Skip to main content

Home/ Groups/ OUANet308-2011
Anthony Robinson

The Potential Use of Blogs in Nursing Education - 0 views

  •  
    This article highlights the potential that blogs have in allowing student nurses to collaborate and enhance their studies. The article describes how healthcare professionals can use online collaboration to "communicate, manage knowledge, mitigate error, and support decision" (Maag, 2005). The author believes that strong written skills are essential in nursing to "disseminate information on evidence-based practice and ultimately provide safer client care" (Maag, 2005). These skills can be enhanced by the online collaboration found with blogs as they provide "an opportunity for the nursing student to converse and state opinions about their knowledge acquisition" (Maag, 2005). Further to this, online collaboration in the form of blogs can provide the setting for "public debate regarding simulations and scenarios that might occur in the clinical setting" (Maag, 2005). This article is a valuable and highly credible resource. The author, Margaret Maag EdD, RN is a Doctor of Education as well as a Registered Nurse. Also the article was accepted by and published by an Industry Journal, Medscape. Although this article may be too detailed at times and provides a lot information on the types and working of blogs, this is probably due to the article's age (published in 2005) when background information was probably required on blogs. The main value of this article is it ability show how blogs, even back in 2005, were "providing the means to make a collaborative effort in enhancing knowledge acquisition". This would not only benefit nursing education but also the healthcare industry at large. References: Maag, M. (2005). The Potential Use of Blogs in Nursing Education. Retrieved April 16, 2011, from http://www.medscape.com/viewarticle/498947
Anthony Robinson

How Web 2.0 is changing medicine - 0 views

  •  
    In this article, Giustini (2006) explains how web 2.0 and it's intrinsic "spirit of open sharing and collaboration" aids the "continual loop of analysis and refinement" of medical information. Giustini (2006), like Maag (2005), uses the example of blogs - in this case Ves Dimovs's Clinical cases and Images - to demonstrate how online collaboration promotes interactive discussions and timely updates on peer-reviewed medical material. Giustini (2006) also touches on how Google can serve as a diagnostic aid, but this will be examined in my commentary on "Googling for a diagnosis" (Tang, 2006). This article is a valuable resource because it highlights another form of online collaboration: the wiki. Giustini (2006) sees wikis as a place "to create optimal knowledge building opportunities for doctors", which will ultimately advance medical science. Wikis can do this in a number of ways. Firstly, by providing an environment "where knowledge exchange is not limited or controlled by private interests" (Giustini, 2006). Wikis also allow "participation and conversations across a vast geographical expanse" and "permit continuous instant alerting to the latest ideas in medicine" (Giustini, 2006). Wikis could also be used "as a low cost alternative to commercial point of care tools". Giustini's occupation as a medical librarian at the University of British Columbia enhances the credibility of this article. This is why I have chosen it to demonstrate the positive effect online collaboration is having on the medical industry. This article is important because it places the idea of a medical wiki in a much larger context. By breaking down the "old proprietary notions of control and ownership" (Giustini, 2006) of knowledge, wikis "may be the answer to the world's inequities of information access in medicine" (Giustini, 2006). References: Giustini, D. (2006). How Web 2.0 is changing medicine. Retrieved April 16, 2011, from http://www.bmj.com/content/333/7582/1283.full Tan
Anthony Robinson

Googling for a diagnosis-use of Google as a diagnostic aid: internet based study - 0 views

  •  
    The internet and the online collaboration that it facilitates is quickly becoming an important clinical tool for doctors. This case study focuses on how doctors use Google to diagnose difficult cases. It was chosen as a resource because it provides another example of how online collaboration is benefiting the medical industry. While there is anecdotal evidence that patients use Google for self diagnosis, I was surprised to find that doctors are using Google as well. In this article, Tang & Ng (2006) examine "How good is Google in helping doctors to reach the correct diagnosis?" . This study shows that the "efficiency of the search and the usefulness of the retrieved information also depends on the searchers' knowledge base" (Tang, 2006). For instance, a doctor would know the correct medical terminology for a patient's symptoms and also have an understanding the medical terms that are returned by Google. For this reason "Google searches by a "human expert" (a doctor) have a better yield" while "patients doing a Google search may find the search less efficient and be less likely to reach the correct diagnosis." This study is a valuable resource because its results are statistically based and follow a well-defined method. This study clearly states the results that 15 out of 26 cases were correctly diagnosed using Google. The real importance of this case study is to demonstrate how online collaboration has allowed useful information on even the rarest medical syndromes to be found and digested within a matter of minutes (Tang & Ng, 2006) and that "web based search engines such as Google are becoming the latest tools in clinical medicine" (Tang & Ng, 2006). References: Tang, H., & Ng, J. (2006). Googling for a diagnosis-use of Google as a diagnostic aid: internet based study. Retrieved April 16, 2011, from http://www.bmj.com/content/333/7579/1143.full
Anthony Robinson

Patients warned off 'Dr Google' - 0 views

  •  
    This article is quite short and not academic but I have included it because it adds some symmetry to the previous articles I have reviewed. While this article is focused specifically on the "risks associated with self-diagnosis and the reliance on 'Dr Google'" (Whyte, 2010), it also serves to highlight a potential problem of online collaboration: credibility and the quality of information. This is its primary value as resource for this project. While Giustini (2006) talks of the open access and freedom of publication that online collaboration allows, I think there is a drawback to online collaboration that hasn't been addressed in the previous articles. Misleading or incorrect information, especially of a medical nature, can be potentially harmful if published. As Whyte (2010) writes in this article, doctors are finding it increasingly concerning that patients are misusing their medication, referring to the internet for advice rather than consulting a trusted GP. Some Google listings that have not been filtered may list incorrect complications and side effects of certain medicines. As a result patients are taking less than the recommended dosage. Dosages or remedies may also be incorrect on Google and this could lead to potentially dangerous overdoses of medicine. Boulos (2006) writes of the problems gauging the reliability and accuracy of information on the internet. While "virtually anybody is able to alter, edit or otherwise contribute to the collaborative Web pages … the very process of collaboration leads to a Darwinian type 'survival of the fittest' content within a Web page" (Boulos, 2006). This would ensure that dubious information was kept to a minimum. Also by providing a closed and secure digital environment, the collaboration process could be carefully monitored and moderated. References: Boulos, M., Maramba, I. & Wheeler, S. (2006). Wikis. blogs and podcasts: a new generation of Web-based tools for virtual collaborative clinical practice and ed
anonymous

Digital Dialogue? Australian Politicians' use of the Social Network Tool Twitter - 2 views

