Your SlideShare is downloading. ×
Polinter11
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Polinter11

211
views

Published on

Published in: Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
211
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Y490 Politics of the Internet November 17, 2010
  • 2. Participation: User-Generated Content and Applications
    • Blogs and Vlogs
    • Web 2.0 applications
      • Facebook
      • Other social networking sites
      • eBay
      • Amazon reviews
      • IMDB reviews and other content
      • Craigslist
      • Wikipedia
      • Flickr
  • 3. The Long Tail Hypothesis Pareto Distribution (aka Power Law)
  • 4. Another Way to Look at the Long Tail
  • 5. Questions
    • Will the people on the left side of the long curve be hurt by the people on the right side? If so how much and what is gained and lost?
    • Does bad behavior by the little guys ruin it for everybody?
    • How can people protect themselves against network mischief?
  • 6. Zittrain Contrasts PCs with iPhones PC iPhone Type of Technology Generative Appliancized/ Tethered Type of Software Open Proprietary Type of Network Anarchic Controlled
  • 7. Definition of Generativity
    • “… a system’s capacity to produce unanticipated change through unfiltered contributions from broad and varied audiences…” (p. 70)
  • 8. Features of a Generative System (pp. 71-73)
    • Leverage
    • Adaptability
    • Ease of mastery
    • Accessibiity
    • Transferabiity
  • 9. Basic Propositions (Zittrain, p. 64)
    • The IT ecosystem functions best with generative technology at its core.
    • Generativity instigates a pattern both within and beyond the technological layers of the IT ecosystem.
    • Proponents of generative IT systems ignore the drawbacks attendant to generativity’s success at their peril.
  • 10. Layer Model
    • Highest: Content
    • Intermediate High: applications
    • Intermediate Low: operating systems
    • Lowest: physical
  • 11. Advantages of Layers
    • Engineers can tinker with one layer without necessarily affecting the other layers.
    • The hourglass shape means that there is lots of room for innovation above and below the operating systems and protocols levels.
  • 12. Problems with Generative Technologies and Anarchic Networks
    • Malware: worms, viruses, trojan horses
    • Incompatibilities in hardware and software which create difficulties for beginners (steep learning curves)
    • Use by criminals, political extremists, hate mongers, pornographers, child molesters, cyberstalkers
    • Vulnerability to cyber attacks of various kinds that go beyond malware (e.g. denial of service attacks, identity theft)
  • 13. Identity Theft
    • The blanket term for any type of crime wherein the offender uses another individual’s legitimate personal information to commit acts of fraud or deception, typically for illicit financial gain
    • Where a person’s identification details are obtained through various covert methods, from rifling through the contents of household dustbins to “phishing.’
        • Phishing is a form of fraud where the criminal pretends to be a reputable organization that needs information about some business you may have done with them
  • 14. Identity Theft and Fraud
    • Identity theft is not really a specific kind of fraud, but an act that leads a person to be able to commit fraud
    • Fraud generally is the attempt to convince for any reason that you are someone other then yourself.
    FTC video on identity theft
  • 15. Examples of Hate Speech on the Internet
    • Nazis and Neo-Nazis
      • Sale of Nazi objects (involving EBay)
      • French policies (involving Yahoo based sales of Nazi stuff)
    • Hate groups
    • Hate Watch
  • 16. Dangers Inherent in Tethered Systems
    • Network service can reprogram appliances at will (through their periodic updating of appliance software)
    • Some appliances can record private information and make it available to those with access to the network (police for example)
    • Tethered networks can be used for censorship
    Controversy over Amazon e-books
  • 17. Examples of Censorship on Tethered Networks
    • Skype in China is used to censor words like Falun Gong and Dalai Lama
    • Google.cn makes searches for Falun Gong and Tibet fail
    • FBI can use OnStar for surveillance
    • Use of cameras in mobile phones?
    Flexispy software for cell phones