Skip to main content

Home/ Net 308/508 Internet Collaboration and Organisation S1 2012/ Group items tagged tools

Rss Feed Group items tagged

Stephen R

Anonymous: serious threat or mere annoyance? - 5 views

  •  
    Steve Mansfield-Devine, editor of Network Security, analyses the threat of the Anonymous activist hacking group. In doing so he discusses the collaborative tools used to organise the members of Anonymous into a focussed effort. The tools discussed include the Low Orbit Ion Cannnon (LOIC) and various spinoffs, Internet Relay Chat (IRC) and Twitter. Mansfield-Devine's discusses the Anonymous group's usage of the LOIC as a Distributed Denial of Service (DDoS) weapon. Mansfield-Devine makes a clear point that only with enough users is the LOIC effective, making the effective usage of the LOIC a collaborative operation. The more users collaborating with the tool, the more effective it becomes. Mansfield-Devine discusses how Anonymous members are coerced into participating in an LOIC attack, specifying IRC and Twitter as the main forms of mobilisation of members. His discussion highlights IRC as a primary form of organisation, with Twitter being taking a more secondary role in directing potential participants into IRC channels. Mansfield-Devine does note that Twitter became an integral part of Anonymous organisation when their domain names were taken offline by authorities during Anonymous operations. Tweets were sent out to redirect the Anonymous participants into new IRC chat rooms to continue the attack. Overall, this article concisely covers IRC, Twitter and LOIC based aspects of Anonymous collaboration and organisation. Mansfield-Devine, Steve. 2011. "Anonymous: Serious threat or mere annoyance?" Network Security 1: 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S1353-4858(11)70004-6
  •  
    In this article Mansfield-Devine explores the threat of the organisation Anonymous and the collaborative tools they use to organise the group. In relation to this, he specifies that Anonymous uses "Low Orbit Ion Cannnon (LOIC) and various versions, Internet Relay Chat (IRC) and Twitter" as his key tools for facilitating organised attacks on institutions (Mansfield-Devine, 2011, p. 4). This article links to the article 'Kony 2012: The Template for Effective Crowdsourcing?' by Olubunmi Emenanjo, on more than one level, they are both about outside organisations against institutions, and they both undeniably rely on social media and the power of the crowds for the mobilization and facilitation of their actions and recruitment (Emenanjo, 2012). The success of the Kony 2012 campaign and Anonymous's attacks can be pin-pointed to how the organisations are aimed at a particular audience, reinforced by social media platforms, and most importantly how they harnessed networking tools to deliver their messages. However a major difference between the two groups is that the Kony 2012 organisation has a consistent online identity, while Anonymous has anonymity. Little is known about the organisation itself but the tools they utilise (LOIC, IRC, and Twitter) lead us so assume that their audiences engage with the organisation. References Emenanjo, O. (2012). Kony 2012: The Template for Effective Crowdsourcing? Communia. Retrieved from http://stipcommunia.wordpress.com/2012/03/13/kony-2012-the-template-for-effective-crowdsourcing/ Mansfield-Devine. (2011). Anonymous: Serious threat or mere annoyance?. Network Security, 1, 4-10. http://dx.doi.org.dbgw.lis.curtin.edu.au/10.1016/S13534858(11)70004-6
  •  
    Although much of this article is not particularly useful to my focus on Anonymous, this article still raises some interesting notes. The way in which the author plays down the impact of Anonymous' actions towards the end of this article is of particular interest. The author often refers to the disorganized nature of the Anonymous movement, and suggests frequently that although a number of individuals may be involved, automated 'botnets' are often more effective than Anonymous members (Mansfield-Devine, 2011). For my focus, this is the most important part of the article because of the way in which the author neglects to take note of Anonymous members who do more than simply use LOIC and other DDoS attacks. Although it may be true that Anonymous DDoS attacks may not result in significant, long term damage to their targets, the disruption caused by such attacks can often provide enough distraction for Anonymous hacktivists to retrieve data from said targets. With hacktivist groups within movements such as Anonymous being responsible for the largest amount of stolen data in 2011 (AFP, 2012), Anonymous DDoS attacks could pave the way for much more damage to be done to websites than the temporary service disruptions noted by the author of this article. Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046 AFP. (2012). 'Hacktivists' biggest data thieves in 2011: Verizon. Retrieved from http://au.news.yahoo.com/thewest/a/-/world/13242086/hacktivists-biggest-data-thieves-in-2011-verizon/
Stephen R

