Skip to main content

Home/ Net 308/508 Internet Collaboration and Organisation S1 2012/ Group items tagged internet

Rss Feed Group items tagged

michelangelo magasic

STEAL THIS FILM - 2 views

  •  
    Steal this Film is a documentary about bittorrent culture centred around the story of the Swedish torrent tracking website The Pirate Bay. In telling their story, the Pirate Bay members relate quite early on that they are not only a filesharing website but also an organisation for free speech. We see bittorrent organisations as situated within the wider context of media piracy and filesharing networks as clandestine organisations that must be diffuse in order to evade detection by anti p2p groups. The Pirate Bay's struggle against media outlets is elevated to a battle against American cultural hegemony. Within this context Kent's (2011) reading of the swarm as a simulacra of group identity can be seen as a defence - a tactic - as deCerteau (1984) puts it for the weak to re-appropriate the power of the strong. Filesharing is a form of protest. By publicising their struggle, The Pirate Bay build a bridge between physical and virtual communities. The film features spontaneous interviews with people on the street."The internet is too big, you can't fight it, (27mins)" says a girl with blue hair. Is she referring to the network of computers which make up the internet, or the strength of communities which practice filesharing, the linkages and solidarity of people across the world? This footage awakens the reader's conceptions of a link between physical and virtual activities, online collaboration breeds a solidarity between users which can echo beyond the activities of the swarm. We see bittorrent used not solely as a method for obtaining entertainment but as a vehicle for ideological struggle. The faces in the movie are conspicuously youthful and one sees that they collaborate not only in terms of files but also in ideas and viewpoints. We see bittorrent as a tool for worldwide collaboration/change. References Certeau, M. (1984), The Practice of Everyday Life. University of California Press, Berkeley. Kent M (2011), 'Strangers in the Sw
  • ...3 more comments...
  •  
    There is no escaping the debate about copyright when studying the Internet. This however is refreshing point of few surrounding the topic. The reliability of the source is sound as long as a viewer is wary of any bias as it is solely from the Pirate Bay point of view. There is a strong representation of a youth culture also. The youth appear tired of being force fed the institutionalized approach to media that had previously existed. As the interviewees comment, the raid on Pirate Bay was clearly a political power play and one that backfired. There is defiance towards America in particular as the documentary presents evidence of its attempt to pressure Sweden into sabotaging those who are 'threatening' Hollywood industries. Copyright laws do not translate across international boarders and for the first time, thanks to this documentary, I could actually see how this might play out in the real world. This is both valuable and useful in the overall understanding of the Bit torrent topic. Of particular importance to me was the statement made by one of the Piratbyran creators, Rasmus Fleischer, stated that they are 'our basic principle is not about building empires' (The League of Noble Peers, 2006). This is the most crucial difference between the Hollywood approach to copyright and the P2P approach to copyright. Just because media is made available for free consumption does not mean that it will not translate into sales on any level. I went away from this documentary feeling that industry producers and distributors need to get creative with their content, listen to their consumers and create a shared experience of shared benefit to both sides of the argument.
  •  
    This roughly thirty minute long documentary, while being a very "copy-left" focussed, helps to place BitTorrent within the context of global politics. It is about "ThePirateBay", one of the biggest BitTorrent trackers in history. ThePirateBay's servers are physically located in Sweden, and this documentary shows how Swedish law has interacted with American and international laws about copyright and file sharing. It uses various clips from many different interviews, including the people central to ThePirateBay but also Swedish citizens seemingly randomly interviewed on the street. It is interesting to note that many of them do seem to have some knowledge about ThePirateBay and also express their support for the site. This sense of community surrounding BitTorrent reminds me of the Australian youths in the "BitTorrents and Family Guy: teenage peer group interactions around a peer-to-peer Internet download community" paper. This documentary highlights the feeling of oppression and resistance to control of media which seems to underlie the communities who use BitTorrent. Combined with the copyright laws, these are worth thinking about because of how they influence the way people use BitTorrent to collaborate, and also how people collaborate to support file-sharing, including by demonstration as seen in the documentary.
  •  
    This film provides various aspects of online file sharing, particularly, in relation to music and movies. The topics discussed in the film include: the difference in copyright laws between America and Sweden, how online file sharing changed the nature of networking within society. The film also presented the contrast of perspectives of online file sharing held by younger consumers as opposed to those of the older producers. In America, major music and film industries regard peer-to-peer file sharing as an infringement to copyright, while in Sweden there is no copyright law for film and music productions that are available in bittorent. A Swedish user disputed that American copyright law should not intervene in other countries because there is no geographical limitation in the Internet. The age gap also highlighted different perspectives, for example, younger users believe in the right to public access while the older producers believe in that commodities (such as music and films) cannot be given to people for free. To argue this, the market of music and film industry cannot outlaw social change. Lastly, the activity of file sharing through bittorent has changed how the way society collaborates to exchange ideas and information. For example, the support to use bittorent is not documented in a fixed website but only transferred through online forums where users collaborate as social groups. This film relates well to the resources I had about Youtube in terms of different perspective based on age. Young people tend to use online media fluently and do not see copyright implications. The movements towards file sharing has become even more apparent, this is shown by social online collaboration is the current method to consume popular media, how the consumer recreate this media and contribute to the mass again.
  •  
    Steal this Film, is a short 30-minute documentary that looks at the social politics and debate about file sharing and the bit torrent client, focusing on Swedish torrent tracking website The Pirate Bay. The documentary outlines how file sharing and copyright is a touchy subject within American laws, and through the documentary we are able to hear differing opinions on who is right and who wrong. The various people that are interviewed who are involved with the Pirate Bay take a 'us against the world' approach and make it clear that technically they aren't doing anything wrong, and through the power of free speech they are making their voice heard. Numerous youths are also interviewed and each seem to be of the copyleft opinion that what they are doing is almost some sort of activism, and believe that these torrent communities are un-able to be stopped. I would also have to agree with this as a 'Pirate' myself and also through the learning that I have undertaken while at university, that this excuse by the Movie/Music industry that they aren't being hurt through piracy is totally utterly false and I think as one of the speakers in the video says "We aren't going to wake up one day and find that all music artists have died because of Piracy". In fact I would go as far to say that because of this cry-baby outlook by these industries that the bit torrent and file-sharing communities have been strengthened because of it.
  •  
    I was taken aback when I went to download 'Steal This Film' and it popped up as a torrent file in BitTorrent. I suppose I wasn't used to, what I perceived as, 'legitimate' content being provided in the form of a torrent. The film stated, "right now ten million people are using BitTorrent" and indeed, at the time of watching, I was also using BitTorrent. One of the things I found admirable, and also a little surprising, was the resilience of the Pirate Bay founders. Even after being raided and shut down by the authorities, their belief in what they were doing, and their advocacy of free speech, was too strong to just let go. I also found the film interesting in its depiction of the various anti piracy campaigns created by Hollywood film studios juxtaposed with the interviews of young people claiming that the amount of money made by Hollywood is "absurd". Even if crew members and writers are suffering at the hands of film piracy, like the people interviewed, I find it difficult to sympathise with Hollywood's view point when you can safely assume that the largest chunk of proceeds made from any film go to the 'talent' and not those people working so hard behind the scenes. Perhaps Hollywood losing money could be considered a positive outcome, as so many subpar films probably should never have been made in the first place. Perhaps having less money to fund any film on a whim will lead film studios to choose their projects more carefully, resulting in the delivery of quality rather than quantity to film consumers.
Dean Strautins

