - Jessica Jsanfilippo 03:57, 7 March 2011 (UTC)
    • Comment: Another very ineresting topic. I believe, most consumers are not aware. I was surprised when I blocked cookies and then wanted to log in to facebook. Following message occured: 'Cookies are not enabled on your browser. Please adjust this in your security preferences before continuing.'. Seems like they are not interested in someone using their service without getting access to information about me so they can get paid:)I am still not aware of all information they can easily get about me. Good luck with project.VladimirTrojak 09:03, 13 March 2011 (UTC)



Name: Uduak Patricia Okon

  • Prospectus Title: Web Pages/Blog Sites: Rights and Limitations-How free are you?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Uduak_Patricia_Okon_Assign_2.pdf
    • Comment: Hi Uduak, Your prospectus is very interesting. I look forward to seeing how your project comes together. But I have some comments that I would like to share, I hope my feedback is helpful.
    • Re:
      • In general, people are entitled to share facts if they don’t breach confidentiality or depict a real situation. This would depend on how citizen bloggers support their argument about their political commentary, whether it’s positive or negative. You need to remember that politicians are public figures, so the first amendment applies differently to them. Therefore the confidential circumstances that apply to the general population do not apply to politicians since they are not entitled to the same level of privacy. And citizen bloggers don’t have to adhere to the same circumstances as journalists to the best of my knowledge (I major in journalism and work in media in NYC) (i.e. it’s considered unethical for journalists to be bias if they’re not commentary writers. Also most journalists are not allowed to put political figure signs on their lawn, bumper sticker on their car, etc they need to push their feelings aside to accurately report the truth). I think the bigger issue is whether or not non-citizen bloggers can face defamatory lawsuits if there is proof they intentionally acted with malice? Or will future non-citizens bloggers have to abide by the same guidelines as employed journalists in the blogosphere working for CNN?
      • Corporate law is an entirely different world. Because many corporations lie to promote their brand among many other issues on the internet, which is unethical to their consumers.
      • I don’t think you should look into news websites like CNN, NY Times, etc because those are explicitly run by paid journalists (whom must adhere to strict guidelines about what they report) and comments are very restricted so the same type of freedom doesn’t apply to citizen journalists because official journalists also have code of ethics and have much more at stake.
      • It's important to note that some citizen bloggers sell advertising on their blogs which might impede with how they portray a public figure on the net because they're getting paid. Formally employed journalists can't bias their stories based on relationships with advertisers because the editorial and advertising departments are seperate at news organizations.
      • You, first need to narrow your focus because there is a huge difference between local mayors and congressional candidates, and citizen and non-citizen bloggers. (i.e. I think it would be interesting if you looked at how political figures use blogging as a form of position taking in Congress and compare cases of democratic and republican candidates on an issue like healthcare reform, education, etc. And the implications blogging has on Senators or Representatives relationships with their constituents).
    • Comment: Uduak, very interesting subject. As you shape these ideas into a final project, one aspect to consider focusing on is to differentiate between a) the official "legal findings" of what bloggers can/cannot do vs. b) the unoffical "codes of conduct" being developed in the world of blogging. I think the unofficial codes would reflect the complex realities of the different types of bloggers, rather than the more simplistic legal concept of a blogger. One case to look at is the judge that was recently found to have been blogging anonymously [she thought :) ] about the case on which she herself was the sitting judge. I'll look for the URL to send you. I look forward to reading your project. Smithbc 05:54, 6 March 2011 (UTC)



Name: Yaerin Kim Quill80 02:17, 23 February 2011 (UTC)

  • Prospectus Title: OpenCourseWare(OCW) and its Impact: Case Study of MIT’s OCW
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Kim.doc
    • Comment: Hi Yaerin, I think this is a great topic. Being a part of F/OSS environment has pushed forward a number of wonderful software innovations. Scratch is an example of MIT's commitment to OCW. Scratch, though at first glance might appear comical, is actually a great tool to teach people the concepts of early stages of computer programming. I'm sure there are tons of other open source software that would interest you. I would suggest, if you have a spare computer or can run a virtual environment, downloading and running a Linux distribution like Ubuntu or Linux Mint. Then you can take a look at the rich repository of software that is completely free to install and use. Some of the software is not F/OSS, such as Adobe Reader, but the disclaimers of Left-Copied software is always clear. Anything that came from MIT would also give credit to that source even if it's been morphed. Best regards, Alan Davies-Gavin--Adavies01 03:45, 5 March 2011 (UTC)
    • Comment: Yaerin, you've nicely narrowed down your topic to MIT OCW and assessing progress on the 3 goals. In the context of this course, it would really be interesting to narrow down even further to the third goal: the level of interaction of OCW users with the institutions that provide it. What are they and the users missing out on? We've already seen examples of digital communities developing and producing some amazing things and perhaps MIT is or should be seeking to turn OCW from content publishing into an active community. I look forward to reading about this in your project. Best, Brian Smithbc 07:28, 6 March 2011 (UTC)
    • Comment: Hi Yaerin. I think your topic is brilliantly targeted and focused on one of the distinct manifestations of peer collaboration - that is an open online course. I, myself, have greatly benefited from MIT OCW and Yale Open Course and thus look forward to see, specifically, the reasons why the participation rate of users is lingering at such low figures. Would it be too much to expect OCW to be an open education forum with lively discussions? In my opinion, the architectures of OCW and Yale Open Course are expressly posing limitations on interaction between users as there is no such place to share opinions. I am very much excited to read your final project! Best, --Yu Ri 10:57, 6 March 2011 (UTC)



Name: William Bauser --Wnb 23:55, 22 February 2011 (UTC)

  • Prospectus Title: Modern Web Design and Civic Engagement: Access to Information and Community Development
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Wnb_assignment2.pdf
    • Comment: This is an interesting topic -- you have a lot of avenues to explore! Among the sites you list, some are clearly partisan while others seem more altruistic. I would be interested to learn the contrast of methods used by each type. For example, what are the membership requirements? Does the site encourage a particular philosophy? Does a certain amount of selective cocooning take place? On the other side, how can an Internet based civic community be both neutral and vital? If it is only fact based then it won't be interesting. How does is promote community discussions without advocating a position? I'm sure you'll have to narrow the focus of your chosen topic and I thought this might be an interesting distinction you could use. -Chris Sura 01:26, 1 March 2011 (UTC)
    • Comment: Hi William: Sounds like a very interesting subject. I have two comments. First, it is clear you are looking at assessing how effective internet tools are in increasing engagement in the political process, but your last statement doesn't seem to fit. It seems like you'd also like to look at how effective they are in increasing the transparency of the political process as well and you'd have to clarify how those fit together. (IMO, engagement =/= transparency.) Second, I'd be interested in hearing more about your methodology, since most of the sites you mention would likely not share their data openly (perhaps I am wrong.) All the best, Brian Smithbc 07:53, 6 March 2011 (UTC)
    • Comment: I think this sounds interesting, particularly as scholars are emerging to study the implications of the internet, web 2.0 and social networking on politics. I think there's going to be a lot of research into how these tools (and many of the sites you mentioned, particularly sites like change.org or moveon.org) are contributing to the distribution of social capital/political capital among the population. I think your topic is timely, and interesting. My guess is that you will need to hone in on a few specific sites and some specific aspects of them in order to make solid comparisons and broad analysis. Best of luck! Acrowe 16:22, 8 March 2011 (UTC)

Name: Brian Smith Smithbc 23:47, 22 February 2011 (UTC)

  • Prospectus Title: Location-Based Services: Implications and Awareness of Effects on Consumer Privacy
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Brian_Smith_-_Assignment_2.pdf
    • Comment: Greetings Brian! I found your research idea very creative and the methodology you are planning to utilize seems realistically achievable, although some instruments used by government and private marketing agencies are very difficult to trace and require special software and equipment. I have a topic idea that may coincide with a notion of privacy you are investigating, so I may cite your work in my project. What I found to be inconsistent is that your methods seem to be distant on the instrumental level from your hypothetical statements, that is, it is undetermined how your method will help to prove or reject either of your hypotheses. In fact, even doctorate dissertations attempting to either reject or accept only one hypothesis. It is in quantitative sciences we test several hypothesis in order to corroborate the validity of the expression or formula, etc., but not in the research as far as academic papers suggest. In terms of your definition of location, it is unclear whether your are talking about the IP address based location or mobile device based location, if it is about mobile device only (most hosts like schools and bosses may hunt for both mobile and the laptop IP to trace their employee or a student) then you need to state so in your research and in the proposal as well. I know one thing for sure that with arrival of the wireless technology it became much more harder for Federal agents to trace hackers: it is technologically more convenient to retain privacy through the public wireless router. I think you will benefit from setting up a singular and more definite hypothetic statement that will encapsulate the entire topic. In addition, you would make the research more productive and to the point if you will add the limitations to your research so that your process will have its bottom line. Check out this research, it could be helpful or at least you can retrieve some more sources from in-context citations: http://www.ischool.utexas.edu/~adillon/Journals/Expertise-JASIS.htm Good Luck! --VladimirK 20:03, 24 February 2011 (UTC)
      • Response: Thank you, Vladimir - these are really helpful comments. I might ping you back for more details as I go through them each. Best, Brian Smithbc 07:56, 6 March 2011 (UTC)
    • Comment: Brian, the location of a caller is also one of the key pieces of information that is used by public safety officials when responding to emergencies. There is a long history of regulation related to the use of location information in the Enhanced 9-1-1 system. I know the location services that you are talking about in your paper are based upon the GPS capabilities in mobile devices, but you may benefit from understanding the history of location as you look at some of the politics surrounding these new services. There has been some recent political maneuvering related to the location information provided by telecommunications carriers for the purpose of Enhanced 9-1-1 since many have determined, as you say in your prospectus, that location information is a marketable commodity.

