Friday, December 10, 2010

Notes: Blown to Bits

Chapter One: Digital Explosion
  • Although data leaks are common, we give our information away because we get something back in return; the digital explosion creates both opportunity and risk.
  • Bits (basic units of information in computing and telecommunication) travel almost instantaneously and take almost no space to store
  • Seven truths (koans) about bits:
    • It's all about bits (ex. there is no difference between texts and phone calls in the world of bits, but the law hasn't caught up with this technology)
    • Perfection is normal: every copy is perfect although computers and networks can still fail; digital copies are perfect only to the extent that they can be communicated at all; networks do check to make sure bits were submitted properly
    • There is want in the midst of plenty: there is a loss of information that is not online; for anything to "exist" online it must be about to be found and found quickly
    • Processing is power
    • More of the same can be a whole new thing: exponential change is smooth and steady but it takes little time before unnoticeable change becomes highly visible
    • Nothing goes away: by 2011, we may be producing more bits than we can store; (ex. hotel key cards and loyalty cards)
    • Bits move faster than thought: international help desk calls, intimate news released online, national and state borders still count
  • Technology is neither good nor bad, but it can be used for good and ill-brings both opportunities and risks
Chapter Two: Naked in the Sunlight
  • Orwell's 1984 describes a world of permanent surveillance, a society void of both privacy and freedom
    • Are we far from that world? the bank tells the government if big withdrawals are made, "little brothers" are always watching (devices of surveillance got smaller and are put in consumer goods, but we don't worry about their uses as surveillance...ex: the camera phone)
  • Footprints and Fingerprints: we can see footprints easily, but rarely pay attention to the fingerprints we make, same with technology
    • Our digital cameras encode their serial number into the pictures we upload, GPS in cars allow them to be tracked, RFID in clothing, printed paper can be traced through the printer encoding
    • The issue: taking bits from a car is not like taking things from a house, no warrant is necessary; no information is truly unidentifiable 
  • Why we loose control of personal information: to save time (EZ pass), save money (loyalty cards, store credit cards), convenience of the customer, fun to be exposed (Facebook), we can't live any other way
  • There is a difference between public and readily available: information available before by going down to city hall and searching through records is available with a click of a button online
Chapter Three: Ghosts in the Machine
    • Reports including sensitive/private information are commonly redacted before they are shared, but ordinary office software makes it easy to quickly recover redacted text. This is dangerous and embarrassing to the government.
    • Adobe offers security with encryption and Redax software; printing and scanning a document works too, but the text is reduced to dots and cannot be searched or used as a document
    • With Word you can "track changes" to a document, to avoid put text in the body of an email not as an attachment
    • Reproducing images electronically create "ghosts of the original"; they are not identical but contain enough of the original to be useful.
      • A photograph is represented in bits (model by modeling, omits information) and the model is turned into an image (rendering) which brings the "ghost" back to life
      • But this can also turn things that never existed into "reality" (ex. photoshopped evidence in court)
    • Processing is power because of the amount of information we store now, compact disk is dying
    • No one owns the internet, but everyone owns the internet; it is not hardware by protocol
      • "OpenDocument Format" where multiple companies could enter into the market and read documents produce by other software
      • Open Source v. Proprietary format
    • Spam: mass emails are so cheap, one response is worth the cost; they can produce graphics of text to get around spam filters
    • Steganography: art of sending secret messages in imperceptible ways (the message itself is not suspicious) while cryptography is the art of sending mesages that are indecipherable
    • Most things on a hard drive can be recovered even if you "format" them and erase information
      • Since bits have widths, information can even be detected on a zeroed disk
    Chapter Four: Needles in the Haystack
      • Although search engines can be used to find long lost relatives and discover things we didn't know existed, they are also used by governments to distort out picture of reality
        • "Search is a new form of control over information"
      • We used to give control over where we get information to authoritative sources like newspapers on record and encyclopedias, but now we give that control to search engines
        • Search engines gather information about us when we search
        • Search engines succeed if we are happy with the connections they make, not on the quality of information they provide because that does not come from them
      • How do search engines survive? adds, if something is "sponsored" on Google, they paid to get it there
        • Either users would pay, sites pay, government/nonprofit pays, or advertisers pay
        • Consumer Alert through the FTC made search engines say that ads are ads
      • How do they work? They search an existing index of sites, not the entire World Wide Web
        • Background: Gather information by visiting sites on a regular basis (those that don't change may only be visited once a year, others are visited by spiders); keep copies ("cached", copying of some sort is permitted or web wouldn't work); build index to show what appear on each page
        • Foreground: Understand query (quotation marks help clarify search), determine relevance of each possible result to the query (however relevance is inherently subjective, long documents tend to be measure more relevant than shore ones because they have more word repetitions), determine ranking of relevant results (if many pages link to one page it must be important, where a company appears in search results is a matter of life and death), present the results
        • Search engines shape our view of the world through the lens of their search results
      • Google: PageRank Algorithm, fast, vast storage, expanding, not much money though until AdWords, now it is pay-per-click
        • "bias can be coded into a computer program"; Search Engine Optimization industry seeks to improve how particular web pages rank within major search engines
        • Ex: put "JC Pennys" in white text on a white background of "Kohls" website and it will come up when users are searching for "Kohls"
      • US Patriot Act can require a search company to hand over personal search records without informing you they are getting information on you
      • "Information access has greater market value than information creation"
