Skip to main content

Home/ Net 308/508 Internet Collaboration and Organisation S1 2012/ Group items tagged 2012

Rss Feed Group items tagged

Tamlin Dobrich

Kony 2012: The Template for Effective Crowdsourcing? - 25 views

A very interesting article that I believe presents a good basic understanding of the topic however being a Wordpress blog I would argue that it may not be a perfectly reliable or an unbiased source...

Net308_508 collaboration Crowd social media kony 2012 crowdsouced interventions

Stephen R

Anonymous: serious threat or mere annoyance? - 5 views

  •  
    Steve Mansfield-Devine, editor of Network Security, analyses the threat of the Anonymous activist hacking group. In doing so he discusses the collaborative tools used to organise the members of Anonymous into a focussed effort. The tools discussed include the Low Orbit Ion Cannnon (LOIC) and various spinoffs, Internet Relay Chat (IRC) and Twitter. Mansfield-Devine's discusses the Anonymous group's usage of the LOIC as a Distributed Denial of Service (DDoS) weapon. Mansfield-Devine makes a clear point that only with enough users is the LOIC effective, making the effective usage of the LOIC a collaborative operation. The more users collaborating with the tool, the more effective it becomes. Mansfield-Devine discusses how Anonymous members are coerced into participating in an LOIC attack, specifying IRC and Twitter as the main forms of mobilisation of members. His discussion highlights IRC as a primary form of organisation, with Twitter being taking a more secondary role in directing potential participants into IRC channels. Mansfield-Devine does note that Twitter became an integral part of Anonymous organisation when their domain names were taken offline by authorities during Anonymous operations. Tweets were sent out to redirect the Anonymous participants into new IRC chat rooms to continue the attack. Overall, this article concisely covers IRC, Twitter and LOIC based aspects of Anonymous collaboration and organisation. Mansfield-Devine, Steve. 2011. "Anonymous: Serious threat or mere annoyance?" Network Security 1: 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S1353-4858(11)70004-6
  •  
    In this article Mansfield-Devine explores the threat of the organisation Anonymous and the collaborative tools they use to organise the group. In relation to this, he specifies that Anonymous uses "Low Orbit Ion Cannnon (LOIC) and various versions, Internet Relay Chat (IRC) and Twitter" as his key tools for facilitating organised attacks on institutions (Mansfield-Devine, 2011, p. 4). This article links to the article 'Kony 2012: The Template for Effective Crowdsourcing?' by Olubunmi Emenanjo, on more than one level, they are both about outside organisations against institutions, and they both undeniably rely on social media and the power of the crowds for the mobilization and facilitation of their actions and recruitment (Emenanjo, 2012). The success of the Kony 2012 campaign and Anonymous's attacks can be pin-pointed to how the organisations are aimed at a particular audience, reinforced by social media platforms, and most importantly how they harnessed networking tools to deliver their messages. However a major difference between the two groups is that the Kony 2012 organisation has a consistent online identity, while Anonymous has anonymity. Little is known about the organisation itself but the tools they utilise (LOIC, IRC, and Twitter) lead us so assume that their audiences engage with the organisation. References Emenanjo, O. (2012). Kony 2012: The Template for Effective Crowdsourcing? Communia. Retrieved from http://stipcommunia.wordpress.com/2012/03/13/kony-2012-the-template-for-effective-crowdsourcing/ Mansfield-Devine. (2011). Anonymous: Serious threat or mere annoyance?. Network Security, 1, 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S13534858(11)70004-6
  •  
    Although much of this article is not particularly useful to my focus on Anonymous, this article still raises some interesting notes. The way in which the author plays down the impact of Anonymous' actions towards the end of this article is of particular interest. The author often refers to the disorganized nature of the Anonymous movement, and suggests frequently that although a number of individuals may be involved, automated 'botnets' are often more effective than Anonymous members (Mansfield-Devine, 2011). For my focus, this is the most important part of the article because of the way in which the author neglects to take note of Anonymous members who do more than simply use LOIC and other DDoS attacks. Although it may be true that Anonymous DDoS attacks may not result in significant, long term damage to their targets, the disruption caused by such attacks can often provide enough distraction for Anonymous hacktivists to retrieve data from said targets. With hacktivist groups within movements such as Anonymous being responsible for the largest amount of stolen data in 2011 (AFP, 2012), Anonymous DDoS attacks could pave the way for much more damage to be done to websites than the temporary service disruptions noted by the author of this article. Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046 AFP. (2012). 'Hacktivists' biggest data thieves in 2011: Verizon. Retrieved from http://au.news.yahoo.com/thewest/a/-/world/13242086/hacktivists-biggest-data-thieves-in-2011-verizon/
ianzed

Making the News: Movement Organisations, Media attention and the public agenda - 18 views

This article very loosely relates to my focus on Anonymous. Although not particularly relevant to my focus, it does provide a decent contextual setting for explaining why Anonymous receives so much...

Net308_508 collaboration community Crowd participatory

Jarrad Long

The Wisdom of Crowds - 26 views

This Wikipedia article presents a summary of the 2004 book of the same name by New York Journalist James Surowiecki. Initially it explains Surowiecki's ideas about how crowd intelligence works and ...

