Comm 151 Final Exam: Suggested Questions
What do trademarks do? (1 pt)
"A peculiar distinguishing mark or device affixed by a manufacturer or a merchant to his goods, the exclusive right of using which is recognized by law." - Used to reward producer of high- quality goods. Reputation tool. - Can be renewed indefinitely if still in use, but needs to be defended. = allowing people to build a reputation of their good - and allow people to track their products over time and see how their products grow or fail [Class 28, slide 9]
What is the definition of Net Neutrality? (1 point)
"Internet service providers treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, and modes of communication." - ISPs want ability to manage traffic on their network (treat some content different if sponsored or if undesired, like BitTorrent). "Peering" arrangements unregulated. - Concern that ISPs will extract payment/kill competition by treating some content/sites/applications differently (cable ISPs vs. streaming video). - Less competition now. Justice Department opposing some mergers (including current ATT/Time Warner proposed merger). [Lecture 27, Slides 24]
Define net neutrality.
"Internet service providers treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, and modes of communication." a) ISPs want ability to manage traffic on their network (treat some content different if sponsored or if undesired, like BitTorrent). "Peering" arrangements unregulated. b) Concern that ISPs will extract payment/kill competition by treating some content/sites/applications differently (cable ISPs vs. streaming video). c) Less competition now. Justice Department opposing some mergers (including current ATT/Time Warner proposed merger). [lecture 28, slide 4]
What are patents and how might they encourage innovation? (1 pt)
"The exclusive right to an invention, and the control of its manufacture." they're actually an exchange between inventors and the public. - In exchange for a time-limited monopoly on their inventions, inventors must fully disclose the invention itself in the patent specification, and agree to release their work into the public domain once their monopoly runs out. Gives incentives for people to design around them: figure out new ways to accomplish goals. [CLASS 28: Patel, Nilay. 2012. "The 'broken patent system': how we got here and how to fix it."]
Taylor (2013) speaks about "Intrusion upon Seclusion", what is that and how is it relevant to social media & privacy law? (1 point)
"intentional intrusion upon one's solitude, seclusion, or private affairs or concerns that would be highly offensive to a reasonable person" = someone has deliberately intruded on a private space when that person knew it was private = Intentional intrusion into private matters that would be highly offensive to a reasonable person, and whether public posts on social media are protected privacy This is relevant to social media and privacy law because courts often rule that there is no expectation of privacy for public posts on Facebook, but there is reasonable expectations for private, password protected communication like email. [Class 27 slide 17]
Malware is the combination of what two words? (1 point)
"malevolent"+"software" [Lecture 25, Slide 17]
Describe and give an example of 2 out of the 3 fallacies of cyber-law (3 points)
#1: Lawless "Wild West": = See threat law, false advertising law, extortion law, contract law, libel law, copyright law, etc. - says this is false because if you do these things you could still get in trouble #2: Shouldn't (or can't?) apply laws to cyberspace. (Barlow 1996, discussed in class 30 by Greenberg) #3: "Netizens should make their own laws in cyberspace": = communications medium; NOBODY lives there. - nobody physically lives online, communication online is different than living online [Class 27 Slide 10]
What are the "Three Fallacies of Cyber-Law?" (1 point)
#1: Lawless "Wild West": = See threat law, false advertising law, extortion law, contract law, libel law, copyright law, etc. - says this is false because if you do these things you could still get in trouble #2: Shouldn't (or can't?) apply laws to cyberspace. (Barlow 1996, discussed in class 30 by Greenberg) #3: "Netizens should make their own laws in cyberspace": = communications medium; NOBODY lives there. - nobody physically lives online, communication online is different than living online [Class 27, Slide 10]
What are "patent trolls"? What are the solutions to patent trolls? (3 points)
(or "non-practicing entity") ="a small company with no products of its own threatens lawsuits against larger companies who inadvertently infringe its portfolio of broad patents") Solutions: Patents are property, so options are limited a) Can't make it illegal for inventors to sell patents to trolls b) Can't invalidate patents just because of who owns them or whether owner makes any products Solution 1: Suggests limiting damages a non-practicing entity can win (making litigation less profitable) Solution 2: Compulsory licensing: "patent holders are required to license patents at commercially viable rates if they don't make products within a certain amount of time." Mix: software patents that give unrestricted patents for short time, then force compulsory licensing for remainder of patent term [Class 28, Slide 33]
From the "YouSoundifyTunes" project, which music site provided the most financial benefits to artists? Why would an artist choose to stream their music on a site that doesn't offer little financial incentive? (1 point)
*Streaming not very profitable for artists but reaching a wide audience was strong motivation (merchandise/concert tickets/etc.). Overall, Spotify seemed most beneficial for artists,Soundcloud/YouTube beneficial for up-and-comers (low barriers).* Spotify seemed most beneficial for artists they would choose to stream their music on a site that does not offer financial incentives if they are up-and-commers (use Soundcloud/YouTube since it has low barriers to entry) [Class 28, lecture slide 12]
Briefly describe the differences between virus and worm (1 point)
*Virus:* = small piece of software that inserts itself into real documents and programs (leaves infection as it travels from computer to computer). - Need human to execute file in order to spread. *Worm:* = standalone software that does not require a host program or human help to propagate - Either exploit a vulnerability on the target system or use some kind of social engineering to trick users into executing them. - A worm enters a computer through a vulnerability in the system and takes advantage of file-transport or information-transport features on the system, allowing it to travel unaided. [Lecture 25, Slide 17]
Name four ways individual power has been increased in regards to cyber law. (1 point)