      Chapter Five: Secret Bits
      • Encryption: the art of encoding messages so they can't be understood by eavesdroppers or adversaries whose hands the messages might fall; de-scrambling requires the key (sequence of symbols) used to create it
      • Congress has to allow banks, airlines, and online stores to use encryption or personal security is at risk; efforts to control encryption would be ineffective and costs would exceed benefit.
      • Bits move through the internet in packets like exposed postcards, wireless networks allow bits to be grabbed without detection 
      • Cryptography (secret writing) has been around basically since writing; Caesar Shift (three places); Substitution ciphers (one symbol for another according to uniform rule; frequency analysis can break this though)
        • Can't reuse pads without risk of being deciphered, loss or interception is also a risk, big pads are hard to conceal
      • Lessons for the Internet Age: Weak systems and their risks are often rationalized to try to avoid the trouble of switching to more secure alternatives.
        • Bernardo Provenzana, mafia boss, stayed on run from Italian police for 43 years but a paper was found with correspondence between him and his son written in Caesar shift. He tried to switch to a new code but was traced and arrested in April 2006 (174)
        • WEP (Wired Equivalent Privacy) and WPA (Wi-FI Protected Access)
        • A cryptographic method should be considered reliable if it is widely known and seems not have been broken (Ex: encryption on DVDs was not distributed, but then it was cracked within three years after announced)
      • For a long time, secure communication was practical "only for people who could arrange to meet beforehand, or who and access to a prior method of secure communication for carrying the key between them"
        • Now they need a common g, private a and b, and a public A and B that can be seem by anyone and not deciphered; with this public-key encryption, anyone can send encrypted mail to anyone over an insecure publicly exposed communication path
        • Digital signatures help verify a mark is probably not forged, attests to integrity and authenticity
        • RSA (Rivest-Shamir-Adleman) algorithm with public and secret keys rely on difficulty of factoring and thus have created much interest in finding fast ways to factor numbers
      • Privacy? Clipper from Clinton to decrypt phone communications, US Patriot Act (Government can sift through data to look for harmful information)
      Chapter 6: Balance Toppled (Who Owns the Bits?)
      • Tanya Anderson (2005) Recording Industry Association of America searched her hard drive and tried to sue her for close to a million dollars for illegally downloading  songs, they had no proof (195)
        • 26,000 lawsuits in five years
        • MediaSentry (RIAA's investigative company), scans suspicious computers for music files and sends IP address to RIAA's Anti-Privacy group, but computers on the same network can have same IP address and some networks rotate IP addresses
        • High Stakes for Infringement: 3 million dollars for 4,000 songs
      • NET Act Makes Sharing a Crime: Copyright infringement not even criminal until turn of 20th c., and in 1976 Congress started enacting a series of laws to increase the penalty
        • A machine at MIT (1993) was being used for file transfer and the FBI questioned it, there was no commercial motive, no crime; law needed to change so these types of cases could be prosecuted (199-200)
        • Digital Theft Deterrence and Copyright damages Improvement Act of 1999, penalties needed to be increased, copyright arms race was in full swing
      • Peer-to-Peer Upheaval: Napster by Sean Fanning, file sharing no longer used "centralized systems", but had a central directory showing who had the songs on their computers "peer-to-peer", no passing through server, "universal jukebox"
      • Specter of Secondary Liability: "how can you hold a company liable for simply publishing the locations of items on the internet?" (203), guilty of secondary copyright infringement (allowing others to infringe and profiting by infringement); "P2P"-no reliance on central authorities
      • Sharing Goes Decentralized:  the central directories of Napster allowed for liability; so to get around, flooding was created (each computer has a file-sharing network of other computers, like FOAF)
        • No Safe harbors: RIAA saw this as another Napster, so Grokster, Morpheus, and Kazaa were sued and finally the Supreme Court ruled in the RIAA's favor (unlike Sony v. Universal Studios where the VCR recorder remained legal  because it had many legitimate uses)
        • A Question of Intent: these companies' liability came from the intent on their distribution, not the capabilities of the software
        • With TiVo you can't skip commercials automatically and songs transferred from Microsoft Zune self-destruct after three plays to limit liability
      • Authorized Use Only: If computer's make file sharing easy, change computers...but there are ways to encrypt information so it cannot be manipulated or distributed
        • "The general technique of distributing content together with control information that restricts its use is called digital rights management (DRM)" (210) (industry specifications that detail restrictions that can be imposed=rights expression languages)
        • The chip "Trusted Platform Module" keeps a computer from booting whose operating system was tampered with, but having a "world of trusted systems" could jeopardize the rapid innovation that has taken place because the infrastructure is currently open
      • Forbidden Technology: anti-circumvention laws to keep people from going around copyright protection; made it illegal to talk about how to unlock iphones from AT&T network
      • 1998 Digital Millennium Copyright Act (DMCA) has anti-circumvention provision that "outlaws technology for bypassing copyright protection" (214) the book gives a couple lines of a program that unscrambles encrypted DVDs, by providing whole code it would violate law. Outlaw manufacturing, selling, writing, and talking about technologies that allow copyright bypass, not just outlaw infringement but bypassing; Circumvention; were allowed to undo lock-in on their mobile phones when shifting service providers then iPhone...AT&T threatened legal action against unlocking companies...unlock own phone not others.  
        • need permission from companies in industry to create new technologies/products/services around DRM-restricted content
        • Copyright Koyaanisqatsi: Life out of Balance
      Chapter 7: You Can't Say That on the Internet
      • Katherine Lester (16) went missing from her home in Michigan; she had met Jimzawi from Jericho on MySpace and went to Jordan to meet him. This led to Deleting Online Predators Act (DOPA) to require schools/libraries to prevent children from using on-site computers to access chat rooms/social networking sites (229-230). This would also prevent "access to online encyclopedias and bookstores"--> education not prohibition to bring safer internet...DOPA not passed into law
      • "Internet is not exactly like anything else" (231): 2-way, no limit to number of channels, delivers packets of bits. 