Net308_508 Collaboration organisation kony 2012 social media wise crowd wisdom of the crowds

Victoria Jobling

Digital Prefigurative Participation: The Entwinement of Online Communication and Offlin... - 0 views

  •  
    Mercea, D. (2012). Digital Prefigurative Participation: The Entwinement of Online Communication and Offline Participation in Protest Events. New Media and Society, 14(1), 153-169. Retrieved March 25, 2012, from Sage Journals Database. http://nms.sagepub.com.dbgw.lis.curtin.edu.au/content/14/1/153.full.pdf+html In this article, the authors aim to identify the use of computer-mediated communication prior to two offline protests, to determine the role and impact it plays on participants. Social media evidently played a strong role in the recent Arab uprising, but unlike the environmental protests studied in this article, there was a widespread urgency for change influencing the use of online resources. The study included FanFest, an environmental festival supporting change in Romania, and Camp for Climate Change, a traditional and direct style protest involving damage to property and blockades, in the UK (p.158-159). FanFest was considered a low-risk event, and Climate Camp was deemed a high-risk event (p.158), due to the level of activism involved. This article is valuable as it determines a correlation between individuals not associated with any activist organizations and their involvement preceding offline events. The idea that potential activists are more likely to attend low-risk events was reinforced, as a large percentage of people who attended FanFest fit this category (p.159-160). The online organization of the festival attracted new participants, as people were able to discuss the event online and collaborate, by offering suggestions to improve future festivals (p.163). The event aimed to engage the public in environmentalism, rather than demand change, like Climate Camp. This enabled people to freely discuss ideas online, without needing to meet in person. This contrasts with Climate Camp, as many participants d
  •  
    In this article Mercea (2011, p. 155) observes how computer-mediated-communications are contributing to "participation in protest events run by social movement organisations". He aims to study specifically what role online communication plays in the relationship between online and offline environments in relation to activism. This article ties in well with the Kony 2012 campaign I am currently observing and has strong links to an article I read called 'Online Activism' by Guobin Yang. In the two cases Mercea presents, the power of the crowds mediated through computer-communication allows online activism to occur (Yang, 2009, pp. 33). Through interactions on Web 2.0 outlets, Social Movement Organisations have become a force for social change (Mercea, 2012, p.156). Mercea and Yang both agree on the idea that organisations that utilise Web 2.0 platforms are more successful at harnessing crowds, and in doing so promote discussions, real life meeting points, and ultimately plan towards a groups next step in action. The Invisible Children organisation is classified as a 'Social Organisation Movement' and is a prime example of how computer-mediated-communication combined with Web 2.0 platforms facilitates participation. Interactions on Web 2.0 outlets have allowed the Invisible Children's Kony 2012 campaign to become a force for social change. The Kony 2012 campaign reinforces Mercea's observation that interactions online can encourage activism to cross over into the offline environment. The Invisible Children's action plan, focused for April 20th 2012 dubbed 'Cover the Night', enables audiences to actively become involved with the campaign offline while engaging with it online. The success of the Invisible Children's campaign can be pin-pointed to how it was aimed at a particular audience, reinforced by social media platforms, and most importantly how it has harnessed Web 2.0 tools to deliver the mission of the Kony 2012 campaign, to make J
Tamlin Dobrich

