comm 151 exam 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is advertising premised on? 1 point

"Buying eyeballs" or getting consumer's attentions

Explain at least three factors that feed into the Zhima Credit score.

"Connections" considers the credit of my contacts in Alipay's social network "Characteristics" considers what kind of car I drive, where I work, and where I went to school "Behavior" scrutinizes the nuances of consumer life, zeroing in on actions that purportedly correlate with good credit

List and explain the four criteria for fair use (Class 28) 3 pts.

"Considered" criteria set up in code: Purposes and character of use (commercial or nonprofit, generally, and whether transforms meaning) Nature of the copyrighted work (facts? Unpublished? Imaginative?) Amount and substantiality of work used (vs. the copyrighted work as a whole) Effect of the use upon potential market (big)

What is a patent troll?(Lecture 29) 1 point

"Patent trolls" (or "non-practicing entity")= a small company with no products of its own threatens lawsuits against larger companies who inadvertently infringe its portfolio of broad patents

What are the three fallacies of Cyber Law and Volokh's counter-arguments for each of these fallacies (Volokh reading) - 3 points

#1: Lawless "Wild West": Counter argument: See threat law, false advertising law, extortion law, contract law, libel law, copyright law #2: Government shouldn't apply bad regulations to cyberspace. Counter argument: everyone has different ideas about which regulations and which are bad #3: "Netizens should make their own laws in cyberspace": communications mediums Counter argument: NOBODY lives there & offline actions affected by online actions

What did ProPublica discover when they bought housing ads on Facebook? What is the controversy here between advertising and law? (Facebook Exclusion by Angwin)

-ProPublica investigation showed it was possible to use FB advertising to exclude protected categories of people from ads. -Federal Fair Housing Act makes it illegal to publish any advertisement "with respect to the sale or rental of a dwelling that indicates any preference, limitation, or discrimination based on race, color, religion, sex, handicap, familial status, or national origin," yet Facebook still was able to do it under the guise of "targeted advertising"

What are the two main strategies for target advertising and what new developments have helped improve it? How does this compare to what was found in the 'Add A Facebook Ad' projects as well as previous general advertising issues?

2 main strategies for target advertising: 1) target based on indexed page content 2) target based on user or household characteristics New developments: offline behavior matching- uses hashed ID to matches of online and offline behavior (store loyalty cards) Add a Facebook Ad project findings: Many were overwhelmed by the targeting options Facebook provides and surprised that Facebook can target such specific populations, but were concerned that they may not know the best strategies for reaching these audiences. Others said that Facebook likely makes advertising to narrow populations cheaper and more efficient than it used to be.

What percentage of the countries tracked in the Freedom House Study have "free internet access"?

25%

What is a gift economy, and what does it rely on? (1 point)

A mode of exchange where valuables are not traded or sold, but rather given without an explicit agreement for immediate or future rewards. Relies on social selective incentives (Karma; donors get titles at Ars Technica), institutional subsidies, guilt, or possibility of future tit-for-tat to motivate contributions (rather than just withdrawals) from a collective good. Ex: tip jars, NPR donations

How do patents work and what is the incentive behind them? (Class 28) 3 pts.

A patent is a government authority or license conferring a right or title for a set period, especially the sole right to exclude others from making, using, or selling an invention. More than an incentive for people to develop new inventions -- they are an exchange between inventors and the public. In exchange for a time-limited monopoly on their inventions, inventors must fully disclose the invention itself in the patent specification, and agree to release their work into the public domain once their monopoly runs out. (Basically, without patents, innovators would have no incentive to share the cool new things they come up with. A patent ensures to the inventor that if they give a detailed record of how to make the invention in the future, they will have full protection over their idea for a limited time + only one to profit. In this way, it is an exchange between the inventor and the public, because the public gets access to the innovation once the patent runs out, and the innovator gets to be the only one to profit off their idea for a limited amount of time. So it's an exchange of the idea to the public for limited time protection to the inventor)

What is the difference between a copyright and a patent? (Class 28, 1 point)

A patent is the exclusive right to an invention and the control of its manufacture, while a copyright is the exclusive rights of the owner of the copyright on a work to make and distribute copies, prepare derivative works, and perform and display the work in public In short, one of them is typically an object that is being manufactured, while the other one is a creative thought or cultural itemer society, but they don't want to overly restrict society's common benefits from intellectual property.