  •  
    Grant, W. J., Moon, B., & Busby Grant, J. (2010). Digital Dialogue? Australian Politicians' use of the Social Network Tool Twitter. Australia Journal of Political Science, 45(4), 579-604. Using the social network tool Twitter by Australian politicians has proven to be a common practice in Australian political arena. The analysis mentioned in the article, suggests that the politicians use the Twitter for political engagement and gaining of more political benefit. For politicians the Twitter is simply a good way of connecting with public. 'Engaging with community online is a great for me, as Premier, to get feedback on the decisions and actions of my government… Twitter in particular is a frank and spontaneous way for people to share views and thoughts - it's not filtered or tempered by second thoughts, it's raw and immediate, and its 24/7.' One of the authors' questions as part of their conducted analysis was 'Does Twitter offer us better ways to collectively shape our world, or is it instead a fragmentary, dangerous and disempowering distraction?' The obtained results were received from 152 Australian politicians and 477 random Australian Twitters. Data analysis suggested that Australian politicians are clearly engaging with Twitter and their broadcast tweeting is of higher number that of Australians in general. Collected data also suggested a pattern of tweeting that Australians in general follow politicians more than politicians follow them. The data analysis conclusion was the tweeting is used by Australian politicians for influencing the communities and for the benefit they may gain through the tweeting. The Twitter provides a tool for listening to the communities by the politicians and is a definitively a good access point to valuable feedbacks. Twitter's rapid connection between politicians and communities is one of the greatest benefits using the Twitter. The Twitter is providing a venue for Australian politicians, citizens and media to connect and sh
  • ...1 more comment...
  •  
    [Part 1] Digital Dialogue? Australian Politicians' use of the Social Network Tool Twitter This article, published in the Australian Journal of Political Science, reports the results of a study undertaken in 2010 that quantitatively analysed how Twitter is used by Australian politicians. The main aim of the study was to analyse the online engagement between politicians and the Australian public. While Twitter use in Australia is relatively small, Australian politicians, like many of their global counterparts have begun to embrace social media tools that offer them new ways to connect, influence and engage with their constituents. The study found that Twitter users are more likely than users of Facebook to make their profiles and posts public, in fact 79% of the users sampled had public "tweets". Amongst the sample chosen for the study 145 out of the 152 Australian politicians on Twitter had public accounts. A study conducted by Jim Macnamara in 2007, found that Australian politicians are generally "quite resistant to conversational social media", that their websites generally use the broadcast model and that their blogs usually have comments turned off. Even with Twitter, it seems that a large proportion of Tweets from politicians are broadcasting information rather than engaging in political discourse. Twitter, like other social networking tools, bypasses "the heavily mediated connections offered by traditional media" (p. 579) and provides the potential for communication beyond the traditional broadcasting of information, including a forum for minor political parties.
  •  
    [Part 2] The report found that apart from tweets to broadcast information, there is a reasonably high level of 'retweeting' performed by politicians, retweeting is a micro-political act of endorsement. It also suggested that the number of people a politician follows loosely translates as the level to which that politician listens to the public. Politicians replying to tweets from non-politicians, however were found to be quite a low percentage of posts, suggesting that to date Twitter has not particularly facilitated an open political dialogue. References: Grant, W. J., Moon, B., and Busby Grant, J. (2010). Digital Dialogue? Australian Politicians' use of the Social Network Tool Twitter. Australia Journal of Political Science, 45(4), 579-604. DOI: 10.1080/10361146.2010.517176
  •  
    Twitter as used by politicians stands at a crossroads. Held in scorn by many politicians, it is often derided as a trivial communications platform with a distinct lack of professionalism. This is well exampled by Julia Gillard's attack on Twitter fan Joe Hockey for daring to consult his 'tweets' for policy opinion. ""He can't govern the nation by tweet," (Courier Mail 2009). Akin to this is the British House of Commons ban on tweeter for apparently as the Deputy Speaker puts it "letting the outside world know what is going on (in parliament)". (Financial Post 2011) In contrast, is enthusiastic tweeting by politicians such as Federal member Joe Hockey and NSW Premier Barry O'Farrell. O'Farrrell in particular uses Twitter for daily political discourse with his constituents. Often offering further insight into policy matters or recent actions in media. With over 6000 Tweets (NSW MP Tweets 2011) O'Farrell has set a precedent for high-profile Australian politicians using Twitter as an effective medium. With Hockey being accused by Gillard over crossing the line between consulting and collaboration using Twitter, the evolving use of the service remains of great interest to the political world. References Julia Gillard hits Joe Hockey's Twitter usage (2009) Courier Mail. Accessed http://www.couriermail.com.au/news/national/julia-gillard-hits-joe-hockeys-twitter-usage/story-e6freooo-1225804950598 Twitter banned in British Parliament (2011) Financial Post. Accessed http://business.financialpost.com/2011/01/19/twitter-banned-in-british-parliament/ NSW MP Tweets (2011) Statistics about Barry O'Farrell on Twitter. Accessed http://nsw.mptweets.com.au/barry-ofarrell/
Helen Pidoulas