Good collaboration - The result of structured fighting - 22 views

Structured Fighting. Clay made it clear that the Internet on it's own is not going to bring World Peace. The more people get together the more they can disagree and fight. By applying a structure f...

Linux Shirky OpenSource Collaboration structure OpenedSystems StackOverflow StackExchange

Stephen R

Anonymous: serious threat or mere annoyance? - 5 views

  •  
    Steve Mansfield-Devine, editor of Network Security, analyses the threat of the Anonymous activist hacking group. In doing so he discusses the collaborative tools used to organise the members of Anonymous into a focussed effort. The tools discussed include the Low Orbit Ion Cannnon (LOIC) and various spinoffs, Internet Relay Chat (IRC) and Twitter. Mansfield-Devine's discusses the Anonymous group's usage of the LOIC as a Distributed Denial of Service (DDoS) weapon. Mansfield-Devine makes a clear point that only with enough users is the LOIC effective, making the effective usage of the LOIC a collaborative operation. The more users collaborating with the tool, the more effective it becomes. Mansfield-Devine discusses how Anonymous members are coerced into participating in an LOIC attack, specifying IRC and Twitter as the main forms of mobilisation of members. His discussion highlights IRC as a primary form of organisation, with Twitter being taking a more secondary role in directing potential participants into IRC channels. Mansfield-Devine does note that Twitter became an integral part of Anonymous organisation when their domain names were taken offline by authorities during Anonymous operations. Tweets were sent out to redirect the Anonymous participants into new IRC chat rooms to continue the attack. Overall, this article concisely covers IRC, Twitter and LOIC based aspects of Anonymous collaboration and organisation. Mansfield-Devine, Steve. 2011. "Anonymous: Serious threat or mere annoyance?" Network Security 1: 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S1353-4858(11)70004-6
  •  
    In this article Mansfield-Devine explores the threat of the organisation Anonymous and the collaborative tools they use to organise the group. In relation to this, he specifies that Anonymous uses "Low Orbit Ion Cannnon (LOIC) and various versions, Internet Relay Chat (IRC) and Twitter" as his key tools for facilitating organised attacks on institutions (Mansfield-Devine, 2011, p. 4). This article links to the article 'Kony 2012: The Template for Effective Crowdsourcing?' by Olubunmi Emenanjo, on more than one level, they are both about outside organisations against institutions, and they both undeniably rely on social media and the power of the crowds for the mobilization and facilitation of their actions and recruitment (Emenanjo, 2012). The success of the Kony 2012 campaign and Anonymous's attacks can be pin-pointed to how the organisations are aimed at a particular audience, reinforced by social media platforms, and most importantly how they harnessed networking tools to deliver their messages. However a major difference between the two groups is that the Kony 2012 organisation has a consistent online identity, while Anonymous has anonymity. Little is known about the organisation itself but the tools they utilise (LOIC, IRC, and Twitter) lead us so assume that their audiences engage with the organisation. References Emenanjo, O. (2012). Kony 2012: The Template for Effective Crowdsourcing? Communia. Retrieved from http://stipcommunia.wordpress.com/2012/03/13/kony-2012-the-template-for-effective-crowdsourcing/ Mansfield-Devine. (2011). Anonymous: Serious threat or mere annoyance?. Network Security, 1, 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S13534858(11)70004-6
  •  
    Although much of this article is not particularly useful to my focus on Anonymous, this article still raises some interesting notes. The way in which the author plays down the impact of Anonymous' actions towards the end of this article is of particular interest. The author often refers to the disorganized nature of the Anonymous movement, and suggests frequently that although a number of individuals may be involved, automated 'botnets' are often more effective than Anonymous members (Mansfield-Devine, 2011). For my focus, this is the most important part of the article because of the way in which the author neglects to take note of Anonymous members who do more than simply use LOIC and other DDoS attacks. Although it may be true that Anonymous DDoS attacks may not result in significant, long term damage to their targets, the disruption caused by such attacks can often provide enough distraction for Anonymous hacktivists to retrieve data from said targets. With hacktivist groups within movements such as Anonymous being responsible for the largest amount of stolen data in 2011 (AFP, 2012), Anonymous DDoS attacks could pave the way for much more damage to be done to websites than the temporary service disruptions noted by the author of this article. Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046 AFP. (2012). 'Hacktivists' biggest data thieves in 2011: Verizon. Retrieved from http://au.news.yahoo.com/thewest/a/-/world/13242086/hacktivists-biggest-data-thieves-in-2011-verizon/
