The document discusses challenges with using blogs and online forums to facilitate public consultation and debate on controversial issues. It notes that the government's Digital Economy Blog attracted criticism and discussion that strayed from selected topics. It also discusses options for designing online deliberative spaces and tools to better enable civil debate on the topic of digital images of young people, including research archives, citizen juries, moderated discussions, and citizen-drafted policy summaries.
This document provides guidance for writing an essay about media in the online age. It suggests introducing the topic and providing some historical context before incorporating two theoretical references. It recommends focusing the essay on two media forms, with case studies to analyze how they have changed. The document outlines discussing present developments in the bulk of the essay by cross-referencing other media and incorporating debate. It suggests speculating about future developments and mapping theories to possible futures. A number of relevant theorists are provided along with notes on incorporating their ideas and challenging whether they remain applicable.
This document provides an overview of a workshop on using data for science journalism. It discusses several approaches for incorporating data into stories, including: mapping controversies on issues like climate change; using data to tell stories in science and technology; and analyzing networks to reveal connections. Specific techniques are illustrated, such as mapping the influence of climate change skeptics online and connections between counter-jihadist groups on Facebook. The document also reviews several tools and resources for data journalism.
This lecture covers the history of global digital culture and technology from the 1980s to the present. Key topics discussed include the social construction of technology; free and open source software movements; peer-to-peer file sharing and related legal issues; social media platforms like Wikipedia, Twitter, YouTube; and perspectives on the future of the internet and challenges around regulation and business models. Important individuals highlighted include Richard Stallman, Shawn Fanning, Lawrence Lessig, Jimmy Wales, and Julian Assange.
The document discusses challenges with using blogs and online forums to facilitate public consultation and debate on controversial issues. It notes that the government's Digital Economy Blog attracted criticism and discussion that strayed from selected topics. It also discusses options for designing online deliberative spaces and tools to better enable civil debate on the topic of digital images of young people, including research archives, citizen juries, moderated discussions, and citizen-drafted policy summaries.
This document provides guidance for writing an essay about media in the online age. It suggests introducing the topic and providing some historical context before incorporating two theoretical references. It recommends focusing the essay on two media forms, with case studies to analyze how they have changed. The document outlines discussing present developments in the bulk of the essay by cross-referencing other media and incorporating debate. It suggests speculating about future developments and mapping theories to possible futures. A number of relevant theorists are provided along with notes on incorporating their ideas and challenging whether they remain applicable.
This document provides an overview of a workshop on using data for science journalism. It discusses several approaches for incorporating data into stories, including: mapping controversies on issues like climate change; using data to tell stories in science and technology; and analyzing networks to reveal connections. Specific techniques are illustrated, such as mapping the influence of climate change skeptics online and connections between counter-jihadist groups on Facebook. The document also reviews several tools and resources for data journalism.
This lecture covers the history of global digital culture and technology from the 1980s to the present. Key topics discussed include the social construction of technology; free and open source software movements; peer-to-peer file sharing and related legal issues; social media platforms like Wikipedia, Twitter, YouTube; and perspectives on the future of the internet and challenges around regulation and business models. Important individuals highlighted include Richard Stallman, Shawn Fanning, Lawrence Lessig, Jimmy Wales, and Julian Assange.
Framework for talking about Information Ethics and Social Justice in professional librarianship. Emphasis on making sure patrons at all levels of ICT access and literacy are being served.
The document discusses the utopian and dystopian views of the internet and technology. It explores how the internet has transformed society in a short period of time through widespread adoption. While some see opportunities for democracy and organization, others worry technology could increase control over individuals and exacerbate human problems. The document also addresses issues like the digital divide and knowledge divide, participatory design, and using technology and the internet for social justice goals.
The document discusses issues around 'We Media' and democracy. It provides questions to consider regarding how 'We Media' has emerged and both the positive and negative impacts on democracy. Theories from thinkers like Chomsky, Curtis, Gillmor, and Keen are referenced regarding how the contemporary media may be both more democratic through citizen participation but also less democratic through issues like surveillance, control and lack of experts. The document also briefly outlines the potential structure for an exam answer on these topics.
The document discusses how to incorporate push ups into your daily routine by outlining 9 reasons to do so. It notes that while daily exercise is important, it doesn't need to be time-consuming, as push ups can be done almost anywhere and have numerous health benefits. Reasons provided include building upper body strength, improving posture and balance, increasing bone density, and boosting heart health and cardiovascular endurance.
Participation, Remediation And Bricolage1Marta Conejo
Deuze analyzes digital culture as emerging values and practices influenced by computerization and an increasingly individualized global society. He identifies three principal components of digital culture: participation through open publishing and collaborative production; remediation as both distantiation from mainstream media and as a social act; and bricolage as reselecting and rearranging online elements to create culture through social systems. Deuze sees cultures existing alongside each other with overlapping values that have different meanings across media, and that there is no single digital culture as it is constantly evolving through human participation.
This presentation was session 7 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered Strategy & the Political Process: A discussion of the essays of Adam Greenfield (Democracy for the Rest of Us: The Minimal Compact & Open Source Government) & Ethan Zuckerman (Making Room for the Third World in the Second Superpower), pages 200 – 227
The document discusses several media theories related to the rise of user-generated content and participatory culture on the internet. It covers theories by Tim O'Reilly on Web 2.0, Dan Gillmor on citizen journalism, Charles Leadbeater on open collaboration, and Henry Jenkins on convergence culture and collective intelligence. It also discusses issues of representation and diversity in participatory media raised by John McMuria and the economic implications of a long tail market described by Chris Anderson.
Hunter Moore created a revenge porn website called IsAnyoneUp that posted explicit photos of individuals without their consent, often ruining their lives. While his actions cultivated an online following, they also seriously harmed many victims. The document discusses the evolving concept of privacy throughout history with the development of new technologies, and examines related legal issues and protections around privacy between individuals and from government intrusion. It notes businesses like Google are pushing privacy boundaries with data collection and raises questions about expectations of privacy in the digital era.
Essay -The reason of divorce. Effects of Divorce on Families - Free Essay Example | PapersOwl.com. Divorce: Staying Together for Children Essay Example | Topics and Well .... Argumentative Essay About Divorce — Argumentative Essay on Divorce. 006 Causes Of Divorce Essay Example Samples Cause And Effect Conclusion .... 50 Positive Divorce Quotes and Sayings for Him and Her. Children and Divorce - Free Essay Example | PapersOwl.com. Argumentative Essay On Divorce | Divorce | Grief. Justified Love: An Argumentative Essay on Divorce | Divorce | Marriage. 014 Print Phpapp02 Thumbnail Cause And Effect Essay On Divorce ~ Thatsnotus. Divorce Reform essay structure - Is the law of divorce in need of .... Sample Essay On Divorce. argumentative essay about divorce. Argumentative Essay on Divorce | Divorce | Adolescence. Cause And Effect Essay On Divorce – Telegraph. Calaméo - Essay on Divorce: Things that Must Be Considered when Writing It. Sample Argumentative Essay About Divorce - Co-operative Education Trust .... ️ Conclusion divorce. Divorce Essay. 2019-01-05. Divorce and Tragedy - Free Essay Example | PapersOwl.com. Argumentative Essay About Divorce - Divorce Argument Essay. Argumentative Essay About Divorce – Argumentative Essay: Marriage. Divorce Essay | Divorce | Single Parent. Children of Divorce And Their Issues - PHDessay.com. 016 Causes Of Divorce Essay Example ~ Thatsnotus. Divorce Essay - GCSE Sociology - Marked by Teachers.com. Divorce Proposal Template | Essay example, Essay, Essay examples.
This document discusses theories about the impact of technology on society. It describes the theories of sociologists Gerhard Lenski, Leslie White, and Alvin Toffler. Lenski believed that a society's ability to survive depends on its level of technological advancement. He identified four stages of communication and four levels of technological development in societies. The document aims to separately consider each theory and clarify how they relate to and differ from each other regarding technology's impact on society.
The document discusses how the Internet has impacted citizens' relationship to the public sphere. While some argue the Internet could provide new democratic possibilities by circumventing traditional media, others are more pessimistic. The Internet reflects existing social inequalities like the "digital divide" between those who do and do not have access. Additionally, concepts like democracy and public sphere may not apply to the postmodern nature of online interactions. Recent studies also suggest the Internet has a limited role in promoting citizenship. In conclusion, the Internet has not significantly changed how citizens relate to the public sphere despite new communication abilities.
How to follow actors through their traces. Exploiting digital traceabilityINRIA - ENS Lyon
This document discusses digital methods for social research using online data. It begins by outlining traditional qualitative and quantitative methods and their limitations. Next, it introduces the concept of digital traceability enabled by the web, which allows researchers to follow actors and map controversies. However, it also notes challenges like noise in large datasets and issues of data ownership. The document advocates an approach that combines qualitative interpretation with quantitative network analysis and mapping of online discussions. It argues digital methods can help overcome divides between qualitative and quantitative research by leveraging new types of online data sources.
This document summarizes a book about intellectual property by James Boyle. It discusses heated battles over intellectual property, the importance of understanding intellectual property law, and how intellectual property rights create the ground rules of the information society. The book contains chapters on topics like copyright, patent, the public domain, the digital millennium copyright act, creative commons, and the need for an environmentalism movement for information.
How to Write an Argumentative Essay Step By Step - Gudwriter. Sample Argument Analysis English - Year 12 VCE Thinkswap. Argumentative Essay Topics for College Assignments - Blog BuyEssayClub.com. 14. Sample quot;Analyze an Argumentquot; Essay. Argumentative Essay.docx Higher Education Government Free 30-day .... sample-argumentative-essay.pdf DocDroid. Top Argumentative Essay Topics for Students. Word Essay How to Write Manual with Examples EssayRuler - Easy .... What Is an Argumentative Essay? Simple Examples To Guide You .... FREE 9 Argumentative Essay Samples in PDF MS Word. Sample Argumentative Essay.doc. Check my Essay: Argumentative essay writing examples. Argument Analysis - Excelsior College OWL - Example of an argument .... Structure of argument analysis essay - Argument Analysis. Argument Analysis Essay - Sakshi Gosavi z Argument Analysis Essay The .... FREE 9 Argumentative Essay Samples in PDF. Descriptive Essay: Argument analysis essay. How to Write an Argumentative Essay Samples and Topics. Analysis And Argument Essay. 2 Argumentative Essay Examples Help You To Start Writing You Essay .... Evaluation Argument Essay Sample Master of Template Document. FREE 15 Argumentative Essay Samples in PDF MS Word. FREE 16 Argumentative Writing Samples amp; Templates in PDF MS Word. Examples Of Argument Analysis Essays. Expository essay: Argument analysis sample. FREE 10 Sample Analysis Essay Templates in MS Word PDF. Sample Argumentative Essay. Learn How to Write a Rhetorical Analysis Essay on Trust My Paper. 005 Argumentative Essay Sample Research Paper Museumlegs. Example Of Argumentative Essay Paragraph Terbaru. 004 Essay Example Ideas For Argumentative Thatsnotus. 004 Paragraph Argumentative Essay Outline Onwebioinnovateco With Theme .... How to Write a Literary Analysis Essay A Step-by-Step Guide - How to ... Argument Analysis Essay Argument Analysis Essay
The document discusses the rise of the information economy and how it has replaced traditional economies based on physical goods. It describes how information and knowledge can now be easily shared digitally, challenging existing economic and business models built around scarcity and intellectual property. The new information economy has disruptive effects and a clash is emerging between a culture that freely shares information and one that seeks to restrict and monetize intellectual property.
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Kaido Kikkas
Musings on the role of technology, spiced up with lessons from some very different folks (based on Pekka Himanen, Howard Rheingold and J.R.R. Tolkien).
This document provides a summary of Lindsey Leitera's Senior Major Project analyzing rhetorical motives in information liberation texts from Richard Stallman to Edward Snowden. It traces the evolution of debates around political ideology, enlightenment ideals, identity, and transparency from 1983 to 2013. Key events discussed include Stallman's "GNU Manifesto", debates between hackers and entrepreneurs like Bill Gates, the emergence of hacktivism with Anonymous and WikiLeaks, and national security whistleblowing by Edward Snowden. The project uses rhetorical analysis of manifestos, essays, and other texts to understand how a "Hacker Ethic" of free information sharing has manifested over time and influenced digital activism and issues of cyber security, technology policy
This document discusses how technology and the internet have changed media, economics, and society. It addresses several key points:
1) The internet has disrupted traditional broadcast and advertising models by allowing for many-to-many communication and long-tail economics through niche markets.
2) Users are now "prosumers" who both consume and produce media, representing a shift away from distinct producers and consumers.
3) The internet has led to changes in work through the sharing economy, with workers taking on temporary gig work without benefits instead of full-time jobs.
4) The document also discusses how racism, hate speech, and white supremacy have adapted to the digital era through more accessible and global
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Please readRobert Geraci, Russia Minorities and Empire,” in .docxTatianaMajor22
Please read:
Robert Geraci, “Russia: Minorities and Empire,” in Abbott Gleason, ed., A Companion to Russian History (Oxford: Wiley-Blackwell, 2009), 243-260.
And discuss:
How does Geraci portray the legacy of the early Russian history for the make-up of 18-19th century Russia?
Please read: Leonard Victor Rutgers, “Roman Policy Towards the Jews: Expulsions from the City of Rome during the First Century C.E.,” in Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74.
And discuss: Rutgers surveys the different reasons historians have given for the expulsion of the Jews from Rome in the first century C.E. Who place did Jews have in Roman society at this time? Were they expelled because of their religious practices, or because they were ‘unruly’ as Rutgers argues? If so, what caused them to act in this way? What kind of historical evidence does the author use?
There are 2 essay, each one should write at least 300-350 words and plus one reference page.
MLA format. Must use quote( “ ”) for every source you use from website. And put (author, page number) behind quote.
Roman Policy towards the Jews: Expulsions from the City of Rome during the First Century
C.E.
Author(s): Leonard Victor Rutgers
Source: Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74
Published by: University of California Press
Stable URL: http://www.jstor.org/stable/25011005 .
Accessed: 26/08/2011 13:35
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
University of California Press is collaborating with JSTOR to digitize, preserve and extend access to Classical
Antiquity.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=ucal
http://www.jstor.org/stable/25011005?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
LEONARD VICTOR RUTGERS
Roman Policy towards the Jews:
Expulsions from the City of Rome
during the First Century c. E.
Tant de causes secretes se melent souvent a la cause apparente, tant de ressorts
inconnus servent a persecuter un homme, qu'il est impossible de demeler dans les
siecles posterieures la source cachee des malheurs des hommes les plus consider
ables, a plus forte raison celle du supplice d'un particulier qui ne pouvait etre
connu que par ceux de son parti.
-Voltaire, Traite sur la tolerance (1763)
IN THIS ARTICLE I want to discuss the evidence for expulsions of Jews from
the city of Rome in the first century C.E. Scholars have long been interested in the
reasons underlying these expulsions. Because the anci.
Ford VS ChevroletThere are many reasons that make the Chevy.docxTatianaMajor22
Ford VS Chevrolet
There are many reasons that make the Chevy’s and Ford’s motors two most common trucks. Studies reveal that that they are the most popular vehicles on sales today. It is because they are powerful, versatile and reasonably priced. They also come in a wide variety of configurations and styles. However, many buyers and sellers have questioned themselves on the better vehicle compared to the other in terms of quality, Wi-Fi, price ranges, value, and costs. To compare and contrast on this subject, let us take an example of two vehicles each from each company to facilitate comparison.
Ford offers the full-size track with automatic high-beam control, automatic parallel parking and power-retractable running boards. Fords are elegant, and they are mostly aluminum making them save weight and bolster gas mileage. None of these features are offered Chevy’s. Chevrolets have outstanding quality. They are mostly comprised of steel, for instance, the Chevrolet Silverado. This makes them good for rough roads and difficult terrains.