Pastebin: How a popular code-sharing site became a hacker hangout - 2 views

  •  
    Matt Brian, mobile editor for The Next Web, discusses the popularity of pastebin.com among hacking (or perhaps more accurately 'cracking') groups. Brain notes that Pastebin is a tool originally designed for collaboratively editing code, but has since gained popularity among malicious security crackers as a method of releasing stolen data to the public. While there are numerous spinoffs of the simple text-sharing concept, pastebin.com remains the most popular. Searching the pastebin.com website for 'anonymous' or their (now disbanded and arrested) spinoff group 'Lulzsec' reveals a considerable level of Pastebin usage by Anonymous. Manifestos and anouncment seem to be a popular use of Pastebin by Anonymous. For example searching '#opegypt' reveals a list of sites taken down by Anonymous - perhaps it was collaboratively updated while the operation took place? The Anonymous group link to Pastebin.com pastes (or other equivalent websites) through blogs and twitter accounts associated with the Anonymous movement. Brain notes its utility in escaping the 140 character limitation of twitter, whilst still retaining anonymity with minimum fuss. If illegal material was posted on Anonymous blogs such as anonops.blogspot.com, youranonnews.tumblr.com or anonnews.org it would likely violate terms of service and result in blogs being closed. Pastebin.com therefore, provides a suitably nebulous zone for posting illegal content. Brain makes extensive note of the use of Pastebin.com to release sensitive, stolen information to the web. Although the hacking groups mentioned are not always directly related to Anonymous, it highlights the usage of Pastebin.com as a tool for sharing information. Hacker groups could potentially be working on releases or manifestos collaboratively with their peers, although this in not discernible in the final Pastebin product. Brian, Matt. 2011, June 5. "Pastebin: How a popular code-sharing site became the ultimate hacker hangout." The Next Web: Social M
  •  
    This article provides an interesting (if somewhat brief) account of the Anonymous movement, and associated (as well as un-associated) hacktivist networks, using a relatively simple internet tool and altering the intended usage to suit the purposes of the movement. The article focuses mainly on the usage of Pastebin by an offshoot of the Anonymous movement called LulzSec, and how the group was able to use Pastebin to greatly aid their hacktivism efforts (Brian, 2011). Although now disbanded and with most of its members arrested (Apps, 2012), LulzSec very successfully utilised Pastebin for various leaks and links to their efforts of retrieving data from a number of high-profile organizations. This article touches on another example of the confrontational tactics for raising media awareness outlined by Andrews and Caren (2010), and thus the two articles may provide relevant references for discussions relating to the reactions to hacktivist groups such as LulzSec, as well as providing information regarding another tool used by such movements. In terms of my focus on the Anonymous movement, the article may not provide a direct reference to the divides between individuals within the movement based on motivation for activities under the Anonymous movement. The article does however provide a relevant secondary source for additional discussion relating to the way in which particular offshoots of the Anonymous movement operate. Andrews, K., & N. Caren. (2010) Making the News: Movement Organisations, Media Attention, and the Public Agenda. Retrieved from http://proquest.umi.com.dbgw.lis.curtin.edu.au/pqdweb?did=2527572391&sid=1&Fmt=6&clientId=22212&RQT=309&VName=PQD Apps, P. (2012). LulzSec Arrests Hurt Hacker Groups, Anonymous Movement Hard To Kill. Reuters. Retrieved from http://www.huffingtonpost.com/2012/03/08/lulzsec-arrests-anonymous_n_1331982.html Brian, M. (July 5th, 2011). Pastebin: How a popular code-sharing site became the ultimate hacker hangout. Retrieved fr
Jocelyn Workman

Yates, D & Paquette, S. (2010) Emergency knowledge management and social media technolo... - 2 views

  •  
    This article looks at the value of social media as a knowledge management platform for managing emergency responses by organisations to disasters, based on a case study of the 2010 Haiti Earthquake. The US was a major stakeholder in coordinating the emergency response to this humanitarian crisis and had, prior to this event, relied on manually intensive and centralised knowledge management systems. This was the first time the U.S. Government "relied on social media to coordinate knowledge and action between cooperating agencies" (p. 7). Data was gathered by one of the participating authors assigned to AFCAT (U.S. Air Force Chief of Staff's Crisis Action Team) to configure social media tools. SharePoint, newly introduced to the organisation, provided a new basis for knowledge sharing. Previously, the only opportunity for staff to find out what others were doing was during information briefings. The SharePoint platform supported mechanisms for knowledge sharing within the team, and Haiti specific wiki pages were developed by participating agencies using a common government MediaWiki platform. Together, these social media tools increased the flow and form of knowledge as they allowed knowledge to be: o shared - it was now visible and accessible within and between agencies o reused as new knowledge o verified and usefulness rated o removed duplication of effort o facilitated collaboration and cooperation between groups Conversely, this study found that the uncontrolled uploading of information to wikis required organisations to put systems in place to manage and monitor the content of wikis. Accuracy of information for emergency response by organisations is critical. This peer reviewed article provided a theoretical framework for social media as it applies to disaster management. I found it took several readings to absorb the content and it was difficult to work out what social media tools were actually created beside wikis.
Sian Cooper

To use or not to use web 2.0 in higher education? - 11 views

Grossek, G. (2009). To use or not to use web 2.0 in higher education? Procedia Social and Behavioural Sciences. Pp478-482. Retrieved 21st March 2012 from http://webpages.csus.edu/~sac43949/pdfs/to%...

