Skip to main content

Home/ Net 308/508 Internet Collaboration and Organisation S1 2012/ Group items tagged facebook

Rss Feed Group items tagged

Dean Strautins

Internet Based Collaboration and Organisation in Education Institutions - 20 views

I will post not much to try to draw these papers to the top of the list in an attempt to attract comment as it now is listed as 85 of 86 posts.

Collaboration in Higher Education

jessica_mann

Japan's social safety net: Facebook's Disaster Message Board - 7 views

This article addressed similar themes to the articles that I included in my own research on collaboration and disaster management. Of particular relevance is the article titled, 'Crisis in a Networ...

Net308_508 collaboration social media technology volunteering disaster twitter facebook crisis mobile phones google Japan community victims

Victoria Jobling

The truth about Twitter, Facebook and the uprisings in the Arab world - 0 views

  •  
    Beaumont, P. (2011, February 25). The Truth about Twitter, Facebook and the Uprisings in the Arab World. The Guardian. Retrieved March 24, 2012, from http://www.guardian.co.uk/world/2011/feb/25/twitter-facebook-uprisings-arab-libya?INTCMP=ILCNETTXT3487 This article discusses how political activists harnessed the web for their benefit, during the Arab revolutions. Unlike other resources, this article is of great value as it reveals that written tweets were not the only way that protestors and activists utilised the web. The people involved used phones to capture images and videos of the destruction around them, to not only inform their fellow protestors, but also to provide credible evidence to the outside world. People also contributed medical information and important phone numbers to assist and organise others involved in the uprising. This indicates the power of the 'other' described in "The Revolutions Were Tweeted: Information Flow during the 2011 Tunisian and Egyptian Revolutions" as ordinary people provide the bulk of the information. Each of these contributions demonstrates a form of collaboration, whereby; participants worked towards a common goal and participated in knowledge sharing (Blau, 2011, p.23). The article conveys that this provided a clear image of what was happening where, via specific sites. It is also noted that each uprising used the web differently, due to constrictions and organisation of the group. Facebook provided the voice to people in Tunisia as it was one of the only social networking sites that had not been shut down, despite the government's desire to do so, they feared it would cause more unrest. However, Egypt appeared to be the most organised group, as "details of demonstrations were circulated by both Facebook and Twitter and the activists' 12-page guide to confronting the regime was distributed by email" (Beaumont, 2011). The author also comments on the Western media's quick judgments on how social media was used
Stephen R

Anatomy of an Anonymous Attack - 1 views

  •  
    This article, recently published by security firm Imperva, investigates how an Anonymous attack is mounted. A Particularly interesting point is that this article makes no mention of IRC channels, instead painting Facebook, Twitter and Youtube channels as the main methods of communication for Anonymous. Also interesting is that such communication is referred to as recruitment, recruitment of technically savvy hackers and not so technically savvy activists who are willing to participate in the attack. Particular attention should be paid to pages 6-8 which outline the recruitment activities over Facebook, Youtube and Twitter. Imperva outline the technical methods used to stage the attack, mentioning that there are 10 -15 'Anons' working to analyse the victim website for security vulnerabilities. These are more experienced hackers who are searching for a vulnerability that might allow them to retrieve private data from the victim (p.6). Although not mentioned in this article, perhaps these experienced hackers collaborate using Internet Relay Chat. When no vulnerability was found, Imperva notes that Anonymous instead tries a DDoS attack, but instead of employing the LOIC, a web based version is used for ease of participation (p.13). This way, users of any device can be recruited (through social media) into participate in the attack with minimum of barriers to entry. Although this article focusses heavily on the technical aspect of the attack, a significant portion of the article deals with the recruitment of participant through social media, alongside discussion of the online variant of the LOIC collaborative Denial of Service tool. Anatomy of an Anonymous Attack. 2012. Imperva. http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
  •  
    This document may prove to be quite a significant additional reference to my focus of my chosen topic of the Anonymous movement and hacktivism. This article discusses precisely what Mansfield-Devine (2011) neglected to note; that within the Anonymous movement, there are a number of individuals with significant hacking skills who are able to retrieve valuable data from the targets of Anonymous attacks. The article quite thoroughly deconstructs the order in which Anonymous attacks typically occur, the differences between the two major types of individuals who participate, and circumstances under which Anonymous attacks are generally able to be successfully performed (2012). Of particular interest, is the emphasis placed on the importance of acknowledging the fact that Anonymous attacks are not always as harmless as they may appear. Another interesting note is found within the conclusion of the report. The report suggests that targeted, small-scale data retrieval attacks are the preferred means of attack for the Anonymous movement and that "DDoS is the hacker's last resort" (Anatomy of an Anonymous Attack, 2012). This would suggest that unlike many sources of information regarding Anonymous hacktivism attacks, Imperva has identified the serious nature of many incidents involving the Anonymous movement, which do not necessarily receive as much immediate attention as a simple DDoS attack may. Anatomy of an Anonymous Attack. (2012). Imperva. Retrieved from http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046
Jocelyn Workman