What political move by the Chinese President Xi Jinping caused massive waves of criticism and subsequent online censorship in the recent years? (1 Point, Class 29)

A proposal that would allow President Xi Jinping to extend his reign indefinitely, as Beijing seeks to break decades of political precedent with minimal domestic uproar.

What is a blockchain and how does it enable more trust? (tapscott article) (3 points)

A public global ledger protected by encryption, which allows strangers to interact with trust. [new block created with all new transactions every 10 minutes. It allows market participants to keep track of digital currency transactions without central recordkeeping. Each node (a computer connected to the network) gets a copy of the blockchain, which is downloaded automatically.

What is a "Five Eyes" nation? (1 point)

A term used to describe an intelligence alliance between Australia, Canada, New Zealand, the United Kingdom, and the U.S.

What two things is a worm dependent on to be successful? (Class 23) (1 point)

A vulnerability on the target system (that it can exploit) Social engineering (to trick users into executing them)

What kind of advertisements does Adblock block? (Angwin article)

Ad blocking is common; Chrome adding functionality to block especially annoying behavior such as ads that: Take up too much screen space Play audio automatically Obscure the content users are trying to view Blacklisting sites that violate ad guidelines.

What are the major differences between social activism before and after the rise of the internet and social media. What potential factors make social media a good medium for social activism? (3 pt. Gladwell)

After internet/social media: Decisions made through consensus, and ties binding people to the group are loose Good factors: This structure makes networks enormously resilient and adaptable in low-risk situations The ease and speed with which a group can be mobilized for the right kind of cause Social networks are effective at increasing participation—by lessening the level of motivation that participation requires

What can be patented? (Class 28, 1 point).

Any "new or useful process, machine, manufacture, or composition of matter" (virtually unchanged since the Patent Act of 1793) Courts have interpreted it to include "anything under the sun that is made by man" as patentable Exceptions: Prior art: "an invention that was known, used, or published anytime before the claimed invention date or more than year before the patent application was filed"; and "obvious" inventions (improvement to an invention that would be "obvious" to anyone with ordinary skill in the field) Supreme Court tightened up "obvious" standard in 2007 The difference is what they protect (invention vs thought or artistic work)

List and explain 3 examples of copyright laws. (Class 28, 1 point).

Audio Home Recording Act of 1992: Exempts from copyright infringement the making of copies for personal use of music files in digital form, provided that those copies are made with approved equipment. Digital Performance Right in Sound Recordings Act (1995): Set up different licensing rules for (1) interactive services [negotiated license], (2) non-interactive subscription services and [compulsory license, with rates set by third party] (3) non-interactive non-subscription digital audio services [looser radio-like license] No Electronic Theft Act of 1997: Establishes penalties for unauthorized sharing and redistribution of copyrighted material over the Internet.

Explain the new model of production called "Commons-based peer production" ? And what are advantages of this new system over old models? 3 points (Class 19)

Central characteristic: people collaborate on large-scale projects based on diverse motivational drives and social signals, instead of market prices or managerial commands" a solution for high costs and work put in to assigning workers what to do individuals self-identify what they want/need to work on peer review knocks down errors best people can cluster according to their abilities. ("From each according to his abilities, to all regardless of need or willingness to pay") Advantages of new systems over old models Lower "information opportunity cost" (easier to match "best person for the job" to task). No clear boundary between user and developer. Increasing returns: allows large cluster of potential contributors to creatively interact with large piles of information Decreases transaction costs associated with property and contract (billing, assignment, oversight, etc)

According to Newman 2017, how can we avoid falling into the trap of phishing? (1 point)

Check sender address Hand-enter site's URL Don't reuse passwords.

According to the Freedom House Study (2017), name 2 countries who face extremely high levels of censorship online. (1 point)

China and Syria

What were two reasons Apple gave when they refused to unlock the San Bernardino shooter's phone? (Lee, Timothy B. 2016, Class 24, 3 points).

Complying would make it impossible to protect customers Would lead to future requests Called the request excessively burdensome

What is the difference between constitutional (or decisional) privacy and tort (or informational) privacy? (1 point) ("Privacy and Information Technology"?