        • Transmitted information always has source and destination, may also have intermediaries, with internet there is "cloud computing" (source->ISP->Cloud->ISP->destination) who should government regulate? can control ISP, destination, source, or intermediaries
        • Ex: parents of child who Pete Solis (232) assaulted tried to sue MySpace; CompuServe computer service provider had bulletin board (Rumorville) while DFA provided content. Rumorville began bashing competing company. Compuserve was the "distributor" and like a trucker, not liable, if it was, this would limit use for participatory democracy (234-235)
        • Prodigy (like Compuserve but said they were like newspaper and wanted to provide family friendly content). On their bulletin board "Money Tallk" information was posted about Stratton Oakmont criminal fraud and was sued for defamation. Held responsible as publisher because they said they were. "Undercut efforts to create safe districts in Cyberspace...Don't even consider editing or censoring" (236). 
      • 1st Amendment doesn't protect against censorship of obscene material: Miller v. California Miller Test 1.) community standards, appeals to prurient interest 2.) depicts or describes in offensive way sexual conduct 3.) lacks social value. Obscene if all three are yes. What is community in cyberspace
        • The Thomas's bulletin board Amateur Action the "Nastiest Place on Earth". Pictures were not obscene in California but were in Tennessee and they were arrested
        • Porn was not new, but the availability or digital porn made it seem new. Time Magazine didn't mention that they bulletin boards which offered images were not openly available to children. Senator Grassley (239) read article which claimed to be from Georgetown University Law School and passed into law Communications Decency Act (CDA) which criminalizes using computer that is used by minor to view/whatever offensive content and distribute such material to minors
        • "court was unwilling to risk the entire Internet's promise as a vigorous marketplace of ideas to serve the narrow purpose of protecting children from indecency" (241) burden from source ISP to destination
        • Good Samaritan clause in CDA allowed ISP to not be responsible for anything they did "in good faith" to protect minors, can censor without being liable (Ken Zeran...see blog)
        • This clause also protected AOL twice, once when Russel used AOL to sell sexual images of little boys, AOL was notified and did not suspend his use. AOL won (246).
        • Gary Dellapenta (doorman) wrote woman's address and name on a chatboard and said she wanted to be raped and gave directions how to break in to he apartment->federal anti-cyberstalking laws. (250)
      • Like an annoying telephone call? 2005 law stated internet could not be used for the purpose of annoying someone
      • "Given the Choice between protection from personal harm and some fool's need to spout profanities, most of us would opt for safety" (253)
        • In Saudi Arabia, every web access goes through government computers to censor
      • "Technological changes happen faster than legal changes" (257)
      Chapter 8: Bits in the Air
      • 2006 Bush talking to British Prime Minister and said the s word, most stations censored word or could get sued $300,000 by FCC; 2002 Bono said f word at Golden Globes, "offensive" (260)
      • First Amendment, freedom of speech, so government isn't fast to restrict it
      • FCC gained authority when there were fewer ways to distribute information, public airways scarce and needed be regulated to be used in public interest, "protecting a defenseless public from objectionable radio and television content" (260)
      • Now we have an abundance of sources of information maybe in the "absence of scarcity", Congress should stop censorship entirely (261)
      • James Clerk Maxwell proposed there may be waves of other frequencies that couldn't be seen like light waves. 1887 radio era began with Henrich Hertz using a wire to create a spark of electromagnetic waves. Marconi experimented with wireless transmission of messages. solved problem of telegraphs, nothing could stop wireless transmission by severing cables, BUT anyone could listen in and signals were crossed and muddled.
        • Ex: titanic, Newspapers had reported all safe because one signal asked if all were safe and another gave a location of another ship.
        • In 1907, Lee De Forest patented technology that allowed production of radio waves at a narrow range of frequencies and a receiver that let those through and screened out the rest.-->amateur broadcaster.
        • Radio Act of 1912 limits broadcasting to license holders, government stipulates frequencies to prevent interference. Amateurs pushed to short wave
        • On Nov 2, 1920 station presented election results, radio not just point-to-point communication, then World Series broadcast, sports broadcasting; regulation in 1921 (could tell "shipping lanes to use, but he couldn't keep them out of the water" (267))
        • Radio Act of 1927, radio spectrum became federal property
        • Brinkley "doctor" bought degree from medical school in Kansas, made it big with buck gland transplants to promise virility...opened Kansas's first radio station KFKB (country, preaching, medical advice to buy patent medicines). Court held FRC had right to not renew license, no prior restraint...central planning not going so well
      • Path to Spectrum Deregulation: broadcast signals when using key fob to unlock door, regulation of these waves would have snuffed digital explosion (273)
      • Spectrum allocation: changing way spectrum utilized, at first cell phones were limited by number of channels, now signal only transmitted a mile or so then sent through wire to company. SHORT DISTANCE!!
      • HD radio inaudible on normal radio, uses guard bands to be filtered out from adjacent channels; secondary spectrum marketing pay per use
      • Everybody shares roads with rules and regulations, commons
      • Hedy Lamarr (actress) married Austrian munitions maker, left and met Mayer and Antheil in Hollywood
        • Radio controlled torpedoes, broadcast noise at same frequency of signal could cause to miss mark (278), came up with idea instead to transmit signal in short burst at different frequencies (transmission couldn't be jammed by flooding a small range of frequency, and too much power to jam all frequencies at the same time; patent ignored for decade
        • Spreading signals across spectrum: channel capacity (bits/second handles), "bits can be transmitted through the channel, from the source to the destination, with negligible probability of error as long as he transmission rate does not exceed the channel capacity" (281)
      • Capacity of radio channel depends on frequencies an power. Bandwidth is the size of the frequency band (difference between top and bottom), channel capacity is proportional to bandwidth. Power increases exponentially with bits. Capacity depends on both bandwidth and power, more bandwidth more important than more power
      • Wireless sensor networking with remote areas with hostle environments