http://www.usip.org/files/resources/SR252%20-%20Crowdsourcing%20Crisis%20Information%20... - 1 views

  •  
    You Tube Need to Know | Crisis mappers: Mobile technology helps disaster victims worldwide | Uploaded by PBS . Retrieved 20 March 2012 http://www.youtube.com/​watch?v=xW7Vt5iunWE This YouTube presentation tells the story of how crisis mapping came to be a source of critical and timely support to Haitians requiring aid following the 2010 devastating earthquake. It is a remarkable example of resourcefulness, voluntary collaboration and use of social media to assist with the humanitarian aid response. The video includes a live interview with, Patrick Meier, head of Ushahidi, a not-for-profit organisation, who explains that within hours of the news of the quake reaching the world, he knew that it would be a real challenge to get information from people on the ground in Haiti. Based on the Haitians high mobile ownership (85%) he worked out that texting a message would be the best way to find out who needed help. He arranged for a local phone company to provide a number for emergency texts. The number is advertised on the radio as 90% of the population has radio access. A call was put out on Facebook to locate volunteers who could translate messages from Haitian Kreyol to English. These messages are then forwarded to Boston where a voluntary group of students plot the location on an online map. The online location is then forwarded to the US response group coordinating the distribution of aid. Within hours help is sent. I came across this video when sourcing materials and was impressed with the professional presentation, the inclusion of a Haitian recipients experience of receiving aid after texting the number he heard on the radio, and interviews with major stakeholders. Further searches of Patrick Meier verified the story. Crisis mapping was also used during the Libyan crisis to bring aid to victims. Crisis locations were extracted from posts for help on Facebook and Twitter and plotted by volunteers
  •  
    (My commentary is actually against the PDF that's linked to, rather than the YouTube video. Reference at the end). This report, commissioned by the United States Institute of Peace, examines the role of Ushahidi, a crisis-mapping platform, in the relief effort following the 2010 earthquake in Haiti. It highlights the ability of crowd-sourcing to provide a more reliable account of what's happening in a disaster situation than traditional intelligence gathering means which don't engage the local population. It begins by describing the challenge that rescuers faced when sourcing their intelligence from media reports, which tended to focus on isolated incidents of violence, wrongly spreading the idea that violence was commonplace and leading the rescue teams to delay their rescue efforts. The report accuses the media of deliberately producing exaggerated reports, which may be true, but even the most ethical journalist can only report on what he or she experiences - if he or she sees or hears about a violent incident, the resulting report will almost certainly give the impression of violence. For the most objective and detailed picture of the state of a crowd, the largest possible portion of that crowd needs to have a voice - something an individual journalist could never facilitate. That's where Ushahidi proved a valuable tool. By aggregating SMS messages, email and social media communications from those in distress, it allowed rescuers to direct assistance appropriately. In addition to crowd-sourcing the conditions of those in distress, Ushahidi also incorporated other forms of crowd-sourcing - maps were sourced from the World Bank, Yahoo!, GeoEye and the U.S. government to provide geographic information, and staffing power was provided by a vast team of volunteers. This gives the case study a lot of depth. Heinzelman, J. and Waters, C. (2010) Crowdsourcing Crisis Information in Disaster-Affected Haiti Retrieved 2 April 2012 from http://www.us
Jocelyn Workman

Social Media and Disasters: Current Uses, Future Options, and Policy Considerations - 17 views

This CRS (Congressional Research Service) Report for Congress by Lindsay, provides an organisational perspective of how social media have been and might be used to improve emergency response and re...

