Skip to main content

Home/ Net 308/508 Internet Collaboration and Organisation S1 2012/ Group items tagged the individual

Rss Feed Group items tagged

Tamlin Dobrich

The More, The Wikier - 4 views

  •  
    Ball, P. (2007, February 27). The more, the wikier. Nature: International weekly journal of Science. Retrieved from http://www.nature.com The More, The Wikier is an article published on Nature: International Weekly Journal of Science, which explores the secret behind the quality of Wikipedia entries when anyone, anywhere has the ability to write and edit content. The article looks at three groups of researchers who "claim to have untangled the process by which many Wikipedia entries achieve their impressive accuracy". Wikipedia is an organisation in which users collaborate their knowledge to create an encyclopedia of information. "The percentage of edits made by the Wikipedia 'élite' of administrators" is steadily declining and "Wikipedia is now dominated by users who are much more numerous than the elite but individually less active." "The wisdom of the crowds" principle suggests that the combined knowledge of a large and diverse group is superior to the knowledge of a few experts. Ball explains that content accuracy and quality of Wikipedia articles is related to a high number of edits by a large number of users. For example, articles that deal with very topical issues receive a higher level of attention from a large and diverse audience and therefore are of higher quality than articles that are not as topical and thus do not attract the same attention. The three research groups referenced in the article are: Dennis Wilkinson and Bernardo Huberman of Hewlett Packard's research laboratories who studied how a high number of edits by a large number of users create the 'best' Wikipedia articles, Aniket Kittur of the University of California, and co-workers who explored how the Wiki community has evolved from a small governing group to a democracy, and Ofer Arazy and colleagues at the University of Alberta who discuss the importance of this diversification of Wikipedia contributors to the overall success of its articles.
  • ...1 more comment...
  •  
    I found the article, The More, the Wikier, useful to the topic I am studying, which is Wikipedia and how James Surowiecki's 'the wisdom of crowds' theory (Surowiecki, 2004) relates to it. The research Philip Ball refers to, suggests that the best Wikipedia articles are those with a large number of edits by a large number of contributors (Ball, 2007, para. 2). This supports 'the wisdom of crowds' theory which basically rests on the idea that if more people are involved in a project, the results will be stronger (Surowiecki, 2004, p. 5). The article also states that, not only is it important to have a large number of contributors to achieve good results, the contributors should come from a wide range of demographics (Ball, 2007, para. 14). Roy Rosenzweig, the author of one of the resources I chose, Can History be Open Source? Wikipedia and the Future of the Past, and Farhad Manjoo, the author of Is Wikipedia a Victim of Its Own Success? another article that Tamlin Dobrich uploaded to this Diigo group, both support this claim also. Rosenzweig and Manjoo write about the bias in the types of Wikipedia contributors there are (the majority are white, English-speaking, educated, Western males) which contribute to some topics and views being missed (Rosenzweig, 2006, p. 128; Manjoo, 2009, para. 9). While this article does discuss some important points about Wikipedia and 'the wisdom of crowds' (Surowiecki, 2004) which are important to the topic I am studying, I think this resource would be more valuable if Ball had included more examples to support the statements he makes, in order to further bolster his arguments. References Ball, P. (2007, February 27). The More, the Wikier. Nature. doi: 10.1038/news070226-6 Manjoo, F. (2009, September 28). Is Wikipedia a Victim of Its Own Success?. Time. Retrieved from http://www.time.com/time/magazine/ar
  •  
    This article takes a look at the crowd sourcing idea that Wikipedia thrives on. 'Lots of edits by lots of people'. Crowd sourcing makes use of the knowledge of crowds. The more people you have contributing information to an article the more information the article will contain. This is however affected when fewer people begin to contribute to the writing and collaboration process. A person contributing to the Wikipedia page may only be making a change as small as a simple grammatical correction but it means quite a lot to the overall aesthetic of the page. People are far less likely to believe the information presented by an article filled with errors and punctuation problems. It might seem like a small issue but this is how many hands make light work. Wikipedia's reliability comes from its ability to be edited by many people with small alterations. It is strange however that in your other article regarding Wikipedia being its own worst enemy you have points made there of why Wikipedia is leaning towards extinction. These mainly are concerned with the decreasing number of people editing. So is Wikipedia going to stay strong or will it slowly become just another encyclopedia?
  •  
    Ball's article highlights the successful nature of Wikipedia's open source network and how quality of information is achieved. He suggests that the 'secret' to Wikipedia's credibility is the increasing number of contributors and the 'diversification' it brings to the platform through collective knowledge (Ball, 2007). I can relate Ball's article to Surowiecki's (2004) article Wisdom of the Crowds because it reinforces the notion that people must be unrelated, independent, and have diversity of mind from one another to form good opinions. The architecture of the collaborative platform Wikipedia harnesses the 'power of the crowds' in such a way that encourages diverse participation, as opposed to a group-think scenario, and thus produces 'wisdom' through quality information (Surowiecki, 2004, p5). Ball observes that Wikipedia's structure allows for an above average quality of information on more topical articles. This occurs because popular topics create more traffic, which in turn enables more contributors to edit an article and therefore creating more 'diverse' and 'reliable' information (Ball, 2007). This reinforces the quality of an article through diversification and mass collaboration. This notion of 'quality' can be applied to the Kony 2012 campaign page on Wikipedia (http://en.wikipedia.org/wiki/Kony_2012), which has been edited over 500 times and has been viewed 1,227,982 times since 6 March 2012, when the Kony 2012 campaign was first launched (Wikipedia Article Page Statistics, 2012). However, it is at this point that the similarities between Ball and Surowiecki cease. According to Ball, the Kony 2012 Wikipedia article is a prime example of a topical issue. The statistics reinforce his observations about Wikipedia's crowds and how they are able to create credible and reliable information due to diversification brought into the article by 1,227,98
Jarrad Long

The Wisdom of Crowds - 26 views

This Wikipedia article presents a summary of the 2004 book of the same name by New York Journalist James Surowiecki. Initially it explains Surowiecki's ideas about how crowd intelligence works and ...