Fords have employed the use of up to date Wi-Fi technology. Ford intends to provide the Ford Sync, which will provide robust connections for occupants. Latest Chevrolet brands Malibu utilize the 4G LTE Wi-Fi Technology that provides rich in-vehicle experiences. This technology is powerful compared to Ford Sync, and is used for connecting devices and executing few remote operations within the car.
From the value and cost standpoint, Ford can consume a little more, and its payload capacity is a little higher. Additionally, its mileage is too better. The prices vary from nation to nation. Chevrolet seems to be a little cheaper, and reasonably priced going for $33,044, which is slightly less than Ford, but the differences are not serious to propel buyers towards one truck leaving the other
Technophiles are likely to put their preferences on Ford to Chevrolet. On overall, Fords have many features as compared Chevy’s. However, they may be hard to maintain. Compared to Fords, Chevrolets are reliable and cheaper. However, the two brands are equally good performers. It is, therefore, prudent to pick what one thinks would fit his or her usage and preference and personal style
Ethical Systems, Research Paper, Spring 2015, Douglas Green, Page 1 of 1
Ethical
Systems/Final
Research
Paper
2,000
words
minimum,
double-‐spaced
Final
Draft
Due:
Tuesday,
April
28,
12:00
pm
(afternoon)
Please
email
your
final
research
paper
to
me
via
MS
Word
attachment
AND
by
cutting/pasting
the
entire
document
into
the
body
of
your
email.
IF
YOU
DO
NOT
RECEIVE
A
CONFIRMATION
EMAIL
BACK,
I
DID
NOT
RECEIVE
YOUR
ESSAY
AND
YOU
WILL
LOSE
ALL
CREDIT
FOR
THIS
REQUIREMENT.
NO
LATE
WORK
WILL
BE
ACCEPTED…
PERIOD!
.
More Related Content
Similar to International Journal of Communication 6 (2012), 2870–2893 193
Framework for talking about Information Ethics and Social Justice in professional librarianship. Emphasis on making sure patrons at all levels of ICT access and literacy are being served.
The document discusses the utopian and dystopian views of the internet and technology. It explores how the internet has transformed society in a short period of time through widespread adoption. While some see opportunities for democracy and organization, others worry technology could increase control over individuals and exacerbate human problems. The document also addresses issues like the digital divide and knowledge divide, participatory design, and using technology and the internet for social justice goals.
The document discusses issues around 'We Media' and democracy. It provides questions to consider regarding how 'We Media' has emerged and both the positive and negative impacts on democracy. Theories from thinkers like Chomsky, Curtis, Gillmor, and Keen are referenced regarding how the contemporary media may be both more democratic through citizen participation but also less democratic through issues like surveillance, control and lack of experts. The document also briefly outlines the potential structure for an exam answer on these topics.
The document discusses how to incorporate push ups into your daily routine by outlining 9 reasons to do so. It notes that while daily exercise is important, it doesn't need to be time-consuming, as push ups can be done almost anywhere and have numerous health benefits. Reasons provided include building upper body strength, improving posture and balance, increasing bone density, and boosting heart health and cardiovascular endurance.
Participation, Remediation And Bricolage1Marta Conejo
Deuze analyzes digital culture as emerging values and practices influenced by computerization and an increasingly individualized global society. He identifies three principal components of digital culture: participation through open publishing and collaborative production; remediation as both distantiation from mainstream media and as a social act; and bricolage as reselecting and rearranging online elements to create culture through social systems. Deuze sees cultures existing alongside each other with overlapping values that have different meanings across media, and that there is no single digital culture as it is constantly evolving through human participation.
This presentation was session 7 in a 12 part webinar series on the book Extreme Democracy. Extreme democracy is a political philosophy of the information era that puts people in charge of the entire political process. It suggests a deliberative process that places total confidence in the people, opening the policy-making process to many centers of power through deeply networked coalitions that can be organized around local, national and international issues. This seminar covered Strategy & the Political Process: A discussion of the essays of Adam Greenfield (Democracy for the Rest of Us: The Minimal Compact & Open Source Government) & Ethan Zuckerman (Making Room for the Third World in the Second Superpower), pages 200 – 227
The document discusses several media theories related to the rise of user-generated content and participatory culture on the internet. It covers theories by Tim O'Reilly on Web 2.0, Dan Gillmor on citizen journalism, Charles Leadbeater on open collaboration, and Henry Jenkins on convergence culture and collective intelligence. It also discusses issues of representation and diversity in participatory media raised by John McMuria and the economic implications of a long tail market described by Chris Anderson.
Hunter Moore created a revenge porn website called IsAnyoneUp that posted explicit photos of individuals without their consent, often ruining their lives. While his actions cultivated an online following, they also seriously harmed many victims. The document discusses the evolving concept of privacy throughout history with the development of new technologies, and examines related legal issues and protections around privacy between individuals and from government intrusion. It notes businesses like Google are pushing privacy boundaries with data collection and raises questions about expectations of privacy in the digital era.
Essay -The reason of divorce. Effects of Divorce on Families - Free Essay Example | PapersOwl.com. Divorce: Staying Together for Children Essay Example | Topics and Well .... Argumentative Essay About Divorce — Argumentative Essay on Divorce. 006 Causes Of Divorce Essay Example Samples Cause And Effect Conclusion .... 50 Positive Divorce Quotes and Sayings for Him and Her. Children and Divorce - Free Essay Example | PapersOwl.com. Argumentative Essay On Divorce | Divorce | Grief. Justified Love: An Argumentative Essay on Divorce | Divorce | Marriage. 014 Print Phpapp02 Thumbnail Cause And Effect Essay On Divorce ~ Thatsnotus. Divorce Reform essay structure - Is the law of divorce in need of .... Sample Essay On Divorce. argumentative essay about divorce. Argumentative Essay on Divorce | Divorce | Adolescence. Cause And Effect Essay On Divorce – Telegraph. Calaméo - Essay on Divorce: Things that Must Be Considered when Writing It. Sample Argumentative Essay About Divorce - Co-operative Education Trust .... ️ Conclusion divorce. Divorce Essay. 2019-01-05. Divorce and Tragedy - Free Essay Example | PapersOwl.com. Argumentative Essay About Divorce - Divorce Argument Essay. Argumentative Essay About Divorce – Argumentative Essay: Marriage. Divorce Essay | Divorce | Single Parent. Children of Divorce And Their Issues - PHDessay.com. 016 Causes Of Divorce Essay Example ~ Thatsnotus. Divorce Essay - GCSE Sociology - Marked by Teachers.com. Divorce Proposal Template | Essay example, Essay, Essay examples.
This document discusses theories about the impact of technology on society. It describes the theories of sociologists Gerhard Lenski, Leslie White, and Alvin Toffler. Lenski believed that a society's ability to survive depends on its level of technological advancement. He identified four stages of communication and four levels of technological development in societies. The document aims to separately consider each theory and clarify how they relate to and differ from each other regarding technology's impact on society.
The document discusses how the Internet has impacted citizens' relationship to the public sphere. While some argue the Internet could provide new democratic possibilities by circumventing traditional media, others are more pessimistic. The Internet reflects existing social inequalities like the "digital divide" between those who do and do not have access. Additionally, concepts like democracy and public sphere may not apply to the postmodern nature of online interactions. Recent studies also suggest the Internet has a limited role in promoting citizenship. In conclusion, the Internet has not significantly changed how citizens relate to the public sphere despite new communication abilities.
How to follow actors through their traces. Exploiting digital traceabilityINRIA - ENS Lyon
This document discusses digital methods for social research using online data. It begins by outlining traditional qualitative and quantitative methods and their limitations. Next, it introduces the concept of digital traceability enabled by the web, which allows researchers to follow actors and map controversies. However, it also notes challenges like noise in large datasets and issues of data ownership. The document advocates an approach that combines qualitative interpretation with quantitative network analysis and mapping of online discussions. It argues digital methods can help overcome divides between qualitative and quantitative research by leveraging new types of online data sources.
This document summarizes a book about intellectual property by James Boyle. It discusses heated battles over intellectual property, the importance of understanding intellectual property law, and how intellectual property rights create the ground rules of the information society. The book contains chapters on topics like copyright, patent, the public domain, the digital millennium copyright act, creative commons, and the need for an environmentalism movement for information.
How to Write an Argumentative Essay Step By Step - Gudwriter. Sample Argument Analysis English - Year 12 VCE Thinkswap. Argumentative Essay Topics for College Assignments - Blog BuyEssayClub.com. 14. Sample quot;Analyze an Argumentquot; Essay. Argumentative Essay.docx Higher Education Government Free 30-day .... sample-argumentative-essay.pdf DocDroid. Top Argumentative Essay Topics for Students. Word Essay How to Write Manual with Examples EssayRuler - Easy .... What Is an Argumentative Essay? Simple Examples To Guide You .... FREE 9 Argumentative Essay Samples in PDF MS Word. Sample Argumentative Essay.doc. Check my Essay: Argumentative essay writing examples. Argument Analysis - Excelsior College OWL - Example of an argument .... Structure of argument analysis essay - Argument Analysis. Argument Analysis Essay - Sakshi Gosavi z Argument Analysis Essay The .... FREE 9 Argumentative Essay Samples in PDF. Descriptive Essay: Argument analysis essay. How to Write an Argumentative Essay Samples and Topics. Analysis And Argument Essay. 2 Argumentative Essay Examples Help You To Start Writing You Essay .... Evaluation Argument Essay Sample Master of Template Document. FREE 15 Argumentative Essay Samples in PDF MS Word. FREE 16 Argumentative Writing Samples amp; Templates in PDF MS Word. Examples Of Argument Analysis Essays. Expository essay: Argument analysis sample. FREE 10 Sample Analysis Essay Templates in MS Word PDF. Sample Argumentative Essay. Learn How to Write a Rhetorical Analysis Essay on Trust My Paper. 005 Argumentative Essay Sample Research Paper Museumlegs. Example Of Argumentative Essay Paragraph Terbaru. 004 Essay Example Ideas For Argumentative Thatsnotus. 004 Paragraph Argumentative Essay Outline Onwebioinnovateco With Theme .... How to Write a Literary Analysis Essay A Step-by-Step Guide - How to ... Argument Analysis Essay Argument Analysis Essay
The document discusses the rise of the information economy and how it has replaced traditional economies based on physical goods. It describes how information and knowledge can now be easily shared digitally, challenging existing economic and business models built around scarcity and intellectual property. The new information economy has disruptive effects and a clash is emerging between a culture that freely shares information and one that seeks to restrict and monetize intellectual property.
Of Hobbits, Amish, Hackers and Technology (or, is technology for humans or vi...Kaido Kikkas
Musings on the role of technology, spiced up with lessons from some very different folks (based on Pekka Himanen, Howard Rheingold and J.R.R. Tolkien).
This document provides a summary of Lindsey Leitera's Senior Major Project analyzing rhetorical motives in information liberation texts from Richard Stallman to Edward Snowden. It traces the evolution of debates around political ideology, enlightenment ideals, identity, and transparency from 1983 to 2013. Key events discussed include Stallman's "GNU Manifesto", debates between hackers and entrepreneurs like Bill Gates, the emergence of hacktivism with Anonymous and WikiLeaks, and national security whistleblowing by Edward Snowden. The project uses rhetorical analysis of manifestos, essays, and other texts to understand how a "Hacker Ethic" of free information sharing has manifested over time and influenced digital activism and issues of cyber security, technology policy
This document discusses how technology and the internet have changed media, economics, and society. It addresses several key points:
1) The internet has disrupted traditional broadcast and advertising models by allowing for many-to-many communication and long-tail economics through niche markets.
2) Users are now "prosumers" who both consume and produce media, representing a shift away from distinct producers and consumers.
3) The internet has led to changes in work through the sharing economy, with workers taking on temporary gig work without benefits instead of full-time jobs.
4) The document also discusses how racism, hate speech, and white supremacy have adapted to the digital era through more accessible and global
Cybersecurity Strategies - time for the next generationHinne Hettema
In this talk, presented in June 2016 at KAIST, I argue that it is time for the next generation of cybersecurity strategies. These must have a governance focus, and be based on international laws, declarations and agreements, basic internet rights and public good provisions.
Similar to International Journal of Communication 6 (2012), 2870–2893 193 (20)
Please readRobert Geraci, Russia Minorities and Empire,” in .docxTatianaMajor22
Please read:
Robert Geraci, “Russia: Minorities and Empire,” in Abbott Gleason, ed., A Companion to Russian History (Oxford: Wiley-Blackwell, 2009), 243-260.
And discuss:
How does Geraci portray the legacy of the early Russian history for the make-up of 18-19th century Russia?
Please read: Leonard Victor Rutgers, “Roman Policy Towards the Jews: Expulsions from the City of Rome during the First Century C.E.,” in Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74.
And discuss: Rutgers surveys the different reasons historians have given for the expulsion of the Jews from Rome in the first century C.E. Who place did Jews have in Roman society at this time? Were they expelled because of their religious practices, or because they were ‘unruly’ as Rutgers argues? If so, what caused them to act in this way? What kind of historical evidence does the author use?
There are 2 essay, each one should write at least 300-350 words and plus one reference page.
MLA format. Must use quote( “ ”) for every source you use from website. And put (author, page number) behind quote.
Roman Policy towards the Jews: Expulsions from the City of Rome during the First Century
C.E.
Author(s): Leonard Victor Rutgers
Source: Classical Antiquity, Vol. 13, No. 1 (Apr., 1994), pp. 56-74
Published by: University of California Press
Stable URL: http://www.jstor.org/stable/25011005 .
Accessed: 26/08/2011 13:35
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at .
http://www.jstor.org/page/info/about/policies/terms.jsp
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact [email protected]
University of California Press is collaborating with JSTOR to digitize, preserve and extend access to Classical
Antiquity.
http://www.jstor.org
http://www.jstor.org/action/showPublisher?publisherCode=ucal
http://www.jstor.org/stable/25011005?origin=JSTOR-pdf
http://www.jstor.org/page/info/about/policies/terms.jsp
LEONARD VICTOR RUTGERS
Roman Policy towards the Jews:
Expulsions from the City of Rome
during the First Century c. E.
Tant de causes secretes se melent souvent a la cause apparente, tant de ressorts
inconnus servent a persecuter un homme, qu'il est impossible de demeler dans les
siecles posterieures la source cachee des malheurs des hommes les plus consider
ables, a plus forte raison celle du supplice d'un particulier qui ne pouvait etre
connu que par ceux de son parti.
-Voltaire, Traite sur la tolerance (1763)
IN THIS ARTICLE I want to discuss the evidence for expulsions of Jews from
the city of Rome in the first century C.E. Scholars have long been interested in the
reasons underlying these expulsions. Because the anci.
Ford VS ChevroletThere are many reasons that make the Chevy.docxTatianaMajor22
Ford VS Chevrolet
There are many reasons that make the Chevy’s and Ford’s motors two most common trucks. Studies reveal that that they are the most popular vehicles on sales today. It is because they are powerful, versatile and reasonably priced. They also come in a wide variety of configurations and styles. However, many buyers and sellers have questioned themselves on the better vehicle compared to the other in terms of quality, Wi-Fi, price ranges, value, and costs. To compare and contrast on this subject, let us take an example of two vehicles each from each company to facilitate comparison.
Ford offers the full-size track with automatic high-beam control, automatic parallel parking and power-retractable running boards. Fords are elegant, and they are mostly aluminum making them save weight and bolster gas mileage. None of these features are offered Chevy’s. Chevrolets have outstanding quality. They are mostly comprised of steel, for instance, the Chevrolet Silverado. This makes them good for rough roads and difficult terrains.
Fords have employed the use of up to date Wi-Fi technology. Ford intends to provide the Ford Sync, which will provide robust connections for occupants. Latest Chevrolet brands Malibu utilize the 4G LTE Wi-Fi Technology that provides rich in-vehicle experiences. This technology is powerful compared to Ford Sync, and is used for connecting devices and executing few remote operations within the car.