Net308_508 Twitter social media community collaboration Wikipedia Crowd

ruenhongo

Crisis in a Networked World: Features of Computer-Mediated Communication in the April 1... - 9 views

This article relates to "Connected Giving" by Torrey et al. (2007) because they both talk about the two different kinds of communication. In this article, the authors discuss how an "unofficial bac...

Net308_508 collaboration community organisation Twitter Facebook Crisis Response Disaster Management

Jocelyn Workman

IGI Global: Fire, Wind and Water: Social Networks in Natural Disasters - 0 views

  •  
    Freeman, M. (2011). Fire, Wind and Water: Social Networks in Natural Disasters. Journal of Cases on Information Technology,13 (2), p.69 -79. A study of the increasing adoption of social networking tools (SNTs) as a channel for critical communication during disasters in Australia, is the platform used by the author to look into how society is accepting the use of SNTs as a whole for emergency management. Using recent natural disasters, the use of SNT's is traced from their limited use during the Victorian Bushfires in 2009 to their increased use and the reliance on SNTs by authorities and individuals, during the Queensland Floods of 2010/2011 and Tropical Cyclone Yasi in 2011 (February). During the fires of 2009, Twitter was used by the ABC radio station 774 Melbourne to provide as much coverage of the fires as possible. Followers increased from 250 to 1200 indicating the popularity of this form of communication, and offering an sight for future use. Two years later, the Queensland Police Service used Twitter and Facebook extensively to broadcast accurate information to those affected by the floods and correct misinformation. The same tactics were employed for Tropical Cyclone Yasi. Technologies are discussed as a medium of communication for accurate and timely information during disasters and for the sharing of knowledge, increasingly coming from the bottom up, but also utilised appropriately from the top down when required. Although this article was easy to understand, the author's discussion of the disasters and technologies, the extensive discussion of qualitative research, followed by a presentation of the case, lead to a repetition of information about the disasters. A more succinct and structured presentation of the results of this triangulated approach to research would have made it easier to appreciate the benefits of SNTs to communities.
samara hartnett

Public Radio's Social Media Experiments: Risk, Opportunity, Challenge - 4 views

  •  
    I have centered my approach to the main theme of Mobile Phones and Crowd Sourcing on both the Radio and Retail industries. With the acknowledgment that Mobile Phones, Crowd Sourcing and Social Media are all connected through the creation and distribution of information, this article further explores the individual adoptions or resistance to associated practices relating to the main theme. The article 'Public Radios Social Media Experiments' (Levenshus, 2007) proves itself very useful in its ability to pin point relevant conclusions regarding the role of the audience, the nature of online communities, the use of associated tools and reasons of reluctance towards industry integration. Although this article responds directly to Radio the points of analysis can also be applied to the Retail industry. These conclusions referred to the transformation of listeners/consumers into potential sources of information and the ability of audiences/consumers to contribute and reveal an unexpected wealth of knowledge. It is here that the connection to information obtained by crowd sourcing on social media platforms is supported and the seamless integrated of mobile devices into this process could be assumed. The article also surmises that social media and crowd sourcing strategies are essential to the future of public broadcasting. This should also be considered with reference to Retail. There are explanations as to why resistance to social media opportunities may occur. For example, resistance is due to the lack of knowledge, resource allocation and institutional culture (Levenshus, 2007). But above all the article describes online communities as organic, dynamic and having lives of their own (2007), giving us a valuable base with which to analyse the role of mobile devices in sourcing information. The provisions of such analytical conclusions help to develop a better understanding of the overall affects to industries such as Radio and Retail as they reconsider busi
  •  
    Thanks for the heads up Dean - the link loads fine in a new tab for me... Have I done something wrong in my post do you think?
  •  
    I have been a big fan of listening to podcasts for years from http://www.abc.net.au/radionational/ . I subscribe to them in Facebook. So I have seen how they have slowly improved how they engage with the public. So your example I think is a good one for an industry that previously just has synchronous communication and now because of Social Media has A Synchronous to leverage its value. What has happened for radio has good lessons for those business owners that think business has got tougher. Radio previously had an audience/users that was "out there" and many other businesses have an audience that is "in here." Regardless of how the audience/client is connected/contacted then this touch point can be leveraged and value added by social media. The Curtin University Gym has users that are "in here" and whilst people are in the gym using the equipment they can see TV's that include advertisements for Physiotherapy etc. This is a basic form of social media interaction, The user arrives and the TV delivers. The Gym also has a Facebook page that they seek to have users or all of Curtin University to like. Maybe they also make use of Flickr and other social mediums that all adds up to adding value to the business through indirect advertising and awareness creation. So the point I am trying to make is that if you have "in here" users then you ought to connect with them whilst they are in the gym with as much social media as is acceptable. Can the Endomodo App be given a Curtin University Brand/Logo so that the many users can utilise? If not then the Curtin Gym can make use of Endomodo Groups so that the elderly classes can better network and collaborate etc. The more connected a business is with its client base then the more value it can deliver to them and the more revenue that business can collect from advertisers in the case of a radio station. A supply busines
Jarrad Long