Anonymous and the global correction - Opinion - Al Jazeera English - 4 views

  •  
    The online protest group 'Anonymous' use web based networking and collaboration tools as effective ways to support and achieve their collective goals. This article follows the technological and social conditions that have shaped the groups innovative use of the internet as a tool for political protest. Like the author states, "as the social, political and technological environment has developed, some have already begun to explore new options, seizing new chances for digital activism"(Anonymous, 2011). In many ways it is hard to see how decentralized networks of like-minded protesters can achieve political change. While Anonymous are aware of how "a loose network of people with shared values and varying skill sets (providing) substantial help to a population abroad is seen as quixotic"(Anonymous, 2011), recent campaigns in Egypt, Tunisia and Libya are generally recognized as highly effective and indicative of what is achievable when collaborating on real world projects via web-based networks (see, Keane, B. 2011). Like Wikipedia and other mass-collaboration projects, it is a global network that drives Anonymous' influence. For example, anonymous use tools such as 'Low Orbit Ion Cannon'; or 'LOIC' (see, Arthur, C. 2010), allowing people from around the world to collaborate together. LOIC enables the group to carry out "distributed denial of service (DDoS) attacks, involving thousands of computer users who request large amounts of data from a website simultaneously, overwhelming it" (Anonymous, 2011). Online systems of mass-collaboration are proving to be productive and influential vehicles for social or political change. To understand their success we need to acknowledge how the "technological infrastructure that allows these movements has been in place for well under a decade - but phenomena such as WikiLeaks and Anonymous have already appeared, expanded, and even become players within the geopolitical environment" (Anonymous, 2011).
  • ...4 more comments...
  •  
    How one man tracked down Anonymous-and paid a heavy price While Anonymous may have seized "new chances for digital activism" it remains subject to investigations and attacks both on the group's concepts and any individuals that can be identified. Its aim to achieve political change through civil disobedience leaves individuals open to prosecution and persecution if identified. This article looks further at attempts to infiltrate Anonymous. It becomes a contest between those seeking to expose the real identities of the Anonymous activists and the activist's responses to these attacks. This article describes one such conflict. It is not clear from the article just what the result was and it is implied that publicity was the aim for an attempt to gain Government Internet Security contracts. The interesting point is that a loose gathering of diversely motivated activists is as vulnerable to cyber attacks as the targets they attack. In a private e-mail Barr is quoted to have said :"They think I have nothing but a hierarchy based on IRC [Internet Relay Chat] aliases!" he wrote. "As 1337 as these guys are supposed to be they don't get it. I have pwned them! :)" (Andersen, 2011) The article claims that from leaked e-mails it attained the full story of how Barr infiltrated Anonymous, used social media to compile his lists, and even resorted to attacks on the codebase of the Low Orbit Ion Cannon-and how others at his own company warned him about the pitfalls of his research. What is 'pwned'? "Pwned" means "to be controlled against your will", or "to be defeated by a superior power". The noun version is pwnage. The "pwn" expression originated in the 1980's from the word "owned". It was used to describe when a hacker would take remote control of a server or another computer. The use of "p" to replace "o" was simply a misspelling at first, but the spelling stuck as a stylistic point. (Gil, 2011) What is 1337? "H
  •  
    What is 1337? "Hacker "Sp33k" for leet, or elite. Originating from 31337 "eleet" the UDP port used by Dead Cow Cult, a hacker group, to access Windows 95 using Back Orifice, a notorious hacking program." (Urban Dictionary, 2011) Works Cited Andersen, N. (2011, March). How one man tracked down Anonymous-and paid a heavy price. Retrieved April 12, 2011, from ars technica: http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars Gil, P. (2011). What is 'pwned'? Retrieved April 10, 2011, from About.com: http://netforbeginners.about.com/od/p/f/pwned.htm Urban Dictionary. (2011). Retrieved April 10, 2011, from Urban Dictionary: http://www.urbandictionary.com/define.php?term=1337
  •  
    Low Orbit ION Cannon This hacking tool can be downloaded free of charge by anyone from Source Forge. (abatishchev, 2011) This is interesting as it will probably be illegal for anyone to use the tools to "impair the operation" of a computer which includes servers. According to reports on the Source Forge you should note that the program may include Trojans. There is a clear warning: USE ON YOUR OWN RISK. WITH NO ANY EXPRESS OR IMPLIED WARRANTIES. In Great Britain for example anyone who uses Low Orbit ION Cannon would be likely to have committed an offence under Computer Misuse Act 1990. Specifically: "This subsection applies if the person intends by doing the act-(a)to impair the operation of any computer;(b)to prevent or hinder access to any program or data held in any computer;(c)to impair the operation of any such program or the reliability of any such data; or(d)to enable any of the things mentioned in paragraphs (a) to (c) above to be done." "A person guilty of an offence under this section shall be liable-(a)on summary conviction in England and Wales, to imprisonment for a term not exceeding 12 months or to a fine not exceeding the statutory maximum or to both;(b)on summary conviction in Scotland, to imprisonment for a term not exceeding six months or to a fine not exceeding the statutory maximum or to both;(c)on conviction on indictment, to imprisonment for a term not exceeding ten years or to a fine or to both." (Computer Misuse Act 1990, 1990) Works Cited abatishchev. (2011, January 23). Low Orbit Ion Cannon. Retrieved April 11, 2011, from SourceForge: http://sourceforge.net/projects/loic/ Computer Misuse Act 1990. (1990). Retrieved April 11, 2011, from legislation.gov.uk: http://www.legislation.gov.uk/ukpga/1990/18/section/3
  •  
    A loosely organised group of hackers is targeting oppressive regimes and says this is just the beginning (Anonymous, 2011). Anonymous presents a mechanism for socio-political change, using the available technological infrastructure that also facilitates such movements as WikiLeaks. This opinion piece, hosted by Al Jazeera, describes an evangelical movement in protest against what they perceive to be oppressive establishments, as governments or institutions. They consider themselves a movement for digital activism, and in this article focus almost exclusively on the plight of the Tunisian people, with mentions of attacks on the Church of Scientology and WikiLeaks, and the Australian government following the introduction of internet censorship laws (Anonymous, 2011). The article reads like a resume of Anonymous' achievements, and the motivations behind their actions, such as the WikiLeaks release of material exposing atrocities perpetrated by the Tunisian government provoking participants in the Anonymous network to attack via distributed denial of service (DDoS) non-essential government websites and replace them with messages of support for the Tunisian people (Anonymous, 2011). Such activities require the concerted efforts of collaborating individuals across a potentially widely dispersed online network. When compared with GetUp!, a community-minded tool for promoting activism for campaigns relevant to Australians, or Avaaz, a global community-minded campaign tool, the Anonymous movement, though also created with the best intentions, still reads in this article as taking matters more directly into their own hands, with limited accountability. The article uses such language as 'information warfare', 'revolution', and 'attacking', and endorses the breaking of laws to achieve what members of the movement believe in; '[t]here is a reason, after all, that those of us who have seen the movement up close have dedicated our lives to what it stands for, and have even vio
  •  
    One of the problems with digital activism is that the internet is a tool that can be accessed by many people, cross-border and across many different countries. What might be acceptable practice and perfectly legal in a country like Australia, might be liable to prosecution in countries like China where the government censors not only the internet, but people in general. Freedom in countries like Australia is taken for granted. Other countries might not enjoy this freedom, and when people try to access content that is politically sensitive or illegal in their country, questions are raised about who is providing the illegal content, and the person accessing the material can be liable to prosecution. Internet laws are also changing rapidly, and it is very difficult for people to keep up with the constantly changing landscape of laws that are evolving and reshaping. While there is a need for activism, an awareness or a better understanding of the potential for breaking the law needs to be clearly understood when posting politically or socially active sensitive material online. There is a real danger that activities that are legal for people surfing the web in Australia are not legal in other countries, and the implications this can mean for people not only posting material, but those reading and interacting content, especially if they have to by-pass traditional methods of accessing the internet to get through to what they want to read, hear or see. Louis-Jacques, L. (2003). Legal Research on International Law Issues. Retrieved from http://www2.lib.uchicago.edu/~llou/forintlaw.html
  •  
    Digital or online 'Hacktivism' has a perception of existing as a natural extension of more traditional forms of protest. Being that the Internet has moved on from being a relatively static information source and into a dynamic realm where regulation and social policy is conducted by governments, protesting has struggled to find its place. An example of collaboration gone astray can be seen in the story of 22 year old Matthew George. In October 2009, in reaction to the Australian Federal Government's attempts to legislate an Internet filter Matthew volunteered to let his PC take part in a denial of service attack on government websites. In collaborating with other PC's Matthew thought "We hoped to achieve a bit of media attention to why internet censorship was wrong..." (SMH 2011) Charged and bought before court, the hacking was not seen as protest by authorities but more akin to cyber-terrorism. Whilst the 'real world' allows avenues for protest, as in registered street marches...the Internet has no such outlet, with the exception of self-publication on forums and social media. This has led to a situation where online collaborative protest seems to lead frequently to vandalism in the form of denial of service attacks. Meet the hacktivist who tried to take down the government (2011) Retrieved from http://www.smh.com.au/technology/security/meet-the-hacktivist-who-tried-to-take-down-the-government-20110314-1btkt.html#ixzz1L9cdAeuE
anonymous

Twitter as Medium and Message - 0 views

  •  
    Savage, N. (2011). Twitter as Medium and Message. Communication of the ACM, 54(3), 18-20. Researchers say the Twitter data may help answer sociological questions that are otherwise difficult to approach. Their research documents the Twitter in means of social media that gives people opportunities for tracking what people are saying about everything. The Twitter opens access to tweets with range of incredible number of topics and subjects that people tweet about. For example a scientist at the Louisiana University used the Twitter for a simple search using a few influenza related keywords. This simple search enabled him to predict future influenza outbreaks. The Twitter's data assisted in another professional field called Air Twitter project at the Washington University in St Louis. The Twitter was engaged for additional provision of information or tweets about events like dust storms, fires, air quality and similar. A similar approach was explored by US Geological Survey (USGS). The Twitter was used for messages in means of a supplement to USGS network of seismographic monitors that alert the federal agencies about occurring earthquakes. Another good example is from psychology field where the Twitter was used for the sentiment analysis of tweets. Researchers used 'Affective Norms for English' tool used in psychology that rates the emotional value of words. The analysed tweets revealed data about particular group happiness levels. The real examples above reveal how data from the Twitter can assist in gaining valuable information either for the medicine, natural disasters or just about happiness levels. The Twitter has been recognised as extremely useful tool for gathering data that would be otherwise difficult to search. Twitter's fast and cost free access to information is very useful for the sociological purpose. Of course, there is always potential for spread of unfiltered information that can invite a possibility of abuse, incorrectness and other negati
  •  
    Paula, an excellent and timely article which shows how Twitter has become a collaborative tool for research and data collection purposes. A leading researcher in this area is academic Dr Steve Wheeler at the University of Plymouth in the UK. He quotes a teacher on Steve's blog who states that he uses Twitter 'is because his community - those he wishes to connect with - are best contacted using it' (Wheeler, 2011a). Indeed Steve argues that connections of both research information and data can be found simply by following academics in your field on Twitter. Although such communications can often be one-way but as your article states, the potential for both medium and message, i.e. this can be interpreted as data and research, as leads to what you want can be invaluable if protocols are followed (Wheeler, 2011b; Savage, 2011). For example, people do collaborate simple nights out with friends on Twitter, so therefore why is collaborating on a large project by using contacts on a professional an ideal? Sometimes it depends on Twitter's image as a social media nattering device (Wheeler, 2011b). I agree that Twitter has had an image problem to overcome. But your article does prove it is being used for research advancement. The dust storm data for example shows what is possible to collect and how getting data transcends time and physical borders. However, it is vital that etiquette be followed, perhaps even making Twitter networks private, and the information is check for credibility. These are the challenges Twitter users face; yet to have this collaboration tool is vital for broadening access to research data and findings. References Savage, N. Twitter as Medium and Message. Communication of the ACM, 54(3), 18-20. Wheeler, S. (2011a). Twitter: It's still about the connections. Learning with 'e's, Retrieved April 14, 2011, from http://steve-wheeler.blogspot.com/2011/04/twitter-its-still-about-connections.html Wheeler, S. (2011b). Twitter: Le triple
  •  
    As BOINC is being used to further research projects through public-resource computing, so too is Twitter, another form of online collaboration, now being used for research. "Researchers are finding they can measure public sentiment, follow political activity, even spot earthquakes and flu outbreaks, just by running the chatter through algorithms that search for particular words and pinpoint message origins" (Savage, 2011). Due to the real time nature of "tweets", researchers can get early warning signs of events like earthquakes by searching twitter for key words like "OMG earthquake" and other related words. Programs can also be written to exclude unrelated words, for instance when looking for flu outbreaks, comments like "Beiber Fever" can be instantly excluded. Although at this stage this form of research can not be 100% accurate it can give a picture of what is happening. Twitter can also give researchers a more subjective point of view. It can look at how the people are affected by an earthquake, instead of just giving statistics on building damage and repair costs. As with anything there can be some problems related to using twitter this way. The first is "sample bias". Information gained in this way relies on the users having a computer, internet access and a twitter account. Although in the western world percentages of this would be high, in poorer nations this usage would drop significantly. However this problem can be addressed. Researchers wanting "to glean insights from tweets can apply corrections to the sample, just as traditional pollsters do" (Savage, 2011). The other problem is that of spam, or users hoping to improve the chance of their tweet gaining high rating by re-tweeting on the same topic. For example in an American election a conservative group sent out "929 tweets in just over two hours" (Savage, 2011) with a link that attacked a representative. This can then affect the data bias. There are so ma
Jocelyn Peucker