From the value and cost standpoint, Ford can consume a little more, and its payload capacity is a little higher. Additionally, its mileage is too better. The prices vary from nation to nation. Chevrolet seems to be a little cheaper, and reasonably priced going for $33,044, which is slightly less than Ford, but the differences are not serious to propel buyers towards one truck leaving the other
Technophiles are likely to put their preferences on Ford to Chevrolet. On overall, Fords have many features as compared Chevy’s. However, they may be hard to maintain. Compared to Fords, Chevrolets are reliable and cheaper. However, the two brands are equally good performers. It is, therefore, prudent to pick what one thinks would fit his or her usage and preference and personal style
Ethical Systems, Research Paper, Spring 2015, Douglas Green, Page 1 of 1
Ethical
Systems/Final
Research
Paper
2,000
words
minimum,
double-‐spaced
Final
Draft
Due:
Tuesday,
April
28,
12:00
pm
(afternoon)
Please
email
your
final
research
paper
to
me
via
MS
Word
attachment
AND
by
cutting/pasting
the
entire
document
into
the
body
of
your
email.
IF
YOU
DO
NOT
RECEIVE
A
CONFIRMATION
EMAIL
BACK,
I
DID
NOT
RECEIVE
YOUR
ESSAY
AND
YOU
WILL
LOSE
ALL
CREDIT
FOR
THIS
REQUIREMENT.
NO
LATE
WORK
WILL
BE
ACCEPTED…
PERIOD!
.
Fairness and Discipline Weve all been disciplined at one.docxTatianaMajor22
Fairness and Discipline
We've all been disciplined at one time or another by a parent or a teacher. What disciplinary experiences have you had as a child that took a non-punitive approach?
I need paragraph or half page with reference
.
Appendix 12A Statement of Cash Flows—Direct MethodLEARNING .docxTatianaMajor22
Appendix 12A
Statement of Cash Flows—Direct Method
LEARNING OBJECTIVE
6
Prepare a statement of cash flows using the direct method.
To explain and illustrate the direct method, we will use the transactions of Computer Services Company for 2014, to prepare a statement of cash flows. Illustration 12A-1 presents information related to 2014 for Computer Services Company.
To prepare a statement of cash flows under the direct approach, we will apply the three steps outlined in Illustration 12-4.
Illustration 12A-1
Comparative balance sheets, income statement, and additional information for Computer Services Company
STEP 1: OPERATING ACTIVITIES
DETERMINE NET CASH PROVIDED/USED BY OPERATING ACTIVITIES BY CONVERTING NET INCOME FROM AN ACCRUAL BASIS TO A CASH BASIS
Under the direct method, companies compute net cash provided by operating activities by adjusting each item in the income statement from the accrual basis to the cash basis. To simplify and condense the operating activities section, companies report only major classes of operating cash receipts and cash payments. For these major classes, the difference between cash receipts and cash payments is the net cash provided by operating activities. These relationships are as shown in Illustration 12A-2.
Illustration 12A-2
Major classes of cash receipts and payments
An efficient way to apply the direct method is to analyze the items reported in the income statement in the order in which they are listed. We then determine cash receipts and cash payments related to these revenues and expenses. The following pages present the adjustments required to prepare a statement of cash flows for Computer Services Company using the direct approach.
CASH RECEIPTS FROM CUSTOMERS.
The income statement for Computer Services Company reported sales revenue from customers of $507,000. How much of that was cash receipts? To answer that, companies need to consider the change in accounts receivable during the year. When accounts receivable increase during the year, revenues on an accrual basis are higher than cash receipts from customers. Operations led to revenues, but not all of these revenues resulted in cash receipts.
To determine the amount of cash receipts, the company deducts from sales revenue the increase in accounts receivable. On the other hand, there may be a decrease in accounts receivable. That would occur if cash receipts from customers exceeded sales revenue. In that case, the company adds to sales revenue the decrease in accounts receivable. For Computer Services Company, accounts receivable decreased $10,000. Thus, cash receipts from customers were $517,000, computed as shown in Illustration 12A-3.
Illustration 12A-3
Computation of cash receipts from customers
Computer Services can also determine cash receipts from customers from an analysis of the Accounts Receivable account, as shown in Illustration 12A-4.
Illustration 12A-4
Analysis of Accounts Receivable
Illustration.
Effects of StressProvide a 1-page description of a stressful .docxTatianaMajor22
Effects of Stress
Provide a 1-page description of a stressful event currently occurring in your life.
Discuss I am married work a full time job as an occupational therapy assistant am taking two courses
Have to take care of a home feed the animals attend to laundry
Think of my pateitns worry about their well being and what I can do for them ( I bring home my patients issues)
Constantly doing paper work for work such as documentation for billing
I feel like I have no free time for me some days I don’t even eat dinner or lunch because I don’t have time to make anything or am just too tired to cook
On top of this I am married and married ppl do argue and my husband am I have been bunting heads on finances.
Then, referring to information you learned throughout this course, address the following:
· What physiological changes occur in the brain due to the stress response?
· What emotional and cognitive effects might occur due to this stressful situation?
· Would the above changes (physiological, cognitive, or emotional) be any different if the same stress were being experienced by a person of the opposite sex or someone much older or younger than you?
· If the situation continues, how might your physical health be affected?
· What three behavioral strategies would you implement to reduce the effects of this stressor? Describe each strategy. Explain how each behavior could cause changes in brain physiology (e.g., exercise can raise serotonin levels).
· If you were encouraging an adult client to make the above changes, what ethical considerations would you have to keep in mind? How would you address those ethical considerations?
In addition to citing the online course and the text, you are also required to cite a minimum of four scholarly sources. For reputable web sources, look for .gov or .edu sites as opposed to .com sites. Please do not use Wikipedia.
Your paper should be double-spaced, in 12-point Times New Roman font, and with normal 1-inch margins; written in APA style; and free of typographical and grammatical errors. It should include a title page with a running head, an abstract, and a reference page.
The body of the paper should be at least 6 pages in length total
not including the reference or title page
Assignment 1 Grading Criteria
Maximum Points
Described a stressful event.
20
Explained the physiological changes that occur in the brain due to the stress response.
36
Explained the emotional and cognitive effects that may occur due to this stressful situation.
32
Analyzed potential differences in physiological, cognitive, and emotional responses in someone of a different age or sex.
32
Discussed the physical health risks.
28
Provided three behavioral strategies to reduce the effects of the stressor and explained how each could cause changes in brain physiology.
40
Analyzed ethical considerations in implementing behavioral strategies and offered suggestions for addressing these.
40
Integrated at least two scholarly references .
Design Factors NotesCIO’s Office 5 People IT Chief’s Offi.docxTatianaMajor22
Design Factors
Notes
CIO’s Office
5 People
IT Chief’s Office
5 People
LAN/WAN Maint.
20 People
Reception
4 People
Telecommunications
20 People
LAN Management
50 People
Server Room A
2 Person
Server Room B
4 Person
Equipment:
Patch Cable
Computer to Wall
Patch Cable
LAN Room
Cable Trays/Runs
Horizontal Runs
Cisco Border Router
Research: Attached to 5 Floor Switches
Server Room A
10 Servers
Server Room B
10 Servers
Computers
One Per Person
Standard floor (first floor) Lesson 2 Project Plan info
Design Factors
Notes
CIO’s Office
5 People
IT Chief’s Office
5 People
LAN/WAN Maint.
20 People
Reception
4 People
Telecommunications
20 People
LAN Management
50 People
Server Room A
2 Person
Server Room B
4 Person
Equipment:
Patch Cable
Computer to Wall
Patch Cable
LAN Room
Cable Trays/Runs
Horizontal Runs
Cisco Border Router
Research: Attached to 5 Floor Switches
Server Room A
10 Servers
Server Room B
10 Servers
Computers
One Per Person
Basement floor
Design Factors
Notes
Vertical Riser Run
On Outside Wall of LAN Room on Each Floor.
Fiber-Optic Multimode
Riser Runs: Backbone
SC Connectors
Fiber-Optic Cable
Cisco Catalyst: Switch: WS-C3750G-24PS-S: 24 Ports
Leave a Minimum of four ports free on each switch
Color Laser Printer
Minimum of One per Room or One per 20 people
Vertical Riser Run
On Outside Wall of LAN Room on Each Floor and Server RM B on this floor.
Fiber-Optic Multimode
Riser Runs: Backbone
SC Connectors
Fiber-Optic Cable
Cable Trays/Runs
Horizontal Runs
Horizontal Runs
Leave a Minimum of four ports free on each switch
Applicataion
U.S. Minimum Requirement Ranges
Space per Employee - 1997
Two people, such as a supervisor and an employee, can meet in an office with a table or desk between them
60" to 72" x 90" to 126:/5.78m2 to 11.7m2
280Sq. Ft./26.0m2
Worker has a primary desk plus a return
60" to 72"x60"to 84"/5.78 to 7.8m2
193Sq. Ft./17.9m2
Executive office - three to four people can meet around a desk
105 to 130"x96 to 123"/9.75 to 11.4 m2
142Sq. Ft./13.2m2
Basic workstation such as a call center
42" to 52" x 60" to 72"/3.9 to 6.7 m2
114Sq. Ft./10.6 m2
NT1310: Project
Page 1
PRO JECT D ESC RIPT ION
As the project manager for the Cable Planning team, you will manage the creation of the cable plan for
the new building that will be built, with construction set to begin in six weeks.
The deliverables for the entire Cable Plan will consist of an Executive Summary, a PowerPoint
Presentation and an Excel Spreadsheet. You will develop different parts of each of these in three parts.
The final organization should contain these elements:
The Executive Summary:
o Project Introduction
o Standards and Codes
Cable Standards and Codes
Building Standards and Codes
o Project Materials
o Copper Cable, Tools, and Test Equipment
o Fiber-Optic Cable, Tools, and Test Equipment
o Fiber-Optic Design Considerations
o Basement Server Comp.
Question 12.5 pointsSaveThe OSU studies concluded that le.docxTatianaMajor22
The document contains questions about leadership, motivation, communication, groups/teams, and decision making. The questions assess knowledge of topics like situational leadership theory, Maslow's hierarchy of needs, organizational communication barriers, stages of team development, and group decision making techniques like brainstorming.
Case Study 1 Questions1. What is the allocated budget .docxTatianaMajor22
Case Study 1 Questions:
1. What is the allocated budget ? $250,000
2. Where does the server room located? Currently, there is no server room
3. What is the number of users with PCs inside each existing site?
Currently there are
4. What is the current cabling used in each location? (cat5e or cat6) Current cabling does not meet the company’s current and future needs
5. Do want us to upgrade token Ring or use a completely new Ethernet network What is your recommendation and why?
6. regarding the ordering system , it is not clear what the we should do , do you want to talk about how to connect the system to the network or how to built the ordering online system because it is more software engineering than networking . Talk about the kind of network (hardware) you recommend based on the business requirements
7. all the sites should have access to our servers in the main branch? yes
8. Regarding the order software, do you need more details about the way it works or just about its connection with the network? Your solution should be from a network point of view
9. Distances are given in Meters or feet? feet
10. Shipment is done by truck, or ships? Currently, only trucking
11. In Dimebox branch, where are administration offices located? See Business goals # 4
12. What is the current network connectivity status? How many devices are currently on the network? How they are physically laid out? Is cabling running all over the floor, hidden in walls or threaded through the ceiling? What are the switches used and its speed? Currently, only the office is networked (token ring) NOVELL
13. What is the minimum Internet speed wanted? See Business Goals on page 2 – I only can tell you what we need the network for, you must tell me what we need to meet the business needs
14. Will the corporation provide wireless access? If yes will it be in all department and buildings? Wireless access would be helpful if we can justify the cost
15. Are there phones in offices? yes
16. What is the internet speed available now? What speed do you want for future? Internet access is through time warner cable company which is not very reliable
17. Do employees access their emails outside the company? yes
18. Do you have plans for future expansion? We like to increase our customer base by 20% over the next year
REMEMBER, you are the IT expert, I’m only a business person who must rely on your expertise.
Network Design and Performance
Case Study
Dooma-Flochies, Inc. with headquarters located on Podunk Road in Trumansburg, NY, is the sole manufacturer of Dooma-Flochies (big surprise). They currently have a manufacturing facility in, Lake Ridge, NY (across Cayuga Lake) on Cayuga Dr. and have recently diversified by purchasing a company, This-N-That, on Industry Ave. in, Dime Box Texas. This-N-That is the sole competitor of Domma-Flochies with their product Thinga-Ma-Jigs. This acquisition gives Dooma-Flochies, Inc a monopoly in this mark.
Behavior in OrganizationsIntercultural Communications Exercise .docxTatianaMajor22
Behavior in Organizations
Intercultural Communications Exercise Response Paper –
Week 5
The most overt cultural differences, such as greeting rituals and name format, can be overcome most easily. The underlying, intangible differences are very difficult to overcome. In this case, the underlying cultural differences are
· Assumptions about the purpose of the event (is the party strictly for fun and for relationship building, or are their business matters to take care of?).
· Assumptions about the purpose and the nature of business relationship.
· Assumptions about power and leadership relationships (who makes the decisions and how?).
· Response styles (verbal and nonverbal signals of agreement, disagreement, politeness, etc.).
Many (though not all) cultural differences can be overcome if you carefully observe other people, think creatively, remain flexible, and remember that your own culture is not inherently superior to others.
The Scenario
Three corporations are planning a joint venture to sponsor an international concert tour. The corporations are Decibel, an agency representing the musicians (from the US, Britain, and Japan); Images, a marketing firm which will handle sales of tickets, snacks and beverages, clothing, and CDs; and Event, a special events company which will hire the ushers, concessionaires, and security officers; print the programs; and clean up the arenas after the shows. The companies come from three different cultures: Blue, Green, and Red. Each has specific cultural traits, customs, and practices.
You are a manager in one of these companies. You will attend the opening cocktail party in Perth, Australia the evening before a 3-day meeting during which the three companies will negotiate the details of the partnership. Your management team includes a Vice President and a number of other managers.
During the 3-day meeting, the companies have the following goals:
Decibel
· As high a royalty rate as possible on sales of T-shirts, videos, and CDs
· Aggressive marketing and advertising to increase attendance and sales
· Good security, both before and during the show Image
Image
· Well known bands that will be easy to market
· As much income as possible from the concerts
· Smoothly functioning event so that publicity from early concerts is positive
Event
· Bands that are not likely to provoke stampedes, riots, or other antisocial behavior
· Bands that are reliable and will show up on time, ready to play
· As much income as possible from the concerts
The cultures that are assigned to the various companies are:
BLUE CULTURE
Image (Marketing Company)
Beliefs, Values, and Attitudes that Underlie This Culture’s Communication
Believe that fate and luck control most things.
Believe in feelings more than reasoning.
An authoritarian leader makes the ultimate decisions.
Nonverbal Traits of This Culture
Treat time as something that is unimportant. It is not a commodity that can be lost.
Conversation distance is close (about 15 inches, face-.
Discussion Question Comparison of Theories on Anxiety Disord.docxTatianaMajor22
Discussion Question:
Comparison of Theories on Anxiety Disorders
There are numerous theories that attempt to explain the development and manifestation of psychological disorders. Some researchers hold that certain disorders result from learned behaviors (behavioral theory), while other researchers believe that there is a genetic or biological basis to psychological disorders (medical model), while still others hold that psychological disorders stem from unresolved unconscious conflict (psychoanalytic theory). How would each of these theoretical viewpoints explain anxiety disorders? Does one explain the development and manifestation of anxiety disorders better than the others?