1) "Cheap speech" (especially blogs) - But Sturgeon's Law: 90% of everything is junk 2) Libel and copyright infringement are also easier. - ISPs given shelter from lawsuits related to subscriber's speech (avoided chilling effect) 3) Advocation of violence and bigotry. (Libertarian response) 4) Technology as supplement to legal protection (filtering software, encryption) Often coupled with anticircumvention laws [Class 27: slide 15]
List and describe the Three Levers of Competition as described by Choudary? How did Airbnb utilize this three-pronged platform strategy? (3 points)
1) Creation of New Sources of Supply: This is new sources of supply that never existed before. The sources tend to be inferior/less sophisticated than mainstream sources. Overtime it evolves to directly compete with big industry. Airbnb found a new overnight room source for travelers. The rooms aren't as nice as five-star hotels, but as the platform becomes more well known, the quality improves to compete with those hotels. 2) Creation of New Behavior for Users on the Demand Side: Users must act unlike they have before and be willing to try new things. Airbnb created an entirely new user behavior in which people can stay at a complete strangers apartment for the night. This type of behavior would have sounded crazy a decade ago. 3) Architecting a Strong Curation System: Platforms need to curate their supply so that they can separate the best from the rest and reduce the costs and risks for users on the platform. To get users to switch to your platform, they must be able to trust the system. The curation system and trust add value to the platform. Airbnb invested in curation systems because of the high risks associated with their system. They send photographers to check out the listings first so that the listings are accurate, and they utilize user reviews. [Class 22: Choudary article]
List 3 advantages of the new system of production for information goods over old models (3 pts)
1) Lower "information opportunity cost" (easier to match "best person for the job" to task). No clear boundary between user and developer. 2) Increasing returns: Allows large cluster of potential contributors to creatively interact with large piles of information. 3) Decreases transaction costs associated with property and contract (billing, assignment, oversight, etc.) ex: Flicker and YouTube, the more people contributing to the product might increase the value of the product [Lecture 21 Slides]
Explain the two levels at which Chinese censorship of individual's social media occurs. (2 points)
1) Many tens of thousands of censors, working inside Chinese social media firms and government at several levels, = read individual social media posts and decide which ones to take down. 2) They also read social media submissions that are prevented from being posted by automated keyword filters, and decide which ones to publish. [Class 30: King, Pan, Roberts (2014)]
Chinese censorship of individual social media posts occurs at what two levels? (1 point)
1) Many tens of thousands of censors, working inside Chinese social media firms and government at several levels, read individual social media posts, and decide which ones to take down. 2) They also read social media submissions that are prevented from being posted by automated keyword filters, and decide which ones to publish.
What problems in commons-based peer-production are associated with the Tragedy of the Commons? Under which conditions are those problems more easily solved? (3 points)
1) No one will invest in a project if they can't appropriate the benefits; - Info isn't rival, so available to all; also diverse motivations to participate. 2) No one has the power to organize collaboration. - Projects that can be broken up into tiny pieces require far less individual motivation to complete (Flickr contributor with single photo) works best when: 1) Projects are modular (can be broken up into variously sized independent projects) 2) Projects are "fine-grained" (tiny production units available for those least interested) 3) Cost of integrating contributions must be low (or itself must be modular and fine-grained). 4) Also helps to have product be protected by rules like the GNU general public license ("four freedoms" ensure gains), technical constraints, rules, or size of project. [Class 21, slides 14 and 15]
According to King et al, what are the two levels that censorship of individual social media posts occurs at? Briefly explain each level. (3 points)
1) Prior restraint (thousands of censors "read social media submissions that are prevented from being posted by automated keyword filters, and decide which ones to publish"). Study this by "creating accounts on numerous social media sites throughout China, submitting texts with different randomly assigned content to each, and detecting ...which ones were censored." 2) Post-publishing review: Censors "read individual social media posts, and decide which ones to take down."Study this by downloading "published Chinese social media posts before the government could censor them, and ...[revisit to] see which was censored." [Class 30 lecture: Slide 4/8]
What are the 2 ways that the Chinese censor individual social media posts? (1pt)
1) Prior restraint (thousands of censors "read social media submissions that are prevented from being posted by automated keyword filters, and decide which ones to publish"). Study this by "creating accounts on numerous social media sites throughout China, submitting texts with different randomly assigned content to each, and detecting ...which ones were censored." 2) Post-publishing review: Censors "read individual social media posts, and decide which ones to take down."Study this by downloading "published Chinese social media posts before the government could censor them, and ...[revisit to] see which was censored." [Class 30 readings: Reverse Engineering Censorship in China]
Explain the two levels of censoring individual social media posts as described by King, et al. (3 pt)
1) Prior restraint (thousands of censors "read social media submissions that are prevented from being posted by automated keyword filters, and decide which ones to publish"). Study this by "creating accounts on numerous social media sites throughout China, submitting texts with different randomly assigned content to each, and detecting ...which ones were censored." 2) Post-publishing review: Censors "read individual social media posts, and decide which ones to take down."Study this by downloading "published Chinese social media posts before the government could censor them, and ...[revisit to] see which was censored." [Class 30, slide 7]
State and describe the two forms of censorship used by the Chinese government that are stated in the King, et al, reading.