Net308_508 web 2.0 wikis education

started by Sian Cooper on 21 Mar 12 no follow-up yet
Jocelyn Workman

Conflict and Disaster Management in a Hyper-connected World - 18 views

Collins article is a useful resource as it discusses the need to increase hyper-connectivity in civil-military responses, with government and non-government organisations engaging with the wider ne...

Net308_508 collaboration social media disaster volunteering crisis movements microvolunteering communication twitter texting technology

Jarrad Long

Reips, U-D & Garaizar, P. (2011) Mining Twitter: A source for psychological wisdom of t... - 10 views

This article discusses the usefulness of Twitter as a tool for research. Researcher Pablo Garaizar suggests that monitoring large volumes of tweets and identifying trends in what users are saying -...

Net308_508 collaboration Crowd participatory

Jocelyn Workman

http://www.cs.colorado.edu/~palen/vieweg_1700_chi2010.pdf - 1 views

  •  
    Vieweg, S., Hughes, A., Starbird, K & Palen, L. (2010). Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. Retrieved 15 March 2012 from http://www.cs.colorado.edu/~palen/vieweg_1700_chi2010.pdf Individuals affected by the emergency events of the Red River Floods and the Oklahoma Grassfires in North America during the Spring of 2009, posted information about their respective situations via the microblogging service, Twitter. In this study, the authors analyse "situational update" information tweeted by individuals experiencing these hazards 'on the ground' to see how these people used the tweets to inform and develop an awareness of the current situation within their community. Twitter is seen as a commonly used social tool increasingly used for emergency communications "because of its growing ubiquity, communication rapidity, and cross platform accessibility", and are "a place for "harvesting" information during a crisis event to determine what is happening on the ground". From the analysis of collected data, coding was allocated by geo-location, location referencing and situational update information. Findings indicated Tweeters broadcasted similar types of information in both emergency situations, and tweets of high Tweeterers during emergencies were 'content rich' and displayed 'big picture situational awareness', with retweets indicating important updates. This study confirms how individuals facing a crisis rely on social media for their own safety and use the tool for altruistic purposes by providing current awareness of the crisis. In addition, the authors developed a Microblog-Enhanced Situational Features for Emergency outline of information categories for use in emergency response. They suggest this outline be used to assist with the development of system s
  •  
    This article relates to the article by Sutton (2010) because it talks about how micro-blogging in the time of disasters is one of the easiest ways for individuals to retrieve, produce and spread information through social networking sites such as Twitter. Sutton (2010) states that Twitter can bring people together in disasters which not only prompts micro-blogging but also can involve micro-volunteering as well. Online communities such as Twitter are decentralized which brings about self-organization and mobilization of information. The two articles are linked in that they both discuss how micro-blogging during disasters is about how information such as warnings, evacuations and peoples locations is shared online by different individuals in the community. Both articles had images implemented to show the readers where the location was that they were discussing as well as graphs to compare the data that is being focused. This made it very reliable to the topic and the range of references also showed how different perspectives were used in this research. I found the article relevant in showing how Twitter had an impact in disaster management and how micro-blogging can actually make a huge effect on how people communicate during a crisis. The graphs and images in the article were very useful because that provided evidence which complemented the text. The article is very valuable for this project because it shows how Twitter is evolving from being used for just a social medium to disaster management. References: Sutton, N. J. (2010). Twittering Tennessee: Distributed Networks and Collaboration Following a Technological Disaster. Proceedings of the 7th International ISCRAM Conference. Retrieved from http://www.jeannettesutton.com/uploads/Twittering_Tennessee_FINAL.pdf (Accessed 16/03/2012)
owen_davies

BitTorrents and Family Guy: teenage peer group interactions around a peer-to-peer Inter... - 22 views

This particular paper looks into the bit torrent community while focusing on the popular American Cartoon-Comedy Family Guy. The article looks into how bit torrent is able to make downloading and s...

Net308_508 Crowd bittorrent

Mitchell Houwen

Review of Lazy Virtues: teaching writing in the edge of Wikipedia. - 22 views

I think it is very astute of Potts to refer to the different generations as 'digital natives' and 'digital immigrants'. We (I include myself in the younger generation) have grown up in a world of c...