200- 400 words please
Three min resources with
in text citations and examples
you can use the following as a module reference
cite as university 2014
Anxiety Disorders
Anxiety disorders such as panic disorder, specific phobias, and social anxiety disorder feature a heightened autonomic nervous system response that is above and beyond what would be considered normal when faced with the object or situation that the person reacts to. For example, a person with a specific phobia of spiders (called arachnophobia) experiences a heightened autonomic response when confronted with a spider (or even an image of a spider). This anxiety response must result in significant distress or impairment. In general, anxiety disorders have been linked to underactive gamma-aminobutyric acid (GABA) in the brain, resulting in overexcitability of the amygdala and the anterior cingulate cortex. Additionally, genetic research shows that anxiety disorders demonstrate a clear pattern of genetic predisposition
Charles Darwin's Perspective
We talked about Charles Darwin when discussing evolution and natural selection. Darwin was also very interested in emotions. One of his books published in 1872,The Expression of Emotions in Man and Animals, was devoted to this topic.
Darwin believed that emotions play an important role in the survival of the species and result from evolutionary processes in the same way as other behaviors and psychological functions. Darwin's writing on this topic also prompted psychologists to study animal behavior as a way to better understand human behavior.
James–Lange Theory of Emotions
Modern theories of emotion can be traced to William James and Carl Lange (Pinel, 2011). William James was a renowned Harvard psychologist who is sometimes called the father of American psychology. Carl Lange was a Danish physician. James and Lange formulated the same theory of emotions independently at about the same time (1884). As a result, it is called the James–Lange theory of emotions. This theory reversed the commonsensical notion that emotions are automatic responses to events around us. Instead, it proposes that emotions are the brain's interpretation of physiological responses to emotionally provocative stimuli.
Cannon–Bard Theory of Emotions
In 1915, Harvard physiologist Walt.
I have always liked Dustin Hoffmans style of acting, in this mov.docxTatianaMajor22
I have always liked Dustin Hoffman's style of acting, in this movie he takes on a sexually deprived young male just out of college, and has never been with a female, and is duped by horny older woman that feels neglected. Dustin Hoffman takes the characters form of a young male, goofy, respectful virgin and intelligent male, missing something but not really sure at the beginning till Ann Bancroft coaxes him with seduction to fulfill her own needs. In an other movie called "The life of Little Big Man" he plays almost the same character but as a white child raised by the Native Americans and a wise old chief that deeply care and loves him as his own, and Fay Dunaway plays a Holy rollers wife that is older and sexually deprived and feeling neglected by her husband and also she goes through major changes in her life from devoted wife, to a honey bell/ house hooker, whats funny Dustin Hoffman is a awesome actor but has to have his surrounding characters bring his character to life. The Graduate was Dustin Hoffman's first big movie of his career.
I actually liked movie "Little Big man" way better due to he went through major changes in his life, from being a Native boy warrior, captured by Yankees, meets Fay Dunaway who loves to give baths, to finding his sister who teaches him to be a gunslinger and then returns to his Grand Father to be a native again and tells his blind Grand Father the world of the white man is a crazy one, then his see the Psyho Col. Custer and gets his revenge by telling Custer the truth. The movie Little Big Man makes you laugh, teaches you things about people and survial and cry at times... its a must see...
Although a stray away from the Benjamin Braddock written about in the novel The Graduate, Dustin Hoffman does an awesome job with this character on film. When you first meet Ben he is at a party that his parents are throwing in his academic honor upon his graduation from school and return home. The whole night, Hoffman stumbles though various conversations and tries to coyly escape from the festivities. Small things such as this Hoffman did a great job at, conveying the hesitance and crisis that Ben was going through as a graduate. There are multiple times in the movie he hardly expresses anything at all, yet it clearly shows you that Ben is having a very hard time internally with everything going on. Even through his relationships with Mrs. Robinson and her daughter Elaine you see the young man struggling with himself through either failed attempts at affection or lack thereof.
.
Is obedience to the law sufficient to ensure ethical behavior Wh.docxTatianaMajor22
Is obedience to the law sufficient to ensure ethical behavior? Why, or why not? Support your answer with at least three reasons that justify your position.
100 words
Discuss the differences between an attitude and a behavior. Provide 4 substantive reasons why it is important for organizations to monitor and mitigate employee behavior that is either beneficial or detrimental to the organization's goals and existence.
150 words
.
If you are using the Blackboard Mobile Learn IOS App, please clic.docxTatianaMajor22
If you are using the Blackboard Mobile Learn IOS App, please click "View in Browser." V BUS 520Week 9 Assignment 4 Paper
I need the paper as soon as possible
Students, please view the "Submit a Clickable Rubric Assignment" in the Student Center.
Instructors, training on how to grade is within the Instructor Center.
Assignment 4: Leadership Style: What Do People Do When They Are Leading?
Due Week 9 and worth 100 points
Choose one (1) of the following CEOs for this assignment: Larry Page (Google), Tony Hsieh (Zappos), Gary Kelly (Southwest Airlines), Meg Whitman (Hewlett Packard), Ursula Burns (Xerox), Terri Kelly (W.L. Gore), Ellen Kullman (DuPont), or Bob McDonald (Procter & Gamble). Use the Internet to investigate the leadership style and effectiveness of the selected CEO. (Note: Just choose one that is easier for you to right about.) It does not matter to me which CEO you pick
Write a five to six (5-6) page paper in which you:
1. Provide a brief (one [1] paragraph) background of the CEO.
2. Analyze the CEO’s leadership style and philosophy, and how the CEO’s leadership style aligns with the culture.
3. Examine the CEO’s personal and organizational values.
4. Evaluate how the values of the CEO are likely to influence ethical behavior within the organization.
5. Determine the CEO’s three (3) greatest strengths and three (3) greatest weaknesses.
6. Select the quality that you believe contributes most to this leader’s success. Support your reasoning.
7. Assess how communication and collaboration, and power and politics influence group (i.e., the organization’s) dynamics.
8. Use at least five (5) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
· Analyze the formation and dynamics of group behavior and work teams, including the application of power in groups.
· Outline various individual and group decision-making processes and key factors affecting these processes.
· Examine the primary conflict levels within organization and the process for negotiating resolutions.
· Examine how power and influence empower and affect office politics, political interpretations, and political behavior.
· Use technology and information resources to research issues in organizational behavior.
· Write clearly and concisely about organizational behavior using proper writing mechanics.
Click here.
Is the proliferation of social media and communication devices a .docxTatianaMajor22
Social media and communication devices have both benefits and drawbacks for society. While they allow easy connection with others and access to information, overuse can negatively impact relationships and mental health. Overall, moderation is key to reap the upsides of technology while avoiding the downsides.
MATH 107 FINAL EXAMINATIONMULTIPLE CHOICE1. Deter.docxTatianaMajor22
The document contains a 30-question math exam covering topics like functions, graphs, equations, inequalities, logarithms, and other math concepts. It includes multiple choice, short answer, and show work questions assessing skills like domain and range, solving equations, graphing, composites, inverses, lines, maximizing profit, and more. Students must demonstrate mathematical reasoning and problem-solving abilities.
If the CIO is to be valued as a strategic actor, how can he bring.docxTatianaMajor22
If the CIO is to be valued as a strategic actor, how can he bring to the table the ethos of alignment, bound to the demands of process strategic planning to move IT to the forefront of the organization's future? Is there a lack of information on strategic planning? Nope. I think the process of planning is poorly understood, and rarely endorsed. The reasons are simple enough. Planning requires a commitment of resources (time, talent, money); it requires insight; it requires a total immersion in the corporate culture. While organizations do plan, planning is invariably attached to the budget process. It is typically here that the CIO lays out his/her vision for the coming year Now a few years ago authors began writing on the value of aligning IT purpose to organizational purpose. They wrote at a time when enterprise architectural planning was fairly new, and enterprise resource management was on the lips of every executive. My view is that alignment is a natural process driven by the availability of the tools to accomplish it. Twenty years ago making sense of IT was more about processing power, and database management. We are in a new age of IT, and it is the computer that is the network, not the network as an independent self-contained exchange of information. If you will spend some time reviewing the basic materials I provided on strategic planning and alignment, we can begin our discussions for the course. Again, here is the problem I would like for us to tackle: If the CIO is to be valued as a strategic actor, how can he bring to the table the ethos of alignment, bound to the demands of process strategic planning to move IT to the forefront of the organization's future? Most of the articles I bundled together for this week are replete with tables and charts. These can be a heavy read. Your approach should be to review these articles for the "big ideas" or lessons that are take away. I think these studies are significant enough that we will conclude our first week with an understanding of the roles between executive leaders, and how they see Information Technology playing a role in shaping a business strategy.
Read the articles to answer the question. Please No Plagerism or verbatim but you are allowed to quote from the article.
Achieving and Sustaining
Business-IT Alignment
Jerry Luftman
Tom Brier
I
n recent decades, billions of dollars have been invested in intormation tech-
nology (IT). A key concern of business executives is alignment—applying IT
in an appropriate and timely way and in harmony with business strategies,
goals, and needs. This issue addresses both how IT is aligned with the busi-
ness and how the business should be aligned with IT Frustratingly, organizations
seem to find it difficult or impossible to harness the power of information tech-
nology for their own long-term benefit, even though there is worldwide evi-
dence that IT has the power to transform whole industries and markets.' How
can companies.
I am showing below the proof of breakeven, which is fixed costs .docxTatianaMajor22
I am showing below the proof of breakeven, which is fixed costs/ contribution margin.
We start with the definition of breakeven and proceed using elementary algebra to derive the formula. Breakeven is a number and is created by knowing fixed and variable costs, and the retail sales price. It is thus not a point of discussion but is based on the assumptions of these variables.
Proof of Breakeven
Definition of BreakevenVolume: Total Revenue = Total Expenses
Definition
1.Total Revenue = Total Expenses
Breakdown of Definition
2. Retail Price * Volume = Fixed Expenses + Variable Expenses
Further Analysis
3. Retail Price * Volume = Fixed Expenses + (Volume * Unit Variable Expenses)
Subtract (Volume * Unit Variable Expenses) from both sides
4. Fixed Expenses = (Retail Price * Volume) — (Volume * Unit Variable Expenses)
Factor
5. Fixed Expenses = Volume * (Retail Price – Unit Variable Expenses)
Divide both sides by (Retail Price – Unit Variable Expenses)
6. Volume = Fixed Expenses
(Retail Price – Unit Variable Expenses)
Substitution based on Definition
7. Since (Retail Price — Unit Variable Expenses) is called Contribution Margin,
Therefore:
Breakeven Volume = Fixed Expenses / Contribution Margin
NAME_________________________________________________ DATE ____________
1. Explain some of the economic, social, and political considerations involved in changing the tax law.
2. Explain the difference between a Partnership, a Limited Liability Partnership (LLP) and a Limited Liability Company (LLC). In each structure who has liability?
3. How is “control” defined for purposes of Section 351 of the IRS Code?
4. What are the advantages and disadvantages of using debt in a firm’s capital structure?
5. Under what circumstances is a corporation’s assumption of liabilities considered boot in a Section 351exchange?
6. What are the tax consequences for the transferor and transferee when property is transferred to a newly created corporation in an exchange qualifying as nontaxable under Section 351?
7. Why are corporations allowed a dividend-received deduction? What dividends qualify for this special deduction?
8. Provide 3 examples of a Constructive Dividend. Are these Constructive Dividends taxable?
9. Discuss the tax consequences of a new Partnership Formation and give details to gain and losses and basis?
10. Provide 2 similarities and 2 differences when comparing Sections 351 and 721 of the IRS Code.
11. What is the difference between inside and outside basis with a partnership?
12. ABC Partnership distributes $12,000 of taxable income to partner Bob and $24,000 of tax-exempt income to Partner Bob. As a result of these two distributions, how does Bob’s basis change?
13. On January 1, Katie pays $2,000 for a 10% capital, profits, and loss interest in a partnership.
Examine the way in which death and dying are viewed at different .docxTatianaMajor22
Examine the way in which death and dying are viewed at different points in human development.
Using only my text as a reference:
Berger, K.S. (2011). The developing person through the life span (8th ed.).
I need 3 detailed PowerPoint slide with very detailed speaker notes. There must be detailed speaker notes on each slide. The 4th slide will be the reference.
.
Karimi 1 Big Picture Blog Post First Draft College .docxTatianaMajor22
Karimi 1
Big Picture Blog Post First Draft
College Girls in Media
Sogand Karimi
Media and Hollywood movies have affected and influenced society’s perception on
female college students. Due to Hollywood movies and media, society mostly recognizes the
negative stereotypes of a college women. Saran Donahoo, an associate professor and education
administration of Southern Illinois University, once said, “The messages in these films
consistently emphasized college as a place where young women come to have fun, engage in
romances with young men, experiment with sex and alcohol, face dilemmas regarding body
image, and encounter difficulties in associating with other college women.” In this essay I will
be talking about the recurring stereotypes and themes portrayed in three hollywood movies,
Spring Breakers, The house bunny and Legally Blond and how these stereotypes affect our
society.
The movie Spring Breakers is about four college girls who are bored with their daily
routines and want to escape on a spring break vacation to Florida. After realizing they don’t have
enough money, they rub a local diner with fake guns and ski masks. They break the laws in order
to get down to Florida, just to break more rules and laws once they’re there. During the film, you
will notice a lot of partying, drugs and sexual activity. The four girls wear bikinis for majority of
the film and are overly sexual. These are some common themes and stereotypes seen in all three
movies. Media and movies like spring breakers have made it a norm to constantly want to party,
get drunk and have sex as a college woman. In an article by Heather Long, she mentions how the
movie can even be seen as supporting rape culture. She believes because of these stereotypes
always being shown in media, it is contributing to the “girls asking for it” excuse when it comes
to rape cases with young girls. Long also said “...never mind the fact that thousands of college
students are spending their spring break not on a beach, but volunteering with groups like Habitat
for Humanity and the United Way, especially after Hurricanes Katrina and Sandy.” THIS shows
how media only displays one side of a certain group or story. Even though not all college girls
like to party and lay on a beach naked for spring break, that’s what media likes to portray. Not
only does this give the wrong message to our society but it influences bigger issues like rape, as
the author mentioned.
http://www.huffingtonpost.com/2010/03/10/alternative-spring-break_n_494028.html
http://www.huffingtonpost.com/2010/03/10/alternative-spring-break_n_494028.html
Karimi 2
The movie House bunny. The House bunny is a movie about an ex playmate or girlfriend
if Hugh Hefner that gets kicked out of the Playboy Mansion due to her aging. She then becomes
a mother of an unpopular sorority with girls that are bit geeky, and unusual compared to other
girls on campus. The story.
Please try not to use hard words Thank youWeek 3Individual.docxTatianaMajor22
Please try not to use hard words Thank you
Week 3
Individual
Problems and Goals Case Study
Select one of the following three case studies in Ch. 6 of The Helping Process:
· Case Susanna
· Case James and Samantha
· Case Alicia and Montford
Identify three to five problems in the case study you have selected.
Write a 500- to 700-word paperthatincludes the following:
· A problem-solving strategy and a goal for each problem
· The services, resources, and supports the client may need and why
· A description of how goals are measurable and realistically attainable for the client
Here is the case studies
Exercise 3: Careful Assessment
The following case studies are about Susanna, James, Samantha, Alicia, and Montford, all
homeless children attending school. The principal of the school has asked you to conduct
an assessment of these children and provide initial recommendations.
Before you begin this exercise, go to the website that accompanies this book: www.
wadsworth.com/counseling/mcclam, Chapter Three, Link 1, to read more about homeless
families and children.
Susanna
Susanna is 15 years old. Th e city where she lives has four schools: two elementary, one
middle, and one high school. Th ere are about 1,500 students enrolled in the city/county
school district and about 450 in the local high school that Susanna is attending. For the
past six months, Susanna has been living with her boyfriend and his parents. Prior to this,
she left her mother’s home and lived on the streets. She is pregnant and her boyfriend’s
parents want her to move out of their home. Her father lives in a town with his girlfriend,
about 50 miles from the city. Her mother lives outside the city with Susanna’s baby brother.
Right now Susanna’s mother is receiving child support for the two children. Susanna wants
to have a portion of the child support so that she can find a place of her own to live. Her
mother says that the only way that Susanna can have access to that money is to move back
home. Susanna refuses to move back in with her mother.