Avaaz - The World in Action - 3 views

  •  
    "Avaaz is a global web movement to bring people-powered politics to decision-making everywhere" (Avaaz.org, 2011). Avaaz means voice, in "... several European, Middle Eastern and Asian languages" (Avaaz.org, 2011a). This is not a website where you need to prove your credentials or log in to be a member. However, it is one of the most powerful and influential organisations in the world. The Avaaz community "... empowers millions of people from all walks of life to take action on pressing global, regional and national issues, from corruption and poverty to conflict and climate change" (Avaaz.org, 2011a). Their online platform "... allows thousands of individual efforts, however small, to be rapidly combined into a powerful collective force" (Avaaz.org, 2011a). The Avaaz community supports campaigns in 14 languages, has a core team on 4 continents, includes thousands of volunteers. Overall, the community helps organise the signing of petitions, funding media campaigns and direct actions, contact through emailing, calling and lobbying governments, and organizing "offline" protests and events. They do this to "... ensure that the views and values of the world's people inform the decisions that affect us all" (Avaaz, 2011a). Two very good examples of the strength of the community include: * Stand With Anna Hazare (Avaaz.org, 2011b) shows of a petition where over 624,876 people have signed since the campaign launched on the 7th April, 2011. Before the goal of one million signatures was reached, a victory has been announced. * Blackout-proof the protests (Avaaz.org, 2011c) is a current petition to "...secure satellite modems and phones, tiny video cameras, and portable radio transmitters, plus expert support teams on the ground -- to enable
  • ...3 more comments...
  •  
    activists to broadcast live video feeds even during internet and phone blackouts" (Avaaz.org, 2011c). This is a campaign to raise monies through 30,000 donors. Many more of their success stories can be viewed on the highlights page of the Avaaz website, success stories from the Avaaz movement worldwide (Avaaz.org, 2011d). References: Avaaz.org. (2011a).The World in Action Retrieved from http://www.avaaz.org/en/about.php Avaaz.org. (2011b). Stand With Anna Hazare [Petition]. Retrieved from http://www.avaaz.org/en/stand_with_anna_hazare/ Avaaz.org. (2011c). Blackout-proof the protests [Fund-raising]. Retrieved from https://secure.avaaz.org/en/blackout_proof_the_protests/?vc Avaaz.org. (2011d). Success stories from the Avaaz movement worldwide. Retrieved from http://www.avaaz.org/en/highlights.php
  •  
    The opening statement to this web site reads " Avaaz is a global movement to bring people-powered politics to decision-making everywhere" (Avaaz.org, 2011) Immediately the reader is in no doubt that this is an organisation that is able to bring together large numbers of people to influence governments worldwide. Like other commentators I had not been aware of this organisation and spent some time researching. Unlike flash mobs and Anonymous, it appears that Avaaz has a formal structure and employs staff. As their website points out the staff write email alerts to the community and work with experts to develop campaign strategies (Avaaz.org, 2011). But it is the Avaaz community that decide where and how to campaign. This is very reminiscent of the Australian Democrats, where all policies are decided by a poll of members (Australian Democrats, 2011). Flash mobs occur in local communities, but the global nature of Avaaz means that this can be magnified to call attention to new issues on a worldwide or country-by-country basis if needed. The key to Avaaz, flash mobs and Anonymous is the use of Internet communication Technology. As the Avaaz website points out in "previous times each group would need to build up a constituency to reach a scale that could make a difference….Today thanks to new technology and ….. global interdependence this constraint no longer applies" (Avaaz.org, 2011). Australian Democrats.(2011). Structure of the Australian Democrats. Retrieved from http://www.democrats.org.au/about/structure.htm Avaaz.org.(2011). The World in Action. Retrieved from http://www.avaaz.org/en/about.php
  •  
    Avaaz's systems of collaboration allow decentralized networks to form around community and global projects, " ...(taking) action on pressing global, regional and national issues, from corruption and poverty to conflict and climate change" (Avaaz 2011). The Avaaz community, like Anonymous, are examples of how decentralized networks of like-minded individuals are capable of achieving common goals. The influences and successes that these groups are currently having regarding the sharing of global resources and fighting for basic human rights and freedoms of information show how powerful these network structures can be. The strength and flexibility of collective intelligence networks such as Avaaz and Anonymous is found in the diversity of their participants. For example, Avaaz uses methods that "allows thousands of individual efforts, however small, to be rapidly combined into a powerful collective force" (Avaaz 2011). Similarly, Anonymous is "a loose network of people with shared values and varying skill sets" (Anonymous, 2011). Like all collective intelligence networks, every member of these groups is acknowledged as having valuable skills that can benefit the community - so a method of harnessing this is input has been developed. However Avaaz and Anonymous use different techniques regarding how they attempt to achieve their goals. Avaaz use socially and politically transparent methods of traditional protest such as "signing petitions, funding media campaigns and direct actions, emailing, calling and lobbying governments, and organizing "offline" protests and events". In contrast, Anonymous are notorious for their use of "distributed denial of service (DDoS) attacks" using software such as 'Low Orbit Ion Cannon'; or 'LOIC' (see, Arthur, C. 2010). These different ways of collaborating online show that while "the social, political and technological environment has developed, some have already begun to explore new options, seizing new chances
  •  
    Avaaz addresses global issues to generate global interest in improved conditions - globally. The world in action (Avaaz.org). Available in fourteen different language, it encourages borderless interest in issues relevant locally and internationally, promoting campaigns to 'close the gap between the world we have and the world most people everywhere want' (About Avaaz, n.d.). Avaaz is to the world what GetUp! is doing for Australia, including its policy on transparency, evidenced in the availability of financial reports, member statistics, and its member-funded, crowd-sourced model. Rather than a distributed, region-dependent staff and budget, Avaaz has a 'single, global team with a mandate to work on any issue of public concern' (Avaaz.org, n.d.). It is Avaaz members who decide where to direct resources The website projects a sense of global community, as much in being available in so many languages as in movements presented on every page heralding from many different countries representing the plights of many and varied communities. Avaaz is a global example of social awareness instigating social movements, easily promoted through the connectivity of the internet and the tools for social networking, to create a better world. Websites and movements for campaigns such as Avaaz and GetUp! Australia are helping to raise awareness and reclaim power for the people. Avaaz.org.(2011). The World in Action. Retrieved from http://www.avaaz.org. GetUp. (n.d.) GetUp! Retrieved from http://www.getup.org.au.
  •  
    As yet another online resource for the "lounge chair activist" Avaaz.org seems to cover it all. Whether you're interested in saving the whales, climate change, gay rights or donating to flood victims, there is a cause available for you. Avaaz, started in 2007 with the mission to "organise citizens of all nations to close the gap between the world we have and the world most people everywhere want" (Avaaz.org, 2011). So far they seem to be achieving this goal. With over 8 million members worldwide, who have so far taken over 38 "actions" this is a website that seems to be doing what it's promised. To ensure that there is no underlying bias, no political voice hiding behind the curtains, Avaaz ensures there is "democratic accountability" by being 100% member-funded. It is mainly staffed by volunteers, who email actions to members in way that registers interest in the project and nothing more. These actions are also normally put forward by Avaaz members themselves, rather than outside parties. Avaaz, like BOINC, relies on word-of-mouth to spread the word. Also using social network sites to keep up the interest between members. Their hope is that once someone joins through a campaign for one specific issue, that they will then continue to support other actions. To prove their success, after "China's violent crackdown on the March '08' protests and riots in Tibet"(Avaaz, 2011) Avaaz was able to build the most successful global position to date. They were able to achieve 1.5 million signatures in just three weeks calling for dialogue between China and the Dalai Lama. Whether you just sign a petition or donate money, having so many available voices ensures that Avaaz will make it count. As stated by Zainab Bangura, the foreign minister of Sierra Leone "Avaaz is an ally, and a rallying place, for disadvantaged people everywhere to help create real change"(Avaaz, 2011). Avaaz.org. (2011). Avaaz.org: The World in Action. R
Kellie Ramm