      Notes: Here Comes Everybody

      Chapter 1: It takes a Village to Find a Phone

      • Cell Phone Story: A woman's phone is found in a cab and stolen instead of returned; her friend used the web to retrieve it
        • We've always relied on group efforts for our survival
        • Forming groups has gotten a lot easier

      Chapter 2: Sharing Anchors Community

      • Sharing to anchor the creation of new groups
      • Manager/hierarchies to simplify communication among the employees (hierarchical organization)
        • New social tools lower the cost of social interaction
        • Flickr
      • Mermaid Parade: Flickr photos, group
        • 1st photos in London Transport bombings
        • Share then gather
        • Coup of Thailand-restrictions on populace, but Alisara Chirapongse had her camera and web blog which offered running commentary on the event
      • Org Chart: organizations reporting structure
        • Draws clear and obvious lines of responsibility
        • Managing resources takes resources and management challenges grow faster than organizational size
        • What happens to tasks that aren't worth cost of oversight? didn't happen
      • Sharing
      • Cooperation: to get change they need to sync
      • Collective action: undertake effort, creates responsibility, ties user id to id of group
        • Tragedy of Commons: free riding
      Chapter 3: Everyone Is a Media Outlet

      • There have been radical changes in the overall ecosystem of information; it used to be hard to get media to consumers, but the web created a new ecosystem
      • Information that is too expensive to print and deliver doesn't go into a newspaper
        • Lott praised the presidential campaign of Thurmond who was pro segregation; this was not considered "press-worthy" until bloggers kept it alive; Lott made an apology which became newsworthy
      • News went from institutional prerogative to part of a communications ecosystem; anyone in the developed world can publish anything anytime (globally available and readily findable)
      • Journalistic privilege to uncover wrong and contribute to the safety value for reporting, what will happen because now everyone can commit acts of journalism 

      Chapter 4: Publish, Then Filter

      • User generated content: users create and share media, but most is not "content for general consumption"
      • Old ways: 1.) Broadcast media where messages are put out for all to see and 2.) communications media that facilitates two-way communication
      • Now many-to-many communication that you can't tell by the medium if message is personal or impersonal (like direct mail)
        • You can't keep things private and in context; most of what is posted on line is in public but not for public
      • Famous: 1.) an audience n the thousands, 2.) unable to reciprocate; have to choose who to respond to and who to ignore; egalitarianism is only possible in small social systems
      • Web blog world: no authorities, only masses where messages become "an unmovable pile of river pebbles"
      • No one can monitor it all; publish then filter
      • Creates community of practice from latent communities which share and provide feedback
      • Our social tools are a challenge to modern society
        • Don't become socially interesting until they become boring/invisible