Oliver Hennessey

Moldova's internet revolution: Analyzing the role of technologies in various phases of ... - 0 views

  •  
    Lysenko, V., Desouza, K. (2011). Moldova's internet revolution: Analyzing the role of technologies in various phases of the confrontation. Technological Forecasting & Social Change 79 (2012) 341-361. Retrieved March 23, 2012 from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S0040162511001223 This research article published in the journal 'Technological Forecasting & Social Change' analyses the role played by online collaboration and organisation tools in Moldova's revolution of April 2009. It specifically details the different technologies used during various phases of the revolution. The research is quite detailed in identifying the different groups involved - dissenters and authorities - with statistics and case studies breaking down the timeline and dynamics of the revolution. Overall the researchers found that: "1) the protesters organized their initial mobilization through social network services (SNS) and short message service (SMS); 2) Twitter was mostly used during later phases of the revolution - the active street protests and the subsequent information war - for communication about the conflict both locally and globally; and 3) through skillful use of new Internet-based ICTs, it is possible to conduct a successful revolution without noticeable prior offline organization". I chose this article as it highlights the power of Twitter as an organization tool through its involvement in providing a communication platform for the dissenters to organize street protests and then update from the ground what was happening. It also shows Twitters strength as a collaborative tool for movements with the involvement of supporters outside of Moldova tweeting about the revolution.
  •  
    I love this article as it relates to the Orange Revolution. I am also a proud protester of a post Orange Revolution protest in New Europe (Latvia) where I had personal exchanges with MP's in a New European country - read here http://balticguide.ee.klient.veebimajutus.ee/index.php?s=1&n=110&a=4161 In Latvia there have been many protests and I sought to increase international pressure on the Latvian government through my founding the Australian Chamber of Commerce in Latvia and in many other ways. I even managed to gain the participation of Curtin University honours Business Students that stayed in a remote city of Latvia to assist the council with its plans. The use of mobile SNS was not part of the protests I was aware of and participated in. Friends informed me what was being posted on websites about the time and place of the next protest. This enabled the inclusion of older proud Latvians and this caused the dynamic situation where younger people restrained their physical action in respect of the older participants so they would not get caught up in altercations. Later protests were much more violent. I as a primary source of information about student protests in New European countries can attest to the fact that the use of mobile SNS would have been very helpful and would have increased the momentum of protests. Because of the many protests in Latvia, many of the citizens that would like to see change, are suffering from protest fatigue. Possibly the earlier more effective use of mobile SNS could have made a difference. I blogged http://austchamriga.blogspot.com.au/ and wrote threatening letters to the IMF as well as led by example through organising courses for the youth of Latvia http://www.youtube.com/watch?v=9uBThbeXy9Q I will be back to Latvia to push more for the direction and changes the people want. I am arming myself with information like in this paper and what I learn in the Masters of Internet Communication. What is clear to me is that without a
owen_davies

BitTorrents and Family Guy: teenage peer group interactions around a peer-to-peer Inter... - 22 views

This particular paper looks into the bit torrent community while focusing on the popular American Cartoon-Comedy Family Guy. The article looks into how bit torrent is able to make downloading and s...