1) Prior restraint (thousands of censors "read social media submissions that are prevented from being posted by automated keyword filters, and decide which ones to publish"). Study this by "creating accounts on numerous social media sites throughout China, submitting texts with different randomly assigned content to each, and detecting ...which ones were censored." 2) Post-publishing review: Censors "read individual social media posts, and decide which ones to take down."Study this by downloading "published Chinese social media posts before the government could censor them, and ...[revisit to] see which was censored." [lecture 30, slide 7]
What are the four factors that determine whether the particular challenged activities constitute fair use or infringement? (3 points)
1) Purposes and character of use (including whether such use is of a commercial nature or is for nonprofit educational purposes, generally, and whether transforms meaning) 2) Nature of the copyrighted work (facts? Unpublished? Imaginative?) 3) Amount and substantiality of the portion used in relation to the copyrighted work as a while 4) Effect of the use upon the potential market for or value of the copyrighted work (big) [Class 28: Herzfeld & Melzer "Forbes Article: Fair Use in the Age of Social Media"]
List an impact of information flow on Financial markets (1 pt)
1) Trading tools democratized (access to tools & info, lowering transaction costs) 2) New goods created (already discussed throughout this class) 3) Sees network effects leading to dominance by few firms - BUT also sees intense competition due to removal of barriers [Lecture 21 slides]
What are the 2 reasons why LinkedIn is allowed in China? (1 pt)
1) connecting China's workforce with the world can only help Chinese companies 2) they need to find foreign partners to import, export, and even recruit foreign talent 3) openly plays by the rules in China [Class 30: What is China censoring online? - Youtube Video]
What are the two main common law causes of acion for invasion of privacy? (1 Point)
1) intrusion upon seclusion = An intentional intrusion upon one's solitude, seclusion, or private affairs or concerns that would be highly offensive to a reasonable person. 2) public disclosure of private facts = A public disclosure of one or more private facts which would be offensive and objectionable to a reasonable person, and which is not of legitimate public concern. [Class 27: Taylor (2014) "Common Law Invasion of Privacy Claims in Social Media"]
Name 3 out of the 7 types of privacy in Leroux's article. (1 point)
1) person (body functions & characteristics); 2) behavior and action (sexual preferences, politics, religion) 3) communication (no interception) 4) data and image (personal data not automatically available to others; users able to exercise a substantial degree of control) 5) thoughts and feelings (think/feel without revealing) 6) location and space (travel w/o being identified, tracked, or monitored) 7) association (including group privacy) Associate without being monitored. [Class 24, Slide 10]
What is the definition of fiat currency? Is bitcoin an example of fiat currency? (1 point)
1) type of currency issued & declared to be legal tender by a government 2) has no intrinsic value (can't be redeemed for silver, etc.). - most modern currencies are fiat currencies Bitcoin tries to cut out the government role in establishing legal tender = "a new electronic cash system that's fully peer-to-peer, with no trusted third party" (Bitcoin's code sets the rules and the network checks for compliance) Not issued by gov't: mathematically generated ("Mined" Limit of 21 million) as the computers in this network log, verify, and sync transactions in a peer-to-peer ledger. Value floats against other currencies (wild swings in value). [Class 22 Slide 3]
Name and explain two ways in which CMC has affected market assumptions about goods. (1 point)
1. Excludability: = Ability of producer to "force" consumers to become buyers by controlling who gets a product and who doesn't. 2. Rivalness: = Two people can't consume the same copy of a good simultaneously Ex: Remember when movie rentals were rival & excludable?Blockbuster, where if one person was renting out a DVD then someone else could not also enjoy that DVD (the more people enjoying a good the smaller piece of the pie you can also enjoy) [Lecture 21: Slide 6]
According to Blank (2013) startups were previously constrained by 5 things. Please describe 3 out of the 5 things. (3 points)
1. The high cost of getting the first customer and the even higher cost of getting the product wrong = (more customer input earlier now) 2. Long technology development cycles = (shortened now) 3. The limited number of people with an appetite for the risks inherent in founding or working at a start-up. = (less risky now) 4. The structure of the venture capital industry, in which a small number of firms each needed to invest big sums in a handful of start-ups to have a chance at significant returns. = (Funding available far more widely, including crowdsourcing) 5. The concentration of real expertise in how to build start-ups, which in the United States was mostly found in pockets on the East and West coasts. = (spreading widely now, including adoption by traditional companies & universities) [Lecture 23: Slide 6]
What four factors determine whether certain activities constitute fair use or infringement? (1 point)
1. the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes 2. the nature of the copyrighted work 3. the amount and substantiality of the portion used in relation to the copyrighted work as a whole 4. the effect of the use upon the potential market for or value of the copyrighted work [Class 28: Herzfeld & Melzer "Fair Use in the Age of Social Media"]
In the LeRoux (2013) article, what are four of the seven types of privacy? (1 point)
7 types of privacy: Privacy of the 1) person (body functions & characteristics); 2) behavior and action (sexual preferences, politics, religion) 3) communication (no interception) 4) data and image (personal data not automatically available to others; users able to exercise a substantial degree of control) 5) thoughts and feelings (think/feel without revealing) 6) location and space (travel w/o being identified, tracked, or monitored) 7) association (including group privacy) Associate without being monitored. [Class 24, Slide 10]
What is Sturgeon's Law? (1 point)
90% of everything is junk on the internet [Class 27 slide 15]
What is a trademark and how is it typically used? (1 point)
= "A peculiar distinguishing mark or device affixed by a manufacturer or a merchant to his goods, the exclusive right of using which is recognized by law." - Used to reward producer of high- quality goods. Reputation tool. - Can be renewed indefinitely if still in use, but needs to be defended (you can loose your trademark - ie: klenex or xerox loosing their trademark) = allowing people to build a reputation of their good - allow people to track their products over time and see how their products grow or fail - allow people to track the quality of the good [Class 28 Slide 9]
What is bitcoin and how does it work?