      Chapter 5: Personal Motivation Meets Collaborative Production

      • Wikipedia was created by Jimmy Wales and Larry Sanger who tried to create Nupedia (written, reviewed, and managed by experts volunteering their time)
        • Seven step process was intended to set a minimum standard of quality, but this made the process extremely slow
        • Sanger suggested using a wiki to create a first draft; first wiki created by Ward Cunningham in 1995
        • Would allow a small group to work on a shared writing effort without needing formal management process in a user editable website
        • Placeholder stub
        • Wikipedia is a process not a product, so it is never finished
      • Articles end up being of high quality most times and has become a general-purpose tool for gathering and distributing information quickly because people think of it as a coordinating resource
      • Power Law Distribution: appears in social settings; imbalance drives large social systems rather than damaging them (no concern over reducing inequality), focusing on the average is no merely useless but harmful
      • Why? exercise unused mental capacities, vanity, and desire to do a good thing
        • When people care it becomes harder to harm; counters vandalism and special interests
        • saves from Tragedy of Commons
        • If everyone lost interest it would vanish instantly 
      Chapter Six: Collective Action and Institutional Changes
      • In 2002, Boston Globe featured a story on Father John Geogham, a pedophile that the bishop knew about and moved him from district to district for thirty five years
        • After article, Voice of the Faithful (VOTF) formed and grew to change and reform the church
        • Bishop Law resigned and there were reforms made, but it happened before and the church didn't try to reform because they treated it as an internal affair to avoid major and synchronized outrage
        • Their goal was to manage fallout because  before the internet age, people couldn't easily share information or coordinate a response. Now we can forward emails (narrows the gap between intention and action) and write web blogs; collective action change as well (easier to form groups); Technology removed barriers of locality of information and barriers to group action
      • Technology creates new characteristics in old institutions (ex: after movable press, scribes wrote slowly)
      • Before email, we had few tools for group communication: it's free and can be sent anywhere, reduces transaction costs
        • Internet is a tool to move information back and forth 
        • Sir Tim Berners-Lee (1990s) invented the web
      • Spread of information like model for spread of disease if 1.) likelihood of infection, 2.) likelihood of contact, or 3.) size of population increase, so does the overall spread
        • Social tools don't create collective action, they remove obstacles to it
      • See blog on Revolution for additional notes
      Chapter Seven: Faster and Faster
      • Collective action harder to get going and stop than individual action
        • Groups exert a different kind of force and threat than individuals
      • Leipzig, Germany (1989): protest against GDR during existing events. Small so government did nothing, others saw government doing nothing, so they joined in
        • "Mass basis" is number of people who understand protest unpunished
        • information cascade, see blog
        • "shared awareness" understanding situation and who else has some understanding; allows groups to begin quickly and effectively; necessary for public action
        • Got so big caused government to collapse
      • Flash mob: a group that engages in a seemingly spontaneous but actually synchronized behavior
        • They were harmless to get attention (department store gathering, supermarket freeze) and now are becoming political 
        • One in Minsk, Russia over election of Lukashenko; ate ice cream and were hauled away; message was in the collective action not the behavior
      • Now organizing effort invisible and immediate
        • Can be documented and live forever while documenters vanish (speaking online=publishing online=connecting with others)
        • Changing internal communication abilities changes capabilities
      • Germans weaker than French but had radios (fast processing of information), blitzkrieg (rapid attack)
      • Airlines: people stuck on plane for hours on runway with no food and stinky bathrooms, support and awareness raised in blogs on internet and comments on news stories, led to Coalition for an Airline Passenger's Bill of Rights
      • Evan Williams: Blogger, audio blogging, Twitter
        • Mostly for benefit of friends, not general public
        • Alaa Abd El Fattan used to document arrest and organize collective action
      Chapter 8 Solving Social Dilemmas
      • Social dilemmas can only be optimized not completely solved
      • Prisoners Dilemma: Nash Equilibrium, each choses dominant strategy and neither get the best outcome
      • Robert Putnam: weakening of community in the United States
        • more social capital=> better health, happiness, and earning potential
        • Direct reciprocity and indirect reciprocity
        • "Participation in group activities, the vehicle for creating and sustaining social capital, was on the decline in the United States"
        • As it became more difficult to get together, transaction cost increased
      • Internet augments realworld social life rather than providing an alternative to it, it's not a separate cyberspace
        • Meetup to identify latent groups and help them come togehter
        • More meetups for groups without support in the broader US
        • "Modern life has raised transaction costs so high that even ancient habits of congregation have been defeated. As a result, things that used to happen as a side effect of regular life now require some overt coordination"
      • Drawbacks: no longer need social support to gather (proana girls)
        • Three types of social losses: jobs of those who distribute information, damage current social bargains, terrorist networks are also more resilient because of better communication tools and more flexible social structures.
      Chapter Nine: Fitting Our Tools To a Small World
      • The average is meaningless in the number of people each person knows like with the power law distribution: a few people account for a wildly disproportionate amount of the overall connectivity
        • "The chance that you are a highly connected person is low, just as it is for everyone, but the chance that you know one is high
        • Six Degrees of Separation
        • Small World Network Characteristics: Small groups are densely connected, large groups are sparsely connected (connect people in groups)
        • Dodgeball FOAF networking
        • The larger the network the more important the highly connected individuals are in holding it together
      • Social Capital is "that store of behaviors and norms in any large group that lets its members support one another
        • Bonding capital is increase in depth of connection and trust
        • Bridging capital is increase in connections, produces good ideas
        • Howard Dean running for president, only had bonding not bridging capital (small dedicated group of supporters)
      • Internet Relay Chat: real-time chat room/channel; topic-centered
        • Ito set up public channel so he could be a host, exert moral suasion over proceedings

      Thursday, December 9, 2010

      Notes: Class Meetings and Podcasts

      August 8th
      • Tagging and Folksonomy: instead of classic organization (folders on computer/Dewey decimal system) we classify information online with tags (keywords you can hang on things to describe content)
      • While tagging alone can be personal, folksonomy makes it social allowing everyone to add meaning and find meaning in tagable items
      • Articles
        • Delicious is a social bookmarking site that uses tags to organize (you can view other's bookmarks)
        • Folksonomy is a people's taxonomy: use tags to label/categorize
        • Others can label you and define
      September 13th (Google)

      • Google instant gives answers to questions before you finish asking
      • Google's mission: organize world's information and make it universally accessible and useful; it's the worlds largest search engine
      • Google makes money through advertising
      • Services: voice, picassa, youtube, health, earth, desktop, ads, gmail, news, enterprise (office applications)
        • Goodies: book search (you can add books to your library), Google maps/my maps, search
        • RSS News feed (really simple syndecation) subscribe to feed (can do through browser/phone/desktop)
        • Google squared builds custom spreadsheets for search/general search, it's a good start
        • Google Reader: subscribe to online news and blogs (one-stop) shop, look at websites you browse and look at what's updated
        • Google Adpps/Goodies (docs.google.com)
      • Google Benefits: free, online real-time collaboration, sharing of document, instant publication of webpages, embedding content into blogs, websites
      Presentation One: Social Networking