The More, The Wikier - 4 views

  •  
    Ball, P. (2007, February 27). The more, the wikier. Nature: International weekly journal of Science. Retrieved from http://www.nature.com The More, The Wikier is an article published on Nature: International Weekly Journal of Science, which explores the secret behind the quality of Wikipedia entries when anyone, anywhere has the ability to write and edit content. The article looks at three groups of researchers who "claim to have untangled the process by which many Wikipedia entries achieve their impressive accuracy". Wikipedia is an organisation in which users collaborate their knowledge to create an encyclopedia of information. "The percentage of edits made by the Wikipedia 'élite' of administrators" is steadily declining and "Wikipedia is now dominated by users who are much more numerous than the elite but individually less active." "The wisdom of the crowds" principle suggests that the combined knowledge of a large and diverse group is superior to the knowledge of a few experts. Ball explains that content accuracy and quality of Wikipedia articles is related to a high number of edits by a large number of users. For example, articles that deal with very topical issues receive a higher level of attention from a large and diverse audience and therefore are of higher quality than articles that are not as topical and thus do not attract the same attention. The three research groups referenced in the article are: Dennis Wilkinson and Bernardo Huberman of Hewlett Packard's research laboratories who studied how a high number of edits by a large number of users create the 'best' Wikipedia articles, Aniket Kittur of the University of California, and co-workers who explored how the Wiki community has evolved from a small governing group to a democracy, and Ofer Arazy and colleagues at the University of Alberta who discuss the importance of this diversification of Wikipedia contributors to the overall success of its articles.
  • ...1 more comment...
  •  
    I found the article, The More, the Wikier, useful to the topic I am studying, which is Wikipedia and how James Surowiecki's 'the wisdom of crowds' theory (Surowiecki, 2004) relates to it. The research Philip Ball refers to, suggests that the best Wikipedia articles are those with a large number of edits by a large number of contributors (Ball, 2007, para. 2). This supports 'the wisdom of crowds' theory which basically rests on the idea that if more people are involved in a project, the results will be stronger (Surowiecki, 2004, p. 5). The article also states that, not only is it important to have a large number of contributors to achieve good results, the contributors should come from a wide range of demographics (Ball, 2007, para. 14). Roy Rosenzweig, the author of one of the resources I chose, Can History be Open Source? Wikipedia and the Future of the Past, and Farhad Manjoo, the author of Is Wikipedia a Victim of Its Own Success? another article that Tamlin Dobrich uploaded to this Diigo group, both support this claim also. Rosenzweig and Manjoo write about the bias in the types of Wikipedia contributors there are (the majority are white, English-speaking, educated, Western males) which contribute to some topics and views being missed (Rosenzweig, 2006, p. 128; Manjoo, 2009, para. 9). While this article does discuss some important points about Wikipedia and 'the wisdom of crowds' (Surowiecki, 2004) which are important to the topic I am studying, I think this resource would be more valuable if Ball had included more examples to support the statements he makes, in order to further bolster his arguments. References Ball, P. (2007, February 27). The More, the Wikier. Nature. doi: 10.1038/news070226-6 Manjoo, F. (2009, September 28). Is Wikipedia a Victim of Its Own Success?. Time. Retrieved from http://www.time.com/time/magazine/ar
  •  
    This article takes a look at the crowd sourcing idea that Wikipedia thrives on. 'Lots of edits by lots of people'. Crowd sourcing makes use of the knowledge of crowds. The more people you have contributing information to an article the more information the article will contain. This is however affected when fewer people begin to contribute to the writing and collaboration process. A person contributing to the Wikipedia page may only be making a change as small as a simple grammatical correction but it means quite a lot to the overall aesthetic of the page. People are far less likely to believe the information presented by an article filled with errors and punctuation problems. It might seem like a small issue but this is how many hands make light work. Wikipedia's reliability comes from its ability to be edited by many people with small alterations. It is strange however that in your other article regarding Wikipedia being its own worst enemy you have points made there of why Wikipedia is leaning towards extinction. These mainly are concerned with the decreasing number of people editing. So is Wikipedia going to stay strong or will it slowly become just another encyclopedia?
  •  
    Ball's article highlights the successful nature of Wikipedia's open source network and how quality of information is achieved. He suggests that the 'secret' to Wikipedia's credibility is the increasing number of contributors and the 'diversification' it brings to the platform through collective knowledge (Ball, 2007). I can relate Ball's article to Surowiecki's (2004) article Wisdom of the Crowds because it reinforces the notion that people must be unrelated, independent, and have diversity of mind from one another to form good opinions. The architecture of the collaborative platform Wikipedia harnesses the 'power of the crowds' in such a way that encourages diverse participation, as opposed to a group-think scenario, and thus produces 'wisdom' through quality information (Surowiecki, 2004, p5). Ball observes that Wikipedia's structure allows for an above average quality of information on more topical articles. This occurs because popular topics create more traffic, which in turn enables more contributors to edit an article and therefore creating more 'diverse' and 'reliable' information (Ball, 2007). This reinforces the quality of an article through diversification and mass collaboration. This notion of 'quality' can be applied to the Kony 2012 campaign page on Wikipedia (http://en.wikipedia.org/wiki/Kony_2012), which has been edited over 500 times and has been viewed 1,227,982 times since 6 March 2012, when the Kony 2012 campaign was first launched (Wikipedia Article Page Statistics, 2012). However, it is at this point that the similarities between Ball and Surowiecki cease. According to Ball, the Kony 2012 Wikipedia article is a prime example of a topical issue. The statistics reinforce his observations about Wikipedia's crowds and how they are able to create credible and reliable information due to diversification brought into the article by 1,227,98
Stephen R

Online Activism - 14 views

My topic of choice is the Anonymous activist group who's activities are often, but not exclusively, enacted online. The online activism by Anonymous is similar to the online activism described in Y...