The Wisdom of Crowds - 26 views

This Wikipedia article presents a summary of the 2004 book of the same name by New York Journalist James Surowiecki. Initially it explains Surowiecki's ideas about how crowd intelligence works and ...

Net308_508 Collaboration organisation kony 2012 social media wise crowd wisdom of the crowds

Victoria Jobling

Protest 2.0: Online Interactions and Aboriginal Activists - 1 views

  •  
    Petray, T.L. (2011). Protest 2.0: Online Interactions and Aboriginal Activists. Media, Culture and Society, 33(6), 923-940. Retrieved March 25, 2012, from Sage Journals Database. http://mcs.sagepub.com.dbgw.lis.curtin.edu.au/content/33/6/923.full.pdf+html This article conveys, that while it is necessary to utilize the tools made available by the digital age, they "should be used to enhance offline activism, rather than to replace it" (p.936). The author has studied an Aboriginal community in Townsville, and the difficulties that activists have faced in gaining momentum in a digital space. Unlike the young tech-savvy protestors in the Arab uprising, or the destructive youths in the London riots, the participants in this community are older and not comfortable with new technology. In this remote community, emails have been favoured when conveying information and organizing meetings online (p.927). However, this has caused difficulties in the disjointed fragmentation of messages, as well as, interfering with a culture that values visual storytelling over the written word (p.930; 927). Similar to, Climate Camp in the UK, the community may have benefited from using some Internet tools, however, face-to-face meetings were found to be more effective when collaborating and organising events. To further their presence online, the group created a Facebook page, allowing people to donate money and support them. However, the lack of success in gaining political momentum is linked to the participants and the current nature of online activism. Whilst the page can facilitate collaboration and organisation, it lost its momentum in the lack of group activity and recent updates (p.933). Due to the current nature of online activism, people can simply 'like' a page or sign a petition to show their support towards a cause, with little to no effort (p
  •  
    Whilst I totally agreed with the concluding points of this article I found it very hard to identify just which topic this article had the greatest relevance to. It is a reliable source as it is associated with the James Cook University and the author has positioned themselves within the community they are researching. I could draw similarities with one of my articles, Public Radio's Social Media Experiments: Risk, Opportunity, Challenge, (Levenshus, 2007) in that they both reference a resistance to social media opportunities. The reasons for this 'resistance' in both articles could be put down to a lack of knowledge, resource allocation and institutional culture or 'cultural explainations' (Petray, 2011, p. 927). The understanding that 'push-button activism' was more of a feeling of evolvement rather than the translation of any 'real participation', supports the articles offer of a resolution. Any negative ideals about cyber-activism are squashed by the simple resolution of combining offline infrastructures with the online and not just relying on either one. Overall I thought this article was a breath of fresh air. Whilst I realise that 'cyber-activism' has been in the spotlight a lot lately due to the Kony 2012 campaign, I was delighted to read an article that turns its attention to local activism. Aboriginal cultures have always maintained my interest and just recently I viewed the 'Tall Man' exhibition that dealt with the Palm Island death in custody referred to in the article. It had a profound affect on me. I also appreciate that preserving oral histories and the rite to communicate in ones own language has deeply embedded social issues within Australia. This is another reason why this articles direct referencing of Aboriginal activism is refreshing and of great value. Equal access to social technologies is so very important in closing the digital divide both globally and locally. As the article points out only '25%' of the globe have such access (P
  •  
    Reference: Levenshus, A. 2007. Public Radios Social Media Experiments: Risk, Opportunity, Challenge. Retrieved from http://www.centerforsocialmedia.org/sites/default/files/public_radio_report3.pdf
Stephen R