      • Social networks existed before the internet (phone trees/organizations/CB radios)
      • 1997: Sixdegrees.com was the first social networking site
        • Friendster dies, linkedin triumphs
        • Many target specific demographics
        • Myspace: safety issues hurt reputation, big with teens 
        • Twitter: SMS (short message service)
        • Over 70% of teens on SNS reported receiving messages from someone they didn't know
        • In a survey, over 90% of undergrads used Facebook
      • little chance of SNS fading in the near future
        • More tagging and "object-centered" networks
        • From centralized to decentralized (FOAF, Onesocialweb, noserub)
        • Advantages: control over privacy, a profile that suits your needs, immune to censorship
      Podcasts
      • Originally for music to download overnight
        • Should be free and easy to get through "Subscriptions"
      Presentation 2: Web 2.0/Privacy
      • New version of www, allows sharing, collaborating and interaction
      • From 1.24 billion to an estimated 3.1 billion in 2012
      • Privacy: an email that wasn't even sent can be tracked, web 2.0 sites mine information; the average netizen doesn't know tracking occurs
        • Netizen: a person actively involved in online communities (cyber citizen)
      • Hacking and Fraud, from computers to mobile devices (3x as dangerous plug-ins compared to a year earlier)
      • Is web 2.0 good for privacy? no, more information available, less awareness
        • only takes one time to put something online and its available forever
        • Cookies: If you delete cookies your browsing experience won't be personalized
      • Organizations that promote online privacy: online alliance corporation, IAB, Better Business Bureau, Trustee, EPIC, Privacy.org
      November 20th & free podcast
      • See blog posts about podcasts...
      Group 3 Presentation: Viral Marketing
      • The strategy encourages indiviuals to pass on a marketing message to others and grants the potential for exponential growth in the messages exposure and infleucnes
        • Grows like a virus, started as street signs (1920s radio, 1940s tv, 1990s Internet/Websites, now social networking)
        • Term popularized in 1997 by Steve Juveston for Hotmail's email practices (placed "get free email" on bottom of every email from hotmail account)
      • Strategies of Viral Marketing
        • 1.) give aways, 2.) provide effortless transfer to others, 3.) Scale easily from small to large (allow for rapid growth), 4.) exploit common motivations and behavior (greed, popularity, love), 5.) common/existing communication networks, 6.) take advantage of others' resources
      • Case study: Grip Films uses constant contact/emails if you sign-up, buy products (1 newsletter/month)
        • Facebook "friends", giveaways for "Liking"
        • Twitter to give daily alerts, repost other tweets
        • Blogger: for human interest (posts and pictures) 
        • YouTube: post trailers and behind the scenes to gain interest
        • Better search engine optimization by putting links to purchasing site
      • Best Buy: manipulate social media to give tools to connect with each other and employees
        • Guidelines: listen, findable, about people, make it social, authentic, trasparent, simple
        • Twitter turned around "twelp force" access to brand and advice
      • Benefits: reaches further, cheaper, increases visibility, combines with other strategies
      • Negatives: false sites, costs money to advertise the social media tools; put in work to make videos and pages
        • Wieden and Kennedy (make commercials), Kallman and Allen
        • Can't control information on sites, word of mouth not always a good thing (bad spreads too)
        • Page views do not equal revenue, repeated viewers
      • Viral-->can't guarantee it'll be "viral", you can be social 
      Cognitive Surplus (Clay Shirky) Presentation
      • We have over one trillion hours of free time collectively
        • 21%, 1 billion people carry around cameras
        • 47%, 3 billion have active cell phone accounts
        • 30%, 2 billion are online
        • more interactive than passive experience
        • 100 million hours to create wikipedia, but Americans spend 200 billion hours watching TV (2000 wikipedias)
      • How to get to work (problem), solved by a social tool PickupPal.com; information to solve a problem quickly
      • Anyone can be media through publishing; more average content published
        • Tools take off that let people do what they want
        • Intrinsic motivators and desire for autonomy and competence
        • and extrinsic motivation
      • Amateur: web, personal, moderate quality
        • Facinating because of diversity of thought
        • Create and share online because we want rewarding experiences
        • YouTube: 12,623,040 hours of video/year; Twitter: 109,500,000,000 words/year
        • Technology brings opportunity to increase ability to create together
      • Culture: collective norms and behaviors in a group
        • positive social interactions creates sharing
        • Personal, communal, public, civic, uncoordinated (youtube), discussion forum, public, transform society
        • Successful groups reward for sharing
      Shirky Talk
      • Africa 2007 election: media blackout/shutdown, blogs essential
        • Too much--> Ushahidi created to aggregate info on a map (crisis map) open source, global deployment in three years
        • Needed digital technology and human generosity
        • Cognitive Surplus: ability for free time of world to go towards working together; we don't just consume anymore, we create and share (freedom to experiment)
        • Social constraints created a more generous culture
      • LOL cats communal (by participants fore each other)
        • Ushahidi civic (for society, to make life better)
      Group 4 Presentation: Fair use and the Issues of Copyright ethics in school and the workplace, and the role of free speech online
      • Copyright right to make copies, license, and otherwise exploit a literary, musical, or artistic work, whether printed, audio, video etc. (1978) protected for lifetime of author/creator for 50 yrs after death
        • How it's enforced: caught and charged with copyright infringement, if holder doesn't bring case for three years, can't press charges; charges decided by copyright holders
        • Peer-to-peer: can share with networks, big problem in colleges
      • Fair Use: no set definition, a limitation of the copyright law (fair use doctrine)
        • Fair Reproduction: criticism, comment, news reporting, teaching, scholarship, research
        • You need permission if the work is protected, you wish to exercise one of the owner's exclusive right, your use exempt or excused from liability for infringement.
        • Rules of thumb: for multimedia you can include other works but use small amount and limit reproduction; research only use small segment
          • Is it commercial or nonprofit educational? What is the nature of the copyrighted work? The amount of substantivity of the portion used in relation to the copyrighted work. The effect of the use upon the potential market for or value of the copyrighted work 
          • Guidelines: don't depend on word-count guidelines, commercial use of another's work is less likely to be considered fair use than uses that are educational or critical, factual works recieve less protection than fictional, try and add value
          • When in doubt try to get permission, they are deemed to consent to fair use of their works by others.
      • Ethics in Fair Use and Copyright
        • taking work offline isn't tangible so it doesn't feel like stealing, still is; emerging technologies caused line of ethics and fair use to be blurred (easy to copy and paste)
        • In education common breaches of ethics involve plagiarism, cheating on exams, illegally downloading software, and turning in anothers' work as own.
        • 74% say they've seriously cheated, 54% say they've plagiarized, 47% say teachers ignore it
        • Business: similar to education, many feel it's not about doing what is right but doing what is best for them
      • Public Domain: Not covered by any copyright laws, to creatively express selves through works but cna be tken advantage of; can be sold as proprietary, make money off of you
      • Copyleft: protects, always free, can get through GNU.org (not unix), gives general license
        • Copy left/EFF are politically left, free and open for people
        • Disney got Mikey Mouse re-copyrighted
        • 5 Copyrights: distribution, reproduction, public display, public performance, modification "all rights reserved"
        • Anything you make is technically copyrighted, but you can't sue unless you buy the copyright
        • In 1980s when most software was proprietary, Linux was GNU's free operating system. Focused on free like liberty not price; PGP to read crypt messages
      • Creative commons license: decide how work can and cannot be used-->have options share work, keep credit
        • Shared culture: new technologies provide for creativity, gives producers/creators tools to make a choice about how to share/exercise copyright in more ways for access and control (Jimmy Whales, Wikipedia)
        • Lawrence Lessing created CC, but what you can share online still complicated
      • Free Speech online: controversy about how free speech works online; what can we say/post?
        • Electronic frontier foundation want to reserve freedom online, protect people from misuse of copyright law; appeal to government, maintain first amendment rights
        • Conform to the place you're in with free speech online; encourage writing online or if the fire people for talking online about boss, if you are at work you are under their rules; online postings can get you into trouble
      Wikileaks
      • an international new media source that publishes otherwise unavailable documents from "anonymous news sources and leaks" (Wikipedia, "Wikileaks")
      • It has released documents about the Afghanistan war and the "Iraq War Logs". In November 2010 it released U.S. State Department diplomatic cables (confidential correspondence between the US State Department and it's diplomatic missions around the world, containing analysis of world leaders, assessments of host countries, and international and domestic issue discussions, labeled secret and confidential).
      • Started as a wiki but no longer accepts user comments or edits, wish to reveal unethical behavior of all governments
      • U.S. Justice Department investigating Wikileaks and Julian Assange (founder): could charge under Espionage Act (difficult because of freedom of the press, unless he broke laws getting information), trafficking stolen government property (but it's intellectual not physical), it could be hard to extradite to US anyway  