Constitutional/decisional Privacy: Freedom to make one's own decisions without interference by others in regard to matters seen as intimate and personal Informational/ tort Privacy: Interest of individuals in exercising control over access to information about themselves

In the "Online Advertising History" reading, Ahuja discusses D.A.R.T. What does D.A.R.T. stand for, and what is its purpose?

Dynamic Advertising Reporting and Targeting. It allowed companies to figure out how many times an ad was viewed and clicked across multiple websites, and made it possible for advertisers to track their ad performance and implement necessary changes to a live campaign.

Name 2 NSA contractors that released classified information. (1 point)

Edward Snowden- phone metadata Hal Martin- smuggled 75% of NSA's hacking tools and then were used for criminal activity by hackers

According to Bauwens, what are 'imaginary communities' with specific values? 1pt

Ethical communities, not just profit-maximising entities identification is in global networks, not just the locales in which they are embedded want to make the world a better place.

What is the significance of a market economy?

Every individual pursues their individual interest, but ends up (unintentionally) promoting the overall welfare of society, as the "invisible hand" of the market turns individual greed into societal benefits A market economy is an economic system in which the decisions regarding investment, production, and distribution are guided by the price signals created by the forces of supply and demand.

What is digital crowding?

Excessive social contact and loss of personal space online

How does CMC change market assumptions of goods in terms of excludability and rivalness? (1pt)

Excludability: Ability of producer to "force" consumers to become buyers by controlling who gets a product and who doesn't. (a good is excludable if it is possible to prevent people who have not paid from accessing it.) CMC took away this ability of producers to control who gets a product and who doesn't (ex: CMC took away ability of companies like Blockbuster to force people to buy movies since they couldn't get it elsewhere- now you can get it for free online so Blockbuster can't "force" you to buy it Two people can't consume the same copy of a good simultaneously CMC takes away rivalness because two people can enjoy the same copy of a good simultaneously (think Netflix- multiple people can stream at once)

How did Facebook violate the Federal Fair Housing Act and what did they propose as a solution? 3 points (Angwin et al 2017)

Facebook allowed reporters to buy "dozens of rental housing ads on Facebook and were set to not be shown to certain categories of users (African Americans, mothers of high school kids, people interested in wheelchair ramps, Jewish people, expats from argentina and Spanish speakers) & were approved almost instantly even though it was contrary to policy Solution: Facebook says it was a tech failure that prevented review and certification screen from appearing. They said that they will fix the failure and add more human reviewers for sensitive targeting

What are two arguments for and two arguments against net neutrality? (1 pt. Pogue)

For: Net neutrality protects innovation. If big companies such as Netflix and Google could pay to get special treatment—faster speeds, more bandwidth—little start-ups would be at a disadvantage. Freedom of speech: Without net neutrality, Comcast could give priority to video from TV networks it owns—such as NBC—and slow down the signals from its rivals Against: sites like netflix and youtube are clogging the pipes with so much data, so those services should have to pay their share If we could charge higher fees to the biggest bandwidth hogs, we could afford to build advanced fiber networks that permit all kinds of new Internet services.

What is the National Security Agency (when is it founded, what is it for)?

Founded in 1952 to do signals intelligence Largest U.S. spy agency Supposed to focus on overseas surveillance Focused on phone and internet monitoring, and especially codebreaking

What are the areas that trust online can suffer problems from? PIS

Have to be confident about identity of involved parties (reputation and identity theft) Security: identification (see you); authentication (verify your identity positively); and authorization (grant access). Authentication is especially hard. Privacy: want to make sure others can't observe above (prior section)

Describe how Shane Chen, the inventor of the hoverboard, has become an example of the modern inventor's plight? (3 points, The U.S. Patent System Is Broken, Says The Inventor Of The Hoverboard")

He invented the hoverboard in 2013 and patented it By 2015, his version had been copied by more than 600 Chinese businesses and then more than 1,000 Chinese factories building them by 2016. He received no royalties, companies don't stand behind their product.

What is an open-network structure vs. a closed-network structure. What did Instagram start as? 3 points

In an open-network structure your information/photos will be shared with anybody publicly. In a closed-network structure your information/photos will only be shared with people that you previously approved. Instagram started as an open-network structure.

How has CMC simultaneously increased and decreased our anonymity?