= "a new electronic cash system that's fully peer-to-peer, with no trusted third party" (Bitcoin's code sets the rules and the network checks for compliance) Bitcoin tries to cut out the government role in establishing legal tender Not issued by gov't: mathematically generated ("Mined" Limit of 21 million) as the computers in this network log, verify, and sync transactions in a peer-to-peer ledger. Value floats against other currencies (wild swings in value). [Class 21 slide 19]
Define a Startup.
= "newly-established business," but tends to be associated with higher- risk digital ventures with high potential for rapid growth. - Tend to be digital products because of lower barriers to entry (cheaper costs to start business and produce product) - Most of the software we've discussed this quarter (especially in the social media space) came from small startups that exploded. - Very powerful and cheap infrastructure to create and distribute information goods [Class 22, slide 15]
Define a 'startup'. What makes it different from the previous business model? What are one pro and one con of a startup? (3pts)
= "newly-established business," but tends to be associated with higher- risk digital ventures with high potential for rapid growth. - Tend to be digital products because of lower barriers to entry (cheaper costs to start business and produce product) - Most of the software we've discussed this quarter (especially in the social media space) came from small startups that exploded. Very powerful and cheap infrastructure to create and distribute information goods Different: Pro: Con: [Class 23 lecture and readings]
What is phishing? Explain the psychology behind why it works. (3 points)
= Identity thief who uses deceptive spam to con consumers out of private information. = a way of attempting to acquire information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. - Spear-phishing targets specific users, generally to use credentials in hacking Phishing works because: 1) Trust in authority 2) Text and graphics lack traditional clues of validity (but note bank example on next slide) 3) Clues are often too subtle to be noticed by untrained, busy, or unobservant users. 4) Sense of urgency/scarcity of phishing emails [Lecture 25, Slide 5 - 6]
Explain the 3 benefits and 3 disadvantages of on-demand platform such as Uber according to Hanrahan. (3 points)
= On-demand platforms (Uber, Lyft, Taskrabbit, etc) allow individuals with resources or skills to flexibly work with customers without overhead of traditional business Benefits: flexibility, autonomy, opportunity (sometimes also lower cost to consumer) - can be cheaper for consumer, flexibility of work Disadvantages: unpredictability/instability; loss of benefits; potential concentration of power in platform. - no guarantees that the business and supply will still be around, no benefits of a full time employee [Class 22, slide 12]
What is a gift economy? Provide one example.
= Relies on social selective incentives (Karma; donors get titles at Ars Technica), institutional subsidies, guilt, or possibility of future tit-for-tat to motivate contributions (rather than just withdrawals) from a collective good. - Institutional subsidies: Academics or IT workers who produce for own reasons (tenure, solve vexing problem) can distribute result almost without cost. - Can't be excluded and not rival, so always has free rider incentive. ex: tip boxes, NPR, donation for school buildings - getting the sticker from the zoo after donating to the zoo and now once you put the sticker on your car you seem like a better person because you donated [Class 21: slide 9]
Describe the idea of "platform thinking".
= Startups create new suppliers; new user behavior & demands; & new curation systems/platforms (trust & quality) a) Taskrabbit: directly hire others for tasks b) AirBNB: directly rent out spare room/property [less risky] c) KickStarter: directly appeal to small investors to support development of new product "Long tail"--can connect smaller suppliers and demand, rather than needing to focus on mass, homogenous products. - But mass employment also threatened... - can have more specialized products [Class 23: Slide 7]
According to the CNBC International video "What is China censoring online?" what is "Intranet" and how do local Chinese companies benefit from it?
= Thanks to the Intranet most traffic goes to sites within China helping domestic Chinese companies China is censoring social media sites, search engines, news websites, Apple's iBooks, Apple's movie offerings. LinkedIN is allowed because they believe that connecting Chinese workforce with the world can help Chinese companies. They need foreign partners for inports and exports. - need to obtain a license to have your own website or app, form, blog, or internet broadcast Intranet: = a private network connected within an enterprise - 96% of internet traffic in China goes to Chinese servers - in an effort to block outside companies a lot of Chinese companies are benefiting quite well = by blocking foreign internet rivals such as Facebook, Google, and Amazon from the market the worlds most populist country is discouraging competition from other countries and therefore is helping its own internal companies Might impose heavy fines or vague forms of punishment for breaking the law and using illegal internet activity China imposed new law = requires both domestic and foreign internet companies to (a) practice censorship, (b) register names of users, and (c) help with government surveillance Censoring the Internet because: (1) it wants to prevent western influences from influencing the countries (2) to improve its own image, promote "positive propaganda" and "strengthen and improve supervision over public opinion [Class 30: What is China censoring online? | CNBC Explains. (2017, March 19). CNBC. ]
Why was China's Internet more like an Intranet?