Here is a short explanation of how location is determined in Enhanced 9-1-1. If you were to need to dial 9-1-1 in an emergency, when your call is answered at the Public Safety Answering Point (PSAP) a software application retrieves information about your location from the Automatic Location Information (ALI) database. The ALI database – there are actually over 3,000 ALI databases in the US, but from a local jurisdiction only one is important - that is/are maintained on behalf of the government by various on-contract third parties. How information about your location gets populated in that database depends upon the device originating your call. For a traditional wired phone, the phone company is responsible to update your location when your phone is installed.

When you are calling from a mobile phone, there are actually two ways that your location is determined. One is GPS, but many mobile devices today still either don’t have GPS chips or the users don’t turn the GPS on for reasons that range from prolonging battery life to a belief that they are protecting their privacy (something that you may next see is an illusion). One way wireless location is determined is by the triangulation of two or more cell towers. A mobile phone is almost always in communication with two or more towers and an estimate can be made of your location by measuring distance as a function of signal strength. The other way is to integrate the GPS chip. For Enhanced 9-1-1, this actually turns out not to be as straight forward as one might think. This is because the GPS information is carried in the data channel of a phone. For many phones it isn’t possible to have both a concurrent voice call and a data transmission. This means that in order to retrieve the GPS data, the PSAP needs to disconnect the caller. Not the best situation in an emergency. The FCC’s Wireless 911 Rules currently specify that the phone carrier is required to be able to locate you within, “50 to 300 meters depending upon the type of location technology used.”

There is also a separate system for determining the location of a caller who is using a VoIP device (as in Skype) and another process for determining the location of a caller from within an enterprise organizations (such as a PBX extension).

Hope you find this of use. Let me know if I may clear up and points or answer any additional questions. --Gclinch 01:55, 8 March 2011 (UTC)


Name: Yu Ri Jeong -- Yu Ri 22:22, 22 February 2011 (UTC)

  • Prospectus Title: How manifestations of collective intelligence vary in different cultures and societies: Study on Naver Knowledge iN of South Korea in comparison with Wikipedia.
  • Link to Prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Yu_Ri_Jeong_Internet_and_Society_Assignment_2_Prospectus.doc
    • Comment: This is a really interesting topic! I hadn't known that South Korea had so strongly resisted the dominance of Wikipedia. I am curious, even if you do not include these questions in your paper, to hear what you think is unique about South Korea that it managed to create its own version of Wikipedia. Was it simply a question of timing, or is there something about South Korean Internet culture that allowed it to rally around its own creation. I also wonder what this means for Wikipedia. As a result of the lack of participation by South Korean Internet users, does Wikipedia suffer from a gap in information about South Korean culture, politics or society? I think the paper you have laid out in your prospectus is very thorough and complete, but I would love to hear your thoughts on these questions separately as you continue your research! Mcforelle 19:39, 5 March 2011 (UTC)
    • Comment: Dear Mcforelle, thank you for your kind words on my prospectus. I believe that the user-friendly manner of NKIN is encouraging Koreans to prefer it over Wikipedia. To elaborate, NKIN offers such an environment that participants can just write down their ideas without having to give much thought about the impacts of their posts. It is not that they have no responsibility in writing down articles; but they want to give information or advice as they do to their friends and family. The system of Wikipedia requires some duties such as learning of new Wiki codes. I believe that these factors are alienating Koreans from using Wiki. Furthermore, the under-activated usage rate of Korean Wiki is discouraging people to use it. --Yu Ri 03:44, 7 March 2011 (UTC)
    • Comment: Hi Yuri! I think your research would reveal some very interesting points about the difference between the Korean Naver website and Wikipedia. If I may suggest, it would be interesting to analyze the difference in user demographic between the two websites. This would assist your analysis for Question #3. Also, since Naver seems to be a for-profit organization, it would be interesting to analyze how profitable NKin has been and contrast it to the non-profit model of Wikipedia. Quill80 22:07, 5 March 2011 (UTC)
    • Comment: Yaerin, thank you for your kind comments. Your suggestions include very important points which I might have ignored had it been not you! Truly, the demographic analysis of two websites and the comparison of them in terms of for-profit and non-profit will reveal some of the interesting characteristics of these open knowledge forums. Thank you! --Yu Ri 03:44, 7 March 2011 (UTC)
    • Comment: Yu Ri: This is a solid proposal for the project. I like how you've used the course themes as your areas of investigation and how you've narrowed down to two communities that you will compare, and even further to a set of articles with common subjects across the two communities. The only area of concern might be that your subject areas are pretty large in and of themselves (architectural elements, social norms & governance, membership, limits on expression, and national law.) If you can do all of those, then that's great, but you might think of narrowing to a smaller set. Otherwise, this proposal seems strong. Have fun! Brian Smithbc 08:07, 6 March 2011 (UTC)
    • Comment: Hi Smith. Thank you for spending your time in reading my prospectus. I absolutely agree with your concern. I wish to nail down the topic further, but am still not certain which theme to focus on as all the aspects matter most. I will keep you informed if I narrow down to the very specific topic! Thank you! --Yu Ri 03:44, 7 March 2011 (UTC)



Name: La Keisha Landrum llandrum 21:48, 22 February 2011 (UTC)

  • Prospectus Title: Building a Sustainable News Org
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LNLAssignment2.doc
    • Comment: Hi La Keisha, It's good to see you're approaching this hot topic. I think most Americans are rather clueless about the current demise of the media or at least they are clueless as to why the media has been in a state of disintegration over the past 30 years. The newspaper companies came to late to the Internet forum and due to their lack of response they lost the "first-to-line" efforts in advertising & classified revenues. Aggregators and bloggers have only worsened the situation for major media, not to mention giants like Google and Craigslist drawing away advertising dollars. Still, a more important aspect is that experienced journalists need to continue to be supported in doing investigative reporting. Looking at detail as to how the different models of moving forward and the benefits might be speculative at this point, but we have seen some success stories in new ways to successfully report on current events. Regards, Alan Davies-Gavin--Adavies01 03:45, 5 March 2011 (UTC)
    • Comment: Hello La Kiesha! This is a very interesting and important topic for the future well being of journalism. According to your prospectus, it seems that you are interested in the profit aspect of the emergence of new internet-based journalism. If this is the case, it would be helpful if you can offer comparison in income for the aforementioned journalist. In other words, how much did these journalist as an employee of a traditional publisher and how much are they making now with their innovative website? Also, it would be interesting to know who is willing to patron these professional journalists. I think the lecture slides from March 1 would be very helpful as well. Good luck!Quill80 22:34, 5 March 2011 (UTC)
    • Comment: Hi La Keisha, Bravo for taking on this topic. I like the fact that you are exploring success stories in online journalism. While journalism is undergoing fundamental changes, I think this is not just a doomsday scenario that dictates journalism will disappear. The newspaper existed for so long because, I believe, there is strong consumer demand for quality information. Just because the business model for supplying news is undergoing transformation doesn't mean that that demand is gone. My hypothesis is what we discussed in our last class: that the newspaper is being disaggregated and all the components will find their places as the changes shake out. There will be a place for classified ads, opinion articles, local fluff pieces, national news, international news, and yes, even, high-quality investigative reporting! It's just that they won't all be delivered by the same company, in the same vehicle, nor with the same business model anymore. As a side note for a case study check out the Seattle Post-Intelligencer. I'm not sure how successful it has been, but their story might be interesting to you in that they closed down their print publication and went entirely online with a shrunken staff. Best, Brian Smithbc 08:30, 6 March 2011 (UTC)
    • Comment: Enjoyed reading your prospectus! Just read an article in The Guardian that seems to resonate very well with your proposed topic. It highlights the business model Huffington Post created whereby a good portion of their content is via free contributions, and the ensuing backlash amongst some writers circles who feel they are under/uncompensated. Also, I noticed you touch on the concept of 'content farming,' and thought I'd reiterate an example I brought up in class, Demand Media. It is the poster child for content farming in the media industry, so might be worth a glance. Good luck and hope this is helpful! - Jessica Jsanfilippo 18:55, 6 March 2011 (UTC)
    • Comment: I really enjoy the topic of your proposal. I think it's a timely and meaningful investigation. I think in comparing what makes these online media outlets successful, it is important to create a measure of which are and which are not successful. There are Nielsen ratings for websites, but I don't recall where to find them... and I believe Alexa does a web index ranking as well. It is probably worthwhile to be sure that the parallels you're drawing are across the most successful models. Many blogs that are popular are not lucrative business models, and as you seem poised to compare your results with the decline in financially-stable, traditional media, this will be an important distinction. It seems like a great jumping off point! Good luck! Acrowe 16:34, 8 March 2011 (UTC)

Name: Jillian York Jyork 21:48, 22 February 2011 (UTC)