SETI@home - An Experiment in Public-Resource Computing - 0 views

  •  
    This article talks about SETI @home's "design and implementation and discuss[es] its relevance to future distributed systems" (Anderson, Cobb, Korpela, Lebofsky, & Werthimer, 2002). The authors of this article are all staff of the University of California, Berkeley, in the space sciences laboratory. The University of California, Berkeley is the home of the SETI @home program. This resource gives a more in depth understanding of how the SETI @home program, in particular how public-resource computing works to aid in the processing of the data. All members of the SETI @home program are initially required to download the client program. This program collects a work unit from the main server, computes a result, returns this result to the main server, then gets another work unit. This article also shows the mathematics behind how this system gives so much computing power, but basically the more client programs computing the work units, the faster the data is processed. The stringent safety precautions are why this system is assured as so safe from malicious attacks from hackers and viruses. There is no communication at all between the various client machines, with each computer talking directly to the main server. As discussed within, for this to work public-resource computing projects need to attract users to their program, and keep them interested in remaining members. SETI @home uses word-of-mouth from its members, referral programs and mass-media news coverage to attract members. The client program can run as either a "GUI application or a screensaver", and runs during what is normally computer idling time which means that the impact on the user is minimal.
  •  
    According to their 2002 poll the SETI @home user base is heavily dominated by males (93% of all users (Anderson et al., 2002)). This information can help them target market to their users. Some of the user benefits include the use of an online community where members can exchange ideas, and a competitive team/individual scoring system. Research is continuing into how to make this, and other forms, of public-resource computing more reliable and efficient in scientific calculations and discovery. Anderson, D., Cobb, J., Korpela, E., Lebofsky, M., & Werthimer, D. (2002). SETI@home: An Experiment in Public-Resource Computing. Communications of the ACM. 45(11), 56-61. doi: 10.1145/581571.581573
Kellie Ramm

SETI @home Website - 0 views

  •  
    This resource is the home page for the SETI @home project. First launched in May 1999, as part of the SETI (Search for Extra-Terrestrial Intelligence) project, SETI@Home's goal is to "detect intelligent life outside Earth". In 1995, David Gedye had a thought that a virtual supercomputer could be developed by joining a large number of internet-connected computers, and from this he organised the SETI @home project to further explore this idea. This concept is now referred to as public-resource computing (University of California, 2011). The whole concept is based on the idea that there are millions of computers connected to the internet that all have downtime that could be utilised. By joining these computers together, a huge amount of computer processing power is derived, the more users involved, the more power that is available. SETI @home uses the computers to listen for unexpected radio noise. This is done by users downloading a small program (available from this website) to their computers. This program then downloads and analyses radio telescope data. The concept only works though if the user population is high, so the SETI @home website provides a number of user incentives to join the program including message boards, a team system, leaderboards based on a unique point system and general information and news about the project. Public-resource computing, is something that can now be taken further afield. It is a great use of online collaboration, particularly seeing the user input required is small, in return for the processing power gained. University of California. (2011). SETI@home. Retrieved from http://setiathome.berkeley.edu/index.php
  •  
    This is a very interesting topic, because not enough value is placed on extra-terrestrial research in mainstream society. The belief that extra-terrestrial life could not possibly exist is an out-dated notion. How could life not exist beyond the earth's solar system, or even within it? Using available technology to search for what's out there is a step in the right direction, and may help to make people realise that there are other more important things than merely existing, and that humans are a mere speck in the universe's expanding dimensions. Earlier beliefs that were held by explorers or philosophers thought the world was flat or that the planets and sun rotated around the earth proves that humans don't have all the answers, and ignorance is not always bliss. Understanding how the universe operates, and finding out if other life forms exist is not only something nice to know, its important in the whole scope of human existence. Helmenstine, A. (2011). Searching for Extraterrestrial Life: Strategies and Science. Retrieved from http://chemistry.about.com/cs/astrochemistry/a/aa010404a.htm
Kellie Ramm

How Many Computers Does It Take to Make Contact with E.T.s? - 1 views

  •  
    This resource, an article from the Wall Street Journal, is a more current take on the SETI @home project. It can be more easily understood by the average reader and gives a summary of both the history of the SETI @home project, and information on where it stands today. It also discusses further details of "distributed computing". According to this resource, late in the 1990s University of California, Berkeley scientist David P. Anderson thought that the millions of "often-idle computers"(Gomes, 2006) could be better utilised in distributed computing. The idea behind distributed computing is to take a scientific problem, and then share out the computations required to millions of computers. To test this theory, Dr. Anderson chose the SETI project, and set up SETI@home. Although the search for Extraterrestrial Intelligence was basically an "attention-getting gimic" (Gomes, 2006), it worked better then expected with almost a million users signing up and downloading the required client. Although there are now many other distributed computing projects available, almost akin to choosing which charity to donate to, many users are still loyal to the original SETI @home project. With their accumulated point system, earned by the number of computing hours donated to the project, users are unwilling to move to another project and lose the points they have earned. The current popularity of this project is shown by the 10,000+ members of the SETI @home facebook page (Facebook, 2011), which also demonstrates how many forms of online collaboration often cross paths. This resource describes the SETI @home project in easy to understand language making it a good introduction to the theory of distributed computing (or public-resource sharing) however some of the information seems to contradict that written on the SETI @home about page.
  •  
    SETI@home has also inspired other collaborative shared computing projects. Most notably the Folding@home project conducted by Stanford University (Sony folding@Home 2008). The aim is to analyze proteins in hope of solving various diseases including Cancer. An interesting aspect of the project is its imbedding as a networked technology in the millions of PlayStations 3's around the world. As a user-setting, PlayStations left idle can shift processing resources to working through the protein work packets sent out by Stanford. Like the SETI Project, various teams compete for most work units analyzed. As an addition, Stanford are in the process of publishing peer reviewed results that stem from the completed work (Stanford 2009). Both this and the SETI Project hold technology as the central core of collaboration, but there is a human social factor playing an important role. Highlighted by the the team-play that gathers around the competition to see who is putting the most resources into completing work units. Sony folding@home (2008). The Folding@home™ Distributed Computing Project at Stanford University. Retrieved from http://www.scei.co.jp/folding/en/ Stanford (2009) Recent Research Papers from Folding@home. Retrieved from http://folding.stanford.edu/English/Papers
Kellie Ramm