Net308_508 Crowd bittorrent

Dean Strautins

Internet Based Collaboration and Organisation in Education Institutions - 20 views

I will post not much to try to draw these papers to the top of the list in an attempt to attract comment as it now is listed as 85 of 86 posts.

Collaboration in Higher Education

ruenhongo

Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet - 10 views

Torrey, C., Burke, M., Lee, M., Dey, A., Fussell, S., & Kiesler, S. (2007). Connected Giving: Ordinary People Coordinating Disaster Relief on the Internet. Human - Computer Interaction Institut...

Net308_508 collaboration social media technology community connected giving online internet volunteering donate support relief

started by ruenhongo on 23 Mar 12 no follow-up yet
Stephen R

Anatomy of an Anonymous Attack - 1 views

  •  
    This article, recently published by security firm Imperva, investigates how an Anonymous attack is mounted. A Particularly interesting point is that this article makes no mention of IRC channels, instead painting Facebook, Twitter and Youtube channels as the main methods of communication for Anonymous. Also interesting is that such communication is referred to as recruitment, recruitment of technically savvy hackers and not so technically savvy activists who are willing to participate in the attack. Particular attention should be paid to pages 6-8 which outline the recruitment activities over Facebook, Youtube and Twitter. Imperva outline the technical methods used to stage the attack, mentioning that there are 10 -15 'Anons' working to analyse the victim website for security vulnerabilities. These are more experienced hackers who are searching for a vulnerability that might allow them to retrieve private data from the victim (p.6). Although not mentioned in this article, perhaps these experienced hackers collaborate using Internet Relay Chat. When no vulnerability was found, Imperva notes that Anonymous instead tries a DDoS attack, but instead of employing the LOIC, a web based version is used for ease of participation (p.13). This way, users of any device can be recruited (through social media) into participate in the attack with minimum of barriers to entry. Although this article focusses heavily on the technical aspect of the attack, a significant portion of the article deals with the recruitment of participant through social media, alongside discussion of the online variant of the LOIC collaborative Denial of Service tool. Anatomy of an Anonymous Attack. 2012. Imperva. http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
  •  
    This document may prove to be quite a significant additional reference to my focus of my chosen topic of the Anonymous movement and hacktivism. This article discusses precisely what Mansfield-Devine (2011) neglected to note; that within the Anonymous movement, there are a number of individuals with significant hacking skills who are able to retrieve valuable data from the targets of Anonymous attacks. The article quite thoroughly deconstructs the order in which Anonymous attacks typically occur, the differences between the two major types of individuals who participate, and circumstances under which Anonymous attacks are generally able to be successfully performed (2012). Of particular interest, is the emphasis placed on the importance of acknowledging the fact that Anonymous attacks are not always as harmless as they may appear. Another interesting note is found within the conclusion of the report. The report suggests that targeted, small-scale data retrieval attacks are the preferred means of attack for the Anonymous movement and that "DDoS is the hacker's last resort" (Anatomy of an Anonymous Attack, 2012). This would suggest that unlike many sources of information regarding Anonymous hacktivism attacks, Imperva has identified the serious nature of many incidents involving the Anonymous movement, which do not necessarily receive as much immediate attention as a simple DDoS attack may. Anatomy of an Anonymous Attack. (2012). Imperva. Retrieved from http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046
ianzed

Making the News: Movement Organisations, Media attention and the public agenda - 18 views

This article very loosely relates to my focus on Anonymous. Although not particularly relevant to my focus, it does provide a decent contextual setting for explaining why Anonymous receives so much...