      Wednesday, December 8, 2010

      What might you do with access to UWB radio transmissions if you had a receiver in a car?


      In chapter eight of Blown to Bits, Abelson et al. briefly mentions UWB (ultra wide brand) radio. UWB "splatter[s] radiation all across the frequencies of the radio spectrum" (Abelson, 288). UWB, according to Abelson, uses extremely low power and very large bandwidth to carry a lot of information in a short time period a small distance, so that it will not interfere with  any normal radio receiver. In the chapter, the two uses described for this technology are to connect the TV, cable box, and DVD player in your home without using cables and to transport your music library from your home audio system to your car in the driveway. 


      If I had a receiver in my car, being about to transport my music library from my computer to my car would be a good use for it. It would be convenient not to have to connect my ipod to my car stereo or change CDs all the time (my CD player is in the trunk, so it's kind of a hassle). I would also probably try to transmit directions/destinations from my home computer to some handheld GPS or something in my car. Whenever I am going anywhere my first step is go to mapquest and see the way they would have me go. I like seeing clearly all the different turns they would have me take. Then I get in my car and have to retype in the address. It's not a huge inconvenience, but it would save some time just to transfer the information from my computer. If I happen to like the directions on the computer, it would be helpful to be able to transfer the entire set of directions to my navigation device in my car. 

      Monday, December 6, 2010

      False Advertising

      What might you have done differently if you were in the position of artist Ken Zeran, mentioned in this chapter?