BOINC: A System for Public-Resource Computing and Storage - 0 views

  •  
    This resource is written by David P. Anderson from the University of California, Berkeley, the original founder of the SETI @home Project (Gomes, 2006) and discusses public-resource computing in more detail. It talks about the benefits of it over grid-computing and goes into more detail about the BOINC (Berkeley Open Infrastructure for Network Computing) Platform for public-resource computing. Public-resource computing (also known as "global computing", "distributed computing" or "peer-to-peer computing") uses available resources on personal computers to do "scientific supercomputing" (Anderson, 2004). It also has the benefit of "encouraging public awareness of current scientific research". SETI @home, one of the most well known forms of public-resource computing, attracts millions of users worldwide and can provide 70 TeraFLOPS of sustained processing, versus approximately 35 TeraFLOPS from the largest conventional supercomputer (Anderson, 2004). The goals of BOINC include: * Reduce the barriers of entry to public-resource computing. * Share resources among autonomous projects * Support diverse applications * Reward participants There are now a number of projects that use BOINC other then SETI@home. These include: * Predictor@home - studies protein behaviour * Folding @home - studies protein folding, misfolding, aggregation, and related diseases. * Climateprediction.net - quantifies and reduces uncertainties in long-term climate prediction based on computer simulations. * Einstein@home - detects certain types of gravitational waves, such as those from spinning neutron stars, that can be detected only by using highly selective filtering techniques that require extreme computing power.
  •  
    By participating in these projects members can feel like they are playing a small part in helping with curing disease, solving global warming, and other world issues. Attracting participants is always a goal of these projects so it's important that these computing programs give no real inconvenience to them. BOINC has a general preference option that allows members to set a number of features including how and when their computer resources are used. This includes "whether BOINC can do work while mouse/keyboard input is active", hours of use, how much disk space can be used, and the network bandwidth. BOINC allows for many different projects to use its systems/setup allowing for smaller research projects to take advantage of the greater computing capabilities. This could potentially in the future help out an unknown research make a global scientific discovery. Anderson, D. (2004). BOINC: A System for Public-Resource Computing and Storage. Retrieved from http://portal.acm.org/citation.cfm?id=1032646.1033223 Gomes, L. (2006). How Many Computers Does It Take to Make Contact with E.T.s? Retrieved from http://online.wsj.com/public/article/SB115145653496392561-3YTEjOQhd0ZilADHfEf8hoK4BhA_20070628.html?mod=blogs
Amy B

Website helps to make dreams come true - 0 views

  •  
    ABC LATELINE Michael Atkin Byline: "Australian website Pozible is helping to connect generous donors with needy projects, but there are concerns about how the website operates." The article introduces crowd-funding as an 'innovation of the internet age', bringing together donors and projects in need of funding, using an environmental group called Green Way Up as an example project, and a website called Pozible as an example of a crowd-funding resource. As an introduction to crowd-funding it presents Green Way Up as being both environmentally and socially conscious, as well as a good example of a crowd-funded project worth attention: Bob Miles and Chuck Anderson want to travel around the world on bio-fuel converted from recycled fats and oils obtained, in one case, from the waste of a chicken shop. However, Green Way Up may not have had such a start toward achieving this venture if not for Pozible; a crowd-funding resource whose Co-founder, Rich Chen, created the site 'because he was sick of hearing about exciting projects which failed to go ahead because they lacked money' (Atkin, 2011). Though it presents a hopeful opportunity to projects and financial benefactors alike, the article turns critical of the website's operations, suggesting Pozible may be 'violating the Corporations Act by raising money and offering rewards without issuing a prospectus' (Atkin, 2011).
  •  
    Jennifer McKay, Professor at the University of South Australia is also concerned that Pozible infringes upon consumer protection laws and security laws, but when asked by Lateline, the Australian Securities and Investment Commission said they were 'considering whether crowd-funding poses any regulatory concerns' (Atkin, 2011). Green Way Up is presented as an exception rather than a rule for projects seeking crowd-sourced funding; '[p]rojects only receive the money if they reach their funding target within 90 days and currently two-thirds fail' (Atkin, 2011). Built upon and relying heavily on trust, the article concludes there is potential risk for all involved. Atkin, M. (2011). Website helps to make dreams come true. Lateline. Retrieved from http://www.abc.net.au/lateline/content/2011/s3180494.htm.
  •  
    SETI@home and the various other projects that use BOINC rely on public contributions to achieve their computer processing goals. In a similar vein, the website Pozible.com.au also relies on public response to assist what would otherwise be unheard of projects. Pozible is a website that uses "crowd-funding" to get its donations. "Crowd-funding is an innovation of the internet age which links generous donors with needy projects" (ABC, 2011). In the example provided by this resource, the needy case is an environmental group called Green Way Up who want to fund an expedition to Norway using only bio-fuel. First shown on ABC's Lateline on the 1st April 2011, this interview discusses numerous aspects of Pozible. It talks through the set-up process, talks to a donator, and even questions the administration process from an ASIC/ACCC point of view. Not only does this website help otherwise unknown projects get up off the ground, it also helps connect them to "lounge-chair activists" looking to donate to causes they believe in. There are still a few problems with the donation process. Projects are required to generate 100% of their goal amount within 90 days to receive the money, meaning that currently only 1/3 of projects achieve this goal. There is also no formal follow-up process to ensure that the projects do what they have promised. On a positive note however, if a project fails to meet the requested total, no money changes hands. Donations work more on a pledge system, and even Pozible makes no profit from the projects, unless this total is met(Pozible.com, 2010). Projects like BOINC and Pozible are innovative ways of using current computer/internet usage to get public interest and participation in what could otherwise be undiscovered projects that could have positive implications in the future. ABC. (2011). Website Helps To Make Dreams Come True. Retrieved from http://www.abc.net.au/lateline/content/2011/s3180494.htm Pozible.com. (20
Helen Pidoulas

Flash Mobs: The Feel Good Phenomenon of the 21st Century : CharValiant - 0 views

  •  
    Flash mobs have been around since 2003, the full power of their reach has not really been felt until a mix of social media like Facebook and Twitter came into effect to help to coordinate events and spread the word. A mix of this and viral video tools like Youtube help to spread the story worldwide in a very short time frame. The organisation of early flash mob performances used to rely on text messages to spread the message. However, these days the internet and social media have made the coordination and the spreading of the message much quicker and it allows for many more networking opportunities. Costs of performances and production are kept to a minimum, with no need to buy air time. An interesting side-effect of viral videos these days is that the video will most often be displayed on television for free anyway, doing away with the need to pay for advertising air time, and has given rise to television programs dedicated to flash mob tv in places like Germany (Flashmob.tv, 2011). Flashmob.tv, (2011). The Show. Retrieved from http://www.flashmob.tv/en/the_show.php
  • ...1 more comment...
  •  
    Flash mobs have been around since 2003, the full power of their reach has not really been felt until a mix of social media like Facebook and Twitter came into effect to help to coordinate events and spread the word. A mix of this and viral video tools like Youtube help to spread the story worldwide in a very short time frame. The organisation of early flash mob performances used to rely on text messages to spread the message. However, these days the internet and social media have made the coordination and the spreading of the message much quicker and it allows for many more networking opportunities. Costs of performances and production are kept to a minimum, with no need to buy air time. An interesting side-effect of viral videos these days is that the video will most often be displayed on television for free anyway, doing away with the need to pay for advertising air time, and has given rise to television programs dedicated to flash mob tv in places like Germany (Flashmob.tv, 2011). Flashmob.tv, (2011). The Show. Retrieved from http://www.flashmob.tv/en/the_show.php
  •  
    This resource, found in the Char Valiant School Newspaper, discusses flash mobs. Flash mobs, a more recent occurrence, are a group of people who meet at a predetermined public location to do a spontaneous performance (often something of a theatrical nature like a song or dance), and then disperse into the crowd at the end. Flash mobs are usually instigated online, using various forms of online media to organise and coordinate the event. This can include mobile phones, email, and social networking sites. Although these "events started out as a way for these groups to mock the conformity of the general population", they have "instead become a symbol of spontaneity and fun around the world"(CharValiant, 2011). Flash Mobs have also become a form of advertising. T-Mobile has used this form of theatrics to their advantage, using them in several of their advertisements. Carolyn Thomas (2010) talks in her article about how T-Mobile is becoming synonymous with flash mobs, showing that the marketing campaign is working as people are instantly remembering the company name and linking it with the campaign. Australia is also getting on the flash mob advertising bandwagon, with the latest "Australian Cancer Council Biggest Morning Tea" launch at Brisbane's Queen Street Mall on the 18th April, 2011 (Cancerqld, 2011) and the viral Sydney Mardi Gras campaign filmed on Bondi Beach (RockYourBox, 2009). Although the link between public resource computing and flash mobs is tenuous at best, as another current form of online collaboration it is still well worth a mention. As public resource computing relies heavily on word-of-mouth advertising to increase its member numbers by using things like social-networking sites, so too does flash mob advertising rely on "going viral" through similar word-of-mouth usage.
  •  
    Written by Caci Murphy, a Senior at Chartiers Valley High School(CharValiant, 2011), this resource is not necessarily as reliable a source as perhaps other more researched papers. Although well written, and factually accurate, a high school senior would be lacking both the technological knowledge and life experience to give an accurate view point to make this an authoritative resource. Cancerqld. (2011). Australia's Biggest Morning Tea Flash Mob. Retrieved from http://www.youtube.com/watch?v=w07Nq2h55Xo CharValiant. (2011). The CharValiant Staff. Retrieved from http://www.cvnewspaper.com/staff/ CharValiant. (2011). Flash Mobs: The Feel Good Phenomenon of the 21st Century. Retrieved from http://www.cvnewspaper.com/news/2011/03/14/flash-mobs-the-feel-good-phenomenon-of-the-21st-century/ RockYourBox. (2009). Say Cheese! Flash Mob On Bondi Beach [OFFICIAL]. Retrieved from http://www.youtube.com/watch?v=Ao4DkbGbxl0 Thomas, C. (2010). T-Mobile and the flash mob marketing phenomenon. Retrieved from http://ethicalnag.org/2010/11/04/flash-mob/
Tessa Gutierrez