Net308_508 collaboration community Crowd participatory

samara hartnett

Social Media: A New Frontier for Retailers? - 6 views

  •  
    As with any critical research involving new technologies the acknowledgment of a 'lack of concrete academic scrutiny and scientific evidence' (Boria et al, 2008) is important. In this article it acts as a timely reminder that mobile devices are still a currently evolving technology. This point serves the reader well when they are trying to position the use of mobile devices and their abilities in sourcing information. There are a number of important points highlighted throughout the article that are directly linked to this evolution. Firstly the evolving role of the consumer that is emerging empowered, sophisticated, critical and well informed. Secondly the developments towards effective leveraging and deriving value from social media-based tools and thirdly the continual shift in consumer behavior away from 'corporate communication' and towards 'peer reviews', ultimately affecting buyer intentions (Boria et al, 2008). Taking the fore noted current evolution of mobile devices into account, a small suggestion that we are 'in the process of replacing phones…' (Boria et al, 2008) all together, can be best understood with reference to traditional mobile technologies. They could not access the Internet. Although this is the only direct reference to a mobile device there is extensive analysis into the sourcing of information by consumers. With out mentioning the Smartphone but accepting its general mainstream adoption, it is easy to assume that consumers sourcing and contributing product information could do so easily from their mobile devices whilst in the act of shopping.
  •  
    Reference: Boria, Constatinides and Romero. 2008. Social Media: A New Frontier for Retailers?. Retrieved from http://www.utwente.nl/mb/nikos/publications/ecpapers/constantinidessocialmedia.pdf
  •  
    This article is beneficial because it touches on key issues relating to the retail industry's lack of adaptation and understanding of online technologies. It highlights the future potential of online shopping, identifies non-adaptation of new technologies as a threat whilst pointing out the potential risk in adopting them. There has been a lot of media coverage about this topic in recent months and whilst this paper was written in 2008 it is not until now that many retail giants are utilising online platforms, take David Jones for example. The study mentions the lack of academic resources relating to Web 2.0 technologies, this is similar to the Twitter paper by Burton & Soboleva, 2011 where there is also little research relating to understanding the real value in the adaptation of Twitter by businesses. "Lack of concrete academic scrutiny and scientific evidence is a warning to businesses to be cautious when engaging in Social Media as marketing tools." (Boria et al, 2008). The article also mentions that retailers could misjudge available tools. This to me expresses the uncertainty that many had and might still have in jumping into these technologies and that there may be a general notion of not understanding their real value. Overall the shift in power from the organisation to the consumer is evident and the ubiquitous nature of the Internet through mobile usage adds to this shift. Crowd sourcing here plays a part because consumers have access to other consumers' opinions and recommendations. Web 2.0 is key, when a consumer has a question others can answer it, instead of the business itself, consumers trust other consumers. An attempt of crowd sourcing by retailers is also is evident here, examples are shown where retailers have tried to get customers to become co-producers or creative contributors, this also serves as a way to create stronger customer engagement. Additional referenc
Emily Lloyd

Resource 3: Can History by Open Source? Wikipedia and the Future of the Past by Roy Ros... - 5 views

  •  
    Roy Rosenzweig's article Can History be Open Source? Wikipedia and the Future of the Past, discusses many issues regarding collaboration, with a focus on its historical entries. One of the most interesting points Rosenzweig makes, is that the contributors on Wikipedia, "do not come from a cross-section of the world's population. They are more likely to be English-speaking, males, and denizens of the Internet" (Rosenzweig, 2006, p. 127). Rosenzweig explains that as a collaborative medium, Wikipedia articles show bias towards Western culture and 'nerdy' topics such as computer science, physics and math (Rosenzweig, 2006, p. 127-128). This is interesting information to apply to Surowiecki's idea of 'the wisdom of crowds' (Surowiecki, 2004, p. 5). Is Wikipedia only representative of the wisdom of white, western, geek crowd? While this article was written back in 2006, I still find it makes some very interesting points about Wikipedia and the collaboration process, which are still applicable today. I also found this article valuable, as unlike a lot of other articles that focus mainly on the author's research which was generally conducted on a very small number of Wikipedia entries, Rosenzweig only discusses the research of others. Rosenzweig cites a range of academics that have compared Wikipedia with other encyclopaedias such as, American National Biography Online, Encarta, Columbia Encyclopaedia, and Britannica; providing the reader with an overview of the different research available and the findings made.
  •  
    References Rosenzweig, R. (2006). Can History Be Open Source? Wikipedia and the Future of the Past. The Journal of American History, 93, 117-146. Retrieved from: http://www.jstor.org/ Surowiecki, J. (2004). The wisdom of crowds: Why the many are smarter than the few. New York, NY: Doubleday.
  •  
    The many critiques in the article provide good fodder for the academic seeking to justify their position one way or the other. Us users of Wikipedia and traditional books know that Wikipedia works just as we know government process has major flaws. In my personal experience it is Wikipedia that is the most accurate source of information when compared to books on the subject of my father's country of birth. Prior to Wikipedia the books were full of misinformation or no information influenced by politics. So for the purpose of studying internet collaboration - I think this paper gives good argument. Even the people that experience history do not recall it exactly the same.
Emily Lloyd