Increase: More power to interact anonymously with people you'll never meet. Decrease: More power for others to track down every last piece of information about you

According to the Freedom House Study (2017), what are some major recent trends that add to the decline of internet freedom over the past few years? (1 Point.

Information manipulation like fake news Mobile internet shutdowns Targeting of livestream apps or users Physical and cyber attacks of news outlets, opposition, and right groups Restrictions on VPN

What is net Neutrality? (1 point)

Internet service providers treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, and modes of communication

In what way does the lean approach reduce the first 2 constraints including (1)high cost (2) long technology development cycles? (Class 20 Lean startup article) (1 point)

It helps new ventures launch products that customers actually want, far more quickly and cheaply than traditional methods

What were keyword ads and who was the first to use them? 1 point

Keyword advertising is a form of online advertising advertiser pays to have an advertisement appear in the results listing when a person uses a particular phrase to search the Web. Yahoo was the first to use them.

What is a lean start-up and what are its three principles? (3 points)

Lean start-up: temporary organization designed to search for a repeatable and scalable business model The lean startup method advocates developing products that consumers have already demonstrated the desire so that a market will already exist as soon as the product is launched rather than developing a product and then hoping that demand will emerge. Has three principles: Instead of an intricate business plan, founders summarize their hypotheses in a framework called a business model canvas, favors experimentation over elaborate planning Uses a "get out of the building" approach called customer development to test their hypothesis, customer feedback over intuition Practice something called agile development which eliminates wasted time and resources by developing the product iteratively and incrementally, interactive design over traditional "big design up front" development

What are the tradeoffs of intellectual property? 1 point. (Class 27 lecture - Copyright and Intellectual Property)

Manufacturers want to give creators incentive to create work useful to a great

What are some tactics/things to look out for when determining if you are being phished or not? (1pt, Class 23)

Misspelled words, weird email addresses, anything that asks you to login or use your personal information/asks for money Don't click on the link, when in doubt just type the link into your own browser to see if it is legit

What are some arguments that CMC is a democratizing force that leads to more freedom? What are some arguments that it leads to more oppression? (3 points, Lec .28)

More Freedom: Increase in the accessibility, quality and quantity of information online --> greater "freedom of informatrestrict ion." Exposure to diverse views from around the world and social network Anonymity and minority views (individual can be heard) Ease of collaboration/organization More oppression (note that people, not tech, oppress) More shallow dialogue Disconnection from "real world" problems Potential for government control of information (in unobservable ways) Gov'ts can monitor and punish citizen speech more effectively than ever (especially for people with less technical sophistication)

What were the overall results discussed for the Firewall projects?

Mostly calls to action for political activism were blocked. Students claimed that they would spend less time on the Internet, if subject to strict censorship (or use a VPN). Also noted that it would be hard to access opposing viewpoints of political info, esp. Since mainly searched on Google.

What is native advertising? (1 point, class 23 slides)

Native advertising has a format that looks less like an ad and more like a regular piece of content on the host's website, but the nature of the content itself is promotional

Does juxtaposing the famous photograph of firemen raising a flag above Ground Zero in the hours after the September 11, 2001 attacks alongside the 1945 Iwo Jima flag raising with the caption "#NeverForget" qualify as fair use? Explain. (1 Point, "Fair Use In the Age of Social Media")

No, using someone else's copyrighted image in your online conversation is not necessarily transformative. The court found that Fox's alteration of the content and message of the photograph was "minimal," and did not constitute an original idea. To the extent Fox's use of the image could be considered commentary, the judge held that it merely amounted to exclaiming "Me too."

What is Shirky's "cute cat" theory?

Non-political tools can be repurposed and are harder to shut down without blowback or harming economy Shirky's "cute cat" theory describes that people would rather spend their time on the internet viewing mundane, leisurely activities such as cat videos rather than activism

Explain the "Battle of Imperialism" (Volokh, Eugene. 2003, Class 26, 3 points).