You receive a call from the behavior specialist at Susanna’s high school. Susanna’s
mother is at the school demanding that Susanna be withdrawn from school. Susanna’s
mother indicates that Susanna will be moving in with her and will be enrolling in another
school district.
Currently Susanna is not doing very well in school. She misses school and she tells the
helper it is because she is tired and that she does not have good food to eat. She has not told
the helper that she is looking for a place to live. Right now she is failing two of her classes
and she has one B and two Ds. Her boyfriend has missed a lot of school, too.
James and Samantha
James is 10 years old and he has a sister, Samantha, who is 8. At the beginning of the
school year, both of the children were attending Boone Elementary School. Both children
live with their aunt and uncle; their parents are in prison. In the middle of the scho.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
2. resource, scholars, activists, technologists, and local source
communities have
generated critiques about the extent of information freedom.
This article injects both the
histories of collecting and the politics of information circulation
in relation to indigenous
knowledge into this debate by looking closely at the history of
the meme and its cultural
and legal underpinnings. This approach allows us to unpack the
meme’s normalized
assumptions and gauge whether it is applicable across a broad
range of materials and
cultural variances.
Post on Slashdot: News for nerds. Stuff that matters.
Subject line: “Aboriginal archive uses new DRM”
Submitted by: ianare on Tuesday, January 29, 2008, @ 02:57PM
1
I’d like to thank the two anonymous reviewers for their
comments and suggestions that have
strengthened this article. This article has been a work in
progress for several years as the Mukurtu
3. platform grew and took shape. During that time, I was lucky
enough to be in conversation with
wonderfully thought-provoking colleagues who pushed me to
think about the politics of openness and
access, including Jason Jackson, Chris Kelty, Tara McPherson,
Craig Dietrich, Paul Dourish, Ramesh
Srinivasan, Robin Boast, Gabriella Coleman, Rosemary
Coombe, Matt Cohen, Jane Anderson, Kate
Hennessy, and Robert Leopold. No amount of thanks is enough
for Mukurtu’s Director of Development,
Michael Ashley, who took Mukurtu CMS from its alpha version
to a 1.0 release in record time, all the while
reminding me not to let perfect be the enemy of good enough.
My biggest debt of gratitude goes to the
indigenous peoples who have worked with Mukurtu CMS to
help create a platform that reflects their
diverse needs.
Kimberly Christen: [email protected]
Date submitted: 2012-04-04
mailto:[email protected]
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2871
4. “A new method of digital rights management which relies on a
user’s profile has been pioneered
by Aboriginal Australians for a multimedia archive. The need to
create profiles based on a user’s
name, age, sex and standing within their community come from
traditions over what can and
cannot be seen. For example, men cannot view women’s rituals,
and people from one community
cannot view material from another without first seeking
permission. Meanwhile images of the
deceased cannot be viewed by their families. This threw up
issues surrounding how the material
could be archived, as it was not only about preserving the
information into a database in a
traditional sense, but also how people would access it
depending on their gender, their
relationship to other people and where they were situated.”
(Slashdot, n.d., para 1)
Comment #2
Subject line: How is this DRM?
Submitted by: Anonymous Coward on Tuesday January 29 2008,
@07:13PM
5. “This doesn’t sound like DRM. It sounds like access control.”
Comment #182
Subject line: DRM/Censorship is ALWAYS bad!
Submitted by Auldclootie on Wednesday January 30 2008,
@09:11AM
“No one elected some anthropologist and gave him/her the
Godlike power to decide
which aspects of Aboriginal culture are rigidly enforced.
Culture is a dynamic process. It
should not be fossilized with rigidly enforced rules about what
is and is not permissible.
Are Aboriginals not to be allowed to dissent? To be non-
conformist? This kind of
DRM/censorship should be thrown on the scrapheap with all the
rest. It disenfranchises
the ordinary people and puts their welfare into the hands of
some supposedly benign
protector. Total bullshit! Of course the Aboriginal elders
support this - they are
conservatives and resist change - what about the rising new
generation? I worked with
6. Aboriginal people in the 90’s in central Australia – it’s about
time this kind of paternalist
crap was consigned to the trash...”
2
Slashdot <reply>
On January 29, 2008, about five months after several
Warumungu people and I installed the
Mukurtu Wumpurrarni-kari community digital archive in the
Nyinkka Nyunyu Art and Culture Centre in the
remote Central Australian town of Tennant Creek, we had our
fifteen minutes of Internet fame, as the
archive was debated on forums from Slashdot to the BBC.
3
As far as I can piece together from the e-
traces of the above Slashdot commentary, it began with a post I
made to my blog on January 6, 2008,
2
Original Slashdot comments archived at
http://yro.slashdot.org/story/08/01/29/2253239/Aboriginal-
Archive-Uses-New-DRM; see also Dietrich and Bell (2011, pp.
208–209).
3
See Christen (2007, 2008, 2009). Slashdot online discussion
7. archived at
http://yro.slashdot.org/story/08/01/29/2253239/Aboriginal -
Archive-Uses-New-DRM; see also
http://news.bbc.co.uk/2/hi/technology/7214240.stm
http://yro.slashdot.org/story/08/01/29/2253239/Aboriginal -
Archive-Uses-New-DRM
2872 Kimberly Christen International Journal of
Communication 6(2012)
announcing the launch of an online demo of the Mukurtu
Wumpurrarni-kari archive.
4
Less than a week
later, on January 11, Wendy Seltzer, an intellectual property
lawyer, wrote a post on her blog lauding the
archive as an example of “digital restrictions done right”
(Seltzer, 2008, emphasis mine). The BBC’s Bill
Thompson read Wendy’s post and told his colleagues from
Digital Planet about our project. Digital Planet’s
focus is on “reporting the human side of technology from
around the world” (Titherington, 2011). On
January 15, I received an e-mail inviting me to be on the show.
I gladly accepted. The next week, I went
to the local NPR station and recorded a 40-some minute
8. interview with Gareth Mitchell, the host of Digital
Planet.
On January 29, the edited segment aired, and a podcast was
made available via the BBC website.
Host Gareth Mitchell opened the segment framing the story this
way: “A remote and ancient Aboriginal
community in the Australian Outback has become the unlikely
setting for a digital archive that’s turned
received wisdom about digital rights management or DRM on
its head.” As I sat listening to the show, the
cultural anthropologist in me cringed at the “ancient” qualifier
(how could a group of people living today
be ancient?), and the digital humanist in me was less convinced
by the invocation of DRM as a
counterpoint to the cultural protocols built into the archive.
However, by the end of the program I was
quite pleased with the way the producers had edited the piece
together, highlighting the community-
focused, ground-up production of the system based on
Warumungu cultural protocols. I appreciated the
commentary at the end of the show from Bill Thompson, who
discussed the system as one based on trust.
I made the point, and Bill echoed it in his comments, that the
9. system could give us a way to think about
control and access in ways that didn’t have to mean an abuse of
power or “locked down” culture.
5
The same day the radio program aired, the BBC Online ran an
article entitled “Aboriginal Archive
Offers New DRM” (BBC, 2008), and Bill Thompson included
the Mukurtu Wumpurrarni-kari archive in his
article, “Locking Down Open Computing” (Thompson, 2008), in
the technology section of the BBC Online.
In contrast to the radio program segment, which covered the
history of the project and the nuances of the
Warumungu cultural protocols, the two articles made DRM
central to the project, when in fact, my
comments on DRM were in response to Mitchell’s query and
analogy. They were certainly never central to
the creation of the archive itself, or to my work at the time. Yet,
over the course of a few weeks, the
Mukurtu archive—a project with multiple goals and two years
in development—became framed around one
of the most controversial contemporary legal, social, and
economic debates: digital rights management.
The Slashdot commentary was bookended by equal parts racist
10. diatribe and compassionate romanticism,
with perhaps a third or more of the comments falling somewhere
in the middle—not sure that Mukurtu
amounted to DRM, but confident that technology should be put
to diverse cultural uses.
In this article, I examine the reach of digital rights management
(DRM) and commons talk as
they extend to—and often push up against—indigenous
articulations of information management and
knowledge circulation protocols within the digital realm. DRM
is a hot-button issue because of high-profile
corporations using digital “locks” to regulate consumer use
instead of copyright or other legal tools.
Tarleton Gillespie argues that, after the Napster case in the
United States, there has been a “fundamental
4
See
http://web.archive.org/web/20080201093247/http://www.kimber
lychristen.com
5
See
http://web.archive.org/web/20080201093247/http://www.kimber
lychristen.com
11. International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2873
shift in strategy, from regulating the use of technology through
law to regulating the design of technology
so as to constrain use.” Further, he suggests that:
What we might call “social engineering” has come full circle
back to actual engineering,
where the tools and the environment are built to assure the right
practices are
facilitated, the wrong are inhibited. These technologies are
largely being developed and
deployed below our cultural radar, enamored as we are with the
thrill of the “information
revolution,” the faith in progress, and the freedom of individual
agency. (2007, p. 6)
Gillespie charts the shift in managing what has been dubbed the
“culture industry”—music,
books, movies, video games, and other software—around
corporate solutions to murky legal issues. He
rightly points to the general fascination with technology and its
associated progressive narratives that
12. blind us to the reach of technology and its unintended
consequences. However, off of Gillespie’s radar are
the other uses for building “control” into systems for purposes
that are not mired in greed, consumerism,
and the circulation of commodities. Curation and circulation of
indigenous digital cultural heritage
materials are, in fact, activities that undo this neat alignment of
control with the abuse of power.
Highlighting these diverse and situational types of controls
gives us another lens through which to view
the notion of digital management of cultural materials and
knowledge.
Almost three years after the first interview on February 22,
2011, I was once again on Digital
Planet. This time, Mitchell invited me to participate in a
discussion about “openness and ownership” and
our conversation took off from two projects that stemmed
directly from the Mukurtu Wumpurrarni-kari
archive: the Plateau Peoples’ Web Portal (PPWP) and Mukurtu
CMS.
6
These two projects leverage the
backend software of the original archive to build digital
platforms for indigenous cultural heritage
13. management. The PPWP is an online educational portal of
Plateau materials co-curated by tribal nations
across the Pacific Northwest region of the United States.
Mukurtu CMS is a free and open source digital
archive and content management tool aimed at the specific
needs of indigenous peoples globally. Whereas
the Mukurtu Wumpurrarni-kari archive was a stand-alone
archive, Mukurtu CMS is a tool that can be
adapted to the local cultural protocols and dynamic intellectual
property needs of any indigenous
community.
7
During the interview, Mitchell was once again curious about
the potential of these projects to
upend dominant discussions about digital technology’s role in
managing and controlling access to culture.
After describing the various ways in which both the PPWP and
the scaled-up Mukurtu CMS allow
those using the tools (indigenous communities, museums,
libraries, and archives) to manage and define
access, circulation, and licensing at granular levels, Ray
Corrigan from Open University turned back to the
general notion of DRM, critiquing it as a corporate “digital
lock” put on by producers aiming to shut out
14. 6
See http://www.mukurtu.org and
http://plateauportal.wsulibs.wsu.edu
7
In Warumungu, “Mukurtu” translates to “dilly bag,” but was
adapted by elders in the community to mean
“a safe keeping place.” Wumpurrarni-kari means “belonging to
the Warumungu people.” Elders gave
permission in 2009 for the word Mukurtu to be used for the
software platform. Production of Mukurtu CMS
was funded in part by a National Endowment for the Humanities
Digital Humanities Start-Up Grant, as well
as an Institute for Museum and Library Studies National
Leadership Grant.
http://www.mukurtu.org/
http://plateauportal.wsulibs.wsu.edu/
2874 Kimberly Christen International Journal of
Communication 6(2012)
consumers. He remarked, however, that “the interesting thing
about Mukurtu is it turns that control stuff
on its head, so it now gives the access control switches to the
users” (Digital Planet, 2011). Exactly. And
yet, this point is oftentimes lost in the cacophony calling for
15. openness at any and all costs. The celebration
of openness, something that began as a reaction to corporate
greed and the legal straightjacketing of
creative works, has resulted in a limited vocabulary with which
to discuss the ethical and cultural
parameters of information circulation and access in the digital
realm. We are stuck thinking about open or
closed, free or proprietary, public or private, and so on, even
though in such common online experiences
as using social media platforms Facebook and Twitter, or when
reading through legal parameters for the
use and reuse of digital information, these binaries rarely exist.
These are not zero-sum games, and
information sociality and creativity is more porous than these
choices allow us to imagine.
In the remainder of this article, I address the contentious issues
of access to knowledge and
information freedom as they play out through assertions of
control over digital materials, clarion calls for a
more robust public domain, and expansive definitions of open
access. I begin by exploring the narrative
field of openness and access on which indigenous claims and
practices are mapped, and then I move to
16. examining the production of Mukurtu CMS in order to focus on
the tensions produced when archival
platforms and culturally diverse notions of information
management, sharing, and privacy rub up against
one another.
8
By highlighting these tensions, I explicitly interrogate
entrenched notions of the public
domain, appeals to openness, and the contours of information
circulation in order to better understand the
stakes of digital sociality as it is lived, imagined, and performed
across cultures and within the messy
spaces where different notions of collaboration, collection, and
curation intersect.
Information Wants to be Free
Like all powerful and formative memes, “information wants to
be free” has a genealogy that can tell
us something about how supporters conceive of the connections
between information, freedom, openness,
and access in relation to digital technologies. Apparently, at the
first Hacker conference in 1984, Stewart
Brand suggested that:
17. On the one hand information wants to be expensive, because it’s
so valuable. The right
information in the right place just changes your life. On the
other hand, information wants
to be free, because the cost of getting it out is getting lower and
lower all the time. So you
have these two fighting against each other. (Brand, 1984)
Emphasizing the tension between particular types of social and
economic practices born from
information circulation, Brand highlighted the seemingly
natural give and take between two factionalized
aspects of information. They are “fighting against each other.”
Pitting informational relations in an
inherent squabble produces a problem to overcome, a side to
choose. One must decide: free or
expensive? Six years later, in 1990, Richard Stallman tweaked
this notion and argued that,
8
I use the term “indigenous” in an inclusive manner and follow
the United Nations (n.d.) in not creating a
definition that would restrict peoples’ self-definitions.
18. International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2875
I believe that all generally useful information should be free. By
“free” I am not referring
to price, but rather to the freedom to copy the information and
to adapt it to one’s own
uses. . . . When information is generally useful, redistributing it
makes humanity
wealthier no matter who is distributing and no matter who is
receiving. (Denning, 1990,
pp. 653–654, emphasis mine)
Here, Stallman emphasizes the benefits of information freedom
as social freedom. Information
that is “generally useful” is something that should be adaptable,
open, and accessible. Reuse, in this
formulation, is a form of social good. Stallman does not
address—nor, perhaps, did his audience of
software designers wonder—how one decides which information
is generally useful, nor did he imagine the
possibility that some information might, in fact, not be useful or
beneficial in the hands of just anyone.
19. That is, Stallman’s “humanity” seems to erase the cultural
logics of many groups who view improper reuse
and redistribution of their materials as possibly damaging to
their cultural practices or traditional
knowledge systems. In many indigenous communities, cultural
knowledge is conferred and transferred
based on systems of obligation and reciprocity that, while they
need not be romanticized as somehow
more natural than their non-indigenous counterparts, should
nonetheless be respected and merged into a
pluralistic understanding of information’s circulation routes
(Chander & Sunder, 2004; Leach, 2005;
Myers, 2005; Srinivasan, Boast, Becvar, & Enote, 2010).
Stallman’s usage prompted an ideological shift
within the debate about digital technology, cultural production,
and remix, a shift whereby technology
producers, users, and activists reimagined information in social
and moral, rather than economic, terms.
A few years later, while cyber-utopist John Perry Barlow was
busy declaring the “independence of
cyberspace” (1994), he produced a laundry list of things that
information wanted, including “to be free.”