Net308_508 Wikipedia Educatin

samara hartnett

Social Media: A New Frontier for Retailers? - 6 views

  •  
    As with any critical research involving new technologies the acknowledgment of a 'lack of concrete academic scrutiny and scientific evidence' (Boria et al, 2008) is important. In this article it acts as a timely reminder that mobile devices are still a currently evolving technology. This point serves the reader well when they are trying to position the use of mobile devices and their abilities in sourcing information. There are a number of important points highlighted throughout the article that are directly linked to this evolution. Firstly the evolving role of the consumer that is emerging empowered, sophisticated, critical and well informed. Secondly the developments towards effective leveraging and deriving value from social media-based tools and thirdly the continual shift in consumer behavior away from 'corporate communication' and towards 'peer reviews', ultimately affecting buyer intentions (Boria et al, 2008). Taking the fore noted current evolution of mobile devices into account, a small suggestion that we are 'in the process of replacing phones…' (Boria et al, 2008) all together, can be best understood with reference to traditional mobile technologies. They could not access the Internet. Although this is the only direct reference to a mobile device there is extensive analysis into the sourcing of information by consumers. With out mentioning the Smartphone but accepting its general mainstream adoption, it is easy to assume that consumers sourcing and contributing product information could do so easily from their mobile devices whilst in the act of shopping.
  •  
    Reference: Boria, Constatinides and Romero. 2008. Social Media: A New Frontier for Retailers?. Retrieved from http://www.utwente.nl/mb/nikos/publications/ecpapers/constantinidessocialmedia.pdf
  •  
    This article is beneficial because it touches on key issues relating to the retail industry's lack of adaptation and understanding of online technologies. It highlights the future potential of online shopping, identifies non-adaptation of new technologies as a threat whilst pointing out the potential risk in adopting them. There has been a lot of media coverage about this topic in recent months and whilst this paper was written in 2008 it is not until now that many retail giants are utilising online platforms, take David Jones for example. The study mentions the lack of academic resources relating to Web 2.0 technologies, this is similar to the Twitter paper by Burton & Soboleva, 2011 where there is also little research relating to understanding the real value in the adaptation of Twitter by businesses. "Lack of concrete academic scrutiny and scientific evidence is a warning to businesses to be cautious when engaging in Social Media as marketing tools." (Boria et al, 2008). The article also mentions that retailers could misjudge available tools. This to me expresses the uncertainty that many had and might still have in jumping into these technologies and that there may be a general notion of not understanding their real value. Overall the shift in power from the organisation to the consumer is evident and the ubiquitous nature of the Internet through mobile usage adds to this shift. Crowd sourcing here plays a part because consumers have access to other consumers' opinions and recommendations. Web 2.0 is key, when a consumer has a question others can answer it, instead of the business itself, consumers trust other consumers. An attempt of crowd sourcing by retailers is also is evident here, examples are shown where retailers have tried to get customers to become co-producers or creative contributors, this also serves as a way to create stronger customer engagement. Additional referenc
Stephen R

Beyond Microblogging: Conversation and Collaboration via Twitter - 1 views

  •  
    Courtenay Honeycutt and Susan Herring discuss the collaborative potential of Twitter. This is of particular relevance to the discussion of Anonymous organisation tools, as Anonymous uses Twitter for a large amount of its public relations. @Anonops, @AnonymousIRC and @Youranonnews are twitter users with substantial followers, each with greater than 250,000 followers. Anonymous's favourite method of attack - Distributed Denial of Service (DDoS - works better with every additional participant. Anonymous must recruit members to participate in such attacks through Twitter, Facebook and Youtube. Twitter presents the most anonymous and easily digestible communication channel of the three, whilst also being extremerly active during past operations such as #oppayback. Therefore, Twitter plays a central role in the collaboration of anonymous, especially communicating with those who do not take an active role in IRC chats. Honeycutt and Herring examine the conversational and collaborative potential of Twitter with the use of the @ symbol to direct conversation. This activity is very prominent among the Anonymous Twitter account listed earlier. Anonymous Twitter feeds are full of responses to criticisms and answers to questions. It is worthwhile to note that Honeycutt and Herrings article was written in 2009, before use of the @ symbol became recognised by Twitter as a certified way of creating conversation. Now, it is easy to transverse conversation simply by clicking tweets with an @ symbol. During Anonymous operations, Twitter provides an invaluable resource in being able to address such a number of followers at once. Honeycutt and Herring also note similarities between Twitter and IRC channels, also noting that the hectic, crossing conversation are perhaps part of the appeal to some of IRC. This is certainly present in Twitter, but without the constraints of server based IRC channels. Twitter presents a global audience to which Anonymous reaches out, when recruiting
Stephen R