On the one hand, we can have the imperialism of the most liberal jurisdiction, where liberal jurisdictions freely export their liberal standards to other places, and Ohio must accept the fact that its residents are downloading obscenity from California Web sites or gambling using Nevada sites. On the other, we can have the imperialism of the most restrictive jurisdiction, in which restrictive jurisdictions in effect export their constraints to other places, and Ohio, Germany, and Saudi Arabia can in effect prevent Californians from accessing what California law would otherwise let them access. Either way will seem to be worse to many than the old geographical system of law, in which what Californians can access is governed by California law and Germans can access is governed by German law. Either the most restrictive jurisdiction exports its restrictions or the least restrictive jurisdiction exports its laxness Possible policy solution: Require protocols where source of the communication is tagged ("this message is coming from Ohio") SUMMARY The first part, as I understand it: Imperialism is extending a region's (usually country) power and influence to other regions. ESSENTIALLY: different regional laws "battle" each other on the internet because geographical boundaries are blurred.

What is the lump of labor fallacy and why is it a fallacy? (3 pts, The Economist 2016, Class 19 Reading)

Only a finite amount of work exists, so that if there is automation, there's less for people to do. This is not true because automation simply redefines certain jobs, rather than completely replacing them

What two solutions does Patel present as potential ways to stop patent trolls? ("The 'broken patent system': how we got here and how to fix it") (1 point)

Patent troll: A patent troll uses patents as legal weapons, instead of actually creating any new products or coming up with new ideas. To limit the amount of damages a non-practicing entity can win in a patent lawsuit (making litigation less profitable) Software patents that give unrestricted patents for short time, then force compulsory licensing for remainder of patent term Compulsory licensing: "patent holders are required to license patents at commercially viable rates if they don't make products within a certain amount of time"

Name and define the 2 types of intellectual property. (1 point, Class 27 Lecture Slides)

Patent: The exclusive right to an invention, and the control of its manufacture Copyright: The exclusive rights of the owner of the copyright on a work to make and distribute copies, prepare derivative works, and perform and display the work in public

According to Stoycheff and Nisbet, with internet access and freedom to use it, what type of content do people choose to engage in?

People choose to engage in entertainment content rather than political content (only about 10% have posted their thoughts about political or social issues)

Explain the four motives behind privacy. LESP

Personal autonomy: desire to avoid being manipulated, dominated, or exposed by others. Emotional release: release from the tensions of social life and opportunities for emotional release. Self-evaluation: integrating experience into meaningful patterns and contemplation. Limited and protected communication: sets interpersonal boundaries and provides for sharing personal information with trusted others.

How are phishing scams designed to trick people? (3 points, Class 23 Lecture Slides)

Phishing: the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. Appeals build on: Trust in authority Text and graphics lack traditional clues of validity Clues are often too subtle to be noticed by untrained, busy, or unobservant users Sense of urgency/scarcity. Fools users by looking genuine: On netflix: Uses some actual Netflix HTML (including autofilling backsplashes promoting Netflix content). =[] -- > Autofills each victim's name

What is phone metadata and how is it obtained?

Phone metadata: Surveillance metadata is gathered by government or law enforcement pertaining to a particular suspect or person of interest. Includes: the phone numbers of the parties involved the duration of the call in some cases location information from the nearest cell tower How it's obtained: It is obtained from telephone service providers and does not require a warrant since it is transactional data

According to King, et al (2014), which posts were less/more likely to get published and why?

Posts designed to promote collective action regardless of if they were in favor or against the government were more likely to get censored. In contrast, criticisms about the state, its leaders and their policies were often published because the Chinese government uses to those posts to determine whether or not officials are doing their jobs/need to be replaced.

How do existing companies like Facebook get rid of competitors? (1pt)

Power & wealth decrease incentive to launch competitors (or do so with explicit goal to be acquired by powerful company) Ex. Facebook bought Instagram & WhatsApp and tried to buy Snapchat. Eventually cloned their features (legal)

What are the things startups were previously constrained by and what is it like now? (3 Points) CERFT

Previously constrained by Customers: The high cost of getting the first customer and the even higher cost of getting the product wrong Technology: Long technology development cycles Risks: The limited number of people with an appetite for the risks inherent in founding or working at a startup. Funding: The structure of the venture capital industry, in which a small number of firms each needed to invest big sums in a handful of start-ups to have a chance at significant returns. Expertise: The concentration of real expertise in how to build start-ups, which in the United States was mostly found in pockets on the East and West coasts. What is it like now? More customer input earlier Shorter technology development cycles Less risky Funding available more widely, including crowdsourcing The concentration of real expertise in how to build start-ups is spreading widely, including adoption by traditional companies & universities

What are the 2 levels in which censorship of individual social media posts occur according to King, et al 2014?