  • Prospectus Title: Understanding "Lesbanon": Lebanon's Online Lesbian Community
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Understanding_Lesbanon.doc
    • Comment: Hi Jillian. I found your approach to the project very interesting: based on your prospectus, it seems that you are studying an online society as a mirror to look into the real world. Your idea of examining the ways that homosexuality is expressed on the Internet would offer a glimpse to the country's customs and legal regulations is truly brilliant. I will look forward to seeing what kind of role the Internet is playing in Lebanon society for freedom of speech - especially for that of lesbians. Best, Yu Ri --Yu Ri 03:29, 7 March 2011 (UTC)
    • Comment: Hey Jillian, I think this is such a great paper topic. I love how secretive communities can still operate out in the public through using the internet. The value of anonymity in this case seems like it must be very high, especially if there are governmental pressures keeping women from coming out. I had no idea that "Lesbanon" existed but it really does make perfect sense. Maybe if there are other communites out there like this, you could make a broader statement on the nature of coming out on the internet despite oppressive governments and societal norms. Otherwise, I think your question is quite reigned in and manageable in scope. I look forward to reading this paper when you're finished. Saambat 18:42, 3 March 2011 (UTC)
    • Comment: Jillian, this is a clever topic. I think in America, we often take for granted what the Civil Rights Movement did for communities beyond racial and sexual orientation lines--it really impacted our cultural norm mindset. The internet is not only release but power for those in disadvantaged or secretive communities the world over--especially when you are looking at two groups under different governments: the Lebanese and the diaspora. I am curious to read more. Myra 19:22, 6 March 2011 (UTC)
    • Comment: I am sorry if I am posting belated remarks but it seems that your topic, along with many other topics related to this type of mental state, overlooks the origins of the same sex attraction for males, that is, pederasty, which by nature can affect the mind set of the near situated females. It is widely argued in the world, may be not in the entire U.S., that the same sex attraction among men is not a genetic phenomenon, but rather it is the bodily stigma imposed either during the childhood or during the adultery. In the majority of cases, I refer to the child molestation cases with a few exceptions, neither adult nor a child is able to recall the first same sex sexual experience, which decisively suggests on the unconscious intercourse under the influence of a sedative and/or somnolent substance. In the scholarly papers similar to this, you may find the old and new findings that can explain both the political and biological causes of mental and physical attraction in the same sex: http://www.ched.uq.edu.au/index.html?page=39750&pid=0 It is no doubt that the nature has produced hermaphrodites, but their amount is nothing in comparison to what America or Lebanon has. Hence, it is not the nature that produces majority of them. Overall, you have very intelligent approach to tackle the puzzle of how homosexuals are created in a society with many religious denominations like Lebanon and the U.S.. As far as I know, it is a scientific fact that in order to have stigma a body should have most of its sensitive erogenous zones irritated. The next piece of the puzzle: by coincidence, the amount of child molestation cases among Jehova Witnesses exceeds the amount of all sexual scandals among Catholic, Muslim, and Orthodox religions. So, here is the Bingo - the amount of religious sects which are striving to get your trust and intimacy and visit you at home and may be have a "drink" or "dinner" with you is equally proportional to the amount of homosexuals in the society. So, the taboo is coming from the kind of common sense I mentioned above; unfortunately or may be fortunately for many Jews in Lebanon, not everyone is able to crunch this trust game puzzle in reality right away. May be your project will help to make this devastating syndrome that originates from the terrible crime disappear from any society. --VladimirK 06:10, 13 March 2011 (UTC)

Name: Caroline McLoughlin Camcloughlin 21:44, 22 February 2011 (UTC)

  • Prospectus title: Privacy and Society
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment-2.pdf
    • Comments: Caroline, I, too, was interested in writing a paper more inclined to policy arguments and Rebekah counseled me against it. I got the impression we are supposed to be more observant of communities and how they interact and work. If this is true, you might lean your paper more towards observing whether privacy policies are adequately disclosed on sites in the US and how they are different on Canadian sites. Is this difference due to the contrasting privacy legal frameworks in the two countries? Do participants react differently?This might also help narrow your topic which seems like alot of material to cover. All this being said, I find your topic very interesting and think it might be great to present it in something like a PowerPoint format. Would be the great beginnings of a law review article if you are a lawyer.[[sjennings 21:18, 27 February 2011 (UTC)]]
    • Comment: Hi Caroline, we are interested in the same privacy subjects. Similar to Sjennings feedback, I tried to make mine more about observing a community, specifically consumers using location-based services, and less about policy. If you've got the understanding already to get into issues and policy, though, then it sounds like a great project. As I mentioned to Jamil Buie above, if you are interested, I'd be willing to trade notes and help each other shape up the final project. Since we are doing similar topics, I would really appreciate your comments on my prospectus as well. Best, Brian Smithbc 05:39, 7 March 2011 (UTC)



Name:Anthony Crowe Acrowe

  • Prospectus title: Tagging and Metadata on the Internet and in New Media
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Crowe_LSTUE120_2.doc
  • Comments:
    • Comment: I like that you've identified another means of content organization for study. I feel like tagging is going to be a rich topic, not only because of the ways people use it, but because of how it defines or redefines website architectures. I don't really know much about tags beyond their most obvious uses (and frankly, on in Twitter), so I am curious to see what kind of social rules you discover in your research. The only thing I might suggest is that, given the richness of your topic, that you not worry about studying superusers too deeply. I feel like a thorough study of tagging on the three main sites you've identified, which are pretty major sites, in addition to the other examples you'll be incorporating, will be more than enough data and analysis for a great paper. Unless perhaps I'm not understanding the particular lens through which you'll be approaching the superuser question? Mcforelle 19:49, 5 March 2011 (UTC)
    • Comment: I think this is a really fascinating and relatively untouched subject; I'm curious to learn the myriad ways tagging is used, both for public sharing and for semi-private sharing (e.g., cleverly devised tags that only a particular group is aware of) -- but I agree with the above commenter in that I'm not sure how the question of superusers fits in here; I think you might be better off narrowing the subject just to the question of tagging.Jyork 16:16, 7 March 2011 (UTC)



Name: Vladimir Kruglyak --VladimirK 21:13, 22 February 2011 (UTC)

  • Prospectus title: A Transparency of the U.S. Government in the Socio-Cyber Environment
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.doc
    • Comment: Vladimir, thank you for your resources. I have been reading your prospectus and found your approach as interesting as ambitious. To investigate wether the U.S. Government maintains Constitutional transparency and accountability for the tax money expenditures using e-government resources, that is a very well focused research and I can tell you are passionate about the topic, which makes the reading even more interesting. However, when you talk about conspiracy relating it with the internet resources, I have to disagree. I think power and conspiracy are long-time friends, governments have faced every kind of suspicions since they exist, but the importance of digital resources when it comes to spreading these suspicions cannot be denied, and that is why I think your research will face very interesting issues to deal with, as investigating the origin of "conspiracies" from a social point of view. Do you think the Internet is a cause or a consequence? I think about WikiLeaks, for example. The Internet had nothing to do with the origin of the cables, but made them become a "popular" topic, blurring the "secret" component of International Politics. Is that a good thing or a bad thing? We are talking about serious crimes becoming nearly gossip (we could talk further about a Spanish journalist murdered in Iraq and how Spanish and American Governments made a deal to make it look like an accident: that's on WikiLeaks). But now it looks like nothing happened. Amazon was selling the cables for Kindle, Julian Assange is to be extradited to Sweden in a week and I highly doubt any of the "accused" by, or thanks to, WikiLeaks, is to face trial. When you say that I am adressing a brave category of people ready to risk their lives for the "right cause", that is exactly the interesting thing about this. Why would someone get into trouble for nothing? However, it calls my attention that you take for granted that their cause is the right one. I see in your statement that you look pretty convinced about conspiracies when it comes to very sensitive and historic topics. You assume the defense of one group, don't you doubt that the cause may not always be the right one? I find your statement so determined that it becomes intriguing to me (it is really hard to me to be sure about something), I will be following your work with interest to get a better understanding of your point of view. In the meantime, I hope to receive more suggestions or resources you may find interesting to check out about this topic. Lorena Abuín. --lorenabuin 21:17, 25 February 2011 (UTC)
    • Comment: I see a potential flaw in your methodology, and find it potentially invasive of a web surfer's privacy. Collecting data by sniffing packets is rather dubious for your uses and can be construed as an abuse of networking tools. Trying to parse the IP addresses into geographical locations through a Whois database may be difficult to and inaccurate if users are using proxy based anonymizers such as Tor or i2p. It is for this reason, among others, that many people chose to use anonymizers when they surf. Deinous 04:15, 26 February 2011 (UTC)
    • Answer: There is no flaw, it is rather your misunderstanding of the software functionality: 1) collecting data of the visiting traffic by IP from a domain is not a crime and often the consent is given by the owner of a domain; 2) WhoIs database traces the domain's information from the server such as registration expiration date and the contact information of the domain's owner. In addition, there is a way to detect the Tor user and toss those IP out from the sample. In my survey, I will target users with average knowledge who do not use anonymous proxy services or encrypted networking channels.
      • Vlaidmir: Thank you all for the creative comments addressed toward my prospectus, although the assignment says to add constructive suggestions which can help an author to improve his project. I think it is little bit unfair to help others reconstruct their idea and receive nothing in return. I guess that is all I can get from the general public. If however, someone in this course really knows about the internet traffic analysis, you are welcome to suggest substantial changes. --VladimirK 20:05, 5 March 2011 (UTC)
    • Comment: Vladimir, I apologize if I said anything to upset or discouraged you in any way. I meant my comment to be constructive in raising an ethical question to your research methodology in regards to the privacy of web surfers. U can certainly observe and aggregate traffic through packet sniffing network tools, but I would not be so trusting in precise geographical locations of the IP addresses for the reasons that I mentioned. However, with a large enough sample you could perhaps get a general feel for regional traffic. | Etherealis a popular easy to use modern analysis tool with good documentation, and may serve your purposes. Again, I meant no disrespect and look forward to your project evolving.Deinous 21:30, 5 March 2011 (UTC)