Net308_508 collaboration organisation crowds china kony 2012 online activism

Oliver Hennessey

Relax: Twitter's New Censorship Policy Is Actually Good for Activists - 6 views

  •  
    Catone, J. (2012). Relax: Twitter's New Censorship Policy Is Actually Good for Activists. Mashable. Retrieved March 23, 2012 from http://mashable.com/2012/01/27/twitter-censorship-activism/ This news article from the online news site Mashable takes a look at the announcement that Twitter will now censor tweets on a country-by-country basis, and argues that this is actually a good thing for online activists. This is contrary to the widespread backlash that has been made against Twitter with users pledging to boycott the service over its new censorship rules. The author points out that Twitter has always been subject to takedown requests, and that this was on a global scale so that if a tweet or user was removed it had to be done for everyone in the world. The author believes it is a lot better that "now, Twitter can remove that tweet in that country, but allow the world to see it". His rationale is that everyone outside of the offending country can still see the tweets, and that if Twitter were to refuse a takedown notice from an oppressive regime it could have its service totally blocked for all users in that country. The fact that Twitter has pledged to increase its transparency in dealing with takedown notices strengthens his argument. I agree with the author on this and find this an especially useful resource as it provides links to circumvent Twitter's technology in an effort to get around censors, and arguments that this new change could even allow the message of censored activists to be more powerful.
  • ...2 more comments...
  •  
    Listen to how people can create thousands of unique Twitter accounts to manipulate the messages on Twitter http://www.abc.net.au/radionational/programs/backgroundbriefing/dont-trust-the-web/3725726 Therefore Twitter needs some rules.
  •  
    This article discusses Twitter's announcement that they can "censor tweets on a country-by-country basis" (Catone, 2012). This policy change initially received backlash online, as users did not understand how beneficial this could be for some activists. In comparison to other articles shared in the project, this news report is not of as great a value, however, it is still relevant to the topic and highlights the importance of sharing information with the world, rather than a local community. The significance of censoring on a country-by-country basis is that when a tweet or user is blocked in a specific country, like Egypt, people outside of Egypt can still view the blocked user and their tweets (Catone, 2012). Prior to the policy change, a censored user or tweet was blocked worldwide, meaning that people can still communicate with the rest of the world (Catone, 2012). This change is of great importance to political activists in many countries like Egypt, Libya and Tunisia, because it means that they can continue to update other nations of the latest circumstances and events. During the Arab Revolution, people captured photos and video footage, not just to show to their local community, but also to provide credible evidence to the outside world (Beaumont, 2011). Clearly, this highlights Twitter's support for protestors in developing or struggling nations, as they have provided an outlet for activists to reach and inform a wider audience. While this article was not as useful as others, it is relevant to the topic and appears to be a reliable source. It, quite simply, demonstrates the importance of being heard in an online environment. Reference: Beaumont, P. (2011, February 25). The Truth about Twitter, Facebook and the Uprisings in the Arab World. The Guardian. Retrieved April 9, 2012, from http://www.guardian.co.uk/world/2011/feb/25/twitter-facebook-uprisings-arab-libya?INTCMP=ILCNETTXT3487
  •  
    This article is of relevance to my chosen topic (the Anonymous online activism group) as it deals with Twitter and the way oppressive governments seek to deal with it's collaborative and organisational power. Mansfield-Devine (2011) discusses how Anonymous use Twitter heavily as a method of collaboration during their activism operations. Though the article says otherwise, if Twitter's censorship were to inhibit this kind of collaboration this could affect the way in which Anonymous organises itself. The reliability of the source is reasonable. Mashable may be a somewhat sensationalist online news website at times, but this article in particular has many links within allowing one to see the sources behind various claims. The article is of considerable relevance to the topic of online movements as it deals with threats to online activism. Twitter itself is subject to pressure to silence of voices of dissension in certain rendering Twitter less useful for activism purposes. I found the article somewhat useful. It highlights that Twitter impervious to control and censorship. It also highlights that Twitter is a powerful tool for organising uprisings and political movements. This article is quite valuable to the overall collaborative resource development project as it is reasonably reliable, deals with the collaborative potential of Twitter and highlights some of the threats to online movements. Mansfield-Devine, Steve. 2011. "Anonymous: Serious threat or mere annoyance?" Network Security 1: 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S1353-4858(11)70004-6
  •  
    Prior to reading this article, I had not been aware of Twitter's new censorship policy related to each individual country. After reading the title of the article, I failed to see how censorship on Twitter could possibly be considered to be a good thing for activists so I was interested to see the writer's arguments. I definitely agree that Twitter's opting to censor certain tweets is the more desirable outcome than a whole country be denied access to the site. Twitter's approach to censorship, something that they don't seem to be able to avoid on some level, has been handled in the best way possible given the circumstances. I believe that transparency of the 'take down requests' has real potential to alleviate some of the frustration users may feel when they notice that something that was there yesterday is suddenly gone today. This method of publically displaying the reason why something has been removed seems to work well for YouTube in similar censorship cases, particularly in relation to copyright cease and desist claims.
Jocelyn Workman

Social Media and Disasters: Current Uses, Future Options, and Policy Considerations - 17 views

This CRS (Congressional Research Service) Report for Congress by Lindsay, provides an organisational perspective of how social media have been and might be used to improve emergency response and re...

Net308_508 Twitter social media community collaboration Wikipedia Crowd

Stephen R

Anatomy of an Anonymous Attack - 1 views

  •  
    This article, recently published by security firm Imperva, investigates how an Anonymous attack is mounted. A Particularly interesting point is that this article makes no mention of IRC channels, instead painting Facebook, Twitter and Youtube channels as the main methods of communication for Anonymous. Also interesting is that such communication is referred to as recruitment, recruitment of technically savvy hackers and not so technically savvy activists who are willing to participate in the attack. Particular attention should be paid to pages 6-8 which outline the recruitment activities over Facebook, Youtube and Twitter. Imperva outline the technical methods used to stage the attack, mentioning that there are 10 -15 'Anons' working to analyse the victim website for security vulnerabilities. These are more experienced hackers who are searching for a vulnerability that might allow them to retrieve private data from the victim (p.6). Although not mentioned in this article, perhaps these experienced hackers collaborate using Internet Relay Chat. When no vulnerability was found, Imperva notes that Anonymous instead tries a DDoS attack, but instead of employing the LOIC, a web based version is used for ease of participation (p.13). This way, users of any device can be recruited (through social media) into participate in the attack with minimum of barriers to entry. Although this article focusses heavily on the technical aspect of the attack, a significant portion of the article deals with the recruitment of participant through social media, alongside discussion of the online variant of the LOIC collaborative Denial of Service tool. Anatomy of an Anonymous Attack. 2012. Imperva. http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
  •  
    This document may prove to be quite a significant additional reference to my focus of my chosen topic of the Anonymous movement and hacktivism. This article discusses precisely what Mansfield-Devine (2011) neglected to note; that within the Anonymous movement, there are a number of individuals with significant hacking skills who are able to retrieve valuable data from the targets of Anonymous attacks. The article quite thoroughly deconstructs the order in which Anonymous attacks typically occur, the differences between the two major types of individuals who participate, and circumstances under which Anonymous attacks are generally able to be successfully performed (2012). Of particular interest, is the emphasis placed on the importance of acknowledging the fact that Anonymous attacks are not always as harmless as they may appear. Another interesting note is found within the conclusion of the report. The report suggests that targeted, small-scale data retrieval attacks are the preferred means of attack for the Anonymous movement and that "DDoS is the hacker's last resort" (Anatomy of an Anonymous Attack, 2012). This would suggest that unlike many sources of information regarding Anonymous hacktivism attacks, Imperva has identified the serious nature of many incidents involving the Anonymous movement, which do not necessarily receive as much immediate attention as a simple DDoS attack may. Anatomy of an Anonymous Attack. (2012). Imperva. Retrieved from http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046
Oliver Hennessey