Anatomy of an Anonymous Attack - 1 views

  •  
    This article, recently published by security firm Imperva, investigates how an Anonymous attack is mounted. A Particularly interesting point is that this article makes no mention of IRC channels, instead painting Facebook, Twitter and Youtube channels as the main methods of communication for Anonymous. Also interesting is that such communication is referred to as recruitment, recruitment of technically savvy hackers and not so technically savvy activists who are willing to participate in the attack. Particular attention should be paid to pages 6-8 which outline the recruitment activities over Facebook, Youtube and Twitter. Imperva outline the technical methods used to stage the attack, mentioning that there are 10 -15 'Anons' working to analyse the victim website for security vulnerabilities. These are more experienced hackers who are searching for a vulnerability that might allow them to retrieve private data from the victim (p.6). Although not mentioned in this article, perhaps these experienced hackers collaborate using Internet Relay Chat. When no vulnerability was found, Imperva notes that Anonymous instead tries a DDoS attack, but instead of employing the LOIC, a web based version is used for ease of participation (p.13). This way, users of any device can be recruited (through social media) into participate in the attack with minimum of barriers to entry. Although this article focusses heavily on the technical aspect of the attack, a significant portion of the article deals with the recruitment of participant through social media, alongside discussion of the online variant of the LOIC collaborative Denial of Service tool. Anatomy of an Anonymous Attack. 2012. Imperva. http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf
  •  
    This document may prove to be quite a significant additional reference to my focus of my chosen topic of the Anonymous movement and hacktivism. This article discusses precisely what Mansfield-Devine (2011) neglected to note; that within the Anonymous movement, there are a number of individuals with significant hacking skills who are able to retrieve valuable data from the targets of Anonymous attacks. The article quite thoroughly deconstructs the order in which Anonymous attacks typically occur, the differences between the two major types of individuals who participate, and circumstances under which Anonymous attacks are generally able to be successfully performed (2012). Of particular interest, is the emphasis placed on the importance of acknowledging the fact that Anonymous attacks are not always as harmless as they may appear. Another interesting note is found within the conclusion of the report. The report suggests that targeted, small-scale data retrieval attacks are the preferred means of attack for the Anonymous movement and that "DDoS is the hacker's last resort" (Anatomy of an Anonymous Attack, 2012). This would suggest that unlike many sources of information regarding Anonymous hacktivism attacks, Imperva has identified the serious nature of many incidents involving the Anonymous movement, which do not necessarily receive as much immediate attention as a simple DDoS attack may. Anatomy of an Anonymous Attack. (2012). Imperva. Retrieved from http://www.imperva.com/docs/HII_The_Anatomy_of_an_Anonymous_Attack.pdf Mansfield-Devine, S. (2011). Anonymous: Serious threat or mere annoyance? Network Security 1: 4-10. Retrieved from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S1353485811700046
Oliver Hennessey

Moldova's internet revolution: Analyzing the role of technologies in various phases of ... - 0 views

  •  
    Lysenko, V., Desouza, K. (2011). Moldova's internet revolution: Analyzing the role of technologies in various phases of the confrontation. Technological Forecasting & Social Change 79 (2012) 341-361. Retrieved March 23, 2012 from http://www.sciencedirect.com.dbgw.lis.curtin.edu.au/science/article/pii/S0040162511001223 This research article published in the journal 'Technological Forecasting & Social Change' analyses the role played by online collaboration and organisation tools in Moldova's revolution of April 2009. It specifically details the different technologies used during various phases of the revolution. The research is quite detailed in identifying the different groups involved - dissenters and authorities - with statistics and case studies breaking down the timeline and dynamics of the revolution. Overall the researchers found that: "1) the protesters organized their initial mobilization through social network services (SNS) and short message service (SMS); 2) Twitter was mostly used during later phases of the revolution - the active street protests and the subsequent information war - for communication about the conflict both locally and globally; and 3) through skillful use of new Internet-based ICTs, it is possible to conduct a successful revolution without noticeable prior offline organization". I chose this article as it highlights the power of Twitter as an organization tool through its involvement in providing a communication platform for the dissenters to organize street protests and then update from the ground what was happening. It also shows Twitters strength as a collaborative tool for movements with the involvement of supporters outside of Moldova tweeting about the revolution.
  •  
    I love this article as it relates to the Orange Revolution. I am also a proud protester of a post Orange Revolution protest in New Europe (Latvia) where I had personal exchanges with MP's in a New European country - read here http://balticguide.ee.klient.veebimajutus.ee/index.php?s=1&n=110&a=4161 In Latvia there have been many protests and I sought to increase international pressure on the Latvian government through my founding the Australian Chamber of Commerce in Latvia and in many other ways. I even managed to gain the participation of Curtin University honours Business Students that stayed in a remote city of Latvia to assist the council with its plans. The use of mobile SNS was not part of the protests I was aware of and participated in. Friends informed me what was being posted on websites about the time and place of the next protest. This enabled the inclusion of older proud Latvians and this caused the dynamic situation where younger people restrained their physical action in respect of the older participants so they would not get caught up in altercations. Later protests were much more violent. I as a primary source of information about student protests in New European countries can attest to the fact that the use of mobile SNS would have been very helpful and would have increased the momentum of protests. Because of the many protests in Latvia, many of the citizens that would like to see change, are suffering from protest fatigue. Possibly the earlier more effective use of mobile SNS could have made a difference. I blogged http://austchamriga.blogspot.com.au/ and wrote threatening letters to the IMF as well as led by example through organising courses for the youth of Latvia http://www.youtube.com/watch?v=9uBThbeXy9Q I will be back to Latvia to push more for the direction and changes the people want. I am arming myself with information like in this paper and what I learn in the Masters of Internet Communication. What is clear to me is that without a
Jocelyn Workman