Name:Corey MacDonald Coreymacd 20:28, 22 February 2011 (UTC)

  • Prospectus title: Fringe Forums for the Under-represented
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_Assignment_2_MacDonald.doc
    • Comments: Wow! This is a great prospectus, I feel like these kinds of sites are the perfect places to be asking these questions. So many of the conversations we've had in class have centered around how to best facilitate legal social interactions. I'm excited to read your analysis of how semi-legal and illegal topics are handled by users, administrators and legal bodies on these forums. I'd be curious to see if legal action had ever been taken against the users of these sites, or whether the information posted on them had ever been used in legal action against someone else, like as evidence or tips on possible illegal goings-on? Are there any specific government agencies that track activity on these kinds of sites? Are any extra precautions taken to protect the anonymity of contributors? Mcforelle 20:34, 5 March 2011 (UTC)
    • Comments: Hi Corey this is a interesting topic, the existence of sites like Erowid and “the chemical underground” highlight how (especially the US) government are losing the battle to control drug information. A “non-event” that may be of interest to you is the DEA making Microgram public in 2003. Microgram was a law enforcement restricted newsletter aimed at forensic chemists and its release made very little impact on the “chemical underground” due to the wealth of information on illicit drugs that was already available.

Here’s a link to an article that might be useful/interesting http://www.michaelerard.com/fulltext/2006/08/open_secrets_how_the_governmen.html Ltconnell 20:36, 5 March 2011 (UTC)



Name: Richard (Rick) Kundiger --Rakundig 19:38, 22 February 2011 (UTC)

  • Prospectus title: The Role of Bittorrent in the Internet Society
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Kundiger_Assignment_2_Research_Prospectus.pdf
    • Comment: This is a great example of "code is law." You have a very powerful tool (the bittorrent protocol) which can be used for both good an illicit purposes. Your investigation of the different interests for and against its deployment should provide an excellent case study. Does a company or government have more of a right than an individual to control the protocols in use? Are those opposed to the protocol trying to protect the greater good of the Internet or their own financial interests? -Chris Sura 01:53, 1 March 2011 (UTC)
    • Comment: Hi Rick, I also like this topic. One thing you could really expand upon is the use of P2P (point to point) connections has also drivin forward such technologies as Skype. This type of technology was also never intended to be used for illicit purposes, but then again the Internet was never designed to be used in many of the ways it is used today. VoIP actually breaks the TCP/IP model where packets were never intended to be treated in such a timely fashion. Another item is that it was used by WikiLeaks to keep Assange a bit more safe, which could be interpreted both good and bad. It's also amazing that the record industry had enough lobby power to take down some of the most famous P2P services. There's also the aspect that businesses deal with a very real threat of employees using bittorrent technologies. The executive that installs a P2P client and accidentally shares out his entire drive has been a very real issue for companies to combat. Further, then end use that also does something simular can share very personal information such as passport and bank account details with the world. Hope my comments have given you some help in this area of interest. Regards, Alan Davies-Gavin--Adavies01 03:45, 5 March 2011 (UTC)



Name: Mary Van Gils

  • Prospectus title: Yelp Case Study - Freedom of Expression
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus_-_Yelp_Study_Case.doc
    • Comment: Wanted to make you aware as you investigate the external restriciton on freedom of expression regarding the Yelp site that there are also types of businesses which are regulated by state law as to how they may respond to reviews/complaints on sites like Yelp. If you look at my prospectus, you will note insurance companies are one of those types of businesses.[[sjennings 15:53, 3 March 2011 (UTC)]]
    • Comment: Hi Mary - This is a fascinating subject - the tension between freedom to express opinions and libel as well as the possible manipulations. Your decision to use Yelp forums as a focal point is also a good idea. What is not clear to me what exactly you will be observing about the forums. It would be great to not only observe instances of the tension points, but also to find instances where free expression has been limited by external sources (not sure if you'll be able to get access to this if it's happened.) I really look forward to reading your project. Best, Brian Smithbc 06:04, 7 March 2011 (UTC)
    • Comment: I think Yelp makes a really interesting case study for freedom of expression, but, as mentioned above, Yelp doesn't exactly seem ripe for external limiting of free expression (in the forums at least; reviews are a separate issue), rather, I would venture to guess that the vast majority of limiting speech on the site is in the interest of the TOS. Nevertheless, I think there's a fascinating question here, and plenty of existing evidence, particularly to the question of reviews/slander.Jyork 16:19, 7 March 2011 (UTC)



Name: Susan Jennings [[sjennings 15:46, 22 February 2011 (UTC)]]

  • Prospectus title: Annuity Companies' Social Media Communities
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Annuity_Companies%27_Social_Media_Communities.doc
    • Comments: Hi Susan, your subject area appears well-defined and methodology seems systematic. In addition to surveying the companies' online activities, I would really encourage you to speak to the compliance person or even a marketing person in those companies to see how their efforts are going. [You might find the marketing person easier to reach out to :) and get a response.] Additionally, is there any way to bring in the actual federal regulators in order to get their perspective on how new social media plays in their framework for regulation? It would be interesting to see if and how they are adapting to the new technologies. Have fun! Brian Smithbc 07:24, 7 March 2011 (UTC)



Name: Alan Davies-Gavin & Alex Solomon

  • Prospectus title: Architecture of Sites eHarmony and Match.com: contributions of membership data and effects on security and privacy.
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment2ProjectProspectus.pdf
    • Comment: Alan and Alex, I think your topic is fascinating and I wanted to chip in my 2 cents which might help your research. Considering the different natures of sites that ultimately sell the same product, I would consider looking at how the two compete in response to one another. By this I mean, is Match doing something that eHarmony isn, and therefore, is eHarmony a bit jealous and trying to get into their market? I know that eHarmony lauched their more casual spinoff "Jazzed.com" which is meant to steal people away from Match. Is Jazzed a suggestion that privacy isn't all that important to frustrated singles? I think that there are also rather large differences in target audience between the two competitors, with eHarmony focusing on a bit older, more conservative crowd while Match goes for the "single and ready to mingle."Also, perhaps look at each companies approach to user profile creation over time, have they changed at all and in what ways? This looks like it'll be an exciting project, I'm looking forward to what you find! (Lewtak 21:31, 1 March 2011 (UTC))
      • Response: Thanks Tym. I like your observations and I think they may well contribute to our research and final content. It's a good perspective that you bring to light. Alan --Adavies01 03:49, 5 March 2011 (UTC)


Name: Kristina Meshkova

  • Prospectus title: A music sharing site - Grooveshark, Soundcloud, MySpace.
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignement_2_%28Kristina_Meshkova%29.pdf
  • Comment: Hey Kristina, I think we have some similar ambitions in regards to our final project. Let's chat tonight if you have any interest in potentially working together Alex Bryan 14:31, 1 March 2011.
    • Comment: Hello Kristina, I found your project very interesting and I am looking forward to see it evolve. I am particularly interested in how and why the streaming content services are so territory-limited, beyond of copyright, and how long will this model survive. In Europe we can use Spotify but instead there is no access to Pandora or Grooveshark, and vice versa. Same happens with Netflix or Hulu. However, Spotify is said to be preparing its expansion to the USA and some people talk about pression groups beyond record labels. I think it could be interesting to explore if there are some inter-continental lobbying activities or corporative deals regarding this issues. Best,lorenabuin 12:00, 6 March 2011.



Name:Vladimir Trojak-- VladimirTrojak 20:01, 20 February 2011 (UTC)

  • Prospectus title: Are different language groups consistent in what topics are permitted and what is removed?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.pdf
    • Comments: Hello Vladimir, Your proposal is intriguing and I am looking forward to see how it evolves. I did have a question about why do you think that all the Wikipedia policies should be the same in all the language communities? Thanks. --SCL 03:06, 22 February 2011 (UTC)

Thank you for your comment. I hope it will turn in the way I expect:)I believe that in general they shoudl be the same, such as 'neutral point of view', 'verifiability'. Although there may be differences in other policies because of different laws, such as topics you can speak about. You have any suggestions?Thanks.VladimirTrojak 18:11, 1 March 2011 (UTC)



Name: Faye Ryding FMRR 23:59, 21 February 2011 (UTC)

  • Prospectus title: Trolls and vandals on Epinions.com
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Faye_Ryding_Assignment_2.doc
    • Comments: Hello Faye, I read your prospectus but had the following thought. What if the person belives they are in the right? Does that make them still a vandal? And can you outline excatly what recourses one can take against such offenders? What authority can someone make a complaint to? That last question brings us to a much bigger, more complex one. Who has the soveriegn rights over the web? The government? A trade federation? Or individual users? --Elishasurillo 04:46, 7 March 2011 (UTC)
    • Facebook recently launched an "anti-troll" algorithm that reduces troll comments by ~50%. Perhaps Epinions.com has implemented a similar algorithm too, and a comparison could be made. Deinous 20:04, 8 March 2011 (UTC)