Encouraging Political Participation in Africa: The Potential of Social Media Platforms - 0 views

  •  
    Chatora, A. (2012). Encouraging Political Participation in Africa: The Potential of Social Media Platforms. Institute for Security Studies. Retrieved March 22, 2012 from http://www.iss.co.za/uploads/15Mar2012SocialMedia.pdf This situation report is from the Institute for Security Studies (a pan-African applied policy research institute based in South Africa), and examines the role of social media in facilitating political participation. It uses as its catalyst the recent popular protests dubbed the 'Arab Spring' to explore the possibility of an 'African Spring' protest movement. The report includes case studies on several African countries highlighting difficulties faced by different countries utilising social media, which includes historical experiences, institutional arrangements and socioeconomic and political conditions. Of note are the actions taken in Cameroon where the government blocked the Twitter service for ten days during the Arab Spring protests for reasons of 'national security', and in Uganda when the 'walk-to-work' protests were successfully initiated by protest groups making use of social media such as Twitter, the government suspended the use of social networks causing 'walk-to-work' protests to lose their momentum. The report concludes that despite the severe challenges facing Africans in taking up social media, that ultimately "engaging with these platforms will allow citizens to circumvent the wide range of tactics used to stifle public opinion". I find this report to be a valuable resource as it explores the current environment, requirements, and limitations within Africa for movements to successfully incorporate social media such as Twitter into their political protests.
  •  
    This article discusses the potential for political protests in African nations, in light of the recent activism in Arab countries. I found this article beneficial, as it clearly highlights the profound difficulties that are faced in some African nations, and discusses elements that are not covered in other articles related to the topic. An element of particular importance was the consideration of historical context when investigating the potential for political activism, both online and offline. The widespread poverty and clear digital divide between some people in Africa, is of significance as many choose to engage in activities of survival, rather than that of political action (Chatora, 2012, p.4). Computer literacy skills and the willingness of people to disobey controlling governments must also be considered, as people in Angola have shown no signs of retreating from political discussion and the organization of protests online, compared to people in Cameroon and Zimbabwe who are facing various difficulties against repressive regimes (Chatora, 2012, p.9-10). The importance of historical context clearly resonates with the article I discussed - "Protest 2.0: Online Interactions and Aboriginal Activists." The Aboriginal activists were uncomfortable with using new technology, due to a lack of computer literacy, as well as, the evident interference it made with the historical context of communication in their culture, as visual storytelling is favoured over the written word used online (Petray, 2011, p.927). This article adds value to the discussion of political activism as it is of great relevance to the topic and appears to be a reliable source of information. Whilst it does comment on various elements not covered in other articles, it also highlights an area of significance regarding the uptake of social media in African nations - clearly implying that there will be future developments in this area of research. Reference: Petray, T.L. (20
Oliver Hennessey

Twitter bots target Tibetan protests - 1 views

  •  
    Krebs, B. (2012). Twitter bots target Tibetan protests. The Sydney Morning Herald. Retrieved on March 24, 2012 from http://www.smh.com.au/it-pro/security-it/twitter-bots-target-tibetan-protests-20120322-1vl5h.html This news article examines the emerging use of Twitter bots to hinder and thwart political protest. Twitter bots are automated Twitter accounts that auto-follow and send junk tweets that can jam up a Twitter feed. The news article covers the current political unrest in Tibet where dissidents are using the social media tool Twitter to protest their suppression under Chinese rule. Popular Tibetan hash tags used by the protesters are being targeted by these Twitter bots and effectively rendered useless as they are flooded with meaningless tweets. The author reports that this practice of online suppression was also put into use by pro-government forces during the disputed parliamentary elections in Russia last year, where anti-Kremlin tweets were diluted by the inundation of automated pro-government messages. This article shows the challenges being faced by political protesters using Twitter as its strength as a message platform is being subverted and used against them. It also highlights how governments can avoid taking the extreme action of shutting down Twitter in their country, and the negative backlash this would bring, and instead leaving it open for their own ends. And whilst the author notes that Twitter did crack down on the events in Russia, it remains to be seen what action, if any, will be taken in Tibet and what actions the protesters themselves can take to circumnavigate this threat.
  •  
    This article reveals an emergence of spam-bots and pro-governmental forces using social media to suppress political activism. It is ironic that this liberating technology that provides activists with an outlet to report, communicate and collaborate information, is being used against them to prevent further protesting. Clearly, this news report is of great value towards the discussion of political activism because most articles appear to discuss the way in which protesters have harnessed the web to their advantage. Yet, there is evidence to suggest that the government, or at least pro-governmental supporters, are using the same technology to interfere with events. Tibetan protestors were using Twitter as a tool in their stand against Chinese rule. It follows suit of the successful Arab Revolution, by organizing the dissemination of information and reports with the tags #tibet and #freetibet (Krebs, 2012). However, it took a turn for the worst when spam-bots started flooding these hashtags with meaningless information to break down the means of communication for protestors (Krebs, 2012). This shares similarities with the methods used by the Iranian government to spread misinformation to protestors, by manipulating the technology to their own advantage (Grossman, 2009). The authorities infiltration of Twitter appears to be an effortless solution to thwart political protest, rather than completely shutting down access to the Internet. Whilst this has the potential to endanger the lives of citizens, people are quick to recognize the difference between bots and genuine people, as other users were warned to be wary of new Twitter accounts spreading misinformation in Iran (Grossman, 2009). Clearly, this article is highly relevant to the topic and appears to be a reliable source. It discusses an aspect of political protesting that has had little to no coverage in the broader mainstream media and academic papers. Reference: Grossm
Dean Strautins