Prior Restraint and Post-publishing Review

According to Gary King, Chinese censorship of individual social media posts occurs at two levels. What are these 2 levels?

Prior restraint (thousands of censors "read social media submissions that are prevented from being posted by automated keyword filters, and decide which ones to publish"). Study this by "creating accounts on numerous social media sites throughout China, submitting texts with different randomly assigned content to each, and detecting ...which ones were censored." Post-publishing review: Censors "read individual social media posts, and decide which ones to take down." Study this by downloading "published Chinese social media posts before the government could censor them, and ...[revisit to] see which was censored."

What is the problem according to Tapscott? What is the solution nowadays? 1 point (Class 20)

Problem: sending copies of assets allows them to be spent more than once (no longer rival and excludable). New solution: Blockchain: or a public global ledger protected by encryption, which allows strangers to interact with trust. [new block created with all new transactions every 10 minutes. It allows market participants to keep track of digital currency transactions without central recordkeeping. Each node (a computer connected to the network) gets a copy of the blockchain, which is downloaded automatically. Examples of broader use: Land titles; sharing platform; remittances; privacy management (and self-monetization), and IP.

According to Tapscott, what are five transformations for a prosperous world? (3 pts, Tapscott 2016)

Protect rights through immutable records Create a true sharing economy End the remittance ripoff Recapture our identities Ensure compensation for the creators of value

Briefly discuss how authoritarian governments restrict the flow of information in each of the three steps of the journalism process and how it contrasts with their restrictive efforts in the pre-internet era. (Simon, Joel. Repression goes Digital) - 3 points

Restrictive efforts pre-internet: news gatherers were mostly professional journalists governments around the world developed refined if imperfect strategies to control their activities, from denying visas and accreditation to the threat of prison sentences and even murder 3 steps of journalism process and restrictive efforts in internet-era: Gathering of news stop information at its source: physically attack protesters who are using cell phones to document abuses. use technology to suppress news gathering: Iran has technology allowing authorities to monitor any communications across a network, including voice calls, text messaging, instant messages, and Web traffic. The Iranian government also set up a Web site asking people to help identify photos of protesters and turn them in. Dissemination of news Simplest: limit access to the Internet or cellular networks. Limit the rise of mass citizen journalism by making it difficult for average citizens to get online,, and make it easy to target the individuals who defy the government. Countries like China and Iran allow broad access to the Internet but limiting the dissemination of certain kinds of critical content. Consumption of news block people from accessing certain kinds of information on the Web. Blacklisting: use filters to block critical Web sites Whitelisting: authorizing approved Web sites and blocking the rest. require Internet café owners to police the sites clients visit; some have installed software that allows the government to do this remotely.

What is MP3.com's weakness? (Class 28, 1 point).

Ripping music first, then matching against local fingerprint (versus DMCA-protected storing of ripped files on server "at the direction" of users)

What type of jobs are most vulnerable to automation?

Routine, predictable work What determines vulnerability to automation, experts say, is not so much whether the work concerned is manual or white-collar but whether or not it is routine.

In order to avoid the Chinese government censorship regulations, _____ substituted the _____ in the infamous Tankman photo.

Rubber duckies, tanks

Explain how Instagram was able to respond and adapt to their user behavior effectively and successfully differentiated themselves from the other check-in apps at the time. (3 points)

Saw potential of visual communication (visual status) and digital devices Early investor impressed with rapid adoptions; lot of investors bandwagoned and had $500k (slow burn rate). Pivoted: 100 users (looked at why those users kept using it).1 Filters helped make photos "worthy" of sharing. No easy way to share them. Open network structure (follow who you want) Rapid adoptions (couldn't scale initially... server down a lot). Weren't great at metrics, but very sticky Attribute some of their success to luck, but also how they responded.

What is the Sharing Economy model, and how does CMC and the internet make it more effective? (3 points)

Sharing economy model: Economic model often defined as a peer-to-peer based activity of acquiring, providing or sharing access to goods and services facilitated by a community based online platform. Sharing economies allow individuals and groups to make money from underused assets. In this way, physical assets are shared as services. Take for instance car sharing services like Lyft and Uber. CMC's effect: Made it easier for asset owners and those seeking to use those assets to find each other. Increased trust and social acceptance of online exchanges and sharing, recognition of the existing inefficiencies and the savings those models can deliver to consumers Allows for flexible working patterns... [particularly] among younger generations" Less administrative overhead than traditional businesses. Independent workforce also requires less bureaucracy.