Name: Alex Bryan 16:59, 21 February 2011

  • Prospectus title: Groooveshark music application
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Prospectus.pdf
    • Comments: Hi, Alex. Sorry that didn't answer you earlier. Will be glad to discuss an opportunity to work together on the Final project. Let's discuss it next week in a chat room or via email. This is my email for the course: kristinam2907@gmail.com Kristina Meshkova, 5 March 2011.
    • Comment: Hello, Alex. I am very interested in the legal aspect of streaming content services. Have you considered to study this issue from a global point of view regarding a potential Grooveshark expansion? As I stated below Kristina's project, I think both of your prospects are very interesting, I will be following them. Good luck lorenabuin 12:06, 6 March 2011 (UTC)



Name: Robert Cunningham

  • Prospectus title: The Archive Team
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Proposed_Paper_TopicCunningham.pdf
    • Comment: Hi Robert! Interesting subject, you've narrowed down nicely on one particular group and your areas of interest should cover nicely what the group is and does nicely. Also, your methods seem achievable and will allow you to experience the group, not just observe it (one of the core challenges for many of the projects, including mine.) The one counsel I would give is to go back to the course material we've been discussing to tie the Archive Team back into the course themes. As examples, you could look at the incentive system for contributors, the group hierarchy and governance for control and decision-making, the architecture of the online tools they use, or the merging of offline and online worlds. Have fun! Smithbc 07:13, 7 March 2011 (UTC)



Name: Joshuasurillo

  • Prospectus title: The effect of government transparency websites- Wikileaks
  • Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Harvard_assignment_2.doc
    • Comment: Joshua, I am very much looking forward to your final product. Your position (or what I am assuming your postion to be) comes across very loud and clear in your prospectus. I wonder if you will reach an opinion as to where to draw the line on "free speech," or if no line should be drawn? My reading of your position if you were to define it today is that free speech must be protected at all costs and no limits are appropriate, at least that is the feeling I am left with from your prospectus. If wikileaks posted the location or identity of our undercover operatives in Iraq or elsewhere, would you support that? If not, what else would you feel would be "going to far?" I look forward to reading more from you. Coreymacd 01:25, 1 March 2011 (UTC)
    • Comment: I will try to convey a more balanced and neutral argument in my final paper. I will weigh both sides of the argument and shed light on both. Hopefully, I will be able to come to a consensus. I would not support a decision by Wikileaks to disclose the location or identity of our undercover operatives in Iraq, but I do not believe it is our place to stop them. I believe the government should not be going after Wikileaks but they should be finding and prosecuting the actual leak; not the whistle blowing agency.--Joshuasurillo 01:32, 7 March 2011 (UTC)



Name: Susan Lemont

  • Prospectus title: Why do people cultivate large online networks?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Lemont_Prospectus.doc
  • Comments:
    • Comment: Unfortunately beyond the stated scope of your project (and not practical to include), but it would be interesting to see how your findings compare to similar surveys of Youtube users (who frequently seek comments, ratings, and channel subscriptions) and members of various online forums which award rankings, custom titles, "reputation", and other benefits to prominent posters based on peer imput. Good luck with this topic. (P.S. Also, it might be interesting try and determine what percentages of Facebook 'friends' of these users are A) people they know in real life vs. those relationships which are strictly online-only and B) what proportion of real life contacts were made prior to 'friending' vs. those which were made as a result of meeting virtually via facebook.) BrandonAndrzej 04:34, 5 March 2011 (UTC)
    • Comment: Hi Susan, your research question is so basic that I am surprised no one else chose a topic towards this issue, since it is the basis of the new big business, social media. From an anthropological point of view, I find it very interesting and not enough explored, focusing the research into motivations: not what or when people share or live online, but why do they do it. Besides, I find your methodology very well planned and practical, although I have some doubts about the sincerity when it comes to explaining to someone you don't know why you have more than 200 friends. I will be following your work with interest, good luck! lorenabuin 11:53, 6 March 2011 (UTC)
      • Response: Thank you everyone for your insightful comments. I have changed my project and the new prospectus follows:


Name: Susan Lemont --SCL 20:23, 6 March 2011 (UTC)

  • Prospectus title: What conditions are conducive to successful commons based peer production?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Peer_production_Lemont_030611.doc
    • Comments: Hi Susan. I like the way you tie the course readings into your project and your "test" of the theoretical writings on a real-life subject. So much of what we study is based on the success stories but we often can learn more from the failures. It will be interesting to know whether some of Benckler's or Zittrain's critical success factors were missing or whether they were all there and the project did not succeed for other reasons. I look forward to reading more about this in your projects. Best, Brian Smithbc 07:39, 7 March 2011 (UTC)




Name: Chris Sura -Chris Sura 03:13, 22 February 2011 (UTC)

  • Prospectus title: The Java Community Process: How Does It Really Work?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Chris_Sura_Assignment_2.pdf
    • Comment: Admittedly, I knew nothing of JCP prior to reading your prospectus, but it's a pretty intriguing process. It does make us wonder who is really behind our machines, as most consumers of technology only see (and care about) the surface. I wish you luck in obtaining your inside info, and I look forward to seeing how it comes along! Myra 23:24, 6 March 2011 (UTC)



Name: Ed Arboleda Earboleda 04:42, 22 February 2011 (UTC)

  • Prospectus title: Are there collective benefits for copyright owners, copyright infringers, and the general community; if copyright infringement is not enforced under specific circumstances on social media sites?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Ed_Arboleda_Prospectus.pdf
    • Comments: Hi Ed, I certainly believe that in specific instances that there can be collective benefits for infringers and owners of copyright. One example is the pirating of the UK run of the TV series Battlestar Gallactica in Australia in October 2004. When the show aired in Australia in January 2005 the ratings exceeded expectations due to “sampling” and word of mouth. Here’s a link to an article with more information http://www.mindjack.com/feature/piracy051305.html Ltconnell 20:49, 5 March 2011 (UTC)



Name: Elisha Surillo

  • Prospectus title: The Tea Party and Internet Freedom
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2.doc
    • Comment: I'm confused. This link does not seem to take me to the correct prospectus? Elisha, could you update this to make sure I can access yours?
    • Comment: Hai to the comment above: Elisha and I uploaded with the same file names so they are stacked alphabetically. My file is one that I would like to remove actually but do not know how, but in the meantime, Elisha's file is the second link. Sorry for any confusion. Deinous 02:33, 6 March 2011 (UTC)
    • Comment: I don't believe the tea party is just confined to the older generation. I believe it to be a stronger movement that will soon grip the masses. By having such a strong presence on the internet this movment will propell itself forward. I believe this is just the begining of many other grassroots campains and parties.--Joshuasurillo 04:34, 7 March 2011 (UTC)
      • Response: Sorry I would change the name but I don't know how. Sorry for the confusion! --Elishasurillo 04:48, 7 March 2011 (UTC)



Name: Brandon A. Ceranowicz - BrandonAndrzej 08:29, 22 February 2011 (UTC)




Name: Lorena Abuín

  • Prospectus title: Contribution to prosecuted online activities (Anonymous, BitTorrent, WikiLeaks)
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_2_-_Lorena_Abu%C3%ADn.pdf
    • Comment: I noticed that there is a lot of crossover between our topics. We are both addressing hacker communities, but from differing angles. I have acquired quite a bit of information about Anonymous and have listed the resources on my tentative reference page located just below here. Feel free to look and use anything from that list that may help you in your project. Also, the Anonymous page found in Wikipedia is quite good in understanding what the Anonymous phenomenon is. They are free agents often acting independently of each other and unaffiliated with one another under the umbrella name Anonymous. In other words, Anonymous is a concept more than an identifiable specific group. I also noticed you have listed pastebin as a resource. It is my suggestion to be careful with that, and try to find where that document was published. It could simply be the rantings of teenager enamored with the publicity of their antics and activity. The questionable authenticity of that write pad entry to me is found in the signature at the bottom. It should read: We are Anonymous/We are legion/We do not forgive/We do not forget/Expect us-always. Lastly, keep in mind that not all Anonymous hacktivity is criminal, that is just the part that gets sensationalized. There are many other cyber-activism efforts that take place under the name of Anonymous that are not criminal. Good luck, and I look forward to watching your project develope! -----=:) Deinous 23:28, 23 February 2011 (UTC) for the #datalove
    • Comment: I found that some of your research objectives coincide with mine. I can assure you that people do use what is called "hacktivism" to oppose the lies and conspiracies of the U.S. Government. If you take a http://www.nogw.com/ alone you would be surprised how some of the secret documents happen to be available on line. For instance, the loan by the Wall Street Banks to finance Adolf Hitler's Army is not a secret nowadays because of the "hacktivism", although the fact and the document has been kept in secret from the Government of Soviet Union for decades. The role of the Jews in the mass murder of millions is proven with facts on the Holocaust denial web sites. I guess the major drive that motivates people to use their skill in the "wrong way" is to oppose the lie that is bigger in size and thus controls the legacy tools such as Media and Congress. Even children in New York City know that the twin towers were demolished by the "uniformed criminals" employed as the federal agents. Check out the list of literature on my prospectus and http://twilightpines.com//index.php?option=com_content&task=view&id=17&Itemid=46 is just one out of dozens web sites. The U.S Government had no reason to deploy troops anywhere at the cost of the taxpayers' dollars. Do you think other citizens do not realize this? They do, but they join others in this giant lie and say that it is a war on terror, and they say this at Law Schools, through the public media, and post it online. These people are indifferent and coward because they lie to themselves and the so called prosecuted activities is the only way to reveal the truth. In your research you are therefore addressing a brave category of people who are ready to risk their lives for the simple yet amazingly right cause - to reveal the corrupted syndicate of greedy liars who oppresses people with their tyrannic power and ability to prosecute. If you are not afraid to cooperate on this project in front of the university staff, then take a look at my proposal and let me know what do you think. I may give you a couple of additional sources and suggestions, but if you do not want to be involved in this type of a project, I will totally understand. Best! --VladimirK 10:29, 25 February 2011 (UTC)
    • Comment: Hai. Thanks for your response. I just thought that I would add that it is very important make the distinction between hackers and crackers. Unfortunately the media has not made this distinction clear and has tainted the meaning of the term hacker. In a nutshell, hackers create things and crackers break things. Most hackers look down upon crackers and dismiss them as technological bugs. Most hackers I know are not pleased with the criminal antics done in the name of Anonymous. It is true that collaborative write pads are in common use because of the ease to collaborate live together at once. Pastebin happens to not be one used for documents all that much though. It is mainly used to send larger pieces of text into chat protocols such as IRC without flooding the channel. Write pads such as typewith.me and piratepad.net are more common to use for group documents since the url is not made public and searchable, and is kept private among the group working on it. Also, an interesting comment about hacktivism made to me by a French hacker with whom I am in contact with simply and broadly described hacktivism as using technology to impact society. I think we must be careful, myself included, when we talk about cracker v. hackers. A classic document among hackers written and maintained by Eric Raymond, "How to Become a Hacker" describes the difference quite well. Deinous 03:11, 26 February 2011 (UTC)
    • Comment: Hi Lorena. I think this is a great topic and I agree that you and Deinous seem to have a strong intersection of ideas. I think the comments I made under Deinous' posting are applicable here as well. It's good to see this topic having such strong discussion. Regards, Alan Davies-Gavin--Adavies01 04:06, 5 March 2011 (UTC)
      • Response: Hi, Alan, thanks a lot for your interest! I can't find your comments below deinous' prospect, and I would really like to check them. lorenabuin 12:12, 6 March 2011 (UTC)
    • Comment: I too went in search of Allen's comments and were unable to find them :( Deinous 18:32, 6 March 2011 (UTC)