Internet Based Collaboration and Organisation in Education Institutions - 20 views

I will post not much to try to draw these papers to the top of the list in an attempt to attract comment as it now is listed as 85 of 86 posts.

Collaboration in Higher Education

Velia Torres

Open content systems achieve high quality - 10 views

The Wall Street Journal (2012). Open Source Code Quality On Par with Proprietary Code in 2011 Coverity Scan Report. Retrieved on March 18, 2012 from http://www.marketwatch.com/story/open-source-cod...

OpenSource Net308_508 community quality Linux WoC

started by Velia Torres on 24 Mar 12 no follow-up yet
Mitchell Houwen

A Decade Of Wikipedia, The Poster Child For Collaboration - 4 views

shared by Mitchell Houwen on 25 Mar 12 - No Cached
  •  
    The poster child of collaboration? A bold statement but is it that far off the truth? Every day Wikipedia helps people around the world find information that is both detailed and related to the topic they have searched. The modern internet is filled with incorrect and purposely misleading information that users can freely access. The user has no idea that the information they are receiving is incorrect so it is quite often trusted. Wikipedia's system of article moderators allows the information to be supplied by anyone but filtered by people considered to be well educated in that chosen field. This means that the information is not as random as other information available throughout World Wide Web. The progression in the Web 2.0 era has been at an exponential rate and Wikipedia has been at the fore front of the revolution as it allows users of the World Wide Web to contribute which is what separates Web 1.0 and web 2.0. So I don't completely agree with the idea that Wikipedia is the poster child of collaboration, however I would suggest that it is the poster child of the Web 2.0 era as it encompasses all that makes the new era so exciting.
  •  
    I found this article was an interesting read as it discusses Wikipedia's journey in becoming a successful and reliable encyclopedia. While I do consider myself a Wikipedia supporter I did find the article to be incredibly bias in favour of Wikipedia as it speaks extensively with Sue Gardner the Executive Director of the Wikimedia Foundation. The article does briefly touch on some negative points about Wikipedia in hearing from Robert McHenry, author and former Editor-in-Chief of Encyclopedia Britannica (Wikipedia's largest competitor) but soon turns back in favour of Wikipedia explaining that its scientific articles are of similar accuracy to that of Encyclopedia Britannica (Solon, 2011). As this article suggests, Wikipedia is evermore becoming a reliable source of information however people still seem to question Wikipedia's reliability. Here are somethings that I found in my own research that can suggest people's lack of confidence in Wikipedia's reliability: * Wikipedia articles that cover obscure and unusual topics tend to present more inaccuracies and errors than those covering mainstream topics - this is because obscure topics receive less traffic and therefore there is less likelihood of errors being corrected (Ball, 2007). * Wikipedia is not an accurate representation of a vast and diverse crowd, in fact "the encyclopedia is missing the voices of people in developing countries, women and experts in various specialties that have traditionally been divorced from tech" (Manjoo, 2009). * Wikipedia has in the past been subject to vandalism with hoax and defamatory article updates (Ball, 2007). Reference: Ball, P. (2007, February 27). The more, the wikier. Nature: International weekly journal of Science. Retrieved from http://www.nature.com Manjoo, F. (2009, September 28). Is Wikipedia a Victim of Its Own Success? Time Magazine. Retrieved from http://www.time.com/time/magazine Solon, O. (2011, January 11). A Decade of Wikipedia, Th
  •  
    This article provides quite an interesting overview of Wikipedia and how it started off as a "dirty little secret" for some in the earlier years, with its use progressing to be an "accepted part of daily life in the developed world" ten years after its launch. In addition, higher education facilities (Grossek, 2009; CCNMTL, 2008) and companies (Hendrix & Johannsen, 2008; Hasan & Pfaff, 2006) are beginning to discover the advantages of employing wikis in their respective institutions. We are beginning to see that the 'wisdom of the crowds' and 'knowledge management' are important factors in larger organisations. Thus what once started out as an online encyclopaedia and a "dirty little secret" is now branching out and weaving its way into larger businesses, organisations, and educational institutions. Although Wikipedia has suffered its fair share of editing glitches and is not completely error free, as mentioned in this article, Wikipedia has come a long way since its introduction into the Web 2.0 world and is becoming a more commonly used tool. In addition, it has shown us the effects of the 'wisdom of the crowds' and how collaboration can be so important. Speakers at the New Media in Education Conference (CCNMTL, 2008) note that wikis provide such a valuable communication and collaboration platform that they essentially create a virtual classroom- an interactive platform where students can share ideas, edit documents, and collaborate on group projects. Inevitably I do agree with the title of this paper and think that Wikipedia is "The Poster Child for Collaboration", with Wikipedia and wikis weaving their way into educational institutions (Grossek, 2009; CCNMTL, 2008) and companies (Hendrix & Johannsen, 2008; Hasan & Pfaff, 2006) who use them as a collaborative tool. Additional References: CCNMTL (Nov 3rd, 2008). Promoting Collaborative Learning using Wikis. [YouTube Video]. Retrieved 22nd March 2012 from http://www.yout
Mitchell Houwen