Net308_508 Collaboration organisation kony 2012 social media wise crowd wisdom of the crowds

Jocelyn Workman

http://www.cs.colorado.edu/~palen/vieweg_1700_chi2010.pdf - 1 views

  •  
    Vieweg, S., Hughes, A., Starbird, K & Palen, L. (2010). Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. Retrieved 15 March 2012 from http://www.cs.colorado.edu/~palen/vieweg_1700_chi2010.pdf Individuals affected by the emergency events of the Red River Floods and the Oklahoma Grassfires in North America during the Spring of 2009, posted information about their respective situations via the microblogging service, Twitter. In this study, the authors analyse "situational update" information tweeted by individuals experiencing these hazards 'on the ground' to see how these people used the tweets to inform and develop an awareness of the current situation within their community. Twitter is seen as a commonly used social tool increasingly used for emergency communications "because of its growing ubiquity, communication rapidity, and cross platform accessibility", and are "a place for "harvesting" information during a crisis event to determine what is happening on the ground". From the analysis of collected data, coding was allocated by geo-location, location referencing and situational update information. Findings indicated Tweeters broadcasted similar types of information in both emergency situations, and tweets of high Tweeterers during emergencies were 'content rich' and displayed 'big picture situational awareness', with retweets indicating important updates. This study confirms how individuals facing a crisis rely on social media for their own safety and use the tool for altruistic purposes by providing current awareness of the crisis. In addition, the authors developed a Microblog-Enhanced Situational Features for Emergency outline of information categories for use in emergency response. They suggest this outline be used to assist with the development of system s
  •  
    This article relates to the article by Sutton (2010) because it talks about how micro-blogging in the time of disasters is one of the easiest ways for individuals to retrieve, produce and spread information through social networking sites such as Twitter. Sutton (2010) states that Twitter can bring people together in disasters which not only prompts micro-blogging but also can involve micro-volunteering as well. Online communities such as Twitter are decentralized which brings about self-organization and mobilization of information. The two articles are linked in that they both discuss how micro-blogging during disasters is about how information such as warnings, evacuations and peoples locations is shared online by different individuals in the community. Both articles had images implemented to show the readers where the location was that they were discussing as well as graphs to compare the data that is being focused. This made it very reliable to the topic and the range of references also showed how different perspectives were used in this research. I found the article relevant in showing how Twitter had an impact in disaster management and how micro-blogging can actually make a huge effect on how people communicate during a crisis. The graphs and images in the article were very useful because that provided evidence which complemented the text. The article is very valuable for this project because it shows how Twitter is evolving from being used for just a social medium to disaster management. References: Sutton, N. J. (2010). Twittering Tennessee: Distributed Networks and Collaboration Following a Technological Disaster. Proceedings of the 7th International ISCRAM Conference. Retrieved from http://www.jeannettesutton.com/uploads/Twittering_Tennessee_FINAL.pdf (Accessed 16/03/2012)
Stephen R

Online Activism - 14 views

My topic of choice is the Anonymous activist group who's activities are often, but not exclusively, enacted online. The online activism by Anonymous is similar to the online activism described in Y...

Net308_508 collaboration organisation crowds china kony 2012 online activism

Jocelyn Workman

http://www.usip.org/files/resources/SR252%20-%20Crowdsourcing%20Crisis%20Information%20... - 1 views

  •  
    You Tube Need to Know | Crisis mappers: Mobile technology helps disaster victims worldwide | Uploaded by PBS . Retrieved 20 March 2012 http://www.youtube.com/​watch?v=xW7Vt5iunWE This YouTube presentation tells the story of how crisis mapping came to be a source of critical and timely support to Haitians requiring aid following the 2010 devastating earthquake. It is a remarkable example of resourcefulness, voluntary collaboration and use of social media to assist with the humanitarian aid response. The video includes a live interview with, Patrick Meier, head of Ushahidi, a not-for-profit organisation, who explains that within hours of the news of the quake reaching the world, he knew that it would be a real challenge to get information from people on the ground in Haiti. Based on the Haitians high mobile ownership (85%) he worked out that texting a message would be the best way to find out who needed help. He arranged for a local phone company to provide a number for emergency texts. The number is advertised on the radio as 90% of the population has radio access. A call was put out on Facebook to locate volunteers who could translate messages from Haitian Kreyol to English. These messages are then forwarded to Boston where a voluntary group of students plot the location on an online map. The online location is then forwarded to the US response group coordinating the distribution of aid. Within hours help is sent. I came across this video when sourcing materials and was impressed with the professional presentation, the inclusion of a Haitian recipients experience of receiving aid after texting the number he heard on the radio, and interviews with major stakeholders. Further searches of Patrick Meier verified the story. Crisis mapping was also used during the Libyan crisis to bring aid to victims. Crisis locations were extracted from posts for help on Facebook and Twitter and plotted by volunteers
  •  
    (My commentary is actually against the PDF that's linked to, rather than the YouTube video. Reference at the end). This report, commissioned by the United States Institute of Peace, examines the role of Ushahidi, a crisis-mapping platform, in the relief effort following the 2010 earthquake in Haiti. It highlights the ability of crowd-sourcing to provide a more reliable account of what's happening in a disaster situation than traditional intelligence gathering means which don't engage the local population. It begins by describing the challenge that rescuers faced when sourcing their intelligence from media reports, which tended to focus on isolated incidents of violence, wrongly spreading the idea that violence was commonplace and leading the rescue teams to delay their rescue efforts. The report accuses the media of deliberately producing exaggerated reports, which may be true, but even the most ethical journalist can only report on what he or she experiences - if he or she sees or hears about a violent incident, the resulting report will almost certainly give the impression of violence. For the most objective and detailed picture of the state of a crowd, the largest possible portion of that crowd needs to have a voice - something an individual journalist could never facilitate. That's where Ushahidi proved a valuable tool. By aggregating SMS messages, email and social media communications from those in distress, it allowed rescuers to direct assistance appropriately. In addition to crowd-sourcing the conditions of those in distress, Ushahidi also incorporated other forms of crowd-sourcing - maps were sourced from the World Bank, Yahoo!, GeoEye and the U.S. government to provide geographic information, and staffing power was provided by a vast team of volunteers. This gives the case study a lot of depth. Heinzelman, J. and Waters, C. (2010) Crowdsourcing Crisis Information in Disaster-Affected Haiti Retrieved 2 April 2012 from http://www.us
Stephen R