= a private network connected within an enterprise - 96% of internet traffic in China goes to Chinese servers - in an effort to block outside companies a lot of Chinese companies are benefiting quite well *most of the internet traffic goes to sites within china* - Most traffic goes to sites within China (economically beneficial trade barrier, helping Alibaba, Tencent, Baidu, and others thrive without threat of outside competition). = by blocking foreign internet rivals such as Facebook, Google, and Amazon from the market the worlds most populist country is discouraging competition from other countries and therefore is helping its own internal companies [Class 30, slide 3]
What is geocoding and how might it be dangerous? (3 points)
= adding geographic codes to customer records to make it possible to plot customer addresses on a map - digital mapping of geographic location of a computer geocoding is not precise and multiple IP addresses can be wrongly associated with one location or physical address - this means people could wrongly accuse an address or person living at an address of being identity thieves, spammers, scammers and fraudsters Ex: If you are only guessing using general info, map to guess (center of US [rounded to 38°N 97°W]) - Taylor Farm in Kansas. "accused of being identity thieves, spammers, scammers and fraudsters. They've gotten visited by FBI agents, federal marshals, IRS collectors, ambulances searching for suicidal veterans, and police officers searching for runaway children." More than 600 million IP addresses associated with farm. [Class 24, Slide 30]
What did the Clinton Administration argue in regards to the Telecommunications Act of 1996? (1 point)
= argued private investment/markets would best promote innovation, foster investment, and manage uncertainties about future of information services (governance in private hands, not gov't agency. Privatized the internet backbone in 1994). - Viewed info services as different than telephony/ "telecommunication services." Excluded I.S. from common carrier regulation. - Also included some deregulation of cable TV and allowed local phone companies into cable business. [Class 27, Slide 23]
In Kate Murphy's article ""We Want Privacy, but Can't Stop Sharing." , What does she mean by using the term "digital crowding"? (1 point)
= describes excessive social contact and loss of personal space online. [Class 24: Murphy (2014)]
Name and briefly explain one sticky area that Cyber Law falls on (1 point)
= geography invisible a) Not just b/c across political boundaries, but CAN'T see borders. If you do business with someone in CA, you're deemed to have legally agreed to do business with someone in CA. - you might be dealing with people who are lying about their position b) Jurisdiction (note jurisdictional passing-of-the-buck in internet fraud cases) c) Trademarks (two local collide) [Joe's in Chicago vs. Joe's in Venice] = "disambiguated" by geography normally. Might need technical solution. d) Obscenity: = Local standards. Porn not sent to certain zip codes. e) Trade regulation: = advertising in a place that subject to laws of 50 states and 200 countries. f) Criminal law: = gambling, copyright, child porn suppressed/monitorable how? Gambling legal someplace not elsewhere. [Lecture 27, Slide 11]
What does it mean that advertising is based on the idea of "buying eyeballs"? What is an issues advertising faces, and how can online advertising circumvent this?
= it means that advertisement is based on getting consumer's attention. Issues: "Half the money I spend on advertising is wasted; the trouble is I don't know which half" [Might be wrong people seeing it; might be wrong message for that person]. Online advertising: = potential to show which half is wrong vs. right by directly observing behavior. [Lecture 23: slide 12]
What is zero-rating? (1pt)
= where your ISP says that they can charge you more for using a different website or ISP to access certain services or gain access to certain content = practice of providing Internet access without financial cost under certain conditions, such as by only permitting access to certain websites or by subsidizing the service with advertising. - used to NOT be okay for internet wires but this might change due to the retraction of Net Neutrality - this was okay for phone providers [Class 27, Slide 25]
What type of advertising does Google use and how does it measure relevance?
Adwords PPC = included quality measure of relevance of ad measures relevance through click-through rate (amount of clicks) - i.e. the more people click on a certain link, the link will appear closer to the top in the next search ensuring that the most relevant links are presented at the top of the search. [Class 23 slide 14]
Explain what happened when the FBI tried to access the phone belonging to the shooter of the San Bernardino massacre. Were they successful? What was Apple's main concern? (3 pts)
After the San Bernadino massacre, FBI wanted to access info on phone (actually owned by SB County), but didn't know passcode (and would erase after 10 wrong guesses). iCloud backup was accessed, but outdated. FBI presented Apple with warrant to access phone data. Apple helped with some info (tried to get it to backup to iCloud again, but they'd reset the iCloud password, which blocked the backup) FBI asked Apple to create new iOS (mockingly called GovtOS) that would allow unlimited password guesses without erasing. Apple said no. FBI obtained a court order requiring Apple create GovtOS under All Writs Act (authorizes federal courts to issue "all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law."). Apple refused, calling request excessively burdensome. Public & political outcry, but tech companies argued that backdoor would compromise other phones if it got out (and set a legal precedent). Broader concerns of privacy vs. security. Encryption creates a new kind of warrant-proof space. [Lecture 26, Slide 25]
What act and argument did Apple use to defend not unlocking the San Bernardino shooters iPhone for the FBI? (1 point)
All Writs Act = authorizes federal courts to issue "all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law."). Apple refused, calling request excessively burdensome. They made the argument that they were against making a code that could later be used for malicious purposes and they wanted to preserve citizen's privacy [Class 26: Grossman (2016) (paragraph 19)]
In the Roberts (2018) article what is described as "friction" in regards to censorship in China? (1pt)
An alternative to complete removal of otherwise censored searches. Flooding those searches with "distractions" that make it more difficult to find. This essentially raises the opportunity cost of finding the material. Make info more difficult to find via "Great Firewall" of China; Human filtering; Automated keyword-based filtering; Search filtering. [Class 30 (Slide 6/8)]
What App does China use to determine your social credit, what is the official name of this type of social credit? (1 point)
App that determines your social credit: = Alipay, a very popular online payment platform Type of social credit: = Zhima Credit (Sesame Credit), a very popular online payment platform [Class 30: Hvistendahl (2017) "Inside China's Vast New Experiment in Social Ranking"]
Name 6 of the 12 countries with no key internet controls observed. (1 point)
Argentina, Australia, Colombia, Germany, Iceland, Italy, Japan, US, UK, South Africa, Japan, Phillipines, among others.... [Class 29: slide 20]
How is social media surveillance an issue of social justice/human rights? Give two examples and explain. (3 points)
Authorities and governments now have powerful new ways to monitor crime and civil unrest. However authorities often target such surveillance at minority groups or others seeking to publicly air political grievances, which can potentially chill free speech 1) There is a concern that the rising power of government surveillance technology is prompting a spike in the monitoring of African Americans and other minority groups through video surveillance, social media and the tracking of cellphone calls 2) [Class 29: Timberg & Dwoskin or Sanja et al.]