Resource 2: Digital Maoism by Jaron Lanier - 0 views

  •  
    Digital Maoism, by self-confessed ranter Jaron Lanier, provides an alternative (and quite contentious) view on collaboration and the way it is used in Wikipedia. Unlike Reagle Jr, who suggests that collaboration can be successful with the correct cultural infrastructure (Reagle Jr, 2011, para. 103), Lanier argues that the best way to achieve successful collaboration on the web is to always cherish the individual over the collective (Lanier, 2006, para. 68). He expresses his frustration with the inaccuracies of his own Wikipedia page and speaks about the work of collaborative communities (or as he calls it, collectives) on wikis more generally, with disgust (Lanier, 2006, para. 33). Lanier argues that, "[h]istory has shown us again and again that a hive-mind is a cruel idiot when it runs on autopilot. Nasty hive mind outbursts have been flavoured Maoist, Fascist and religious, and these are only a small sampling" and that, "[i]f wikis are to gain any more influence they ought to be improved by mechanisms like the ones they have worked tolerably well in the pre-Internet world" (Lanier, 2006, para. 65). Lanier's essay is an interesting resource to view when thinking about collaboration and 'the wisdom of crowds' theory (Surowiecki, 2004, p. 5), and how this applies to Wikipedia. Lanier, a computer scientist and regular writer on the topic of computers and Internet-based technologies, portrays a controversial viewpoint that differs from much other writing on the topic. While I don't agree with most of Lanier's outspoken views which are often unsubstantiated, I think that there is some merit in the suggestion that there needs to be at least one individual, (as well as the correct infrastructure, as other theorists suggest), to guide the work in collaborative organisations. I also think this resource is useful as it is so far removed from other writing on this topic, which often glorifies the collective, allowing you to think about the topic in another way.
  •  
    References Lanier, J. (2006). Digital Maoism. Retrieved from http://edge.org/3rd_culture/lanier06/lanier06_index.html Reagle Jr, J.M. (2011). Good Faith Collaboration. In J.M. Reagle Jr, Good Faith Collaboration: Culture of Wikipedia (Online Edition, Chapter 3). Cambridge, MA: The MIT Press. Retrieved from http://reagle.org/joseph/2010/gfc/chapter-3.html Surowiecki, J. (2004). The wisdom of crowds: Why the many are smarter than the few. New York, NY: Doubleday.
  •  
    Digital Maoism is a rumination on the direction of online collaboration. Lanier examines this from a self reflexive viewpoint which begins with an examination of his own self as constructed by users on Wikipedia. In doing this he looks at online collaboration not through the empirical standpoint of participation, but the deeper reflection of having been 'produced' by it. The inconsistencies in the online record of his life introduce his perspective of measured criticism toward collaborative networks which increasingly attempt to function as overarching meta-narratives. Larnier's tone is personal, his perspective artistic rather than academic, he relates his arguments in language which brings it to life, "it's important to not lose sight of values just because the question of whether a collective can be smart or not is so fascinating. Accuracy in a text is not enough. A desirable text is more than a collection of accurate references. It is also an expression of personality." Seeing in Emily's introduction that Larnier was a "self-confessed ranter", I was a little concerned as to how balanced the article would be. He is a bit of ranter, but such is his passion for the subject, and I would say that it is a fair and insightful critique on online collaboration. Larnier's main thrust is reaffirming the importance of the individual as conscious participants within networks of online collaboration: aware of their own value as part of a diverse group rather than drones in a 'hive'. The relevance of this essay is its recognition that online collaboration is not smart merely by aggregation, that users must be empowered in their own beliefs for the group to benefit from the multiplication of which.
Stephen R