Name: Margaret Tolerton deinous

  • Prospectus title: Jailbreaking appliance based gadgets and game consoles: the legal and generative implications
  • Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:JailbreakingGadetsAndGamesConsoles.doc
    • Comment: Margaret, thanks a lot for your offering. I could really use some inside information about this topic. About your suggestion, I chose pastebin as a reference looking for a way to begin my research. You are right when you say that accuracy is not guaranteed when it comes to this source, but my main objective is to test the general perception of internet community about "hacktivism", I want to read about it in forums, press articles comments... See what normal people think about this. Of course, not every "hacktivist" action is a ciber-crime, but I am particularly interested in motivations that lead people to engage in certain projects that could be prosecuted depending on the country, as uploading copyrighted contents. I am sure we could find a lot of profit-driven actions, but I want to get deeper in personal motivations, since there are many so-called "cyber-crimes" that have nothing to do with obtaining a profit, at least a tangible one. When reading your prospectus, I came up with something very interesting: "Happy to help others who are not as advanced?". I think solidarity plays a huge role of hacktivism communities, empowered by the feeling of being passionate about some topic. I guess the desire to share sprouts from passion, but I think that the need of feeling part of a community is also very important, especially when it comes to very well defined criminals such as sex offenders and very sensitive content uploaders, communities widely persecuted but, however, still huge. While my prospectus adopts a more anthropological point of view, I see yours as an inside work with very valuable information about hacktivism running. I look forward to see how your research evolves and to learn more about these communities from a privileged point of view. Please don't hesitate to make any suggestion you may consider, I am sure it will be very helpful for my research. Lorena Abuín. --lorenabuin 21:00, 25 February 2011 (UTC)
    • Comment: LOL, I don't know how privileged my point of view is. I am more or less just another nerd with a computer on Friday and Saturday nights. In recent weeks I have come to feel as though the people of Telecomix have accepted me as one of their own though, as I have done a little public relations, fact checking, and some translations. Telecomix is very open about their work, and does not engage in illegal actions. Being mostly European, they lobby against, or for, various cyber laws to their respective Parliaments. What I meant though by my comment "happy too help others who are not as advanced" is that it is common for someone to ask a question of a technological nature and usually others jump in and help to solve the problem. For example, my switch over to Linux, I have been having quite a time configuring a few of my drivers, and getting used to working from a command line with unix syntax, and several people who know how to fix the problems will jump in and start coaching with many lulz along the way.Deinous 03:45, 26 February 2011 (UTC)
    • Comment: Hello there. I am delighted and in part surprised to see a topic of this type. By type I mean it is heavily technological mission to retrieve a piece of real information from the community of real hackers. Not all software engineers employed by the government are able to intervene communication among the community of real hackers. You may however, catch a few portals where "I can do this, I can do that" type of conversations take place, but whether they really have done something interesting and indeed reveal their ideology is a big speculation. For this course, I believe, you need to change your frequency, sort of speak, and listen not for the hacking communities themselves, but for the actions they have already done. Actions speak lauder than words, as you may know. You you need to listen to the anti-thesis, that is, the counter part of the hacking group. In this country, among various subsequent agencies that keep control of all networks, the NSA sources will probably be the most beneficial to you, although I am not 100 percent sure about this. It is difficult to find something that is available to the public. Recall the scandal with pornographic downloads by the employees of the Trade Commission; this is just one out of million examples of the internet traffic control by the Feds. It is therefore the Feds who are on the opposite side of the argument with the hackers. By considering both ideology of the hackers and a counter-premise by the Feds you will have a full and comprehensive picture for your project. In short, I am proposing to search not only within the hackers community, which may only seem as community of hackers and give you a bogus information, but also find reports, chronicles, and cases exposed by the Feds. It may ultimately appear that it is the Feds who are vandals and trolls and who violate privacy and steal the tax money of the citizens. At least this is what my prospectus's sources can prove, but take a look at National Security Agency [1] web site. In the meantime, I will keep checking on your project and will try to give you more clues because your topic coincides with mine in many regards. --VladimirK 06:14, 3 March 2011 (UTC)
      • Response: Thank you for your response and comments. I will certainly take them into consideration. However, I feel that my views toward hacking are much broader than the criminality of a few, and that there should be more emphasis in part on the difference between hacking and cracking. I am one that still holds the traditional meaning of a hacker as one that is adept with the computer and often generates new creative uses for what is in front of them. As a result I am watching my topic shift a bit and focusing perhaps more on the difficulty that researchers have with the DMCA preventing them from publishing in full their findings, and the law of fair use. Over this past year we have watched the jailbreaking of an iPhone of iPad for the use of external software not approved by Apple go from being an illegal act to being justified as fair use. Although it will nullify any warranty of your gadget. Currently we are watching this same debate occur over the jailbreaking of the Sony PS3 to run Linux and homebrewed games. I am one that supports the fair use argument in that if you are clever enough to make your gadgetry do fun and interesting things beyond the uses that they are intended, then you should be able to do it--especially if you have no intention on using pirated software or make profit of any sort from it. As for an original angle, I am still waffling a bit, and welcome any further comments.====:) Deinous 17:36, 3 March 2011 (UTC)
    • Comment: Hi Margaret, Given your change in perspective of your project you may wish to explore the discussion of Tivoization (if you have note already considered such). The question of, “Should manufacturers of hardware have the right to limit the use of software on their machines when that software included elements covered under versions of the GNU license?” seems a related and interesting debate. --Gclinch 16:54, 5 March 2011 (UTC)
      • Response: Guy, thank you so much for your wonderfully concise thesis question! Sometimes it just takes the right little tweak to bring scattered thoughts together, and pondering the legal parameters of an open source kernel wrapped in a proprietary shell is a question I would very much like to spend some time on. Thanks again. Deinous 19:50, 5 March 2011 (UTC)
    • Comment: Margaret, I am very glad you found my suggestion helpful. I look forward to your final output. It’s a really intriguing topic. Thanks for checking out web.alive (comment below). I didn’t play any role in developing it (wish I were that bright). My colleague Arn Hyndman is the chief architect.

Your comment about, “test driving it among a group of ppl,” got me thinking. If we wished to, we could use the tool for a virtual study group. Would you be interested? Do you think others would be? It could be a great environment for classmates to meet and discuss the coursework.