Review of Lazy Virtues: teaching writing in the edge of Wikipedia. - 22 views

I think it is very astute of Potts to refer to the different generations as 'digital natives' and 'digital immigrants'. We (I include myself in the younger generation) have grown up in a world of c...

Net308_508 Wikipedia Educatin

Stephen R

Pastebin: How a popular code-sharing site became a hacker hangout - 2 views

  •  
    Matt Brian, mobile editor for The Next Web, discusses the popularity of pastebin.com among hacking (or perhaps more accurately 'cracking') groups. Brain notes that Pastebin is a tool originally designed for collaboratively editing code, but has since gained popularity among malicious security crackers as a method of releasing stolen data to the public. While there are numerous spinoffs of the simple text-sharing concept, pastebin.com remains the most popular. Searching the pastebin.com website for 'anonymous' or their (now disbanded and arrested) spinoff group 'Lulzsec' reveals a considerable level of Pastebin usage by Anonymous. Manifestos and anouncment seem to be a popular use of Pastebin by Anonymous. For example searching '#opegypt' reveals a list of sites taken down by Anonymous - perhaps it was collaboratively updated while the operation took place? The Anonymous group link to Pastebin.com pastes (or other equivalent websites) through blogs and twitter accounts associated with the Anonymous movement. Brain notes its utility in escaping the 140 character limitation of twitter, whilst still retaining anonymity with minimum fuss. If illegal material was posted on Anonymous blogs such as anonops.blogspot.com, youranonnews.tumblr.com or anonnews.org it would likely violate terms of service and result in blogs being closed. Pastebin.com therefore, provides a suitably nebulous zone for posting illegal content. Brain makes extensive note of the use of Pastebin.com to release sensitive, stolen information to the web. Although the hacking groups mentioned are not always directly related to Anonymous, it highlights the usage of Pastebin.com as a tool for sharing information. Hacker groups could potentially be working on releases or manifestos collaboratively with their peers, although this in not discernible in the final Pastebin product. Brian, Matt. 2011, June 5. "Pastebin: How a popular code-sharing site became the ultimate hacker hangout." The Next Web: Social M
  •  
    This article provides an interesting (if somewhat brief) account of the Anonymous movement, and associated (as well as un-associated) hacktivist networks, using a relatively simple internet tool and altering the intended usage to suit the purposes of the movement. The article focuses mainly on the usage of Pastebin by an offshoot of the Anonymous movement called LulzSec, and how the group was able to use Pastebin to greatly aid their hacktivism efforts (Brian, 2011). Although now disbanded and with most of its members arrested (Apps, 2012), LulzSec very successfully utilised Pastebin for various leaks and links to their efforts of retrieving data from a number of high-profile organizations. This article touches on another example of the confrontational tactics for raising media awareness outlined by Andrews and Caren (2010), and thus the two articles may provide relevant references for discussions relating to the reactions to hacktivist groups such as LulzSec, as well as providing information regarding another tool used by such movements. In terms of my focus on the Anonymous movement, the article may not provide a direct reference to the divides between individuals within the movement based on motivation for activities under the Anonymous movement. The article does however provide a relevant secondary source for additional discussion relating to the way in which particular offshoots of the Anonymous movement operate. Andrews, K., & N. Caren. (2010) Making the News: Movement Organisations, Media Attention, and the Public Agenda. Retrieved from http://proquest.umi.com.dbgw.lis.curtin.edu.au/pqdweb?did=2527572391&sid=1&Fmt=6&clientId=22212&RQT=309&VName=PQD Apps, P. (2012). LulzSec Arrests Hurt Hacker Groups, Anonymous Movement Hard To Kill. Reuters. Retrieved from http://www.huffingtonpost.com/2012/03/08/lulzsec-arrests-anonymous_n_1331982.html Brian, M. (July 5th, 2011). Pastebin: How a popular code-sharing site became the ultimate hacker hangout. Retrieved fr
Jocelyn Workman

http://www.usip.org/files/resources/SR252%20-%20Crowdsourcing%20Crisis%20Information%20... - 1 views