According to lecture, why did the 19th century need Tripadvisor?

So you can read reviews of places you are going so that you trust that the place you are going is safe. Ex: hotel owner murdered his guests, but people kept going to it because they had no way to know that the guests were being murdered

What are the four states of privacy? AIRS

Solitude: free from observation by others Intimacy: small group seclusion for members to be close Anonymity: freedom from identification/surveillance in public Reserve: desire to limit disclosures to others

According to Ahuja's "Online Advertising History" and the discussion on the lecture, what was the first internet advertising? What was the users' response to it and why?

Spam, users were outraged because it was government supported and turned interpersonal communication to a mass ad medium

In what ways are Amazon and other tech giants simultaneously stifling and promoting innovation? How has the industry responded to their presence?

Stifling innovation Amazon and other tech giants disincentivize would-be entrepreneurs within their own companies with huge salaries -- whereas in the past, it would be more common to leave and establish their own ventures. Investors hesitate to fund anything in spaces that Amazon and other major firms could enter, which is virtually everything given Amazon's history. Industry response and Promoting innovation The industry has responded by nearly halving in the number of companies less than a year old (since 1980). How they are promoting innovation: The few firms that remain are "financing next generation research at a scale no one else can afford," such as Google's Fiber internet and self driving cars.

The invention of Spam has transformed email from an interpersonal form of communication into what larger form of communication? (1 point) - Class 21

Takes interpersonal e-mail and turns it into mass ad medium Takes advantage of tiny marginal cost (low costs mean very tiny response rate might still exceed costs, therefore send it to as many people as possible)

What is Google's "Selfish Ledger"? (1 point, Lec. 22)

The Selfish Ledger, is a nearly 9-minute-long concept video from inside Google's "moonshot factory" X labs The main concept found in the selfish ledger can be defined in very similar terms: its premise, on the individual level, is to help users with self-improvement and behavior modification. But it wants to get all of your information ("near total data collection..." creepy) Some say that the ledger includes a disturbing concept to reshape humanity with data views "ledgers" of personal information and data as being equivalent to genes that we don't own, but can pass on to others to predict (and influence) behavior of future generations of users Summary: the ledger collect all data on the user and interpret the data, and then guide and nudge the user to make choices that are beneficial for society and for the user. Controversial and sparks debate about privacy issues.

What is fair use?

The doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as Criticism, news reporting, Teaching, and research without the need for permission from or payment to the copyright holder. Fair use is not limited to this; it also takes into consideration whether or not the work is transformative, etc

What is a patent? (Class 28, 1 point)

The exclusive right to an invention, and the control of its manufacture

What is the "invisible hand" and how does it relate to individuals and society? 1 Point

The market force that helps the demand and supply of goods in a free market to reach equilibrium automatically An economy will comparatively work and function well if the government will leave people alone to buy and sell freely among themselves If people were allowed to trade freely, self interested traders present in the market would compete with each other, leading markets towards the positive output with the help of an invisible hand. In a free market scenario where there are no regulations or restrictions imposed by the government, if someone charges less, the customer will buy from him. Therefore, you have to lower your price or offer something better than your competitor. Whenever enough people demand something, it will be supplied by the market and everyone will be happy. The seller end up getting the price and the buyer will get better goods at the desired price.

Where does the term 50c come from?

The people hired to surreptitiously posting large numbers of fabricated social media comments, as if they were the genuine opinions of ordinary Chinese people are known formally as "Internet commentators" but more widely as "50c party" members, so-called because they are rumored to be paid 50 cents (5 jiao, 角, or about US$0.08) to write and post each comment.

What are the aspects of social platforms that make it a poor choice as a platform for activism? What two traits do social platforms lack that was found in the civil right protests of the 1960s? (3 points;

The platforms of social media are built around weak ties and a network structure. Twitter is a way of following (or being followed by) people you may never have met. But weak ties seldom lead to high-risk activism and networks don't have a centralized leadership structure and clear lines of authority, so they have real difficulty reaching consensus and setting goals. Social media platforms lack the strong ties and hierarchical organization found in the civil rights protests which lead to high risk activism.