Expecting the Unexpected: The Need for a Networked Terrorism and Disaster Response Stra... - 14 views

Stephenson and Bonabeau's article (2007) proposes an alternative strategic approach for emergencies that utilises the concepts of 'swarm intelligence' and 'netwar' (2007, p. 2), a combination of co...

Net308_508 collaboration community social media Twitter Wikipedia Disaster Management Crisis Response

Jocelyn Workman

Social Media and Disasters: Current Uses, Future Options, and Policy Considerations - 17 views

This CRS (Congressional Research Service) Report for Congress by Lindsay, provides an organisational perspective of how social media have been and might be used to improve emergency response and re...

Net308_508 Twitter social media community collaboration Wikipedia Crowd

samara hartnett

Public Radio's Social Media Experiments: Risk, Opportunity, Challenge - 4 views

  •  
    I have centered my approach to the main theme of Mobile Phones and Crowd Sourcing on both the Radio and Retail industries. With the acknowledgment that Mobile Phones, Crowd Sourcing and Social Media are all connected through the creation and distribution of information, this article further explores the individual adoptions or resistance to associated practices relating to the main theme. The article 'Public Radios Social Media Experiments' (Levenshus, 2007) proves itself very useful in its ability to pin point relevant conclusions regarding the role of the audience, the nature of online communities, the use of associated tools and reasons of reluctance towards industry integration. Although this article responds directly to Radio the points of analysis can also be applied to the Retail industry. These conclusions referred to the transformation of listeners/consumers into potential sources of information and the ability of audiences/consumers to contribute and reveal an unexpected wealth of knowledge. It is here that the connection to information obtained by crowd sourcing on social media platforms is supported and the seamless integrated of mobile devices into this process could be assumed. The article also surmises that social media and crowd sourcing strategies are essential to the future of public broadcasting. This should also be considered with reference to Retail. There are explanations as to why resistance to social media opportunities may occur. For example, resistance is due to the lack of knowledge, resource allocation and institutional culture (Levenshus, 2007). But above all the article describes online communities as organic, dynamic and having lives of their own (2007), giving us a valuable base with which to analyse the role of mobile devices in sourcing information. The provisions of such analytical conclusions help to develop a better understanding of the overall affects to industries such as Radio and Retail as they reconsider busi
  •  
    Thanks for the heads up Dean - the link loads fine in a new tab for me... Have I done something wrong in my post do you think?
  •  
    I have been a big fan of listening to podcasts for years from http://www.abc.net.au/radionational/ . I subscribe to them in Facebook. So I have seen how they have slowly improved how they engage with the public. So your example I think is a good one for an industry that previously just has synchronous communication and now because of Social Media has A Synchronous to leverage its value. What has happened for radio has good lessons for those business owners that think business has got tougher. Radio previously had an audience/users that was "out there" and many other businesses have an audience that is "in here." Regardless of how the audience/client is connected/contacted then this touch point can be leveraged and value added by social media. The Curtin University Gym has users that are "in here" and whilst people are in the gym using the equipment they can see TV's that include advertisements for Physiotherapy etc. This is a basic form of social media interaction, The user arrives and the TV delivers. The Gym also has a Facebook page that they seek to have users or all of Curtin University to like. Maybe they also make use of Flickr and other social mediums that all adds up to adding value to the business through indirect advertising and awareness creation. So the point I am trying to make is that if you have "in here" users then you ought to connect with them whilst they are in the gym with as much social media as is acceptable. Can the Endomodo App be given a Curtin University Brand/Logo so that the many users can utilise? If not then the Curtin Gym can make use of Endomodo Groups so that the elderly classes can better network and collaborate etc. The more connected a business is with its client base then the more value it can deliver to them and the more revenue that business can collect from advertisers in the case of a radio station. A supply busines
Jocelyn Workman