Name one purpose that the Chinese use censorship? (1 Point)
Censorship in China is used to muzzle those outside government who attempt to spur the creation of crowds for any reason—in opposition to, in support of, or unrelated to the government.
Explain China's "vast new experiment in social ranking" as described in the Hvistendahl article (2017). How did it compare to prior authoritarian systems? What's one of the two existing problems it solves? (3 points)
Chinese gov't called for the establishment of a nationwide reputation tracking system for individuals, businesses, and gov't officials. called "social credit" Compared to prior authoritarian systems of coercion, more subtle and all-encompassing (Prior totalitarian monitoring systems were very expensive and hard to implement). Gives example of prior shaming system (red light photos on TV) that couldn't scale. - used to be very difficult to perform these operations Solves two existing problems: 1) payment system friction 2) absence of method to tell good risks from swindlers [Lecture 30]
What were the findings of the Freedom House study? (1 point)
Conclude internet freedom has been decreasing for seven straight years. Major recent trends: information manipulation (fake news, bots/disinformation, censorship/suppression of news); mobile internet shutdowns (sometimes regional); targeting of livestream apps or users; physical & cyberattacks of news outlets, opposition, and rights groups, and restrictions on VPNs. Tracked internet freedom in 65 countries and only 1/4 of population live in countries with "free" internet access [Class 29: slide 18]
What website first introduced the banner ad? Which company first bought a banner ad space from that website? (1 point)
First website to introduce the banner ad: = HotWired (Wired magazine's former online off-shoot). - allowed AT&T to pay to place a banner ad above their site for 3 months First company to buy banner ad space from a website: = AT&T (paid $30,000) - ad enjoyed a click-through-rate of 44% [Class 23: Cook 2013]
According to Blank (2013), why is it foolish to make a five-year plan? How is the new lean startup model different from a traditional business model? (1 point)
Foolish to make a five-year-plan because they are generally fiction and are waste of time. it lies in the assumption that it's possible to figure out most of the unknowns of a business in advance, before you raise money and actually execute the idea - after some time entrepreneurs learn that customers do not need or want most of the product's features they dreamed up of in their five-year-plan New lean startup model different from traditional business model: because instead of executing a business model (traditional) you are instead searching for one (lean startups) where you (1) begin with hypotheses in a framework called a "business model canvas", (2) then do customer development to test hypotheses quickly [MVP (minimum viable production) to immediately get feedback & iterate] - lean startups are an agile development of a product and uses working with customer development [Class 23: Blank (2013) "Why the Lean startup changes everything" by article]
According to Yves LeRoux why is Google Glass dangerous? (3 points)
Google Glass tracks your eye movements and makes data requests based on where you are looking. This means the device collects information without active permission. - Eye movements are largely unconscious and have significant psychological meanings. - For example, eye movements show who you are attracted to and how you weigh your purchase options when shopping. - even a passing glance as you walk past a stranger's wallet can mean that the device on your face learns his/her credit card number. *All of this information can be compromised with a security breach, revealing both the information of the one using Google Glass and the people they surround themselves with.* [Class 24: LeRoux (2013) "Privacy concerns in the digital..."]
Based on the CNBC Explainer article (2017), what are three websites blocked in China? (1 point)
Google, Yahoo, Facebook, Instagram, Snapchat, Reddit [Lecture 30: slide 3]
What determines vulnerability to automation?
High- and low-skill non-routine workers at least risk (though some are more pessimistic). Examples: a) transport & logistics automation: self-driving cars, amazon drones b) office support automation: robots in customer service c) sales & services: customer service call operators c) low-skill non-routine workers examples: plumbing (hard for computers to take over and automate) d) high-skill non-routine workers examples: creative jobs, directors, artists [Class 21]
How has CMC made it easier for libel and copyright infringement? (1 point)
ISPs given shelter from lawsuits related to subscriber's speech (avoided chilling effect) [Lecture 27: slide 15]
What happens to a copyrighted work after its copyright term expires? (1 pt)
It falls into the public domain and can be used by anyone for any purpose. [Moody, Glyn. (2016) "Copyright chaos: Why isn't Anne Frank's diary free now? Op-ed: EU's long and fragmented copyright terms are unfit for the digital world."]