Describe Madison's Dilemma and how it relates to CMC.

The power to help you is usually also power that can be used to hurt you. CMC has increased and decreased our anonymity More people to interact anonymously and people you'll never meet More power for others to track down every last piece of info about you

Under what conditions will commons-based peer production work best?

The product is informational/cultural Capital resources needed for production are widely dispersed (e.g. computing and communication capabilities) Projects are modular (can be broken up into individual projects), fine grained, and costs of integrating contributions are low

Why is it difficult for inventors to sue for patent and copyright infringements nowadays? - Class 28/29

These legal battles often take years to procure an outcome and costs thousands of dollars -- time and money that the victim of the crime must sacrifice.

According to Finley's article, why does Google, which still makes most of its revenue from advertising, block ads?

They are trying to pre-empt larger threat of third-party ad blockers, like a fox guarding the hen house Google hopes ridding the web of its very worst ads might discourage Chrome users from installing more aggressive ad-blocking software that saps revenue universally.

How many countries does the Freedom House Study (2017) track?

Tracks internet freedom in 65 countries

Why can e-commerce platforms like Amazon and eBay, who facilitate the sale of counterfeits, operate with little risk of prosecution? (1 point) ("The U.S. Patent System Is Broken, Says The Inventor Of The Hoverboard")

U.S. protection circumvented by e-commerce -- enabling U.S. consumers to buy from infringing factories located overseas. Not liable for third-party infringement

What is the presumption of continuity (Volokh, U.S. Law and Cyberspace: Five Basic Principles)? (1 point)

Unless there's good reason to believe the contrary, the rule of law for cyberspace conduct should be the same—no more and no less restrictive—as the rule of law for non-cyberspace transactions. Most of the time, this will lead us to the right result. (Laws should be independent of medium)

What is the difference between viruses and worms? Class 23: Hackers and Malware, Slide 22

Viruses need humans to execute the file (click on it) in order for the virus to be spread from computer to computer, and needs to insert itself into real documents and programs, while a worm is a standalone software that does not require a host program or human help to propagate by exploiting vulnerability in systems of spread itself through social engineering.

Name and explain 3 types of Malware. (3 points) Class 23

Viruses: small piece of software that inserts itself into real documents and programs (leaves infection as it travels from computer to computer). Needs human to execute file in order to spread Worm: standalone software that does not require a host program or human help to propagate (either exploit a vulnerability on the target system or use some kind of social engineering to trick users into executing them) Trojan horse: a computer program that looks legitimate "but instead does damage when you run it" (can't replicate automatically or infect other files, and often used to create "back doors") Bots: automated process that interacts with other network services (can be legit). Infected host can "connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices, or "botnet." Ransomware: restricts user access by encrypting files/locking down the system; forces user to pay to remove it Rootkit: designed to remotely access or control a computer without being detected by users or security programs Spyware: software that spies on user activity without their knowledge Adware: (advertising-supported software) malware that automatically delivers advertisements (sometimes bundled with spyware) Bug: software flaw produces an undesired outcome (can be exploited by hackers)

What is the name of the score/app that China uses as a monitoring and enforcement system?

Zhima

What are the two reasons that success of the U.S. government and other NGOs in promoting internet access as a means to democracy been limited? (1 point

authoritarian governments have adapted their own strategies in response. the "if we build it, they will come" philosophy doesn't take into account basic human psychology that entertainment choices are preferred over news and attitudes toward the internet determine its use, not the technology itself Greater efforts must be put toward tearing down "psychological firewalls," building demand for internet freedom and influencing citizens to employ the internet's democratic potential. There is this idea that when internet is mainly used for entertainment and not to discuss politics, authoritarian government actually benefits from this, thus promoting internet access to these societies don't actually help them.

According to Kelly et al., what has been the general trend in Internet freedom worldwide? Which country has proven to be the worst abuser of Internet freedom?

generally declining; China


Conjuntos de estudio relacionados

med/surg chap 46 Myasthenia Gravis & Guillain Barre

View Set

Anatomy and Positioning of the Bony Thorax, Sternum and Ribs

View Set

Info 360 Chapter 10, Management Info CH. 9, MIS9, Management Info CH. 9

View Set