Pastebin: How a popular code-sharing site became a hacker hangout - 2 views

  •  
    Matt Brian, mobile editor for The Next Web, discusses the popularity of pastebin.com among hacking (or perhaps more accurately 'cracking') groups. Brain notes that Pastebin is a tool originally designed for collaboratively editing code, but has since gained popularity among malicious security crackers as a method of releasing stolen data to the public. While there are numerous spinoffs of the simple text-sharing concept, pastebin.com remains the most popular. Searching the pastebin.com website for 'anonymous' or their (now disbanded and arrested) spinoff group 'Lulzsec' reveals a considerable level of Pastebin usage by Anonymous. Manifestos and anouncment seem to be a popular use of Pastebin by Anonymous. For example searching '#opegypt' reveals a list of sites taken down by Anonymous - perhaps it was collaboratively updated while the operation took place? The Anonymous group link to Pastebin.com pastes (or other equivalent websites) through blogs and twitter accounts associated with the Anonymous movement. Brain notes its utility in escaping the 140 character limitation of twitter, whilst still retaining anonymity with minimum fuss. If illegal material was posted on Anonymous blogs such as anonops.blogspot.com, youranonnews.tumblr.com or anonnews.org it would likely violate terms of service and result in blogs being closed. Pastebin.com therefore, provides a suitably nebulous zone for posting illegal content. Brain makes extensive note of the use of Pastebin.com to release sensitive, stolen information to the web. Although the hacking groups mentioned are not always directly related to Anonymous, it highlights the usage of Pastebin.com as a tool for sharing information. Hacker groups could potentially be working on releases or manifestos collaboratively with their peers, although this in not discernible in the final Pastebin product. Brian, Matt. 2011, June 5. "Pastebin: How a popular code-sharing site became the ultimate hacker hangout." The Next Web: Social M
  •  
    This article provides an interesting (if somewhat brief) account of the Anonymous movement, and associated (as well as un-associated) hacktivist networks, using a relatively simple internet tool and altering the intended usage to suit the purposes of the movement. The article focuses mainly on the usage of Pastebin by an offshoot of the Anonymous movement called LulzSec, and how the group was able to use Pastebin to greatly aid their hacktivism efforts (Brian, 2011). Although now disbanded and with most of its members arrested (Apps, 2012), LulzSec very successfully utilised Pastebin for various leaks and links to their efforts of retrieving data from a number of high-profile organizations. This article touches on another example of the confrontational tactics for raising media awareness outlined by Andrews and Caren (2010), and thus the two articles may provide relevant references for discussions relating to the reactions to hacktivist groups such as LulzSec, as well as providing information regarding another tool used by such movements. In terms of my focus on the Anonymous movement, the article may not provide a direct reference to the divides between individuals within the movement based on motivation for activities under the Anonymous movement. The article does however provide a relevant secondary source for additional discussion relating to the way in which particular offshoots of the Anonymous movement operate. Andrews, K., & N. Caren. (2010) Making the News: Movement Organisations, Media Attention, and the Public Agenda. Retrieved from http://proquest.umi.com.dbgw.lis.curtin.edu.au/pqdweb?did=2527572391&sid=1&Fmt=6&clientId=22212&RQT=309&VName=PQD Apps, P. (2012). LulzSec Arrests Hurt Hacker Groups, Anonymous Movement Hard To Kill. Reuters. Retrieved from http://www.huffingtonpost.com/2012/03/08/lulzsec-arrests-anonymous_n_1331982.html Brian, M. (July 5th, 2011). Pastebin: How a popular code-sharing site became the ultimate hacker hangout. Retrieved fr
Chin Sing Wong

Incentives in Bit Torrent Induce Free Riding - 27 views

As most of my readings are focusing on analyzing the operating status of BitTorrent world, in this task, I found more readings are relevant to the issue of free-riding. This paper again take notes ...

Net308_508 collaboration community BitTorrent

Stephen R

Online Activism - 14 views

My topic of choice is the Anonymous activist group who's activities are often, but not exclusively, enacted online. The online activism by Anonymous is similar to the online activism described in Y...

Net308_508 collaboration organisation crowds china kony 2012 online activism

theresia sandjaja

The YouTube Effect: How YouTube has Provided New Ways to Consume, Create, and Share Music - 1 views

  •  
    Youtube acts as a place that enables users to access media, create, connect, collaborate and share between other Youtube users. This article explores how Youtube provides community space through technology that facilitates music creativity by the users. The article is divided by two sections; firstly, the relationship of art and technology will be examined and reflected on appropriate literatures, the other section will analyse a case study of an amateur musician who consumes music and ideas, recreates and shares back this 'art' work. Through Youtube, masses are able to view and listen digitalised artwork and the technological revolution enable users to play, reconstruct and share innovative ideas. Thus this action has created democratisation of art where previously artworks were constrained by institutions and now the artwork politic has become bias. The case study included in this article covers many aspect on how a user utilise Youtube to collaborate online. Firstly, Youtube as a medium has the ability to connect communities of users with similar interest. Secondly, Youtube enables users to combine talents and create a piece of work even though the creators live in different geographical area. Thirdly, difficulties that affecting the production were discussed: time differences constrain, physical distance between creators, file size, different Internet access and privacy of creators. The factors mentioned is similar to the three properties of digital networks explained by Sassen (2002), which are: decentralized access, simultaneity and interconnectivity. Youtube enable the producers to promote themselves by distributing their creation to the crowd. The audience has become the 'jury' to give feedback on how they perceive the work and may become producer recreating new original work and supplementing the existing one. This made the communication and ideas to circulate within the online community.
  •  
    Resource: Cayari, C. (2011) "The YouTube Effect: How YouTube has Provided New Ways to Consume, Create, and Share Music." International journal of education and the arts, July 2011, 12(6). Available online at http://www.ijea.org/v12n6/ Additional reference: Sassen, S. (2002), 'Towards a Sociology of Information Technology', Current Sociology, May, 50(3): 365-388 available online at http://transnationalism.uchicago.edu/infotech.pdf
Chin Sing Wong

Resisting free-riding behavior in BitTorrent - 17 views

This is another article that talk about resist/prevent free-rider behaviors in BitTorrent file sharing network. This paper more analyse from a technical standpoint, propose a quota-based encrypted ...