Anonymous: serious threat or mere annoyance? - 5 views

  •  
    Steve Mansfield-Devine, editor of Network Security, analyses the threat of the Anonymous activist hacking group. In doing so he discusses the collaborative tools used to organise the members of Anonymous into a focussed effort. The tools discussed include the Low Orbit Ion Cannnon (LOIC) and various spinoffs, Internet Relay Chat (IRC) and Twitter. Mansfield-Devine's discusses the Anonymous group's usage of the LOIC as a Distributed Denial of Service (DDoS) weapon. Mansfield-Devine makes a clear point that only with enough users is the LOIC effective, making the effective usage of the LOIC a collaborative operation. The more users collaborating with the tool, the more effective it becomes. Mansfield-Devine discusses how Anonymous members are coerced into participating in an LOIC attack, specifying IRC and Twitter as the main forms of mobilisation of members. His discussion highlights IRC as a primary form of organisation, with Twitter being taking a more secondary role in directing potential participants into IRC channels. Mansfield-Devine does note that Twitter became an integral part of Anonymous organisation when their domain names were taken offline by authorities during Anonymous operations. Tweets were sent out to redirect the Anonymous participants into new IRC chat rooms to continue the attack. Overall, this article concisely covers IRC, Twitter and LOIC based aspects of Anonymous collaboration and organisation. Mansfield-Devine, Steve. 2011. "Anonymous: Serious threat or mere annoyance?" Network Security 1: 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S1353-4858(11)70004-6
  •  
    In this article Mansfield-Devine explores the threat of the organisation Anonymous and the collaborative tools they use to organise the group. In relation to this, he specifies that Anonymous uses "Low Orbit Ion Cannnon (LOIC) and various versions, Internet Relay Chat (IRC) and Twitter" as his key tools for facilitating organised attacks on institutions (Mansfield-Devine, 2011, p. 4). This article links to the article 'Kony 2012: The Template for Effective Crowdsourcing?' by Olubunmi Emenanjo, on more than one level, they are both about outside organisations against institutions, and they both undeniably rely on social media and the power of the crowds for the mobilization and facilitation of their actions and recruitment (Emenanjo, 2012). The success of the Kony 2012 campaign and Anonymous's attacks can be pin-pointed to how the organisations are aimed at a particular audience, reinforced by social media platforms, and most importantly how they harnessed networking tools to deliver their messages. However a major difference between the two groups is that the Kony 2012 organisation has a consistent online identity, while Anonymous has anonymity. Little is known about the organisation itself but the tools they utilise (LOIC, IRC, and Twitter) lead us so assume that their audiences engage with the organisation. References Emenanjo, O. (2012). Kony 2012: The Template for Effective Crowdsourcing? Communia. Retrieved from http://stipcommunia.wordpress.com/2012/03/13/kony-2012-the-template-for-effective-crowdsourcing/ Mansfield-Devine. (2011). Anonymous: Serious threat or mere annoyance?. Network Security, 1, 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S13534858(11)70004-6
  •  
    Although much of this article is not particularly useful to my focus on Anonymous, this article still raises some interesting notes. The way in which the author plays down the impact of Anonymous' actions towards the end of this article is of particular interest. The author often refers to the disorganized nature of the Anonymous movement, and suggests frequently that although a number of individuals may be involved, automated 'botnets' are often more effective than Anonymous members (Mansfield-Devine, 2011). For my focus, this is the most important part of the article because of the way in which the author neglects to take note of Anonymous members who do more than simply use LOIC and other DDoS attacks. Although it may be true that Anonymous DDoS attacks may not result in significant, long term damage to their targets, the disruption caused by such attacks can often provide enough distraction for Anonymous hacktivists to retrieve data from said targets. With hacktivist groups within movements such as Anonymous being responsible for the largest amount of stolen data in 2011 (AFP, 2012), Anonymous DDoS attacks could pave the way for much more damage to be done to websites than the temporary service disruptions noted by the author of this article. Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046 AFP. (2012). 'Hacktivists' biggest data thieves in 2011: Verizon. Retrieved from http://au.news.yahoo.com/thewest/a/-/world/13242086/hacktivists-biggest-data-thieves-in-2011-verizon/
samara hartnett