Also, anyone who is working as a group in developing their project can use it to collaborate virtually. There are virtual white boards, web browsers that appear to be mounted on walls, desktop application sharing portals and other tools. I’ll be glad to meet folks in the environment and show how to use the tools. --Gclinch 23:06, 6 March 2011 (UTC)

      • Response: Guy, I think using web.alive as a platform for a study group is a great idea. Perhaps you can make an announcement in class this week. Deinous 00:59, 7 March 2011 (UTC)



Name: Guy Clinch -- Gclinch 13:22, 22 February 2011 (UTC)

  • To my Classmates: As of March 20 I have changed the title and subject of my finalk project proposal. --Gclinch 01:28, 21 March 2011 (UTC)
  • It has occurred to me that in order to give me feedback on my proposal you may need to experience the web.alive environment. Please feel free to click on the following link and explore. http://apex.avayalive.com/715/html

I look forward to reading your ideas. Thank you. --Gclinch 19:24, 3 March 2011 (UTC)

    • Comment: Hai Guy! I recently checked out web.alive and thought on first impression it was a nice sleek, useful, and intuitive application. Very well designed indeed. Were you one of the developers? I'm afraid that at this time I cannot offer much in the way of constructive criticism without test driving it among a group of ppl, but I do see it as a wonderful tool for distance business communication. Deinous 18:32, 6 March 2011 (UTC)



Name: Syed Yasir Shirazi [User: syedshirazi]

  • Prospectus title: Online Group Buying - Newly Emerging Business Model or Fad?
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Syed_Yasir_Shirazi-Assignment_2.pdf
    • Comment: Syed, this is a really interesting topic, but I am concerned that it may be too broad. I feel like a question like yours would more likely take up a book than a paper to be completed over a single semestre! Perhaps you could look into a specific group-buying site rather than the concept as a whole, like Groupon or LivingSocial. It might even be interesting to compare the two. Or, are there sites in which users decide which company they want to solicit such coupons from, rather than having the site itself decide? Just some ideas to help you get this topic down to something manageable. Does this help at all? Mcforelle 21:05, 5 March 2011 (UTC)
      • Response: Hi Michelle - Thanks for the feedback. I was actually planning to do a comparative study between a daily deal website (Groupon) versus a more traditional online retailer (Amazon or ebay) to see which model is more sustainable in terms of driving traffic and providing value. But your comments about 'websites that allow users to decide which company they want to solicit coupons from' has got me thinking now. Project is currently in Work-in-Process mode.Will keep everyone posted. Thanks - Yasir ~~syedshirazi 22:14, 06 March 2011




Name: Jessica Sanfilippo - Jsanfilippo 16:03, 22 February 2011 (UTC)

  • Prospectus title: Transparency and Participation in Crowd Funding
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:JSanfilippo_Assignment_2.doc
    • Comment: Hi Jessica,I think crowd funding is a fascinating topic, and there seem to be various types of crowd funding as you point out. Micro Loans and sites such as Kiva.com are also wonderful examples of crowd funding. I am probably over reaching, but I noticed that Syed Yasir A. Shirazi has a prospectus on Group Buying, and wonder if the two can be connected somehow? What if materials needed for a funded project on kickstarter.com for instance, could be purchased through groupon.com or a similar site? Regardless, I am looking forward to your findings around Crowd Funding (especially in the creative space).
    • Comment: Hi Jessica: www.33needs.com is another website which would be of interest to you. You might want to take a look at it for ideas related to crowd-funding. Also, let me know if you would be interested in sharing thoughts regarding the final research project.My email id is sshirazi@fas.harvard.edu. Thanks - Yasir ~~syedshirazi 21:24, 06 March 2011




Name: Adriana Faria Torii [drifaria] and Anna Christiana Marinho C. Machado [(Anna 17:03, 22 February 2011 (UTC))]

  • Prospectus title: Analysis of E-Government Practices in Brazil
  • Link to prospectus:http://cyber.law.harvard.edu/is2011/sites/is2011/images/Faria_Marinho_Prospectus.pdf
    • Comment: Hi Adriana and Anna - E-governance in an emerging country like Brazil is an attention-grabbing subject. As you have mentioned in your prospectus, in terms of audience, Brazil is amongst the top ten countries in the world (I think they have recently moved up to #5 in terms of total internet users). But that said, the overall internet penetration is pretty low (I think it is close to only 40% of the entire Brazilian population).

The G2C part of your project should provide an interesting analysis since concepts like e-voting work the best when the internet usage amongst citizenry is high. Brazil does not have uniformly high internet penetration across the entire county. Maybe you can differentiate the G2C aspect and compare between urban and rural populations because there will be different results (I believe) for effectiveness of such an ‘e-system’ amongst the 2 geographic segments. Also, you can include some analysis on mechanisms for ‘fraud detection’ for e-voting and e-tax filing processes. Thoughts on this link might be of interest to you: http://qssi.psu.edu/files/hidalgo.pdf. Looking forward to reading your final paper. ~~syedshirazi 21:21, 03 March 2011 (UTC)

    • Comment: Hi, I believe you should also compare other countries E- Government practices to Brazil's. It might be interesting to see if there are any other governments polices similar to Brazil's. There might be a government with similar statistics, and by comparing them you might see another variable that might be affecting Brazil. --Joshuasurillo 04:57, 7 March 2011 (UTC)



Name: Laura Connell Ltconnell 18:15, 22 February 2011 (UTC)

Envisional - Technical report: An Estimate of Infringing Use of the Internet
Hope you find this helpful --Gclinch 03:47, 1 March 2011 (UTC)

    • Comment: Hi Laura, glad to see this topic on the list. It's a tough topic as it could be looked at as requiring a world government organization to pass law enacting the crack down on stolen DRM'ed materials. At the same time there seems to be evidence that this type of activity does not hit the bottom line of Hollywood and other world producers of content. Manufacturers of CD and DVD technology has traditionally tried to work with the "Hollywoods" of the world only to be thwarted by the hacker. There seems to be a balance in the mix where the manufactures can create some hurdles for the most common user and at the same time not create a situation where users are not able to access valid content (such as putting in a DVD from Japan in a US DVD player and not being able to play the content). I think we're moving more and more toward online content like Netflix where the content is more controlled and the physical media is going away. Streaming content has some inherent properties that cannot be easily overcome, further, as long as the browser being used to support a new type of encryption technology, companies can make changes to security on the web server side when hackers have found an exploit. It's a very interesting topic, but I think any laws created would be done by people that do not fully understand the technology and also the laws have great potential to be outdated in a short amount of time if not written with enough foresight. Having said that, there has been a great deal of reduction in some types of sharing due to cases against people that have pirated DRM'ed media and also have had big impacts on many sites that traditionally have been an excellent source for finding pirated material. Regards, Alan Davies-Gavin--Adavies01 03:45, 5 March 2011 (UTC)




Name: Alokika Singh Singh singh 19:32, 22 February 2011 (UTC)User:Singhsingh

  • Prospectus title: Online Political Activism in India
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment_II_22_feb..pdf
    • Comment: Hi Alokika: I think your topic is very interesting. You can also draw a comparative line between roles of leading social/political leaders in India versus the role of ordinary internet users when it comes to acting as the leading force behind online social/political debate in India? A lot of times, it has been seen that individuals who don’t follow any hierarchy kick-off such bold campaigns. (Take the example of what happened in Egypt over the last six months. The online movement was sparked by ordinary folks and not any leading social or political figure). I am curious to know whether the online ‘Pink Chaddi’ campaign was initiated by general users or spearheaded by a leading social organization in India. I suspect the former. So it will be interesting to see how the online debate has evolved in India. Looking forward to reading your final analysis.~~syedshirazi 20:36, 27 February 2011 (UTC)



Name: Don Hussey Donaldphussey 19:47, 22 February 2011 (UTC)

  • Prospectus title: Online Crowd-Sourcing of Starbucks Product Development
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:LSTU_E-120_--Hussey_-_Asmt2.doc
    • Comment: Don, this is a really ambitious project. I think it's a great idea for you to use your professional position to get your foot in the door with some of the people at Starbucks; I hope it works! My only concern with this project is that you are only focusing on the corporate side of this venture. Is there any way you can include information from participants or contributors to this site? Is there any way on this site that users can interact with each other, or is it a one-way interaction between contributors and Starbucks? ~~mcforelle 18:39, 27 February 2011 (UTC)
    • Comment: Don, I also agree with mcforelle in that you should involve the contributors into your work. For example, if you look at those in support of Starbucks minis (lol)

http://mystarbucksidea.force.com/ideaview?id=08750000000H4DwAAK you can ask them if they seriously feel more loyalty to the company based on their contributions--even if they never see their ideas come to fruition? Or do they merely want to be a part of the Starbucks online community? Or do they want bragging rights? Also, it might be interesting to briefly compare the Starbucks strategy--seeing the consumer/contributor as the catalyst of a new product--versus, say, the recent Dominos Pizza strategy--viewing the consumer/contributor as the rater of a finished product. This might allow you to connect the measurable (business performance) with the non-measurable (customer feedback)--the latter which now can be more accurately measured because of social media and online communities. All in all, I think you have great potential with this topic! Myra 20:16, 6 March 2011 (UTC)

    • Comment: Re: methodology, Social Mention is a free tool you can use to track sentiment/mentions/posts related to Starbucks in various social spheres. Might be worth checking out as the mystarbucksidea project takes off, in order to see how this shapes their metrics! - Jessica Jsanfilippo 03:19, 7 March 2011 (UTC)




Name: Tym Lewtak lewtak 21:31, 22 February 2011 (UTC)

  • Prospectus title: User Generated Sites: Defining Superusers and Their Monetization
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/Assignment_2.pdf
    • Comment: Tymoteusz, I find you topic very interesting.

      I am wondering as a product of your research if you will study the proportion of individuals who are super users compared to commercial organizations using these tools. That is, in respect to commercial organizations using the various tools, how important is the individual? Over time, is the place of the individual becoming more or less important? I would suspect that part of this equation depends upon the rate at which people are able to monetize their involvement as much as how commercial organizations are co-opting the modalities. Is there a constant influx of new blood or will the ability of individuals to monetize their involvement decrease over time?