Christakis, N. (2010). The Hidden Influence of Social Networks. - 3 views

  •  
    [Please Note: This comment is in two parts due to Diigo restrictions on length] Topic: Flash Mobs This TED Talk is important to the topic of flash mobs because it highlights the fact that modern issues of global significance such as obesity, crime, good health, and creativity, are affected by the social connections that we all have. The rise of Internet usage through avenues such as social networks in the form of Facebook and other similar sites has been acknowledged as a vital factor that is also used by flash mobs when organizing their activities. The main point that can be taken into account through this TED Talk, is that if subconscious concepts such as obesity can claim influences from social networking, it should also follow that other more positive concepts such as philanthropy, will also be influenced by connecting with social networks. These social networks have a resilience that survives the test of time so it is of utmost importance to understand what the contributing factors are that sustain them. One important factor that was discovered was the power of emotion. Emotional "stampedes" and "collective existences" can be formed through social networks. They appear in clusters that can be delineated, for example, by "happy patches" and patches with other emotional characteristics. [Continued in the comment below]
  • ...1 more comment...
  •  
    [Continuation of comment above] Studies have shown that our unique gene make-up strongly influences whether we will be outwardly social or on the fringe of society. These inherited traits also affect whether in a social setting such as an online network, we will be in the center of the cluster or skirting around its perimeter. Social networks have value due to their ability to encourage a unique structure of emotional and other ties between individuals and groups. Use of social media networks has been invaluable in organizing the activities of flash mobs. REFERENCES Christakis, N. (2010). The Hidden Influence of Social Networks. TED Talks. Filmed February 2010. Posted May 2010. Retrieved April 5, 2011 from: http://blog.ted.com/2010/05/10/the_hidden_infl/
  •  
    Flash mobs utilise digital communications among social networks to mobilise a large group of people to appear in a set location. Many reading about flash mobs highlight the use of Internet communication but there have not been many references that refer to how the social network functions. Nicholas Christakis is a Harvard Professor of Medicine, Health Care Policy, and Sociology at Harvard University and he directs a diverse research group investigating social networks. "His work examines the biological, psychological, sociological, and mathematical rules that govern how we form these social networks, and the rules that govern how they shape our lives" (TED Conferences, 2010). Christakis gives three reason that people cluster but for flash mobs the most relevant is that people can share a common exposure to something (Christakis, 2010)and thus messages are spread to people of like mind, in turn pleading to a large crowd with everybody having a common purpose. Another important aspect to take from this is that networks are constantly changing in composition but the network still persists. Kaulingfreks and Warren would describe this as a rhizome that is "an ubiquitous connection between points in a structure but without a clear defined path…each node passing information to other nodes (2010, p. 221) . Christakis says " It is the ties between people that makes the whole greater than the sum of parts" (2010).For flash mobs and protest movements it is the power of the group that makes all the difference as has been demonstrated in political flash mobs and recent protests in Egypt, Iran and Tunisia. Christakis, N. (2010, February). The hidden influence of social networks TED Talks [Video file]. Retrieved from http://www.ted.com/talks/nicholas_christakis_the_hidden_influence_of_social_networks.html Kaulingfreks, R., & Warren, S. (2010). SWARM: Flash Mobs, mobile clubbing and the city. Culture and Organization, 16(3), 211 - 227. doi:10.1080/14759551.
  •  
    After watching this video on networks I started to consider the relevance of the internet informing networks and would the networks form in another way if social media tools were not available. Flash Mobs was organised on the internet and use internet tools to collaborate there next event. Could the same thing be achieved without the internet? My guess is yes it can be achieved without the internet. If we take the Egyptian Revolution and the claims that Facebook and Twitter were responsible for the organisation of the revolution some argue that this was not the case. The main body of the argument is that there been revolutions well before the internet (Rosen, 2011). Supports this argument however still recognises the role that social networks had played in the revolution(Beaumont, 2011). Pickwell, 2011 argues that many crowd gathering s such as revolutions and protest do not utilise the internet or social media to gather crowds. Pickwell claims they under utilise the tools the internet offered them. Considering that social media has a communication roll to play, you may also need to consider other factors used in creating the network. Christakis, 2011 presentation on networks gives you a better understanding as to how networks operate and why the above arguments have some merits. Beaumont, P. (2011). The truth about Twitter, Facebook and the uprisings in the Arab world. Retrieved 15th April 2011, from http://www.guardian.co.uk/world/2011/feb/25/twitter-facebook-uprisings-arab-libya Christakis, N. (2010). The Hidden Influence of Social Networks. TED Talks. Filmed February 2010. Posted May 2010. Retrieved April 5, 2011 from: http://blog.ted.com/2010/05/10/the_hidden_infl/ Pickwell, J. (2011). Lecture on the anti-war movement and Internet Collaboration and Organisation, net 308 iLectures: Curtin Unversity, Rosen, J. (2011). The "Twitter Can't Topple Dictators" Article. Retrieved 15th April 2011, from http://pressthink.org/2011/02/the-twitter-
Hans Dusink