His bumper-sticker version of the tension-filled statements that
20. preceded it became the tag line for a
generation of individuals invested in defying corporate and
legal attempts to control content and
technology. “Information wants to be free” became a battle cry
and rallying point for legal pundits, social
activists, and academics against the rising regulation of
“information,” whether through technological locks
or expansive intellectual property rights laws. High profile legal
cases pitted industry giants and
corporations against media consumers and small-time creators,
providing the ingredients for a David vs.
Goliath-style drama to play out across mainstream news media
and more marginal networks alike (Lessig,
2004; Gillespie 2007). Brand recognized the power of the
meme, noting its reach beyond his first
utterance. In April 1997, Wired magazine’s Jon Katz called it
“the single dominant ethic in this
community.”
Grounding their stance in information’s assumed natural
inclination toward freedom, Internet
enthusiasts and intellectual property rights critics easily
connected openness, the public domain, and the
commons, creating a well-defined (and seemingly neutral)
21. platform for information’s circulation routes—
particularly digital information. The “cultural commons” was,
thus, easily defined as “the vast store of
unowned ideas, inventions, and works of art that we have
inherited from the past and continue to enrich”
(Hyde, 2010, p. 18). Conjuring a sense of information passed
down through generations easily washes
over other, more dubious ways that “we have inherited from the
past,” making the process seem both
2876 Kimberly Christen International Journal of
Communication 6(2012)
natural and necessary without tainting it with colonial conquests
or racist research agendas that pushed
scientific exploration and collection practices. In this framing,
it is easy to forget the following:
Many cultural and historical artifacts of indigenous life are
spread across the collections
of museums and private holdings. Such holdings may be viewed
on site or, increasing,
electronically through virtual museums. Still, many indigenous
people have limited
22. access to their own cultural heritage and may be excluded also
from interpreting these
objects even when publicly displayed. (Resta, Roy, De
Montano, & Christal, 2002, p.
1482)
Although the “information wants to be free” meme emerged
from 25 years of digital celebration,
it was also successfully linked back to the nation’s beginnings
to weave a narrative of information freedom
as a bedrock of national freedom. In their quest for a benign and
balanced intellectual property rights
system, legal scholars and Internet freedom advocates delight in
quoting founding father Thomas
Jefferson as he inscribed the natural state of information:
That ideas should freely spread from one to another over the
globe, for the moral and
mutual instruction of man, and improvement of his condition,
seems to have been
peculiarly and benevolently designed by nature, when she made
them, like fire,
expansible over all space, without lessening their density in any
point, and like the air in
23. which we breathe, move, and have our physical being, incapable
of confinement or
exclusive appropriation. (Boyle, 2002, p. 15)
“Like the air we breathe,” Jefferson’s poetic framing of
information’s natural state, has worked
just as well when considered in light of digital bits and bytes as
it did for early 19th-century analogue
information. In 1918, U.S. Supreme Court Justice Louis
Brandeis used Jefferson’s words to pen a
dissenting opinion suggesting the following: “The general rule
of law is, that the noblest of human
productions—knowledge, truths ascertained, conceptions, and
ideas—become, after voluntary
communication to others, free as the air to common use” (Boyle,
2002, p. 15, emphasis mine). Jefferson
and Brandeis, along with a handful of other early American
thinkers, are routinely marshaled in support of
a “balanced” intellectual property regime that takes as its main
focus the maintenance of a public domain
where ideas move freely, creating an information commons.
While freedom is made paramount in these
discussions, the first half of Brandeis’ quote is downplayed:
after voluntary communication to others. In
24. relation to Western intellectual property laws, this half of the
sentence, if discussed at all, is viewed as a
creator’s right to disseminate his or her works commercially or
otherwise. What is not generally discussed
is the vast store of materials in Western museums, archives,
libraries, and personal collections that were
not voluntarily given, and would not generally meet the
standards of prior informed consent. The colonial
collecting history of Western nations is comfortably forgotten
in the celebration of freedom and openness
that would give “us” a storehouse of materials for the common
good. In fact, the commons was never a
place of inclusion, nor was it ever unregulated or uncontrolled.
In his study of the commons as an idea
and as practiced, Lewis Hyde shows quite clearly that, “the
simple fact is that the commons were a form
of property that served their communities for centuries because
there were strict limits on the use rights.
The commons were not open; they were stinted” (2010, p. 34,
emphasis mine). That is, commons have
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2877
25. always been regulated and exclusive; they work precisely
because they function within a system defined
by many options for use. Commons were never free, nor did
they promote an unregulated notion of
freedom.
The power and appeal of information freedom comes, then, at
least in part, from its connection to
deeply emotive and ideological American narratives. In the 21st
century, such bids for information
freedom in the commons appear in tandem with the claim that
digital technology and digital information
have created a “revolution.” Overt claims of a “digital
revolution” now appear in everything from
marketing materials to the nightly news, to academic
conferences. Digital utopianism slowed with the first
dot-com bust, but it has seen a pronounced resurgence with the
rise of social networking sites and the
recent spate of political upheavals in the Arab world. From
Tehran to Tunisia, revolutionaries employed
and deployed social media, including Facebook and Twitter, to
aid their practice and serve their cause.
While CNN branded the Tunisian uprising a “Twitter
Revolution,” digital skeptics like Malcolm Gladwell
26. decried social media for producing slactivism, as opposed to the
real activism taking place on the ground.
The least compelling question about any of these revolutions
and their intersection with, and use of, social
media is the cause-and-effect type of query posed by some
bloggers: “Is Tunisia the First Twitter
Revolution?” What is striking about these claims in relation to
technology is their reliance on revolution as
the framing narrative device. Revolution is not just what is
happening on the ground; it is embedded in
technology itself. These platforms and tools do not just provide
logistical support for revolutionaries; in
these celebratory narratives, social media are
anthropomorphized and become agents themselves within
the revolution. Human agency is muted, and technology
becomes the revolutionary figure.
Information freedom and digital revolution dovetail neatly with
pre-existing American discourses
about the primacy of individual liberties and the necessity of
information circulation. Without inspection
and divorced from their historical moorings, however, these
dominant couplings tend to create a flat
debate and produce a false choice between freedom and
sociality on the one hand, and oppression and
27. privacy on the other. At the same time, revolution’s pull and
freedom’s appeal may lead us to both
misunderstand the ethics of openness and de-historicize the
public domain, where sociality is always
already a matter of well-established power relations and
historical relationships between nations,
institutions, and the many publics that engage with each other
as they circulate, create, and use
information. The “information wants to be free” meme does a
disservice to the task of understanding the
ethics of information circulation, both within the digital realm
and in a post-colonial world order where we
cannot so neatly carve out the digital from the political and the
historical.
Openness, Access, and the Public Domain
Openness is valued in Western societies. We teach our kids to
be open—share and share alike.
We want our significant others to be open with us. We demand
openness from our politicians and pundits.
The expansion of digital technologies (and specifically the
Internet) into their current collective place as an
everyday part of social and political life, serving as media for
28. information circulation, has increased
attention to the practice and goal of openness within the digital
ecology. Open access (OA) is not just an
idea, but a movement.
2878 Kimberly Christen International Journal of
Communication 6(2012)
Open Access is a growing international movement that uses the
Internet to throw open
the locked doors that once hid knowledge. It encourages the
unrestricted sharing of
research results with everyone, everywhere, for the
advancement and enjoyment of
science and society. Open Access is the principle that all
research should be freely
accessible online, immediately after publication, and it’s
gaining ever more momentum
around the world as research funders and policy makers throw
their weight behind it.
(Scholar Works, n.d., para. 1)
29. For the OA movement, the goal appears to be making
information—partitioned off as research—
free to everyone, everywhere, with the assumption that
information freedom will be a social and political
benefit in all cases. In fact, open access is routinely marshaled
in support of new models for scholarly
publishing, commercial publishing, open source software
production and licensing, music distribution,
pharmaceutical production and distribution, intellectual
property rights, traditional knowledge, traditional
cultural expressions, academic research, commercial research,
and so on. The crowdedness under the
banner of open access should give us pause. It distracts from the
specificity and historical context of
various calls for, and definitions of, openness. In these vast
calls, openness and unfettered access define
the boundaries of information sharing; neither is questioned as a
political stance or historical assumption.
Instead, they are treated as de facto positive, beneficial aspects
of knowledge circulation.
In his dissection of Google and its place in the social landscape,
Siva Vaidhyanathan argues that
we have a collective blind faith in Google that keeps us from
looking critically at Google’s practices and the
30. effects (intended or not) the company has on society. He argues
that, “[b]ecause we focus on the miracles
of Google we are too blind to the ways in which Google exerts
control over its domain” (2011, p. 14).
Similarly, I suggest that OA and public domain advocates have
been guilty of a cultural blindness around
the contours of access and openness in relation to varied types
of information resources. These advocates’
faith in openness as an end in and of itself has distracted them
from seeing the possibilities of alternative
access regimes that are neither oppressive nor controlling, but
based on divergent social and ethical
systems and ways of imagining information and its movement
between various groups of people.
The ease with which openness and access are celebrated and
linked to revolution and freedom—
and deemed a public good with little qualification—signals the
lack of an adequate historical context within
which to anchor these systems. The universal goal of
“unrestricted sharing” defines a terrain where any
type of access control or differing notions of sharing are
incompatible and must be overcome. The friction
in these debates is concerned with both access (who gets it, who
31. doesn’t) and alternative perspectives
about knowledge as either 1) something up for grabs by anyone,
or 2) assemblages of dynamic modes of
making sense of the world that are embedded in cultural, social,
and political systems. The first
perspective derives from the impulse to understand knowledge
as a non-rivalrous good. The second
perspective is more anthropologically rooted; it considers the
diverse systems of meaning produced by
human beings throughout time and space. The first moves
toward the universal, the second toward the
local. The general and universal appeals to knowledge anchors
open access movements in too-rigid
understandings of the public domain, as well as in a limiting
perception of the “public good.” Critiquing the
popular notions of the public domain, Julie Cohen argues that,
“the uncritical assumption that information
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2879
is available because it is ‘out there’ is one of the central
failings of the mainstream economic model and
the associated public lands/stewardship model of the public
32. domain” (Cohen, 2006, p. 154).
This framing of the digital landscape promotes a type of
historical amnesia about how the public
domain was initially populated. In the United States, the rise of
public domain talk is linked to Westward
expansion and the displacement of indigenous peoples; the use
of this discourse signals an erasure of the
destructive effects of colonization and obscures its ideological
underpinnings (Chander & Sunder, 2004;
Cohen, 2006; Sherman & Wiseman, 2006). Lewis Hyde
documents the conflicting invocations of the
commons in early America:
To solve the “Indian problem,” the Dawes Act began the
process of breaking up tribal
holdings and giving individual Indians deeds to private plots of
land. . . . Thus did the
founders’ vision of a nation of small freehold farms settle, a
century later, over the
Indian lands, a civilizing enclosure of a once native commons.
(Hyde, 2010, p. 169)
Similarly, in her discussion of the legal and discursive
frameworks of intellectual property rights, Boatema
33. Boateng shows the inequitable power structures defined through
the public domain:
The position of Third World nations has often been that their
access to industrial
property must be facilitated in order to achieve the technology
transfer necessary for
industrialization. On the other hand, much cultural production
that Third World nations
and indigenous peoples seek to protect is deemed by mainstream
intellectual property
law to reside in the public domain and therefore is legitimately
open to exploitation by
all and sundry. These positions are related to deep-seated
differences over the terms by
which the world’s resources should be distributed. Rather than
being absolute and
universal, therefore, the basic premises of intellectual property
law have emerged in a
process of struggle between different positions and through the
reiteration and
reinforcement of those positions that win out in the process.
(2005, pp. 65–66,
emphasis mine)
34. Boateng highlights the creation of the public domain as a
beneficial category for Western nations
wanting to produce their own resources (and then limit the
resources’ use) by building on indigenous
resources without acknowledgment or redress. Further, Jane
Anderson suggests that there are “a range of
reasons why indigenous knowledge issues cannot always be
accommodated” within discussions about the
public domain. In her view, “contests over access to knowledge
arise because of the historical conditions
that meant that indigenous people lost control over how and
what knowledge was to be circulated.”
Anderson marks the public domain as a space that exacerbates
indigenous peoples’ prior claims to their
materials and knowledge, and where indigenous concerns about
“culturally appropriate conditions for
access” continue to be erased (2010, pp. 25–26). Anthony
Seeger puts the matter more bluntly: “We are
faced with another case of cultural blindness” (2005, p. 83). For
many indigenous communities in settler
societies, the public domain and an information commons are
just another colonial mash-up where their
cultural materials and knowledge are “open” for the profit and
35. benefit of others, but remain separated
2880 Kimberly Christen International Journal of
Communication 6(2012)
from the sociocultural systems in which they were and continue
to be used, circulated, and made
meaningful.
These dehistoricized notions of the public domain place privacy
and sociality at opposites ends of
the knowledge-circulation spectrum. Privacy is either an
individual choice or a national necessity, while
sociality is about “giving up” one’s privacy or opening the
national window to others. In these narratives,
governments, corporations, or new technologies “censor”
freedoms, and individuals are assumed to
willingly give up their privacy to be social. This tendency to
polarize the circulation of ideas obscures the
fact that privacy or secrecy are aspects of sociality that are
crucial to the production of knowledge and
materials within the public domain. Legal scholars, such as
Pamela Samuelson, argue that the public
domain is ill-defined, having shifted in scale and scope over the
36. course of its history in relation to nation-
building, international alliances, and treaties (2006b).
Samuelson reminds us that:
Public domain concepts may have proliferated in recent years
because “the public
domain” does not really exist. It is a metaphor, a social -legal
construct, that serves an
instrumental purpose—to assist us in thinking of a complex
issue, to organize our
thoughts, to serve as a “short cut” to denote a mindset, a view, a
perception about the
legal status of different types of information and what can be
done with this information.
(2006a, p. 145)
In contrast, then, to commonplace perceptions of the public
domain as a neutral space for
creation that benefits all participants equally, a historicized
account of the public domain instead
acknowledges a variety of spaces that have violated indigenous
peoples’ rights by defining their collective
works as “folklore” and excluding their protection via copyright
system (Christen, 2011; Dommann, 2008;
37. Wendland, 2008). Monika Dommann reminds us of this
legislative history:
Developed countries exported goods protected by intellectual
property law, while
developing countries exported folklore, falling into the public
domain. Whereas
developed countries could benefit commercially from their
works, the cultural products
of developing countries remained objects of commercial
exploitation by others. (2008, p.
12)
This lesser-talked-about construction of the public domain must
be incorporated into our larger
conversations about the future of access, openness, and the
circulation of information within the public
domain—and outside it.
Can the imagination and technological prowess that promoted
open access publishing, open
source software, and Creative Commons licenses exist side-by-
side with those alternative systems of
knowledge production that rely instead on social relations
maintained and forged through negotiated
38. interdependencies, which have as their goal the mutual gain
between stakeholders in social, economic,
and cultural terms? Can we imagine a digital landscape of social
media that provides access controls but
does not simultaneously invoke individualistic notions of
privacy or abusive systems of censorship?
Examining indigenous systems of knowledge circulation and
indigenous mobilizations of digital
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2881
technologies widens the frame of digital analysis, re-defines the
contours of digital sociality, and loosens
the stranglehold of open access models on the way we imagine
information circulation.
Indigenous peoples, historically shut out of national public
spaces and civic life, are collaborating
on a variety of projects that highlight alternative ways of
imagining information creation, circulation, and
the practices of access. Off the grid, Latin American and
Australian indigenous peoples have used pirate
satellites and radio programming to connect politically,
socially, and culturally between dispersed
39. communities. They have widely adapted and reworked
geographic information system technologies to
fight for land rights and mineral resources. Using GIS
technologies to map and visualize their lands,
indigenous peoples have brought social relations back to place -
based mapping practices. Inserting their
local knowledge and histories, they have provided GIS with a
human face to incorporate into traditional
geographic practices. Indigenous peoples’ concerns for the
repatriation of their ancestors’ remains and
cultural materials have led to innovative content management
systems and archival databases, such as
the Reciprocal Research Network and the Ara Iritija archive,
that privilege indigenous knowledge while
also promoting sharing between communities and institutions.