Public Radio's Social Media Experiments: Risk, Opportunity, Challenge - 4 views

  •  
    I have centered my approach to the main theme of Mobile Phones and Crowd Sourcing on both the Radio and Retail industries. With the acknowledgment that Mobile Phones, Crowd Sourcing and Social Media are all connected through the creation and distribution of information, this article further explores the individual adoptions or resistance to associated practices relating to the main theme. The article 'Public Radios Social Media Experiments' (Levenshus, 2007) proves itself very useful in its ability to pin point relevant conclusions regarding the role of the audience, the nature of online communities, the use of associated tools and reasons of reluctance towards industry integration. Although this article responds directly to Radio the points of analysis can also be applied to the Retail industry. These conclusions referred to the transformation of listeners/consumers into potential sources of information and the ability of audiences/consumers to contribute and reveal an unexpected wealth of knowledge. It is here that the connection to information obtained by crowd sourcing on social media platforms is supported and the seamless integrated of mobile devices into this process could be assumed. The article also surmises that social media and crowd sourcing strategies are essential to the future of public broadcasting. This should also be considered with reference to Retail. There are explanations as to why resistance to social media opportunities may occur. For example, resistance is due to the lack of knowledge, resource allocation and institutional culture (Levenshus, 2007). But above all the article describes online communities as organic, dynamic and having lives of their own (2007), giving us a valuable base with which to analyse the role of mobile devices in sourcing information. The provisions of such analytical conclusions help to develop a better understanding of the overall affects to industries such as Radio and Retail as they reconsider busi
  •  
    Thanks for the heads up Dean - the link loads fine in a new tab for me... Have I done something wrong in my post do you think?
  •  
    I have been a big fan of listening to podcasts for years from http://www.abc.net.au/radionational/ . I subscribe to them in Facebook. So I have seen how they have slowly improved how they engage with the public. So your example I think is a good one for an industry that previously just has synchronous communication and now because of Social Media has A Synchronous to leverage its value. What has happened for radio has good lessons for those business owners that think business has got tougher. Radio previously had an audience/users that was "out there" and many other businesses have an audience that is "in here." Regardless of how the audience/client is connected/contacted then this touch point can be leveraged and value added by social media. The Curtin University Gym has users that are "in here" and whilst people are in the gym using the equipment they can see TV's that include advertisements for Physiotherapy etc. This is a basic form of social media interaction, The user arrives and the TV delivers. The Gym also has a Facebook page that they seek to have users or all of Curtin University to like. Maybe they also make use of Flickr and other social mediums that all adds up to adding value to the business through indirect advertising and awareness creation. So the point I am trying to make is that if you have "in here" users then you ought to connect with them whilst they are in the gym with as much social media as is acceptable. Can the Endomodo App be given a Curtin University Brand/Logo so that the many users can utilise? If not then the Curtin Gym can make use of Endomodo Groups so that the elderly classes can better network and collaborate etc. The more connected a business is with its client base then the more value it can deliver to them and the more revenue that business can collect from advertisers in the case of a radio station. A supply busines
ianzed

Making the News: Movement Organisations, Media attention and the public agenda - 18 views

This article very loosely relates to my focus on Anonymous. Although not particularly relevant to my focus, it does provide a decent contextual setting for explaining why Anonymous receives so much...

Net308_508 collaboration community Crowd participatory

Stephen R

Pastebin: How a popular code-sharing site became a hacker hangout - 2 views

  •  
    Matt Brian, mobile editor for The Next Web, discusses the popularity of pastebin.com among hacking (or perhaps more accurately 'cracking') groups. Brain notes that Pastebin is a tool originally designed for collaboratively editing code, but has since gained popularity among malicious security crackers as a method of releasing stolen data to the public. While there are numerous spinoffs of the simple text-sharing concept, pastebin.com remains the most popular. Searching the pastebin.com website for 'anonymous' or their (now disbanded and arrested) spinoff group 'Lulzsec' reveals a considerable level of Pastebin usage by Anonymous. Manifestos and anouncment seem to be a popular use of Pastebin by Anonymous. For example searching '#opegypt' reveals a list of sites taken down by Anonymous - perhaps it was collaboratively updated while the operation took place? The Anonymous group link to Pastebin.com pastes (or other equivalent websites) through blogs and twitter accounts associated with the Anonymous movement. Brain notes its utility in escaping the 140 character limitation of twitter, whilst still retaining anonymity with minimum fuss. If illegal material was posted on Anonymous blogs such as anonops.blogspot.com, youranonnews.tumblr.com or anonnews.org it would likely violate terms of service and result in blogs being closed. Pastebin.com therefore, provides a suitably nebulous zone for posting illegal content. Brain makes extensive note of the use of Pastebin.com to release sensitive, stolen information to the web. Although the hacking groups mentioned are not always directly related to Anonymous, it highlights the usage of Pastebin.com as a tool for sharing information. Hacker groups could potentially be working on releases or manifestos collaboratively with their peers, although this in not discernible in the final Pastebin product. Brian, Matt. 2011, June 5. "Pastebin: How a popular code-sharing site became the ultimate hacker hangout." The Next Web: Social M
  •  
    This article provides an interesting (if somewhat brief) account of the Anonymous movement, and associated (as well as un-associated) hacktivist networks, using a relatively simple internet tool and altering the intended usage to suit the purposes of the movement. The article focuses mainly on the usage of Pastebin by an offshoot of the Anonymous movement called LulzSec, and how the group was able to use Pastebin to greatly aid their hacktivism efforts (Brian, 2011). Although now disbanded and with most of its members arrested (Apps, 2012), LulzSec very successfully utilised Pastebin for various leaks and links to their efforts of retrieving data from a number of high-profile organizations. This article touches on another example of the confrontational tactics for raising media awareness outlined by Andrews and Caren (2010), and thus the two articles may provide relevant references for discussions relating to the reactions to hacktivist groups such as LulzSec, as well as providing information regarding another tool used by such movements. In terms of my focus on the Anonymous movement, the article may not provide a direct reference to the divides between individuals within the movement based on motivation for activities under the Anonymous movement. The article does however provide a relevant secondary source for additional discussion relating to the way in which particular offshoots of the Anonymous movement operate. Andrews, K., & N. Caren. (2010) Making the News: Movement Organisations, Media Attention, and the Public Agenda. Retrieved from http://proquest.umi.com.dbgw.lis.curtin.edu.au/pqdweb?did=2527572391&sid=1&Fmt=6&clientId=22212&RQT=309&VName=PQD Apps, P. (2012). LulzSec Arrests Hurt Hacker Groups, Anonymous Movement Hard To Kill. Reuters. Retrieved from http://www.huffingtonpost.com/2012/03/08/lulzsec-arrests-anonymous_n_1331982.html Brian, M. (July 5th, 2011). Pastebin: How a popular code-sharing site became the ultimate hacker hangout. Retrieved fr
Jocelyn Workman

Distributed Networks and Collaboration Following a Technological Disaster - 13 views

Sutton's article discusses the use of Twitter following a technological disaster on 22 December 2008 at the Tennessee Valley Authority's (TVA) Kingston Fossil Plant where a coal waste containment p...