      It may be fascinating to see is this is an indication of a generative system over the long run or something that may peak and decline. Good luck! --Gclinch 03:26, 1 March 2011 (UTC)

      • Response: Gclinch, Thanks for all of your input! I initially didn't think to so much as include corporations, but taking a second glance at the subject you're right. I would be foolish to not look at motivations for companies and individuals alike to join sites as super-users. If I can find historical data on users from these sites, I'd like to especially take a look at whether it was individuals who joined first and became super-users, or if corporations jumped onto the "ball game" with individuals following. I suspect the latter isn't true, but I will try to distinguish between companies that joined these sites early on versus already popular companies that grew their earlier existent popularity. (Lewtak 21:20, 1 March 2011 (UTC))
    • Comment: One thing that is very interesting about internet communities is the ability of certain super users to arise. You will find it in all communities from IRC to blogs to forums to games and so on. Normally these are the folks to spend 60+ hours a week on their system (might want to look up references on hours as it relates to superusers) and this is their exposure to the "outside" world. There are different kinds of super users as well. There are the mentors who want to help the community evolve and guide users in the right direction, gently correct them when they are wrong, and are just generally helpful. There are also the dictatorial power mongers who will ban, delete, disparage, etc... anything they don't like, no matter how small the violation or mistake may be. There are many super user personalities in between as well. These individuals do it because they want to do it, not because of pay. Sites that can entice a user community to police itself significantly reduces their overhead costs and still, normally, maintains a good site with good content and a happy user community. Unless, of course, they select a powerMAD person to be the superuser in which case everyone will eventually get upset and move to greener pastures. Rakundig

Name: Denise Reed---dreed07 21:40, 22 February 2011 (UTC)

  • Prospectus title: A comparative study of user behavior on Chinese social networking sites with that of United States social networkers
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/sites/is2011/images/REED_LSTU_E120_Assignment_2.doc
    • Comment: Fascinating subject! I think that the differences between Chinese and USA based social networking sites is an area ripe for exploration, and one that could potentially shed a lot of light on the effects of government censorship on online communities. Some thoughts: differences in user behavior may be due to many different factors, including site architecture, demographics, and cultural influences. It would be worthwhile to explore the demographic differeces (such as age, socio-economic status, and geographic location) between different sites offering similar services in and outside of China. Furthermore, I wonder if it would be possible to obtain information on the behavior of Chinsese nationals using facebook prior to that site being banned in the PRC, and to compare it to that of non-Chinese nationals? Also, you might look into the social networking habits of users in Hong Kong, where Facebook and simmilar sites (IIRC) remain unblocked. Are their any social networking sites specifically targeted toward the Hong Kong community, and how do such sites differ from those in the rest of China? Finally, I notice that your links seem to be primarily in English. Direct access to Chinese social networking sites, and their users, in their native language would, I imagine, be extremely valuable to this project. BrandonAndrzej 03:57, 5 March 2011 (UTC)
    • Comment: I would love to see how your research will bloom at the end of the course. I am from South Korea but I have spent a considerable amount of time in China as my family runs business there. I usually stay in Beijing at least for a month every year and am naturally exposed to the Internet culture of China. As it is widely known, access to Facebook is blocked in the country and sometimes - I am not certain about the cause - access to Google is denied, which practically separates me from my online networks. You prospectus seems to cover general contrasting characteristics of two countries' different social networks. Since the filtering level of these countries varies, setting clear standards for comparing subjects, I think, might be quite crucial. From your project, selecting a proper social network website which can be considered as Facebook of the US would be an essence. Please let me know if you need any help with that.

--Yu Ri 03:27, 6 March 2011 (UTC)



Name: Michelle Forelle mcforelle 21:56, 22 February 2011 (UTC)

  • Prospectus title: Online Video-Making Groups: Community, Copyright, Collaboration and Commercialism
  • Link to prospectus: http://cyber.law.harvard.edu/is2011/Image:Assignment2_Vimeo.pdf
    • Comment: Michelle, I have never heard of Vimeo (this is where the Geico man asks me if I live in a cave), but I think you are onto something very interesting here. Perhaps when you tap the frequent contributors of the site, you can ask them why they post their videos on Vimeo instead YouTube, and if for a time, they did switch over to YouTube, and why? It looks like Vimeo started about a year before YouTube. Where did they share their videos before, or did they not? At the onset, Vimeo seems like a more serious bunch than Youtube, but let's see what you discover! Myra 21:03, 6 March 2011 (UTC)
    • Comment: Thought this was a very interesting and challenging research topic. I work in the digital advertising space, and video has always been a tough nut to crack for clients. They are drawn to the "sight, sound and motion" element that made TV advertising so successful, but clearly the digital space opens possibilities for an entirely new set of formats beyond the :30 sec TV spot. I have used Vimeo for one of my client's campaigns, and it was the community-oriented nature of its architecture that made it particularly compelling. So, I'll be very curious to read your completed report! Also thought I'd share a helpful resource that summarizes the online video landscape (it's slightly dated, but you might find their case studies to be useful to your cross-analysis): eMarketer. Good luck! - Jessica Jsanfilippo 01:29, 7 March 2011 (UTC)
    • Comment: I think this is a very interesting topic and i cannot wait till it is completed. There are so many other video sharing websites besides Youtube. Like Myra said, Vimeo seems to be for more serious users. Also they tend to target a specific group of fellow professionals. I wish I had chosen this topic. Good luck! --Joshuasurillo 04:26, 7 March 2011 (UTC)




Name: Myra Garza Myra

  • Prospectus title: Preparing and Accommodating Millenials in the Workforce: Use of Social Media in Two Career Coaching Businesses
  • Link to prospectus:http://cyber.law.harvard.edu/is2011/Image:Garza.M.Prospectus.doc
    • Comment: Myra, this is a really interesting topic! I feel like this is exactly as narrow a case study as the professors were asking for. I'm jealous that you were able to identify such an relevant topic, lol! I look forward especially to reading the background research for this paper, as it is my understanding that minority youth are disproportionally represented on sites like Twitter; I'm eager to find out whether that rumor is true, and if so, what it means for the way these youth interact with and influence the hiring process. I'm also interested in hearing how these companies help steer the social use of the social media into the practical, career-building use. I'm curious to see if you find that the conclusions you are specific to urban youth or whether such tactics in career counseling are also applicable to suburban and rural kids too. Great prospectus, I really look forward to reading your paper! mcforelle 18:02, 27 February 2011 (UTC)
    • Comment: I, too, think this is going to be a very interesting paper. There is such a need in the corporate community for young people who can help older executives use social media both within the organization for employees and outside the organization for the public and consumers. I would be interested in what the career objectives are for the clients of these two organizations. Are they interested in using their social media skills as part of their job requirements or are they looking for careers in various non-related fields? <<sjennings 01:05, 1 March 2011 (UTC)>>
    • Comment: Great topic, as I am sure many of us see on a daily basis the generational differences at work, and the need to involve and "catch" the millenial generation. I wonder if the two organizations will provide you with data on their success, and outreach numbers in the community? I look forward to seeing how this plays out. Coreymacd 01:35, 1 March 2011 (UTC)
    • Comment: Hi Myra - The influence of social media on both the job search process and in the workplace itself is a very powerful topic! If I am interpreting your prospectus correctly, it seems that your primary concern is with how, in practice, the two case study sites prepare Millenials for the proper use of social media in their job search/and work environments? If so, it might be interesting to connect with Human Resources representatives, to get a pulse on how their employee/recruitment policies have evolved due to the emergence of these new communication tools. In theory, I think there should likely be some alignment between the advice from the two websites and what HR is practicing. Separately, you also raise a very compelling distinction, which is that these businesses serve the needs of minority groups. I wonder if this may warrant its own stand-alone investigation. This way, you can truly dedicate your research towards how the workplace and job search process is shifting (and hopefully closing the gap) for minorities, as exemplified by the social media practices and guidelines from your 2 case study sites. In any case, this is indeed a substantial topic, so I look forward to seeing which direction you take it! - Jessica Jsanfilippo
      • Response: Everyone--thanks so much for feedback! I actually am an HR professional myself, and I can tell you that a lot of HR and business literature out there encourages the bridging of generations at work--particularly with the use of technology. Easier said than done! So, I already have an interest in the broad topic and am hoping the two organizations will be willing to share their experiences teaching social media tactics to youth (for career purposes) and offer some insight on the specific needs of minority youth. I actually met the owner of CC4Kidz at a conference a few weeks ago, and after searching for similar organizations, I discovered The Youth Career Coach Inc. As Jessica indicated above, this topic will require some more narrowing down. Thanks! Myra 22:50, 6 March 2011 (UTC)



Name: Jose Uscanga

When you ask, “Is free press necessary for democracy?” many of us would say, obviously yes. Reading your prospectus though makes me wonder, “what do we mean today by a free press.” Does phenomenon such as Mexican citizens taking, “on the civic responsibility of alerting other citizens by providing detailed and unfiltered information,” redefine what we mean when we use the term press? I’ll be looking forward to reading your conclusions. I’d also be interested to learn if you think there is something unique about Mexican culture that compels people to get involved. It seems to me that these citizen journalists are taking huge risks. Even less than the professional journalists, there would seem to be no safety net. After all isn’t it easy for the drug cartels to find out who is issuing the alerts. Is it a demographic trend, is it youth driven or does it span the population? Is it something unique about the way Mexican people relate to one another that makes people get involved? Thanks for taking on such an interesting and challenging topic. --Gclinch 02:57, 1 March 2011 (UTC)




Name: karishma Goenka--Karishma goenka 09:27, 8 April 2011 (UTC)