T-Mobile and the Flash mob marketing phenonomen - 3 views

  •  
    The origin of flash mobs is credited to Bill Wasik who emailed friends in June 2003 to gather in the home furnishing department of Macy's in Manhattan. More than a 100 people began discussing whether to purchase a 'love rug' for their fictitious commune and then dispersed as quickly as it had formed (Hewitt, 2003). Flash mobs are defined in the Oxford dictionary as "a public gathering of complete strangers, organized via the Internet or mobile phone, who perform a pointless act and then disperse again" (Oxford University Press, 2011). Advertising agencies now utilise flash mobs to promote commercial products. This article discusses the Saatchi and Saatchi award winning T-Mobile advertisement "Life is for sharing" (posted to Youtube by jonjonbaker, 2009). Rather than focusing on how mobile phones and social media are used to organise a flash mob, the discussion here is about how this same media is used to create "viral traction - the ability to be widely forwarded to millions of viewers almost instantly" (Thomas, 2010). The advertisement itself shows bystanders utilising their mobile devices to share photos with their friends as well as ringing them to talk about the experience. As the title of the advertisement says "life is for sharing". Nick Burcher wrote in his blog Personal thoughts on the evolution of media and advertising that "advertisers are creating events to push user generated content coverage, a physical community made virtual. The event drives the Conversation, rather than the other way round as Wasik intended" (Burcher, 2009). Flash mobbing has become more than Wasik first imagined. On this case it has been utilised to raise brand awareness, but the same techniques can also be used to promote political opinions.
  • ...2 more comments...
  •  
    Burcher, N. (2009, November 18). Flash mob evolution - even Microsoft stores are trying them now [Web log post]. Retrieved from http://www.nickburcher.com/2009/11/flash-mob-evolution-even-microsoft.html Hewitt, G.(2003). Flash Mobs - A New Social Phenomenon. Retrieved from http://www.rense.com/general39/flashnmob.htm jonjonbaker. (2009, January 16). T-Mobile Advert "Life For Sharing". Retrieved from http://www.youtube.com/results?search_query=flash+mob&aq=0 Oxford University Press. (Ed.) (2011) Oxford Dictionary. Thomas, C. (2010, November 4). T-Mobile and the flash mob marketing phenomenonThe Ethical Nag: Marketing for the Easily Swayed [Web log post]. Retrieved from http://ethicalnag.org/2010/11/04/flash-mob/
  •  
    Thanks you for sharing Hans, having reviewed the link and your response there appears to be many similarities between flash mobs and social-media facilitated, political protests. Much like the advertisers and marketers who drive flash mob, brand campaigns through new media, political demonstration organisers can also utilise the same tools to coordinate group activities activities and create spreadability of their cause - or as Thomas labels it 'traction' (Thomas, 2010). Examples in Thomas' article mention the flash mob video footage was uploaded to the popular video sharing site YouTube where it could be watched by potentially millions of web viewers. However, what the article fails to expand on is the stacking and interlinking of other social networking services (SNS) such as Twitter and Facebook. For instance, were other SNS used as a replacement of e-mail to recruit the flash mob participants? After the flash mob act was published on YouTube, what was the strategy to draw further attention to the video clip? Is the flash mob footage just one node in the brand campaigns overall web presence? The traction behind the 2011 Egypt revolution grew at exponential rates based on the stacking of social networking services and effective utilisation of network effects (Gustin, 2011). Demonstrators published events on Facebook, allowing organisers to gauge attendance. Invitations could also be issued and rapidly passed amongst social circles. The combination of footage being uploaded to YouTube and the millions of related conversations being published to Twitter clearly highlights the participatory culture of the web and its global reaching powers (Gustin, 2011). Gustin, S. (February 11, 2011). Social Media Sparked, Accelerated Egypt's Revolutionary Firez: EPICENTER. Retrieved April 7, from http://www.wired.com/epicenter/2011/02/egypts-revolutionary-fire/ Thomas, C. (2010, November 4). T-Mobile and the flash mob marketing phenomenonThe Ethical
  •  
    Hans this is a very interesting article and ties in with the article I found by McGreer (2010) who discussed the business response to FlashMobs. Whilst two different approaches were used the one constant was the use of professional film crew to use the footage for uploading. The question McGreer raises is when it no longer has the artistic element, which Wasnik defines an event as a FlashMob, are commercial applications really FlashPerformances? McGreer, B. (2010). Give Them something to talk about. US Banker. Retrieved from ProQuest Database.
  •  
    Hans this is a very interesting article and ties in with the article I found by McGreer (2010) who discussed the business response to FlashMobs. Whilst two different approaches were used the one constant was the use of professional film crew to use the footage for uploading. The question McGreer raises is when it no longer has the artistic element, which Wasnik defines an event as a FlashMob, are commercial applications really FlashPerformances? McGreer, B. (2010). Give Them something to talk about. US Banker. Retrieved from ProQuest Database.
Helen Pidoulas

On the Social Psychology of Flash Mobbing - 0 views

  •  
    James Neill provides his personal insights on Flash Mobs, based on an interview with a journalist and research conducted through social media like Twitter. His discoveries point to flash mobbing as an activity that comes across as spontaneous, which is performed in public places, but that behind the scenes, take a lot of co-ordination and planning to prepare for the event. Flash mob peformances can be defined as being spontaneous, simple, peaceful, social and the message is spread virally through the use of technology like Youtube and social networking sites like Twitter and Facebook. The different types of flash mobs include smart mobs, reality tv set ups, rent a crowds and the like are mentioned in this article, but there is room to debate if these groups are actually flash mobs or not. One of the key elements of flash mobs is the way individualism has been stripped, and the group persona is adopted, even for a short tiime, but each individual member. In this way, they shift away from their individuality to embrace and portray the message being delivered by this organised crowd of entertainers. It is almost the adoption of a mob mentality, without the violence. Messages spread by groups are immediately more attention grabbing that by individuals, and so this could be the reason for the success and longevity of flash mob activities. These groups demand attention, and while they are entertaining and fun to listen to because they break the routine and inject something unique into everyday lives, by speaking with movement and song. Neill, J. (2007). On the Social Psychology of Flash Mobbing. Retrieved April 18, 2011, from http://7125-6666.blogspot.com/2007/10/flash-mobbing.html
Helen Pidoulas

Flash-Mobs Are The New Public Intellectuals - 0 views

  •  
    In Riley's (2005) conclusion, he sums up really well the evolution of tools like flash mobs in the collection and dissemination of information in a different ways are opening the door for more and more interaction and are driving the use of different technologies to spread messages to many people in a very short space of time. Through an expressive platform like Flash Mob performances, these groups of people getting together to tell their story in entertaining ways also reach out to the general community and provide a refreshingly different and more intelligently placed story telling method than is currently being utilised by the centralised media units that are used to disseminating data from a single source. These avenues for human expression break down the constraints imposed by plutocracy, industrialism and the expectations and moulding of the masses who are conditioned to believe that they are no better than mere servants of the rich minority who ultimately control everything, because money equals power and therefore privilege and status is more important and above the laws for everyday people. The use of the Flash Mobs is interesting because it takes an impromptu-like performance, engages the public in unplanned entertainment, and spreads a message that is delivered in a very entertaining way. The delivery of these performances is not only live, but is also filmed by spectators and organisers, and placed on websites like Youtube and spread to audiences worldwide. Examples of this include the St Patrick's Day performance at Central Station in Sydney Australia, which went viral worldwide within a day or two of being uploaded to Youtube. The use of online mediums like Youtube also means that statistical or quantitative data can be collected about the viewers or online audience, and used by the intellectuals in the planning of the next Flash Mob event. Riley, C. (2005). Flash-Mobs Are The New Public Intellectuals. Retrieved April 17, 2011, from http://www
Helen Pidoulas

Flash mobs in viral video advertising - 0 views

  •  
    Torben (2010) discusses the evolution of flash mobs as a tool for viral video advertising. He discusses how major corporations, like T-Mobile utilised the buzz that these flash mob choreographed performances provide to their audiences, and their video went viral with over 20 million viewers. This very effective form of advertising does not go through official channels, but seems to grab the attention of the general public more than traditional and tired advertising is doing presently. The use of social media sites like Facebook to discuss and promote flash mob scenes give consumers a voice where there wasn't one before, driving technological evolution from an end-user perspective, and providing valuable feedback to manufacturers so that they can understand what their consumers want. There is no guesswork. Successful viral video campaigns like T-Mobile have shown that the use of flash mobs can drive interest in their product and can be spread with very little effort on their part, provided they get the entertainment factor right. As long as they make the flash mob performance entertaining enough, the message will spread to a wider audience than traditional advertising might achieve. Torben, R. (2010). Flash mobs in viral video advertising. Retrieved April 17, 2011, from http://www.torbenrick.eu/blog/social-media/flash-mobs-in-viral-video-advertising/
Helen Pidoulas

Mashflob.com: The Worldwide Flashmob Community! - 0 views

  •  
    A community based website that consolidates the activities of Flash Mobbers around the world into a single portal. The resourceful website provides a central point of contact for people who create flash mobs, for people who are entertained by them and for those planning and for those who want to be a part of this intellectual movement. The website allows people to register and collaborate with other flash mob fans, keeping subscribers informed on event dates, locations, latest videos, flash mob events, a calendar and forum. Flash mobs not only allow people to enjoy the entertainment factor, but the developers of the flash mobs also drive the use of different technologies, such as websites, choreography, video editing, and the use of social media to spread the message. Entertaining and thought-provoking flash mob performances usually end up going viral, but along the way, these viral videos collect important demographic information about those who view the videos. Mashflob.com: The Worldwide Flashmob Community! (2011). Retrieved April 17, 2011, from http://www.mashflob.com/
1 - 20 of 77 Next › Last »
Showing 20 items per page