      The story of Ken Zeran is told in chapter seven of Blown to Bits. Zeran was an artist and filmmaker who relied on his phone for his livelihood. In 1995, someone posted advertisements on an AOL bulletin board for inappropriate, offensive shirts relating to a bombing in Oklahoma City. The ad gave Zeran's phone number as the contact information even though Zeran had nothing to do with the advertisement (Abelson, 244). Ken started getting angry calls and even death threats about the shirt advertisements from Yahoo. Ken's response was to call AOL and ask them to remove the user. They did once, but whoever was responsible just made another name and posted the same false information. AOL promised to remove and prevent further postings, but did not follow through. Ken eventually got police surveillance around his home for protection. He also called one radio station that was promoting calling Ken and basically telling him off. The radio station learned of the situation and issued a retraction. Ken tried to sue AOL for defamation of character but to no avail, since AOL could not (due to precedent) be held to the same standard as a publisher. 


      I probably would have tried to contact "higher ups" in the AOL company to get the content removed. I definitely would have called the police right away if people were making death threats against me. I also would have changed my phone number. It would be a different situation now than in 1995 because of the expansion of the web. Ken didn't have the same accessible tools that he anyone would now. I could switch to a business plan that focused on online and/or in person business interactions instead of on the phone. I could change my number and send messages/emails out to clients and friends that I trusted were not the culprit. It still would be a setback to change business styles abruptly, but I think with increased technology and others using technology I would be able to keep clients even if I stopped my phone service until the false advertisements stopped.

      Wednesday, December 1, 2010

      DRM-protected Content

      What’s the value of a bit? It seems that going after folks who have traded songs or movies online is a huge expenditure of effort and money. Is DRM-protected content the way to go? If you don’t agree, propose another method for the distribution of digital multimedia so that content creators can still be compensated.


      In chapter 6 of Blow to Bits, bits are valued pretty highly. In trying to place a dollar value on them, the RIAA decided $750 was the cost of one song downloaded illegally. I think the main point of those examples was that a bit does not have one set value, it depends on how it was obtained (one song legally only costs about dollar), who it harms, and other factors. All the information stored on a computer and transfered online is in the form of bits, so they do carry a large importance. Because most of our information and media is now online in the form of bits, it makes sense that such money and effort goes in to trying to keep these bits from spreading illegally without compensation. If the majority of people decide to steal music, record companies and artists would lose tremendously. Something has to be done, which is why individuals who have downloaded music from Napster, or suspected of it get law suits filed against them. Someone needs to be the example (Ableson et al. includes stories of people who have never owned computers getting investigated for illegally obtaining music from "their" computers).


      I think, from the limited knowledge I have on the subject, that  DRM-protected media is more harm than it's worth. It seems ridiculous to buy a CD that is DRM protected, bring it home, and not be able to download it to your personal MP3 player because of the encryption on it. Many cars don't have CD players anymore, and just have an input jack for your MP3. The wikipedia article on DRM said that the Walmart online music store sold DRM protected music that was encrypted only to play on certain MP3 devices. If I buy anything, even if it's less than a dollar, I expect to be able to use it. 


      I think one part of a better alternative would be education. Yes, for downloading music illegally online from sites like limewire, it's relatively known that this is illegal, but as for burning a CD for a friend, a surprising amount of people don't know that that's illegal. I was observing an elementary school classroom this summer and the computer resource teacher came into the class and asked who thought that burning a CD for someone else was wrong. The majority of the class believed it wasn't. I think that's the main problem. When people don't know it's wrong, they hesitate a lot less to actually do it. My neighbors back home used to rent videos from Blockbuster and use their VCR to make their own copies, thus paying only $4 for a movie most everyone else paid $15-$20 to own. My parents and others in the neighborhood knew about it and would always talk about how they were stealing and how that was wrong. Even though one family used technology to get out of paying full price, the majority of the neighborhood with the same technology wouldn't even consider using it for that purpose. There are always going to be people who are okay with stealing (whether from an actual store or movies online, many of which break DRM protected content to do it anyways), but I'd like to believe if everyone knew it was wrong, the vast majority of people would restrain and pay up. When buying songs online, I think it's still smart to have some sort of protection, like with iTunes you can't have your bought songs on more than three computers (or something like that) and when you plug in a new iPod to your computer, so all your old songs are replaced. I imagine it would be easy to reenter your own music if you own copies, but still these are two hurdles that would keep the "average joe" from giving numerous friends copies of songs or getting copies from others. The "non average joes" would probably be determined enough to find ways around DRM protected media anyway.

      Wednesday, November 17, 2010

      FOAF networks

      What professional benefits do you see by investing some time in a FOAF-style network?


      In chapter 9 of Here Comes Everybody, Clay Shirky describes using friend of a friend style networks. In these networks, you receive notifications of your friends and those of your friends' friends. Shirky describes using a service called dodgeball. He sent out a blast to his network saying he was going to a certain bar. His friends got messages that he'd be at the bar, but his friends' friends also got messages that their friend's friend was going to that bar. Through this service he met his friend's friend that he probably wouldn't have been able to meet otherwise, using it to "broker introductions" (219). 


      I can see this kind of network have many advantages professionally. The job I had through high school, I received because one of my friends had a friend that was hiring someone to help with her graphic design business. Having "bridging" capital and friends with "bridging" capital is valuable, as Shirky describes. Having a network that is based on cultivating these connections could have professional benefits by aiding in receiving a job and moving up in companies. I think that is the main advantage, especially right now when it is statistically harder to get a job when you're qualified, connections are vital. Just how Shirky met someone he didn't already through a friend using this kind of network, we could meet future employers.