Net308_508 collaboration social media technology twitter community mobilization Wikipedia recovery crisis disaster management organisation microvolunteering

Oliver Hennessey

Relax: Twitter's New Censorship Policy Is Actually Good for Activists - 6 views

  •  
    Catone, J. (2012). Relax: Twitter's New Censorship Policy Is Actually Good for Activists. Mashable. Retrieved March 23, 2012 from http://mashable.com/2012/01/27/twitter-censorship-activism/ This news article from the online news site Mashable takes a look at the announcement that Twitter will now censor tweets on a country-by-country basis, and argues that this is actually a good thing for online activists. This is contrary to the widespread backlash that has been made against Twitter with users pledging to boycott the service over its new censorship rules. The author points out that Twitter has always been subject to takedown requests, and that this was on a global scale so that if a tweet or user was removed it had to be done for everyone in the world. The author believes it is a lot better that "now, Twitter can remove that tweet in that country, but allow the world to see it". His rationale is that everyone outside of the offending country can still see the tweets, and that if Twitter were to refuse a takedown notice from an oppressive regime it could have its service totally blocked for all users in that country. The fact that Twitter has pledged to increase its transparency in dealing with takedown notices strengthens his argument. I agree with the author on this and find this an especially useful resource as it provides links to circumvent Twitter's technology in an effort to get around censors, and arguments that this new change could even allow the message of censored activists to be more powerful.
  • ...2 more comments...
  •  
    Listen to how people can create thousands of unique Twitter accounts to manipulate the messages on Twitter http://www.abc.net.au/radionational/programs/backgroundbriefing/dont-trust-the-web/3725726 Therefore Twitter needs some rules.
  •  
    This article discusses Twitter's announcement that they can "censor tweets on a country-by-country basis" (Catone, 2012). This policy change initially received backlash online, as users did not understand how beneficial this could be for some activists. In comparison to other articles shared in the project, this news report is not of as great a value, however, it is still relevant to the topic and highlights the importance of sharing information with the world, rather than a local community. The significance of censoring on a country-by-country basis is that when a tweet or user is blocked in a specific country, like Egypt, people outside of Egypt can still view the blocked user and their tweets (Catone, 2012). Prior to the policy change, a censored user or tweet was blocked worldwide, meaning that people can still communicate with the rest of the world (Catone, 2012). This change is of great importance to political activists in many countries like Egypt, Libya and Tunisia, because it means that they can continue to update other nations of the latest circumstances and events. During the Arab Revolution, people captured photos and video footage, not just to show to their local community, but also to provide credible evidence to the outside world (Beaumont, 2011). Clearly, this highlights Twitter's support for protestors in developing or struggling nations, as they have provided an outlet for activists to reach and inform a wider audience. While this article was not as useful as others, it is relevant to the topic and appears to be a reliable source. It, quite simply, demonstrates the importance of being heard in an online environment. Reference: Beaumont, P. (2011, February 25). The Truth about Twitter, Facebook and the Uprisings in the Arab World. The Guardian. Retrieved April 9, 2012, from http://www.guardian.co.uk/world/2011/feb/25/twitter-facebook-uprisings-arab-libya?INTCMP=ILCNETTXT3487
  •  
    This article is of relevance to my chosen topic (the Anonymous online activism group) as it deals with Twitter and the way oppressive governments seek to deal with it's collaborative and organisational power. Mansfield-Devine (2011) discusses how Anonymous use Twitter heavily as a method of collaboration during their activism operations. Though the article says otherwise, if Twitter's censorship were to inhibit this kind of collaboration this could affect the way in which Anonymous organises itself. The reliability of the source is reasonable. Mashable may be a somewhat sensationalist online news website at times, but this article in particular has many links within allowing one to see the sources behind various claims. The article is of considerable relevance to the topic of online movements as it deals with threats to online activism. Twitter itself is subject to pressure to silence of voices of dissension in certain rendering Twitter less useful for activism purposes. I found the article somewhat useful. It highlights that Twitter impervious to control and censorship. It also highlights that Twitter is a powerful tool for organising uprisings and political movements. This article is quite valuable to the overall collaborative resource development project as it is reasonably reliable, deals with the collaborative potential of Twitter and highlights some of the threats to online movements. Mansfield-Devine, Steve. 2011. "Anonymous: Serious threat or mere annoyance?" Network Security 1: 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S1353-4858(11)70004-6
  •  
    Prior to reading this article, I had not been aware of Twitter's new censorship policy related to each individual country. After reading the title of the article, I failed to see how censorship on Twitter could possibly be considered to be a good thing for activists so I was interested to see the writer's arguments. I definitely agree that Twitter's opting to censor certain tweets is the more desirable outcome than a whole country be denied access to the site. Twitter's approach to censorship, something that they don't seem to be able to avoid on some level, has been handled in the best way possible given the circumstances. I believe that transparency of the 'take down requests' has real potential to alleviate some of the frustration users may feel when they notice that something that was there yesterday is suddenly gone today. This method of publically displaying the reason why something has been removed seems to work well for YouTube in similar censorship cases, particularly in relation to copyright cease and desist claims.
Jocelyn Workman