Net308_508 collaboration BitTorrent Torrent

Victoria Jobling

Digital Prefigurative Participation: The Entwinement of Online Communication and Offlin... - 0 views

  •  
    Mercea, D. (2012). Digital Prefigurative Participation: The Entwinement of Online Communication and Offline Participation in Protest Events. New Media and Society, 14(1), 153-169. Retrieved March 25, 2012, from Sage Journals Database. http://nms.sagepub.com.dbgw.lis.curtin.edu.au/content/14/1/153.full.pdf+html In this article, the authors aim to identify the use of computer-mediated communication prior to two offline protests, to determine the role and impact it plays on participants. Social media evidently played a strong role in the recent Arab uprising, but unlike the environmental protests studied in this article, there was a widespread urgency for change influencing the use of online resources. The study included FanFest, an environmental festival supporting change in Romania, and Camp for Climate Change, a traditional and direct style protest involving damage to property and blockades, in the UK (p.158-159). FanFest was considered a low-risk event, and Climate Camp was deemed a high-risk event (p.158), due to the level of activism involved. This article is valuable as it determines a correlation between individuals not associated with any activist organizations and their involvement preceding offline events. The idea that potential activists are more likely to attend low-risk events was reinforced, as a large percentage of people who attended FanFest fit this category (p.159-160). The online organization of the festival attracted new participants, as people were able to discuss the event online and collaborate, by offering suggestions to improve future festivals (p.163). The event aimed to engage the public in environmentalism, rather than demand change, like Climate Camp. This enabled people to freely discuss ideas online, without needing to meet in person. This contrasts with Climate Camp, as many participants d
  •  
    In this article Mercea (2011, p. 155) observes how computer-mediated-communications are contributing to "participation in protest events run by social movement organisations". He aims to study specifically what role online communication plays in the relationship between online and offline environments in relation to activism. This article ties in well with the Kony 2012 campaign I am currently observing and has strong links to an article I read called 'Online Activism' by Guobin Yang. In the two cases Mercea presents, the power of the crowds mediated through computer-communication allows online activism to occur (Yang, 2009, pp. 33). Through interactions on Web 2.0 outlets, Social Movement Organisations have become a force for social change (Mercea, 2012, p.156). Mercea and Yang both agree on the idea that organisations that utilise Web 2.0 platforms are more successful at harnessing crowds, and in doing so promote discussions, real life meeting points, and ultimately plan towards a groups next step in action. The Invisible Children organisation is classified as a 'Social Organisation Movement' and is a prime example of how computer-mediated-communication combined with Web 2.0 platforms facilitates participation. Interactions on Web 2.0 outlets have allowed the Invisible Children's Kony 2012 campaign to become a force for social change. The Kony 2012 campaign reinforces Mercea's observation that interactions online can encourage activism to cross over into the offline environment. The Invisible Children's action plan, focused for April 20th 2012 dubbed 'Cover the Night', enables audiences to actively become involved with the campaign offline while engaging with it online. The success of the Invisible Children's campaign can be pin-pointed to how it was aimed at a particular audience, reinforced by social media platforms, and most importantly how it has harnessed Web 2.0 tools to deliver the mission of the Kony 2012 campaign, to make J
Victoria Jobling

The truth about Twitter, Facebook and the uprisings in the Arab world - 0 views

  •  
    Beaumont, P. (2011, February 25). The Truth about Twitter, Facebook and the Uprisings in the Arab World. The Guardian. Retrieved March 24, 2012, from http://www.guardian.co.uk/world/2011/feb/25/twitter-facebook-uprisings-arab-libya?INTCMP=ILCNETTXT3487 This article discusses how political activists harnessed the web for their benefit, during the Arab revolutions. Unlike other resources, this article is of great value as it reveals that written tweets were not the only way that protestors and activists utilised the web. The people involved used phones to capture images and videos of the destruction around them, to not only inform their fellow protestors, but also to provide credible evidence to the outside world. People also contributed medical information and important phone numbers to assist and organise others involved in the uprising. This indicates the power of the 'other' described in "The Revolutions Were Tweeted: Information Flow during the 2011 Tunisian and Egyptian Revolutions" as ordinary people provide the bulk of the information. Each of these contributions demonstrates a form of collaboration, whereby; participants worked towards a common goal and participated in knowledge sharing (Blau, 2011, p.23). The article conveys that this provided a clear image of what was happening where, via specific sites. It is also noted that each uprising used the web differently, due to constrictions and organisation of the group. Facebook provided the voice to people in Tunisia as it was one of the only social networking sites that had not been shut down, despite the government's desire to do so, they feared it would cause more unrest. However, Egypt appeared to be the most organised group, as "details of demonstrations were circulated by both Facebook and Twitter and the activists' 12-page guide to confronting the regime was distributed by email" (Beaumont, 2011). The author also comments on the Western media's quick judgments on how social media was used
1 - 20 of 31 Next ›
Showing 20 items per page