Beyond Microblogging: Conversation and Collaboration via Twitter - 1 views

  •  
    Courtenay Honeycutt and Susan Herring discuss the collaborative potential of Twitter. This is of particular relevance to the discussion of Anonymous organisation tools, as Anonymous uses Twitter for a large amount of its public relations. @Anonops, @AnonymousIRC and @Youranonnews are twitter users with substantial followers, each with greater than 250,000 followers. Anonymous's favourite method of attack - Distributed Denial of Service (DDoS - works better with every additional participant. Anonymous must recruit members to participate in such attacks through Twitter, Facebook and Youtube. Twitter presents the most anonymous and easily digestible communication channel of the three, whilst also being extremerly active during past operations such as #oppayback. Therefore, Twitter plays a central role in the collaboration of anonymous, especially communicating with those who do not take an active role in IRC chats. Honeycutt and Herring examine the conversational and collaborative potential of Twitter with the use of the @ symbol to direct conversation. This activity is very prominent among the Anonymous Twitter account listed earlier. Anonymous Twitter feeds are full of responses to criticisms and answers to questions. It is worthwhile to note that Honeycutt and Herrings article was written in 2009, before use of the @ symbol became recognised by Twitter as a certified way of creating conversation. Now, it is easy to transverse conversation simply by clicking tweets with an @ symbol. During Anonymous operations, Twitter provides an invaluable resource in being able to address such a number of followers at once. Honeycutt and Herring also note similarities between Twitter and IRC channels, also noting that the hectic, crossing conversation are perhaps part of the appeal to some of IRC. This is certainly present in Twitter, but without the constraints of server based IRC channels. Twitter presents a global audience to which Anonymous reaches out, when recruiting
Oliver Hennessey