What is the one app that the Chinese government doesn't block? (1 point)
LinkedIn [Class 30 Slide 3]
What are the pros and cons of peer-production? (1 point)
Main features: individuals own their tools of production; low transaction costs (Coase again) & cheap matching of buyers & sellers. Companies provide hub built on existing web/phone infrastructure. Putting "dormant" capital or underused skilled labor to work (sometimes for free). But not easy to measure economic or environmental effects, and existing suppliers angered. Wants "legal framework in which peer-production services may thrive and grow, but where the legitimate public-policy interests of preserving public health and standards of safety and protecting individuals from fraud are maintained." Legal framework though has yet to be implemented that will allow peer-production services to thrive and grow while preserving public health and standards of safety for consumers. [Class 21: Levrer & Moylan "Embracing the Peer-Production Economy"]
What are native-style display ads, and what are social native ads? (1 point)
Native-style display ads: = appear along site's regular content Social native ads: = displayed on social media channels looking like "regular" posts. Paid for by brands but published by authors (videos, blogs, Instagram posts, etc.) in their own style and voice. [Class 24: Muna 2016 and Lecture 24 slide 6]
Are you safe from wiretapping as a US citizen? Why or why not? (1pt)
No, because even though under the 4th amendment U.S. citizens are protected against unreasonable searches and seizures without "probable cause" (ie: wiretapping) the U.S. government was found to have warrantless wiretapping after Snowden revelations. In other words, U.S. citizens should not be subjected to wiretapping unless a court says there is "probable cause". However, certain revelations reveals that the government wiretapped and collected data on a number of individuals without "probable cause" or reason [Class 26 lecture and readings]
From the "Firewall" project, were all Western news media sites (e.g. The New York Times, WSJ, Economist, etc) blocked in China? (1 point)
No, some were allowed such as The Economist because they were or might have been more favorable in the eyes of the Chinese government. [Class 30, lecture slide 14]
How does Facebook use your data ON and OFFLINE to create targeted ads? (3 points)
Online data- Your likes and your friends likes influence what everyone on your friends list will see for ads. Clicking on that ad will show you more similar ads in the future. Facebook monitors your posts of major life events and tailors ads to those categories such as a wedding engagement with dress ads. Any information you disclose on Facebook or add to your profile such as location, age, and relationship status can be used for advertisers to target you. Offline data- Facebook utilizes data collection companies to create ads surrounding what you buy in the real world. Email lists, browser cookies, loyalty cards, and public records are collected by these companies and the information is given to facebook so that businesses can you target you more specifically from the real world to online. [Class 23: Klosowski Article]
In brief, what does the NSA's PRISM program colect? - 1 point
PRISM = program where at least nine different U.S. technology companies help provide data information from its customers to help surveil terrorism suspects - not supposed to target U.S. citizens or people in U.S. - companies that voluntarily cooperate have immunity from prosecution PRISM program collects: 1) E-mail 2) Chat: video and voice (calls made in U.S.) 3) Videos 4) Photos 5) Facebook posts and instant messages 6) Contents of an unknown number of phone calls 7) Metadata of phone calls 8) VoIP 9) Stored data 10) File transfers [Class 26: Stray 2013]
What is the difference between copyright and patents? What do they both have in common? (3 pts)
Patent: "The exclusive right to an invention, and the control of its manufacture." Copyright: "The exclusive rights of the owner of the copyright on a work to make and distribute copies, prepare derivative works, and perform and display the work in public." Both temporary monopolies granted to inventors/creators [Class 28, slide 8]
What does Macaskill, Ewen. 2013 refer to as "the Pattern of Life" in the "NSA Files Decoded" article, and how does the NSA create it? (3 points)
Pattern of life: = A detailed profile of the target and anyone associated with them. -Through requesting access to media companies such as Facebook and Skype, the NSA can surveil people who are "three hops" from their target - who could be people who talk to people who talk to people who talk to you. - cell phones, laptops, Facebook, Skype, chat-rooms: all allow the NSA to build what is calls "a pattern of life" [Macaskill (2013) "NSA Files Decoded"]
What is a possible policy solution regarding "battle of imperialisms"? (3 point)
Possible policy solution: Require protocols where source of the communication is tagged ("this message is coming from Ohio") - tag communication info to see where it is coming from [Class 27]
According to Solon (2017), for what reason would a VC be hesitant to back a startup? (1 pt)
Power & wealth decrease incentive to launch competitors (or do so with explicit goal to be acquired by powerful company) = VCs less likely to back startup that might get squashed by existing tech giants (threat of Amazon etc. moving in has a chilling effect). Are existing companies are getting harder to disrupt? [Class 22: Solon (2017)]
What do Ming & Choudhry (2017) say is the prior pattern of control by the Chinese government over the internet? What is the modern pattern? (1 pt)
Prior pattern was to tighten info control just before Party Congress every five years, then roll back. Now continuous. Modern Pattern: Vision of sovereignty is to be able to control and monitor all internet traffic passing through their internet infrastructure. a) Use propaganda and misinformation (and denial of service attacks) to shape internet content beyond China b) Also interfere with programs and sites more subtly, including functions within programs like WhatsApp. [Class 30, slide 7]
What was thought to be the prior pattern of information control in China according to the Ming and Choudhury (2017) article? (1pt)
Prior pattern was to tighten info control just before Party Congress every five years, then roll back. Now continuous. [Class 30 (Slide 3/8): Prior pattern was to tighten info control just before Party Congress every five years, then roll back. Now continuous.]