9
Indigenous peoples’ creation, use, and
reuse of digital technologies and platforms provides the
framework necessary for a new vocabulary that
understands the historical and ethical dimensions of digital
technology and information circulation
(Christen, 2009; Ginsburg, 2008; Hennessy, 2009; Hunter et al.,
2004; Johnson, 2003; Verran et al.,
2007).
40. Mukurtu: A New Vocabulary for Openness
After the launch of the Mukurtu Wumpurrarni-kari archive in
2007, my collaborators and I
consulted with and presented the archive’s capabilities to many
groups: indigenous communities,
archivists, librarians, and museum scholars. As I met with and
received e-mails from indigenous
communities interested in the archive, I encountered similar
ethical systems of accountability in which
access is determined by particular sets of relationships or
knowledge systems. We soon recognized that
indigenous communities across the globe share similar sets of
archival, cultural heritage, and content
management needs. The Squamish Nation in Canada wanted an
archive whose protocols could
accommodate their intricate clan and family system; the Citizen
Potawatomi Nation in Oklahoma wanted a
digital archive that could ground use and access within the 47
families to which all community members
belong; in New Zealand, some Maori archivists wanted a system
that could deal with extensive kin-based
social networks; the Zuni libraries wanted to be able to
41. exchange content and metadata with the Library
of Congress through their own cultural-based standards; and in
Kenya, the Maasai wanted a system that
would allow them to differentiate materials meant for
commercial purposes from those meant only for
internal circulation through intellectual property management
tools. Alongside these specific cultural and
social needs was the general consensus that any widely
adaptable tool must confront the low levels of
literacy and computer literacy found within indigenous
communities, as well as the necessity of
accommodating various infrastructural needs—from a system
that could be totally offline to a cloud
solution for those communities without any technical support or
server capacity. The alpha-version of the
software followed a “two-click mantra” I had instilled in the
developers, knowing that a user-friendly
9
See their respective websites at http://www.irititja.com and
http://moa.ubc.ca/renewal/rnn.php
2882 Kimberly Christen International Journal of
Communication 6(2012)
42. interface must include a workflow process that took only two or
fewer clicks to accomplish any task. The
two-click mantra recognized that neither literacy nor computer
literacy could be taken for granted within
this system. Unlike the approaches underpinned by utopian
narratives of total access that flow neatly from
the “information wants to be free” meme, we recognized that
large portions of the world not only don’t
have access to the Internet or digital tools; they also don’t have
the skills to implement them if they do
have access (Ginsburg, 2008). To address this access and
education need, each iteration of Mukurtu CMS
has had educational and community empowerment (train the
trainer) components embedded into every
step of the process. Access cannot just be about providing
hardware and software, otherwise we rehearse
the technologically deterministic arguments of those who would
champion the idea of a laptop on every
desk without determining the human needs, desires, and
attitudes of the people who will inhabit and bring
the technology to life. Mukurtu CMS began as a grassroots
effort to address specific cultural, social, and
technological needs, and it continues as a community-driven
platform.
43. Without digital tools, content management systems, and
archival platforms that address their
specific needs, many indigenous communities and their
collaborators have produced expensive one-off
projects to accommodate their own informational needs. These
systems address specific needs, but they
also lend themselves to obsolescence more quickly and are less
sustainable without a community of users
to continually adapt and update the software. We knew from the
lessons of the open source software
movement that producing an adaptable tool could be a powerful
way to accommodate multiple use-case
needs and thereby allow the communities to have ownership
over their own archiving systems. Although
many in the open source software movement are grounded in the
axiomatic “information wants to be free”
meme, they also, at the same time, provide a solid model for
participatory creation and software
development that relies on communities of users all contributing
to a larger project. Rather than focus on
one-off projects, then, we set out to produce a platform that
could be adaptable to multiple indigenous
contexts. Key to our success in producing just such a tool was
44. our decision early on to build Mukurtu on
top of the free and open source Drupal 7 content management
platform.
10
Mukurtu CMS can be thought of
as a system with three layers: Drupal 7 is the bottom layer
providing the scaffolding; in the middle, there
is Mukurtu CMS providing the protocol-driven, sociocultural
access levels; and on top, there is the specific
community’s content.
10
See http://drupal.org/drupal-7.0
http://drupal.org/drupal-7.0
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2883
Figure 1. Mukurtu CMS platform layers.
On December 20, 2010, more than three years after the original
Mukurtu Wumpurrarni-kari
45. archive was installed in Tennant Creek, my collaborators and I
launched Mukurtu CMS: an open source,
free, standards-based community archive and content
management system aimed at the specific needs of
indigenous peoples globally (http://www.mukurtu.org). Mukurtu
translates directly to “dilly bag” in the
Warumungu language. However, the Warumungu elders I
worked with in Tennant Creek redefined the
term as a “safe keeping place.” That is, the platform, like the
dilly bag, is meant to protect and preserve
cultural materials while also circulating and sharing them.
Elders and novices must interact: The system
does not work if knowledge or cultural materials are closed off
or hidden from all. Knowledge can (and
does) die if it is not used. But it also needs to be used and
circulated properly within an articulated ethical
system. The original version of the archive, created as a stand-
alone browser-based system for the
Warumungu community in Tennant Creek, provides both the
technical framework and the ideological
structure that underpin all of the technological decisions, design
choices, and functionality that define
Mukurtu CMS.
46. http://www.mukurtu.org/
2884 Kimberly Christen International Journal of
Communication 6(2012)
Figure 2. Mukurtu CMS homepage.
Building from the original project, Mukurtu CMS allows
indigenous communities, libraries,
archives, and museums to archive, preserve, and circulate their
cultural materials and knowledge in ways
that reinforce their own systems of knowledge management
without denying the dynamism and flux of all
such systems. The framework provides a flexible template that
allows cultural protocols to change over
time and in varied situations. Five components of Mukurtu CMS
set it apart from proprietary commercial-
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2885
off-the-shelf and open source content management systems: 1)
cultural protocols for content
47. management, 2) granular level access parameters based on
community protocols, 3) multiple and flexible
licensing options, 4) extensive metadata fields to account for
indigenous knowledge, and 5) built-in
options for exchanging materials and metadata with other
communities or institutions while maintaining
community cultural protocols.
The crux of Mukurtu CMS is its emphasis on cultural protocols,
both at a core level of its
architecture and in all areas of its functionality. Working
against either an open or closed option or the
simple open-by-default framework found in most content
management systems, Mukurtu CMS recognizes
the granular level and socially malleable protocols that drive
both access to and the circulation of cultural
materials. That is, access based either on expansive parameters
such as whether users are “friends,” or
merely an on or off option for access cannot handle the mire of
fine-grained and overlapping types of
relationships that predicate access. For example, in the alpha
version of the software, the Warumungu
community managers at the Nyinkka Nyunyu Art and Culture
Centre where the system was housed set
48. out protocols based on family and place-based relations,
followed by community status defined by
peoples’ relations to both one another and traditional
community knowledge. In practice, what this meant
was that individuals self-identified within the system’s users
database, and then the software pulled
content that was matched to the person’s profile. A person could
be a woman, from the Jones family, with
relations to both the Patta and Parrta country. In the system,
this person would be able to access only the
content that was tagged with these same affiliations. These
protocols flowed from the set of preexisting
social norms concerning the creation, reproduction, and
distribution of knowledge within the community.
I first encountered these protocols when some Warumungu
community members and I visited
the National Archives in Darwin to look at both their online and
paper collections. While everyone was
elated to find documents and images of relatives, there was
anguish over the violation of cultural
protocols observed by Warumungu people in the distribution,
circulation, and reproduction of cultural
materials and knowledge. For example, images of people who
49. were deceased were catalogued with no
warnings; pictures of sacred sites were divulged with no
connection to the ancestors who cared for those
places; and ritual objects were disconnected from the practices,
people, and places that they need to be
efficacious. Protocols are not rigid; they assume change, they
accept negotiation, and they are inherently
social—not given, neutral, or natural. As we sat down with
Warumungu community members and
sketched out how information travels, cataloged types of access,
and imagined scenarios for changes
within the system, it became clear that what we needed was a
flexible system that accounted for the
significance of the cultural protocols driving current sets of
relations and types of informational flow. By
linking extensive user profiles to a set of protocols attached
directly to the content, we were able to define
the parameters of access through social and cultural values,
while also embedding the possibility for
change within the system. This system worked very well for this
one local community as they set out to
manage their digital cultural heritage through their own
knowledge and relationship systems. But in order
to meet the needs of multiple communities around the world
50. who had a similar need but divergent sets of
protocols and management frameworks, we looked to create a
software platform that was adaptable
enough to manage these heterogeneous systems without losing
the flexibility and specificity of the
protocol-driven needs.
2886 Kimberly Christen International Journal of
Communication 6(2012)
Scaling up the original system meant creating an adaptable,
features-based platform that would
allow any community to define and redefine their own access
and circulation protocols based on their own
cultural norms and priorities. Using interviews, face-to-face
meetings, and case studies, we produced a set
of community-driven narratives defined as “users stories” that
drove our development.
11
Table 1. User Story Narratives for Community Agile
Development of Mukurtu CMS.
51. As a . . . I want to . . . So that . . .
Tribal administrator Define my own cultural protocols for the
content uploaded into the archive
The content I upload is linked to
parameters for access by members
of the community, such as gender,
clan, family group, elder, etc.
Tribal administrator Link cultural protocols to groups in the
community
Content that I upload is accessible
by only the tribal members who
have the matching user profile tags
Tribal administrator Set up parameters for access to content
in the archive
When individuals enter information
about themselves, it matches with
cultural protocols
Tribal administrator Define access parameters for various
52. types of users and groups
When I assign someone a status
such as “tribal member,” it is clear
what permissions they have
Tribal administrator Set up pages for individual tribal
member in each of the families of the
tribe
Each person can have a
genealogical page where they can
upload information about
themselves and link content
Tribal administrator Set up “collections” Individual content can
be grouped
and viewed
Tribal administrator Set licensing options Each piece of content
or collection
is licensed either with traditional
copyright, Creative Commons
license, or a traditional license we
53. define
11
We used an “agile” software development method
(http://www.agile-process.org/) and adopted it to our
specific needs, reworking it as a “community agile development
model.” We defined this as a process of
designing, building, testing, implementation, and updating that
emphasizes active community participation
and feedback throughout the entire development period by
engaging in short, clearly defined “sprints” of
work.
http://www.agile-process.org/
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2887
These narratives form the basis for Mukurtu’s architecture. That
is, we began from a radically
different place than most content management systems or digital
archive solutions. Instead of assuming
that information wanted to or should be open, free, and
54. available to “anyone with an Internet connection,”
our development process emphasized the underlying sociality of
information and its reliance on, and
embeddedness within, ethical systems of relation and action in
which people negotiate the creation,
reproduction, and distribution of knowledge based on multiple
and interrelated factors and situations.
Beginning with the social life of information and the competing
or overlapping circulation routes in which it
moves, we sought to define and build a flexible tool whereby
users would not have to give up on or erase
their own knowledge systems in order to preserve, share, and
manage their cultural heritage materials.
At its core, Mukurtu CMS allows for and is driven by
relationships: community, individual,
familial, clan, ancestral, etc. That is, the system takes as its
philosophical and architectural starting points
the already-existing social systems and information circulation
routes of any given community. Mukurtu
CMS allows users—from small community archives to tribal
museums, to individual or family users—to
infuse their voices, their cultural concerns, and their notions of
sociality and historicity into the system.
55. For as Helen Nissenbuam points out in her exhaustive study of
privacy, “What people care most about is
not simply restricting the flow of information but ensuring that
it flows appropriately” (2010, p. 2).
Perhaps restriction is the wrong word. Instead of making any
type of access choice a negative, we might
look at choices about circulation models as reflecting the
diversity of peoples around the world—a diversity
not to be celebrated in and of itself, but to be acknowledged
within the spectrum of access models.
Copyright in the U.S. context has recently driven much of the
dialogue about access, use, and
“fair use.” Copyright is a particular social and legal solution to
a tension between content creators, content
consumers, and content distributers; it should not, however, be
the benchmark for how we understand
the range of possibilities for managing knowledge circulation
(Boyle, 2008, pp. 2–5). Mukurtu CMS takes
an agnostic view toward licensing that accounts for the diverse
legal and social needs of indigenous
communities globally as they manage and share their digital
cultural heritage and knowledge with third
parties. For any piece of content or collection, one can choose
between traditional copyright, Creative
56. Commons licenses, and our own traditional knowledge (TK)
licenses and labels for any materials to be
shared externally.
12
This is key. Mukurtu’s protocols function internally, within the
communities who use
Mukurtu based on their shared understandings of circulation.
“Shared” does not, however, mean without
deliberation or redefinition. Cultural protocols and practices are
always and everywhere provisional and
dynamic, not just within indigenous communities. Mukurtu
CMS allows communities (however defined) to
use protocols to decide on pathways for circulation within the
system. Importantly, though, the TK license
and label options within Mukurtu aim to answer the grassroots
calls of individuals and communities who
want to engage with a range of strategies to manage and
maintain their cultural materials as these
materials move out of their own communities to third parties.
We developed the TK licenses and labels as
a strategic solution to a very specific issue: the management of
already-existing and circulating digital
material, such as photographs, sound-recordings, films, and
manuscripts that embody or represent
57. traditional indigenous knowledge, cultures, and practices
(Anderson & Christen, in press).
12
See http://www.youtube.com/user/mukurtu?feature=watch for a
short introductory video:
“gather.create.share” about the TK licenses.
http://www.youtube.com/user/mukurtu?feature=watch
2888 Kimberly Christen International Journal of
Communication 6(2012)
Importantly, for a large portion of materials that are already in
the public domain or owned by
third parties, the TK label option takes the notion of fair use
and extends it to illustrate culturally specific
conditions of access and use for materials. In their 2011 book
Reclaiming Fair-Use, Patricia Aufderheide
and Peter Jaszi argue that fair-use offers an important
component for ameliorating the harsh exclusions of
copyright. It is precisely the built-in flexibility within the
concept that allows for multiple interpretations of
what constitutes fair-use to be developed. Further, they suggest
that fair-use must, by definition, retain
58. this flexibility, as social and cultural norms for what constitutes
“fair” change over time and are often
made in response to differently situated parties. The TK labels
situate community-determined
interpretations of what constitutes fair use at their core. They
are adaptable and aim to be an educational
and social “tag” informing people how materials should be used
properly. The labels function to provide
additional or missing information, and in doing so, they help
users to make a more informed decision
about the best and most appropriate way of using this material.
At every step, Mukurtu CMS aims to
integrate and promote not just a new way of archiving and
sharing cultural materials, but also a new way
of understanding the diverse modes of knowledge management
that exist globally, systems that promote
historically minded and culturally responsive technologies.
Slashdot <ending>
Clearly, Mukurtu CMS is not a DRM system in any sense.
Contrary to the remarks on Slashdot
that I quoted at the start of this article, the software neither
locks anything up, nor closes anyone out.
59. Mukurtu CMS provides software solutions that allow any
community to define their own access parameters
and protocols for sharing. These are all open, in the sense that
the platform allows anyone who sets up an
instance of Mukurtu CMS to constantly change, add, delete, and
update their protocols, categories, and
communities. In this way, the platform allows users—variously
defined and self identified—to customize
and adapt the system to their needs. Social networking sites are
championed merely because they allow
individual users to define who sees their posts or choose who
can interact with them. Those who celebrate
this functionality because it helps to ensure individual privacy
are nonetheless confounded when an
archiving and content management tool aimed at indigenous
peoples incorporates access permissions for
members of their own communities. The comments on Slashdot
make it clear that the technology was not
in question, but its application to specific communities:
Individuals can make choices, but collectives,
communities and groups are somehow suspicious.