IGI Global: Fire, Wind and Water: Social Networks in Natural Disasters - 0 views

  •  
    Freeman, M. (2011). Fire, Wind and Water: Social Networks in Natural Disasters. Journal of Cases on Information Technology,13 (2), p.69 -79. A study of the increasing adoption of social networking tools (SNTs) as a channel for critical communication during disasters in Australia, is the platform used by the author to look into how society is accepting the use of SNTs as a whole for emergency management. Using recent natural disasters, the use of SNT's is traced from their limited use during the Victorian Bushfires in 2009 to their increased use and the reliance on SNTs by authorities and individuals, during the Queensland Floods of 2010/2011 and Tropical Cyclone Yasi in 2011 (February). During the fires of 2009, Twitter was used by the ABC radio station 774 Melbourne to provide as much coverage of the fires as possible. Followers increased from 250 to 1200 indicating the popularity of this form of communication, and offering an sight for future use. Two years later, the Queensland Police Service used Twitter and Facebook extensively to broadcast accurate information to those affected by the floods and correct misinformation. The same tactics were employed for Tropical Cyclone Yasi. Technologies are discussed as a medium of communication for accurate and timely information during disasters and for the sharing of knowledge, increasingly coming from the bottom up, but also utilised appropriately from the top down when required. Although this article was easy to understand, the author's discussion of the disasters and technologies, the extensive discussion of qualitative research, followed by a presentation of the case, lead to a repetition of information about the disasters. A more succinct and structured presentation of the results of this triangulated approach to research would have made it easier to appreciate the benefits of SNTs to communities.
Stephen R

Anatomy of an Anonymous Attack - 1 views

  •  
    This article, recently published by security firm Imperva, investigates how an Anonymous attack is mounted. A Particularly interesting point is that this article makes no mention of IRC channels, instead painting Facebook, Twitter and Youtube channels as the main methods of communication for Anonymous. Also interesting is that such communication is referred to as recruitment, recruitment of technically savvy hackers and not so technically savvy activists who are willing to participate in the attack. Particular attention should be paid to pages 6-8 which outline the recruitment activities over Facebook, Youtube and Twitter. Imperva outline the technical methods used to stage the attack, mentioning that there are 10 -15 'Anons' working to analyse the victim website for security vulnerabilities. These are more experienced hackers who are searching for a vulnerability that might allow them to retrieve private data from the victim (p.6). Although not mentioned in this article, perhaps these experienced hackers collaborate using Internet Relay Chat. When no vulnerability was found, Imperva notes that Anonymous instead tries a DDoS attack, but instead of employing the LOIC, a web based version is used for ease of participation (p.13). This way, users of any device can be recruited (through social media) into participate in the attack with minimum of barriers to entry. Although this article focusses heavily on the technical aspect of the attack, a significant portion of the article deals with the recruitment of participant through social media, alongside discussion of the online variant of the LOIC collaborative Denial of Service tool. Anatomy of an Anonymous Attack. 2012. Imperva. http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
  •  
    This document may prove to be quite a significant additional reference to my focus of my chosen topic of the Anonymous movement and hacktivism. This article discusses precisely what Mansfield-Devine (2011) neglected to note; that within the Anonymous movement, there are a number of individuals with significant hacking skills who are able to retrieve valuable data from the targets of Anonymous attacks. The article quite thoroughly deconstructs the order in which Anonymous attacks typically occur, the differences between the two major types of individuals who participate, and circumstances under which Anonymous attacks are generally able to be successfully performed (2012). Of particular interest, is the emphasis placed on the importance of acknowledging the fact that Anonymous attacks are not always as harmless as they may appear. Another interesting note is found within the conclusion of the report. The report suggests that targeted, small-scale data retrieval attacks are the preferred means of attack for the Anonymous movement and that "DDoS is the hacker's last resort" (Anatomy of an Anonymous Attack, 2012). This would suggest that unlike many sources of information regarding Anonymous hacktivism attacks, Imperva has identified the serious nature of many incidents involving the Anonymous movement, which do not necessarily receive as much immediate attention as a simple DDoS attack may. Anatomy of an Anonymous Attack. (2012). Imperva. Retrieved from http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046
Emily Lloyd

Resource 2: Digital Maoism by Jaron Lanier - 0 views

  •  
    Digital Maoism, by self-confessed ranter Jaron Lanier, provides an alternative (and quite contentious) view on collaboration and the way it is used in Wikipedia. Unlike Reagle Jr, who suggests that collaboration can be successful with the correct cultural infrastructure (Reagle Jr, 2011, para. 103), Lanier argues that the best way to achieve successful collaboration on the web is to always cherish the individual over the collective (Lanier, 2006, para. 68). He expresses his frustration with the inaccuracies of his own Wikipedia page and speaks about the work of collaborative communities (or as he calls it, collectives) on wikis more generally, with disgust (Lanier, 2006, para. 33). Lanier argues that, "[h]istory has shown us again and again that a hive-mind is a cruel idiot when it runs on autopilot. Nasty hive mind outbursts have been flavoured Maoist, Fascist and religious, and these are only a small sampling" and that, "[i]f wikis are to gain any more influence they ought to be improved by mechanisms like the ones they have worked tolerably well in the pre-Internet world" (Lanier, 2006, para. 65). Lanier's essay is an interesting resource to view when thinking about collaboration and 'the wisdom of crowds' theory (Surowiecki, 2004, p. 5), and how this applies to Wikipedia. Lanier, a computer scientist and regular writer on the topic of computers and Internet-based technologies, portrays a controversial viewpoint that differs from much other writing on the topic. While I don't agree with most of Lanier's outspoken views which are often unsubstantiated, I think that there is some merit in the suggestion that there needs to be at least one individual, (as well as the correct infrastructure, as other theorists suggest), to guide the work in collaborative organisations. I also think this resource is useful as it is so far removed from other writing on this topic, which often glorifies the collective, allowing you to think about the topic in another way.
  •  
    References Lanier, J. (2006). Digital Maoism. Retrieved from http://edge.org/3rd_culture/lanier06/lanier06_index.html Reagle Jr, J.M. (2011). Good Faith Collaboration. In J.M. Reagle Jr, Good Faith Collaboration: Culture of Wikipedia (Online Edition, Chapter 3). Cambridge, MA: The MIT Press. Retrieved from http://reagle.org/joseph/2010/gfc/chapter-3.html Surowiecki, J. (2004). The wisdom of crowds: Why the many are smarter than the few. New York, NY: Doubleday.
  •  
    Digital Maoism is a rumination on the direction of online collaboration. Lanier examines this from a self reflexive viewpoint which begins with an examination of his own self as constructed by users on Wikipedia. In doing this he looks at online collaboration not through the empirical standpoint of participation, but the deeper reflection of having been 'produced' by it. The inconsistencies in the online record of his life introduce his perspective of measured criticism toward collaborative networks which increasingly attempt to function as overarching meta-narratives. Larnier's tone is personal, his perspective artistic rather than academic, he relates his arguments in language which brings it to life, "it's important to not lose sight of values just because the question of whether a collective can be smart or not is so fascinating. Accuracy in a text is not enough. A desirable text is more than a collection of accurate references. It is also an expression of personality." Seeing in Emily's introduction that Larnier was a "self-confessed ranter", I was a little concerned as to how balanced the article would be. He is a bit of ranter, but such is his passion for the subject, and I would say that it is a fair and insightful critique on online collaboration. Larnier's main thrust is reaffirming the importance of the individual as conscious participants within networks of online collaboration: aware of their own value as part of a diverse group rather than drones in a 'hive'. The relevance of this essay is its recognition that online collaboration is not smart merely by aggregation, that users must be empowered in their own beliefs for the group to benefit from the multiplication of which.
michelangelo magasic