IGI Global: Fire, Wind and Water: Social Networks in Natural Disasters - 0 views

  •  
    Freeman, M. (2011). Fire, Wind and Water: Social Networks in Natural Disasters. Journal of Cases on Information Technology,13 (2), p.69 -79. A study of the increasing adoption of social networking tools (SNTs) as a channel for critical communication during disasters in Australia, is the platform used by the author to look into how society is accepting the use of SNTs as a whole for emergency management. Using recent natural disasters, the use of SNT's is traced from their limited use during the Victorian Bushfires in 2009 to their increased use and the reliance on SNTs by authorities and individuals, during the Queensland Floods of 2010/2011 and Tropical Cyclone Yasi in 2011 (February). During the fires of 2009, Twitter was used by the ABC radio station 774 Melbourne to provide as much coverage of the fires as possible. Followers increased from 250 to 1200 indicating the popularity of this form of communication, and offering an sight for future use. Two years later, the Queensland Police Service used Twitter and Facebook extensively to broadcast accurate information to those affected by the floods and correct misinformation. The same tactics were employed for Tropical Cyclone Yasi. Technologies are discussed as a medium of communication for accurate and timely information during disasters and for the sharing of knowledge, increasingly coming from the bottom up, but also utilised appropriately from the top down when required. Although this article was easy to understand, the author's discussion of the disasters and technologies, the extensive discussion of qualitative research, followed by a presentation of the case, lead to a repetition of information about the disasters. A more succinct and structured presentation of the results of this triangulated approach to research would have made it easier to appreciate the benefits of SNTs to communities.
Victoria Jobling

Protest 2.0: Online Interactions and Aboriginal Activists - 1 views

  •  
    Petray, T.L. (2011). Protest 2.0: Online Interactions and Aboriginal Activists. Media, Culture and Society, 33(6), 923-940. Retrieved March 25, 2012, from Sage Journals Database. http://mcs.sagepub.com.dbgw.lis.curtin.edu.au/content/33/6/923.full.pdf+html This article conveys, that while it is necessary to utilize the tools made available by the digital age, they "should be used to enhance offline activism, rather than to replace it" (p.936). The author has studied an Aboriginal community in Townsville, and the difficulties that activists have faced in gaining momentum in a digital space. Unlike the young tech-savvy protestors in the Arab uprising, or the destructive youths in the London riots, the participants in this community are older and not comfortable with new technology. In this remote community, emails have been favoured when conveying information and organizing meetings online (p.927). However, this has caused difficulties in the disjointed fragmentation of messages, as well as, interfering with a culture that values visual storytelling over the written word (p.930; 927). Similar to, Climate Camp in the UK, the community may have benefited from using some Internet tools, however, face-to-face meetings were found to be more effective when collaborating and organising events. To further their presence online, the group created a Facebook page, allowing people to donate money and support them. However, the lack of success in gaining political momentum is linked to the participants and the current nature of online activism. Whilst the page can facilitate collaboration and organisation, it lost its momentum in the lack of group activity and recent updates (p.933). Due to the current nature of online activism, people can simply 'like' a page or sign a petition to show their support towards a cause, with little to no effort (p
  •  
    Whilst I totally agreed with the concluding points of this article I found it very hard to identify just which topic this article had the greatest relevance to. It is a reliable source as it is associated with the James Cook University and the author has positioned themselves within the community they are researching. I could draw similarities with one of my articles, Public Radio's Social Media Experiments: Risk, Opportunity, Challenge, (Levenshus, 2007) in that they both reference a resistance to social media opportunities. The reasons for this 'resistance' in both articles could be put down to a lack of knowledge, resource allocation and institutional culture or 'cultural explainations' (Petray, 2011, p. 927). The understanding that 'push-button activism' was more of a feeling of evolvement rather than the translation of any 'real participation', supports the articles offer of a resolution. Any negative ideals about cyber-activism are squashed by the simple resolution of combining offline infrastructures with the online and not just relying on either one. Overall I thought this article was a breath of fresh air. Whilst I realise that 'cyber-activism' has been in the spotlight a lot lately due to the Kony 2012 campaign, I was delighted to read an article that turns its attention to local activism. Aboriginal cultures have always maintained my interest and just recently I viewed the 'Tall Man' exhibition that dealt with the Palm Island death in custody referred to in the article. It had a profound affect on me. I also appreciate that preserving oral histories and the rite to communicate in ones own language has deeply embedded social issues within Australia. This is another reason why this articles direct referencing of Aboriginal activism is refreshing and of great value. Equal access to social technologies is so very important in closing the digital divide both globally and locally. As the article points out only '25%' of the globe have such access (P
  •  
    Reference: Levenshus, A. 2007. Public Radios Social Media Experiments: Risk, Opportunity, Challenge. Retrieved from http://www.centerforsocialmedia.org/sites/default/files/public_radio_report3.pdf
Mitchell Houwen