Mukurtu CMS was created in response to a set of social,
cultural, and political tensions that
60. manifest in the dearth of digital tools for indigenous libraries,
archives, museums, and cultural centers.
While it provides a flexible, extensible, and uniform set of
technology tools, it does not produce or strive
for homogeneity. We recognize that indigenous perspectives on
managing, protecting, sharing, and
preserving cultural heritage materials and traditional knowledge
are anything but uniform (Burri-Nenova,
2008). While it is clear that Western intellectual property
regimes are hostile to and dismissive of
indigenous claims and worldviews, it is equally apparent that
recent digital tools aimed at sharing and
exchanging cultural information are also ill-equipped to deal
with the diverse social structures, cultural
protocols, and histories of exploitation and exclusion of
indigenous peoples globally (Anderson, 2010;
Carpenter, 2004; Coombe, 2009).
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2889
In recent debates about digital technologies, access to the pubic
61. domain, and privacy, there is a
false choice between content creation and passive use; between
open systems that promote democratic
participation and closed systems that encourage oppression;
between human beings as autonomous
authors or communities as homogenous creators. What these
arguments miss, when they move from a
discussion of corporate attempts to control consumers to a
consideration of smaller communities
attempting to maintain, preserve, and protect cultural heritage
materials, are the histories of exclusion
and the present contexts of marginalization of indigenous
peoples. We can recognize corporate greed in
the expansion of copyright law without dismissing indigenous
uses of access parameters and cultural
protocols for information management within, between, and
outside their dynamic and changing
communities. We can create both movements and tools that
allow for an expansive notion of openness
and access, but do so without sacrificing diversity or appealing
to universal goals and generalized needs.
Incorporating a wider range of ethical and cultural concerns into
our digital tools subverts the
62. narrow notions of information freedom and the cultural
commons that presently characterize our
discussion of the commons. Memes like “information wants to
be free” and general calls for “open access”
undo the social bearings of information circulation and deny
human agency. Shifting the focus away from
information as bits and bytes or commodified content,
indigenous cultural protocols and structures for
information circulation remind us that information neither wants
to be free nor wants to be open; human
beings must decide how we want to imagine the world of
knowledge-sharing and information management
in ways that are at once ethical and cognizant of the deep
histories of engagement and exclusion that
animate this terrain.
63. 2890 Kimberly Christen International Journal of
Communication 6(2012)
References
Anderson, J. (2010). Indigenous knowledge/traditional
knowledge and intellectual property. (Issues paper
for the Center for the Public Domain, Duke University).
Retrieved from
http://web.law.duke.edu/cspd/itkpaper
Anderson, J., & Christen, K. (in press). ‘Chuck a copyright on
it’: Dilemmas of digital return and the
possibilities for traditional knowledge licenses and labels.
Museum Anthropology Review. Special
Issue: Digital return: Indigenous knowledge and the circulation
of culture, K. Christen, J. Bell, &
64. M. Turin (Eds.).
Aufderheide, P., & Jaszi, P. (2011). Reclaiming fair-use: How
to put balance back in copyright. Chicago:
University of Chicago Press.
Barlow, J. P. (1994). Selling wine without bottles: The economy
of mind on the global net. Retrieved from
http://w2.eff.org/Misc/Publications/John_Perry_Barlow/HTML/i
dea_economy_article.html
BBC. (2008, January 29). Aboriginal archive offers new DRM.
BBC Online. Retrieved from
http://news.bbc.co.uk/2/hi/technology/7214240.stm
Boyle, J. (2002). Fencing off ideas: Enclosure and the
disappearance of the public domain. Daedalus,
131(2), 13–25.
Boyle, J. (2008). The public domain: Enclosing the commons of
the mind. New Haven, CT: Yale University
Press. Retrieved from
http://www.thepublicdomain.org/download
65. Boateng, B. (2005). Square pegs in round holes? Cultural
production, intellectual property frameworks
and discourses of power. In R. A. Ghosh (Ed,), CODE:
Collaborative ownership and the digital
economy (pp. 61–74). Cambridge, MA: MIT Press.
Brand, S. (1984). (Comments at the 1984 Hacker conference).
Retrieved from
http://www.rogerclarke.com/II/IWtbF.html
Burri-Nenova, M. (2008). The long tail of the rainbow serpent:
New technologies and the protection and
promotion of traditional cultural expressions. In C. Graber & M.
Burri-Nenova, (Eds.), Intellectual
property and traditional cultural expressions in a digital
environment (pp. 205–236). Cheltenham,
UK: Edward Elgar Press.
Carpenter, M. (2004). Intellectual property law and indigenous
peoples: Adapting copyright to the needs
of a global community. Yale Human Rights in Development
Law Journal, 7, 51–78.
Chander, A., & Sunder, M. (2004). The romance of the public
domain. California Law Review, 42, 1331–
66. 1374.
Christen, K. (2007). Following the nyinkka: Relations of respect
and obligations to act in the work of
aboriginal cultural centers. Museum Anthropology, 30(2), 101–
124.
http://web.law.duke.edu/cspd/itkpaper
http://w2.eff.org/Misc/Publications/John_Perry_Barlow/HTML/i
dea_economy_article.html
http://news.bbc.co.uk/2/hi/technology/7214240.stm
http://www.thepublicdomain.org/download
http://www.rogerclarke.com/II/IWtbF.html
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2891
Christen, K. (2008). Archival challenges and digital solutions in
aboriginal Australia. SAA Archaeological
Recorder, 8(2), 21–24.
Christen, K. (2009). Aboriginal business: Alliances in a remote
Australian town. Santa Fe, NM: School of
Advanced Research Press, Global Indigenous Politics Series.
Christen, K. (2011). Opening archives: Respectful repatriation.
American Archivist, 74, 185–210.
67. Coombe, R. (2009). The expanding purview of cultural
properties and their politics. Annual Review of Law
and Social Sciences, 5, 393–412.
Cohen, J. (2006). Copyright, commodification and culture:
Locating the public domain, in in the future of
the public domain. In L. Guibault & B. Hugenholtz, (Eds.), The
future of the public domain (pp.
121-166). The Hague: Klewar Law International.
Denning, D. (1990). Concerning hackers who break into
computer systems. Proceedings of the 13th
National Computer Security Conference, Washington, DC.
Dietrich, C., & Bell, J. (2011). Representing culture via agile
collaboration. In G. Styliaras, D.
Koukopoulos, & F. Lazarinis (Eds.), Handbook of research on
technologies and cultural heritage:
Applications and environments (pp. 207-222). Hershey, PA.
Digital Planet. (2011, February 22). (Radio show episode).
Retrieved from
http://www.bbc.co.uk/iplayer/episode/p00dt2rc/Digital_Planet_
68. 22_02_2011
Dommann, M. (2008). Lost in tradition? Reconsidering the
history of folklore and its legal protection since
1800. In C. Graber and M. Burri-Nenova, (Eds.), Intellectual
property and traditional cultural
expressions in a digital environment (pp. 3–16). Cheltenham,
UK: Edward Elger Press.
Gillespie, T. (2007). Wired shut: Copyright and the shape of
digital culture. Cambridge, MA: MIT Press.
Ginsburg, F. (2008). Rethinking the digital age. In P. Wilson &
M. Stewart (Eds.), Global indigenous
media (pp. 287–306). Durham, NC: Duke University Press.
Hennessy, K. (2009, April). Virtual repatriation and digital
cultural heritage: The ethics of managing online
collections. Anthropology News, 5–6.
Hunter,,J., Schroeter,,R., Koopman,,B., & Henderson, M.
(2004). Using the semantic grid to build bridges
between museums and indigenous communities, pp. 46–61.
Proceedings of the GGF11 Semantic
Grid Applications Workshop.Honolulu, HI.
69. Hyde, L. (2010). Common as air: Revolution, art and ownership.
New York: Farrar, Straus and Giroux.
Johnson, H. (2003). Graded access to sensitive materials at the
archive of the indigenous languages of
Latin America, pp. 176-178. Proceedings of the Joint
Conference on Digital Libraries, Houston,
TX.
http://www.bbc.co.uk/iplayer/episode/p00dt2rc/Digital_Planet_
22_02_2011
2892 Kimberly Christen International Journal of
Communication 6(2012)
Katz, J. (1997, April). The netizen: Birth of a digital nation.
Wired. Retrieved from
http://www.wired.com/wired/archive/5.04/netizen_pr.html
Leach, J. (2005). Modes of creativity and the register of
ownership. In R. Ghosh (Ed.), CODE:
Collaborative ownership and the digital economy (pp. 29–44).
Cambridge, MA: MIT Press.
70. Lessig, L. (2004) Free culture: How big media uses technology
and the law to lock down culture and
control creativity. New York: Penguin Books.
Myers, F. (2005). Some properties of culture and persons. In R.
Ghosh (Ed.), CODE: Collaborative
ownership and the digital economy (pp. 45–60). Cambridge,
MA: MIT Press.
Nissenbuam, H. (2010). Privacy in context: Technology, policy,
and the integrity of social life. Palo Alto,
CA: Stanford University Press.
Resta, P., Roy, L., De Montano, M. K., & Christal, M. (2002).
Digital repatriation: Virtual museum
partnerships with indigenous peoples (pp. 1482–1483).
Proceedings of the 2002 International
Conference on Computers in Education, Auckland, New
Zealand.
Samuelson, P. (2006a). Enriching discourse on public domains.
Duke Law Journal, 55, 783–834. UC
Berkeley Public Law Research Paper No. 925052.
Samuelson, P. (2006b). Challenges in mapping the public
71. domain. In L. Guibault and B. Hugenholtz,
(Eds.), The future of the public domain (pp. 7–21). The Hague:
Klewar Law International.
Scholar Works. (n.d.) Open access [email protected]
umassamhurst. Retrieved from
http://scholarworks.umass.edu/oa
Seeger, A. (2005). Who got left out of the property grab again:
Oral traditions, indigenous rights, and
valuable old knowledge. In R. Ghosh (Ed.), CODE:
Collaborative ownership and the digital
economy (pp. 75–84). Cambridge, MA: MIT Press.
Seltzer, W. (2008, January 11). Mukurtu contextual archiving:
Digital “restrictions” done right. Legal Tags
(blog post). Retrieved from
http://wendy.seltzer.org/blog/archives/2008/01/11/mukurtu-
contextual-archiving-digital-restrictions-done-right.html
Sherman, B., & Wiseman, L. (2006). Toward an indigenous
public domain? In L. Guibault and B.
Hugenholtz (Eds.), The future of the public domain (pp. 259–
277. The Hague: Klewar Law
72. International.
Slashdot. (n.d.) Aboriginal archive uses new DRM. Retrieved
from
http://yro.slashdot.org/story/08/01/29/2253239/Aboriginal-
Archive-Uses-New-DRM
Srinivasan, R., Boast, R., Becvar, K., & Enote, J. (2010).
Diverse knowledges and contact zones in the
digital museum. Science Technology and Human Values, 35(5),
735–768.
http://www.wired.com/wired/archive/5.04/netizen_pr.html
http://scholarworks.umass.edu/oa
http://wendy.seltzer.org/blog/archives/2008/01/11/mukurtu-
contextual-archiving-digital-restrictions-done-right.html
http://wendy.seltzer.org/blog/archives/2008/01/11/mukurtu-
contextual-archiving-digital-restrictions-done-right.html
http://yro.slashdot.org/story/08/01/29/2253239/Aboriginal -
Archive-Uses-New-DRM
International Journal of Communication 6 (2012) Does
Information Really Want to be Free? 2893
Thompson, B. (2008, January 28). Locking down open
computing. BBC Online. Retrieved from
http://news.bbc.co.uk/2/hi/technology/7212803.stm
73. Titherington, S. (2011, March 29). Click and Digital Planet
merge. BBC Online. Retrieved from
http://www.bbc.co.uk/blogs/theeditors/2011/03/click_and_digita
l_planet_merge.html
United Nations. (n.d.) Who are indigenous peoples? UN
Permanent Forum on Indigenous Issues. Retrieved
from
http://www.un.org/esa/socdev/unpfii/documents/5session_factsh
eet1.pdf
Vaidhyanathan, S. (2011). The googlization of everything and
why we should worry. Los Angeles:
University of California Press.
Verran, H., Christie, M., Anbins-King, B., van Weeren, T., &
Yunupingu, W. (2007). Designing digital
knowledge management tools with aboriginal Australians.
Digital Creativity, 18(3), 129–142.
Wendland, W. (2008). It’s a small world (after all): Some
reflections on intellectual property and
traditional cultural expressions. In C. Graber & M. Burri -
Nenova (Eds.), Intellectual property and
74. traditional cultural expressions in a digital environment (pp.
150–181). Cheltenham, UK: Edward
Elger Press.
http://news.bbc.co.uk/2/hi/technology/7212803.stm
http://www.bbc.co.uk/blogs/theeditors/2011/03/click_and_digita
l_planet_merge.html
http://www.un.org/esa/socdev/unpfii/documents/5session_factsh
eet1.pdf
Course Goal:
This course prepares
students from diverse scholarly and professional backgrounds to
investigate, analyze and critique the social,
political and cultural tensions surrounding contemporary
information practices.
Students will critically engage with the theoretical approaches,
ethical groundings, methodological
frameworks and technical skills utilized by information
professionals.
Course Objectives:
Upon completion of this course students will be able to:
1.Identify and analyze information-related problems of a
community or organization
75. 2.Frame and articulate information resources, services and
systems that can address the information-
related problems of a community or organization
3.Describe influences on individual and institutional
information practices
4.Assess the implications of a contemporary information issue
for an information organization
5.Apply knowledge of information technologies and resources
to a real world situation, taking into
account the perspectives of institutional and community
stakeholders
6.Articulate ideas and concepts in a variety of communication
modes including oral, written and
multimedia
7.Provide direction and feedback within a team or small group
setting
8.Synthesize scholarship from information studies and related
fields, along with media accounts
9.Apply knowledge from existing scholarship to real-world
information problems
10.Describe principles and ethics of the information professions
11.Critically evaluate the role of the information professions in
societies
76. 12.Describe the contributions of the information professions
13.Participate meaningfully in professional development
opportunities
Course Topics:
●Contemporary Theory
●Technology and Information Infrastructures
●Intellectual Property and Copyright
●Questioning Information Freedom
●Privacy
●Data and Bias
●Repair and Care Work
●Practicing Anti-Racism in Information Spaces
●Legacies of Colonialism in Libraries, Archives and Museums
●Library Labour Required and Recommended Reading: Material
from books, journals, videos,
podcasts and websites will constitute required reading. These
will be listed in the course learning
management system (i.e. Canvas) and will be available directly
through links or through Library
77. (e.g., electronic and/or print formats).
Topic Briefing
The major assignment is a Topic Briefing Paper on a topic of
your choice. Examples will be provided
on Canvas. A topic briefing document is a short, formatted
document, outlining the key issues and
literatures on a topic, in order to provide information for an
organization about making a decision,
moving forward with a policy, or creating a new program (for
example). Topic Briefings often present
findings from literature in an easily accessible way, using
graphics or images, and offer concise and
clear recommendations for an organization.
This assignment has 5 parts:
A.Topic Briefing Proposal:
You will submit a one-page proposal providing the following
required information: the topic selected;
at least 4 relevant references; your motivation for choosing the
topic; potential audience(s); initial
ideas concerning how you will explore the topic; and
B.Topic Briefing Draft:
You will submit a full draft of the Topic Briefing
78. C.Topic Briefing Peer Feedback:
You will provide peer reviews of 2 of your colleagues Topic
Briefing Drafts.
D.Topic Briefing Final:
This is the final 4 page professionally formatted version of your
topic briefing. This must have at
least 10 references.
E.Topic Briefing Pitch:
You will submit a slide deck of 3 slides maximum and present a
2 minute “pitch” of your Topic Briefing.