  •  
    You Tube Need to Know | Crisis mappers: Mobile technology helps disaster victims worldwide | Uploaded by PBS . Retrieved 20 March 2012 http://www.youtube.com/​watch?v=xW7Vt5iunWE This YouTube presentation tells the story of how crisis mapping came to be a source of critical and timely support to Haitians requiring aid following the 2010 devastating earthquake. It is a remarkable example of resourcefulness, voluntary collaboration and use of social media to assist with the humanitarian aid response. The video includes a live interview with, Patrick Meier, head of Ushahidi, a not-for-profit organisation, who explains that within hours of the news of the quake reaching the world, he knew that it would be a real challenge to get information from people on the ground in Haiti. Based on the Haitians high mobile ownership (85%) he worked out that texting a message would be the best way to find out who needed help. He arranged for a local phone company to provide a number for emergency texts. The number is advertised on the radio as 90% of the population has radio access. A call was put out on Facebook to locate volunteers who could translate messages from Haitian Kreyol to English. These messages are then forwarded to Boston where a voluntary group of students plot the location on an online map. The online location is then forwarded to the US response group coordinating the distribution of aid. Within hours help is sent. I came across this video when sourcing materials and was impressed with the professional presentation, the inclusion of a Haitian recipients experience of receiving aid after texting the number he heard on the radio, and interviews with major stakeholders. Further searches of Patrick Meier verified the story. Crisis mapping was also used during the Libyan crisis to bring aid to victims. Crisis locations were extracted from posts for help on Facebook and Twitter and plotted by volunteers
  •  
    (My commentary is actually against the PDF that's linked to, rather than the YouTube video. Reference at the end). This report, commissioned by the United States Institute of Peace, examines the role of Ushahidi, a crisis-mapping platform, in the relief effort following the 2010 earthquake in Haiti. It highlights the ability of crowd-sourcing to provide a more reliable account of what's happening in a disaster situation than traditional intelligence gathering means which don't engage the local population. It begins by describing the challenge that rescuers faced when sourcing their intelligence from media reports, which tended to focus on isolated incidents of violence, wrongly spreading the idea that violence was commonplace and leading the rescue teams to delay their rescue efforts. The report accuses the media of deliberately producing exaggerated reports, which may be true, but even the most ethical journalist can only report on what he or she experiences - if he or she sees or hears about a violent incident, the resulting report will almost certainly give the impression of violence. For the most objective and detailed picture of the state of a crowd, the largest possible portion of that crowd needs to have a voice - something an individual journalist could never facilitate. That's where Ushahidi proved a valuable tool. By aggregating SMS messages, email and social media communications from those in distress, it allowed rescuers to direct assistance appropriately. In addition to crowd-sourcing the conditions of those in distress, Ushahidi also incorporated other forms of crowd-sourcing - maps were sourced from the World Bank, Yahoo!, GeoEye and the U.S. government to provide geographic information, and staffing power was provided by a vast team of volunteers. This gives the case study a lot of depth. Heinzelman, J. and Waters, C. (2010) Crowdsourcing Crisis Information in Disaster-Affected Haiti Retrieved 2 April 2012 from http://www.us
Jocelyn Workman

http://www.cs.colorado.edu/~palen/vieweg_1700_chi2010.pdf - 1 views

  •  
    Vieweg, S., Hughes, A., Starbird, K & Palen, L. (2010). Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. Retrieved 15 March 2012 from http://www.cs.colorado.edu/~palen/vieweg_1700_chi2010.pdf Individuals affected by the emergency events of the Red River Floods and the Oklahoma Grassfires in North America during the Spring of 2009, posted information about their respective situations via the microblogging service, Twitter. In this study, the authors analyse "situational update" information tweeted by individuals experiencing these hazards 'on the ground' to see how these people used the tweets to inform and develop an awareness of the current situation within their community. Twitter is seen as a commonly used social tool increasingly used for emergency communications "because of its growing ubiquity, communication rapidity, and cross platform accessibility", and are "a place for "harvesting" information during a crisis event to determine what is happening on the ground". From the analysis of collected data, coding was allocated by geo-location, location referencing and situational update information. Findings indicated Tweeters broadcasted similar types of information in both emergency situations, and tweets of high Tweeterers during emergencies were 'content rich' and displayed 'big picture situational awareness', with retweets indicating important updates. This study confirms how individuals facing a crisis rely on social media for their own safety and use the tool for altruistic purposes by providing current awareness of the crisis. In addition, the authors developed a Microblog-Enhanced Situational Features for Emergency outline of information categories for use in emergency response. They suggest this outline be used to assist with the development of system s
  •  
    This article relates to the article by Sutton (2010) because it talks about how micro-blogging in the time of disasters is one of the easiest ways for individuals to retrieve, produce and spread information through social networking sites such as Twitter. Sutton (2010) states that Twitter can bring people together in disasters which not only prompts micro-blogging but also can involve micro-volunteering as well. Online communities such as Twitter are decentralized which brings about self-organization and mobilization of information. The two articles are linked in that they both discuss how micro-blogging during disasters is about how information such as warnings, evacuations and peoples locations is shared online by different individuals in the community. Both articles had images implemented to show the readers where the location was that they were discussing as well as graphs to compare the data that is being focused. This made it very reliable to the topic and the range of references also showed how different perspectives were used in this research. I found the article relevant in showing how Twitter had an impact in disaster management and how micro-blogging can actually make a huge effect on how people communicate during a crisis. The graphs and images in the article were very useful because that provided evidence which complemented the text. The article is very valuable for this project because it shows how Twitter is evolving from being used for just a social medium to disaster management. References: Sutton, N. J. (2010). Twittering Tennessee: Distributed Networks and Collaboration Following a Technological Disaster. Proceedings of the 7th International ISCRAM Conference. Retrieved from http://www.jeannettesutton.com/uploads/Twittering_Tennessee_FINAL.pdf (Accessed 16/03/2012)
1 - 20 of 52 Next › Last »
Showing 20 items per page