Relax: Twitter's New Censorship Policy Is Actually Good for Activists - 6 views

  •  
    Catone, J. (2012). Relax: Twitter's New Censorship Policy Is Actually Good for Activists. Mashable. Retrieved March 23, 2012 from http://mashable.com/2012/01/27/twitter-censorship-activism/ This news article from the online news site Mashable takes a look at the announcement that Twitter will now censor tweets on a country-by-country basis, and argues that this is actually a good thing for online activists. This is contrary to the widespread backlash that has been made against Twitter with users pledging to boycott the service over its new censorship rules. The author points out that Twitter has always been subject to takedown requests, and that this was on a global scale so that if a tweet or user was removed it had to be done for everyone in the world. The author believes it is a lot better that "now, Twitter can remove that tweet in that country, but allow the world to see it". His rationale is that everyone outside of the offending country can still see the tweets, and that if Twitter were to refuse a takedown notice from an oppressive regime it could have its service totally blocked for all users in that country. The fact that Twitter has pledged to increase its transparency in dealing with takedown notices strengthens his argument. I agree with the author on this and find this an especially useful resource as it provides links to circumvent Twitter's technology in an effort to get around censors, and arguments that this new change could even allow the message of censored activists to be more powerful.
  • ...2 more comments...
  •  
    Listen to how people can create thousands of unique Twitter accounts to manipulate the messages on Twitter http://www.abc.net.au/radionational/programs/backgroundbriefing/dont-trust-the-web/3725726 Therefore Twitter needs some rules.
  •  
    This article discusses Twitter's announcement that they can "censor tweets on a country-by-country basis" (Catone, 2012). This policy change initially received backlash online, as users did not understand how beneficial this could be for some activists. In comparison to other articles shared in the project, this news report is not of as great a value, however, it is still relevant to the topic and highlights the importance of sharing information with the world, rather than a local community. The significance of censoring on a country-by-country basis is that when a tweet or user is blocked in a specific country, like Egypt, people outside of Egypt can still view the blocked user and their tweets (Catone, 2012). Prior to the policy change, a censored user or tweet was blocked worldwide, meaning that people can still communicate with the rest of the world (Catone, 2012). This change is of great importance to political activists in many countries like Egypt, Libya and Tunisia, because it means that they can continue to update other nations of the latest circumstances and events. During the Arab Revolution, people captured photos and video footage, not just to show to their local community, but also to provide credible evidence to the outside world (Beaumont, 2011). Clearly, this highlights Twitter's support for protestors in developing or struggling nations, as they have provided an outlet for activists to reach and inform a wider audience. While this article was not as useful as others, it is relevant to the topic and appears to be a reliable source. It, quite simply, demonstrates the importance of being heard in an online environment. Reference: Beaumont, P. (2011, February 25). The Truth about Twitter, Facebook and the Uprisings in the Arab World. The Guardian. Retrieved April 9, 2012, from http://www.guardian.co.uk/world/2011/feb/25/twitter-facebook-uprisings-arab-libya?INTCMP=ILCNETTXT3487
  •  
    This article is of relevance to my chosen topic (the Anonymous online activism group) as it deals with Twitter and the way oppressive governments seek to deal with it's collaborative and organisational power. Mansfield-Devine (2011) discusses how Anonymous use Twitter heavily as a method of collaboration during their activism operations. Though the article says otherwise, if Twitter's censorship were to inhibit this kind of collaboration this could affect the way in which Anonymous organises itself. The reliability of the source is reasonable. Mashable may be a somewhat sensationalist online news website at times, but this article in particular has many links within allowing one to see the sources behind various claims. The article is of considerable relevance to the topic of online movements as it deals with threats to online activism. Twitter itself is subject to pressure to silence of voices of dissension in certain rendering Twitter less useful for activism purposes. I found the article somewhat useful. It highlights that Twitter impervious to control and censorship. It also highlights that Twitter is a powerful tool for organising uprisings and political movements. This article is quite valuable to the overall collaborative resource development project as it is reasonably reliable, deals with the collaborative potential of Twitter and highlights some of the threats to online movements. Mansfield-Devine, Steve. 2011. "Anonymous: Serious threat or mere annoyance?" Network Security 1: 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S1353-4858(11)70004-6
  •  
    Prior to reading this article, I had not been aware of Twitter's new censorship policy related to each individual country. After reading the title of the article, I failed to see how censorship on Twitter could possibly be considered to be a good thing for activists so I was interested to see the writer's arguments. I definitely agree that Twitter's opting to censor certain tweets is the more desirable outcome than a whole country be denied access to the site. Twitter's approach to censorship, something that they don't seem to be able to avoid on some level, has been handled in the best way possible given the circumstances. I believe that transparency of the 'take down requests' has real potential to alleviate some of the frustration users may feel when they notice that something that was there yesterday is suddenly gone today. This method of publically displaying the reason why something has been removed seems to work well for YouTube in similar censorship cases, particularly in relation to copyright cease and desist claims.
Jocelyn Workman

Conflict and Disaster Management in a Hyper-connected World - 18 views

Collins article is a useful resource as it discusses the need to increase hyper-connectivity in civil-military responses, with government and non-government organisations engaging with the wider ne...

Net308_508 collaboration social media disaster volunteering crisis movements microvolunteering communication twitter texting technology

1 - 15 of 15
Showing 20 items per page