BitTorrent Etiquette: How To Avoid Getting Banned From Private Trackers - 3 views

  •  
    Torrent etiquette is more than just good manners, it is a tool by which bittorrent sites promote collaboration and organisation between users. Torrent etiquette has many faces, it is frequently a formal mechanism such as seeding ratios needed to stay on site or the instructions of Admin on discussion boards, yet it is also something which users proliferate themselves purely through the course of interaction. Etiquette allows bittorrent communities to solidify user collaboration. There are 1,090,000 results for 'torrent etiquette' on google, this page presents one net user's guide to the subject. That bittorrent has evolved to the point of having a widely understood etiquette says something: strangers need just a very basic framework to be able to come and work together collaboratively. Before, people would download individually, now, with a little guidance a group of people from all over the world, with different intents, schedules and backgrounds can work as a coherent entity, each individual not only gaining his or her needs but contributing to the needs of the group. Aside from some specific information on ratios and multiple accounts, Brooks' advice is very simple, "If someone uploads something you happen to like, click the thanks button. If there's a forum, say hi. If a tracker has a list of requests to fill then see how you can help out." Etiquette provides boundaries to the crowd and by looking closely at its form we see that its is very close to the ethics we live by in day to day life. Thus, we realise the power the internet has in connecting people and concatenating the work of individuals into that of an organisation. References Brookes, T. (2010). Torrent Etiquette: How to avoid getting banned from private trackers . Retrieved 20th March from http://www.makeuseof.com/tag/bittorrent-etiquette-avoid-banned-private-trackers/.
  •  
    This page, rather than looking mostly at rules like my articles, also addresses etiquette, at least for private torrent trackers. Although some of the etiquette described could be applied to public torrent trackers, it is mostly relevant only to the more exclusive private torrent trackers. Rather than this being a weakness of this page for the subject, it is useful to note that fair use and courtesy by people using BitTorrent is much more likely to happen in smaller communities, and doesn't necessarily apply to BitTorrent as a whole. The collaboration that occurs through BitTorrent becomes more like collaboration when it is governed by these kinds of social interactions between users in the same private community. This page mentions ways which users can help out other individuals, for example by looking at someone's list of requests, or hitting a "thanks" button on someone's torrent. These seem much more specifically collaborative interactions than what occurs through the actual BitTorrent downloading process, where everything is automatic. Overall this is an interesting page, but I would suggest keeping in mind that the etiquette described doesn't apply directly to all BitTorrent activity. Many users going through public torrent trackers likely don't feel any kind of reason to observe any of this etiquette and will share what the protocols of BitTorrent make them share.
  •  
    Like the many articles that I looked at a few weeks ago, Brookes gives us a brief introduction into how private tracking helps to create mechanisms for interaction and how these websites promote a good social etiquette and overall community for users. He shows a similar opinion to many others in that people do not require much in order to feel part of a community. According to Brookes, the introduction of communities to the bit torrent world, has taken away the more individualistic downloader. Through the private trackers it has seen these collaborative communities sprout up and instead of individuals selfishly downloading for themselves they are now working and contributing for others and are helping the whole group function. His overall belief that the etiquette element of these communities is key and that if they are to function properly, that each person should be willing to help out when required. As I mentioned, many of the other articles that I reviewed, for example Incentives in Bit Torrent Induce Free Riding (2005) written by Jun, S., Ahamad are of a similar opinion that private trackers are improving the communal and collaborative features of bit torrent and have made it something that people are encouraged and enticed to participate in.
Jocelyn Workman

Social Media and Disasters: Current Uses, Future Options, and Policy Considerations - 17 views

This CRS (Congressional Research Service) Report for Congress by Lindsay, provides an organisational perspective of how social media have been and might be used to improve emergency response and re...