A Decade Of Wikipedia, The Poster Child For Collaboration - 4 views

shared by Mitchell Houwen on 25 Mar 12 - No Cached
  •  
    The poster child of collaboration? A bold statement but is it that far off the truth? Every day Wikipedia helps people around the world find information that is both detailed and related to the topic they have searched. The modern internet is filled with incorrect and purposely misleading information that users can freely access. The user has no idea that the information they are receiving is incorrect so it is quite often trusted. Wikipedia's system of article moderators allows the information to be supplied by anyone but filtered by people considered to be well educated in that chosen field. This means that the information is not as random as other information available throughout World Wide Web. The progression in the Web 2.0 era has been at an exponential rate and Wikipedia has been at the fore front of the revolution as it allows users of the World Wide Web to contribute which is what separates Web 1.0 and web 2.0. So I don't completely agree with the idea that Wikipedia is the poster child of collaboration, however I would suggest that it is the poster child of the Web 2.0 era as it encompasses all that makes the new era so exciting.
  •  
    I found this article was an interesting read as it discusses Wikipedia's journey in becoming a successful and reliable encyclopedia. While I do consider myself a Wikipedia supporter I did find the article to be incredibly bias in favour of Wikipedia as it speaks extensively with Sue Gardner the Executive Director of the Wikimedia Foundation. The article does briefly touch on some negative points about Wikipedia in hearing from Robert McHenry, author and former Editor-in-Chief of Encyclopedia Britannica (Wikipedia's largest competitor) but soon turns back in favour of Wikipedia explaining that its scientific articles are of similar accuracy to that of Encyclopedia Britannica (Solon, 2011). As this article suggests, Wikipedia is evermore becoming a reliable source of information however people still seem to question Wikipedia's reliability. Here are somethings that I found in my own research that can suggest people's lack of confidence in Wikipedia's reliability: * Wikipedia articles that cover obscure and unusual topics tend to present more inaccuracies and errors than those covering mainstream topics - this is because obscure topics receive less traffic and therefore there is less likelihood of errors being corrected (Ball, 2007). * Wikipedia is not an accurate representation of a vast and diverse crowd, in fact "the encyclopedia is missing the voices of people in developing countries, women and experts in various specialties that have traditionally been divorced from tech" (Manjoo, 2009). * Wikipedia has in the past been subject to vandalism with hoax and defamatory article updates (Ball, 2007). Reference: Ball, P. (2007, February 27). The more, the wikier. Nature: International weekly journal of Science. Retrieved from http://www.nature.com Manjoo, F. (2009, September 28). Is Wikipedia a Victim of Its Own Success? Time Magazine. Retrieved from http://www.time.com/time/magazine Solon, O. (2011, January 11). A Decade of Wikipedia, Th
  •  
    This article provides quite an interesting overview of Wikipedia and how it started off as a "dirty little secret" for some in the earlier years, with its use progressing to be an "accepted part of daily life in the developed world" ten years after its launch. In addition, higher education facilities (Grossek, 2009; CCNMTL, 2008) and companies (Hendrix & Johannsen, 2008; Hasan & Pfaff, 2006) are beginning to discover the advantages of employing wikis in their respective institutions. We are beginning to see that the 'wisdom of the crowds' and 'knowledge management' are important factors in larger organisations. Thus what once started out as an online encyclopaedia and a "dirty little secret" is now branching out and weaving its way into larger businesses, organisations, and educational institutions. Although Wikipedia has suffered its fair share of editing glitches and is not completely error free, as mentioned in this article, Wikipedia has come a long way since its introduction into the Web 2.0 world and is becoming a more commonly used tool. In addition, it has shown us the effects of the 'wisdom of the crowds' and how collaboration can be so important. Speakers at the New Media in Education Conference (CCNMTL, 2008) note that wikis provide such a valuable communication and collaboration platform that they essentially create a virtual classroom- an interactive platform where students can share ideas, edit documents, and collaborate on group projects. Inevitably I do agree with the title of this paper and think that Wikipedia is "The Poster Child for Collaboration", with Wikipedia and wikis weaving their way into educational institutions (Grossek, 2009; CCNMTL, 2008) and companies (Hendrix & Johannsen, 2008; Hasan & Pfaff, 2006) who use them as a collaborative tool. Additional References: CCNMTL (Nov 3rd, 2008). Promoting Collaborative Learning using Wikis. [YouTube Video]. Retrieved 22nd March 2012 from http://www.yout
Chin Sing Wong

Peer-to-Peer Dissemination of Learning Objects for Creating Collaborative Learning Comm... - 7 views

Bulkowski, A., Nawarecki, E., & Duda, A. (2008). Peer-to-Peer Dissemination of Learning Objects for Creating Collaborative Learning Communities. Retrieved from http://www.editlib.org/p/28630. ...

Net308_508 Crowd bittorrent

started by Chin Sing Wong on 25 Mar 12 no follow-up yet
1 - 20 of 40 Next ›
Showing 20 items per page