Net308_508 Twitter social media community collaboration Wikipedia Crowd

Victoria Jobling

The Revolutions Were Tweeted: Information Flows during the 2011 Tunisian and Egyptian R... - 4 views

  •  
    Lotan, G., Graeff, E., Ananny, M., Gaffney, D., Pearce, I., & boyd, d. (2011). The Revolutions Were Tweeted: Information Flows during the 2011 Tunisian and Egyptian Revolutions. International Journal of Communications, 5, 1375-1405. Retrieved March 24, 2012, from http://ijoc.org/ojs/index.php/ijoc/article/view/1246/643 This article investigates how information was disseminated via Twitter during the Tunisian and Egyptian revolutions. It is clear that there were advantages in relying upon Twitter and social media during this time, because these sites provided real-time updates that mainstream media could not convey, due to the limitations of the platform, or censorship (Grossman, 2009; p.1399). The use of hashtags or key words assisted in the organisation of information, such as #sidibouzid and #Tunisia (p. 1376; p. 1395). However, the constant and rapid flow of content made it difficult to determine what is false and what is legitimate information - Twitter's strength and weakness in this situation. It is essential to understand how information can be organised and filtered through the positions of 'actor types' (classification of users in this study), making this article valuable to the study of political protests. There were many different actors mentioned but the most important contributors to the dissemination of content were journalists, bloggers, and activists. These actors had a tendency to retweet information from the same actor type or amongst the three aforementioned categories, to essentially create a sense of reliable organisation to the Twitter chaos (p. 1393). The study also concluded that individuals, rather than organisations, were considered more reliable during the uprising (p. 1398). This appears to demonstrate the scepticism associated with mainstream media in a society that no longer wishes to be talked 'at', but rather invo
  •  
    This article relates my topic in its discussion of Twitter usage in online activism. The online activist group Anonymous (my topic of choice) also performed activist activities surrounding Egypt and Tunisia. Much of Anonymous' activities were organised through the use of Twitter making this article quite relevant. As suggested in the article, Anonymous did appear to have certain high powered actors who highlighted information of particular relevance to the operations, affecting the flow of information through the Twitter network. The article is published in a peer-reviewed journal making it a highly reliable source. It is also quite recent, written in 2011, which is a huge asset given the rate at which social networking technology progresses. The article is also perfectly relevant to the discussion of Twitter usage in political protests. The way that information flows and is determined critical or irrelevant through various actors' retweets is an important topic. I found the article quite useful as the topic is closely related to the online activism performed by the Anonymous group. This article contributes a great deal of value to this collaborative resource development project on a whole, as it is a reliable source, is very recent and it is highly relevant, dealing with Twitter as a collaboration and organisation tool.
owen_davies

BitTorrents and Family Guy: teenage peer group interactions around a peer-to-peer Inter... - 22 views

This particular paper looks into the bit torrent community while focusing on the popular American Cartoon-Comedy Family Guy. The article looks into how bit torrent is able to make downloading and s...

Net308_508 Crowd bittorrent

Tamlin Dobrich

Kony 2012: The Template for Effective Crowdsourcing? - 25 views

A very interesting article that I believe presents a good basic understanding of the topic however being a Wordpress blog I would argue that it may not be a perfectly reliable or an unbiased source...

Net308_508 collaboration Crowd social media kony 2012 crowdsouced interventions

Victoria Jobling

Digital Prefigurative Participation: The Entwinement of Online Communication and Offlin... - 0 views

  •  
    Mercea, D. (2012). Digital Prefigurative Participation: The Entwinement of Online Communication and Offline Participation in Protest Events. New Media and Society, 14(1), 153-169. Retrieved March 25, 2012, from Sage Journals Database. http://nms.sagepub.com.dbgw.lis.curtin.edu.au/content/14/1/153.full.pdf+html In this article, the authors aim to identify the use of computer-mediated communication prior to two offline protests, to determine the role and impact it plays on participants. Social media evidently played a strong role in the recent Arab uprising, but unlike the environmental protests studied in this article, there was a widespread urgency for change influencing the use of online resources. The study included FanFest, an environmental festival supporting change in Romania, and Camp for Climate Change, a traditional and direct style protest involving damage to property and blockades, in the UK (p.158-159). FanFest was considered a low-risk event, and Climate Camp was deemed a high-risk event (p.158), due to the level of activism involved. This article is valuable as it determines a correlation between individuals not associated with any activist organizations and their involvement preceding offline events. The idea that potential activists are more likely to attend low-risk events was reinforced, as a large percentage of people who attended FanFest fit this category (p.159-160). The online organization of the festival attracted new participants, as people were able to discuss the event online and collaborate, by offering suggestions to improve future festivals (p.163). The event aimed to engage the public in environmentalism, rather than demand change, like Climate Camp. This enabled people to freely discuss ideas online, without needing to meet in person. This contrasts with Climate Camp, as many participants d
  •  
    In this article Mercea (2011, p. 155) observes how computer-mediated-communications are contributing to "participation in protest events run by social movement organisations". He aims to study specifically what role online communication plays in the relationship between online and offline environments in relation to activism. This article ties in well with the Kony 2012 campaign I am currently observing and has strong links to an article I read called 'Online Activism' by Guobin Yang. In the two cases Mercea presents, the power of the crowds mediated through computer-communication allows online activism to occur (Yang, 2009, pp. 33). Through interactions on Web 2.0 outlets, Social Movement Organisations have become a force for social change (Mercea, 2012, p.156). Mercea and Yang both agree on the idea that organisations that utilise Web 2.0 platforms are more successful at harnessing crowds, and in doing so promote discussions, real life meeting points, and ultimately plan towards a groups next step in action. The Invisible Children organisation is classified as a 'Social Organisation Movement' and is a prime example of how computer-mediated-communication combined with Web 2.0 platforms facilitates participation. Interactions on Web 2.0 outlets have allowed the Invisible Children's Kony 2012 campaign to become a force for social change. The Kony 2012 campaign reinforces Mercea's observation that interactions online can encourage activism to cross over into the offline environment. The Invisible Children's action plan, focused for April 20th 2012 dubbed 'Cover the Night', enables audiences to actively become involved with the campaign offline while engaging with it online. The success of the Invisible Children's campaign can be pin-pointed to how it was aimed at a particular audience, reinforced by social media platforms, and most importantly how it has harnessed Web 2.0 tools to deliver the mission of the Kony 2012 campaign, to make J
1 - 20 of 22 Next ›
Showing 20 items per page