How does the new credit system in China allow the government to control the citizens? 1pt
Resulting score become obvious to self and others and benefits you directly; cheating, playing video games for too long, "spreading rumors" and being "seriously untrustworthy" in the eyes of the government will lead to direct and indirect punishment (literally treated as a "second-class citizen"); sanctions add friction to almost all economic activity at no cost to government; incentive to ostracize disfavored friends baked in. [Class 30 slide 13]
Discuss the findings of the King et Al study and provide reasons for why certain subjects were censored and others were not. (3 points)
Results: (note: predate recent crackdowns, so results might not apply to present) a) Found criticism of the state, its leaders, and policies was routinely published. - Might be useful for monitoring performance of leaders. b) Censored posts with the potential to inspire or organize collective action were likely to be censored (even if in favor of the state). - having people be able to organized and be mobilized to take action seemed to scare them the most [Class 30 Slide 10]
Explain the main tradeoff associated with intellectual property. (1 point)
Societal benefit vs. reward for creation a) reward for creation: Want to give creators an incentive to create works useful to the greater society (not reliant on hobbyists or altruists). --> More supply. b) societal benefit Don't want to overly restrict society's common benefits from IP. Dissemination hurt by monopoly pricing . -->Satisfy demand at a low price. Two main dimensions: 1. Compensation 2. Control - can you affect what people do with these goods (think: free beer vs. freedom of speech). - What can they do with it, and how much do they have to pay you? *At the same time that we want to give a long-lasting patent to inventors, so they have a bigger incentive to innovate, we also want to give them a short-lasting patent, so that society can benefit more from the invention.* [Class 28, slide 10]
What is the risk of automation on the job market? How is automation contributing to the growing gap between social classes? (3 points)
Technological advances are leading to a growing number of jobs becoming automated, displacing people from work. Not only are labor-related jobs becoming automated but white-collar jobs such as a radiologist are at risk as well. Automation is contributing to a gap in social class due to the fact that middle class jobs such as manufacturing are becoming less and less available. Low-skill jobs and high-skill jobs meanwhile are expanding. This is coined as job polarization. [Class 21: Economides, Nicholas "The impact of the internet on Financial Markets"]
In the article "When Vending Machines attack (a University), how did the vending machine at the unnamed University become hacked? (3 Points)
The Vending machine is an internet of things machine (= This genre of internet-connected appliances and vehicles brings our lives a new kind of convenience, really great, the best convenience. If your idea of convenience is an unpredictable device that occasionally inconveniences you beyond comprehension.) - Its connection to the internet and weak password allowed it to be attacked by a botnet that spread from one device to another. - Once the password was known, the malware had full control of the device and would check in with command infrastructure for updates and change the device's password, locking the university tech team from accessing them. [Class 25: Blue (2017) "When vending machines attack..."]
What is the fair use doctrine and what specific law codifies it? (1 point)
The fair use defense was created to limit the scope of copyright through an equitable rule of reason. The Copyright Act codifies the judicially created "fair use" doctrine. [Class 28: slide 19]
What are the methods that government can stop disseminating information online mentioned in Joel's article? (1 pt)
The simplest way to stop the dissemination of information or ideas is to limit access to the Internet or cellular networks ex: This is a strategy employed in some of the world's most repressive countries, such as Burma and Cuba By making it difficult for average citizens to get online, these governments inhibit the rise of mass citizen journalism, and make it easy to target the individuals who defy the government. [Class 29: Simon, Joel. 2010. "Repression Goes Digital: e Internet has become a chokepoint in the struggle for a free press."]
What does Nicholas Economides mean by the internet facilitates information flows? (1 pt)
This includes (i) information used to evaluate actions, such as analyst's reports; and (ii) software and interfaces that facilitate information exchange, dissemination, and evaluation [Class 21: Economides "impact of the internet on financial market" readings]
What is it to isolate and repress regions of unrest? Think of a classic arcade game. 1pt.
Whack-a-mole [Class 29, Slide 24]
Briefly explain the findings of the King et al. article, what type of messages did the Chinese government end up censoring the most and why? Also how did the Chinese government use online criticism of government officials for its benefit? (3 points)
While this article was looking at the two levels that were used to censor social media posts by the Chinese government (known as "prior restraint" and "post-publishing review"), the findings revealed that there was a lot of posts criticizing the state, its leaders, and its policies (surprisingly, these types of posts weren't censored - mainly because the Chinese government would use online criticism to monitor government officials, which was seen as a benefit). The posts that did get censored, however, were posts with the potential to inspire or organize collective action (whether or not the posts were for or against the state). [Class 30: King et al. (2014) "Reverse-Engineering Censorship in China: Randomized Experimentation and Participant Observation"]
In what ways have the powers of copyright expanded? (1pt)
a) Quantity/realms of copyright expanded (automatic, even for kid's drawing or e-mail) b) Hugely expanded (and expanding) extensions of copyright time periods. 11 times in last 40 years. Supreme Court upheld in Eldred v. Ashcroft c) Bans on encryption circumvention d) New user power can come at the cost of old revenue models (DVRs and ad skipping; peer-to-peer music & video distribution; news aggregation). e) Distribution in new media or modes. [Class 28, Slide 11]
According to Kate Murphy, how do people engage online without giving up their privacy? (3 points)
a) setting up multiple fake identities, b) using a virtual private network to shield their browsing behavior c) not "liking" anything on Facebook or following anyone on Twitter which making their social networks and preferences harder to track. [Class 24: Murphy (2014) "We want privacy, but can..."]
What is "blacklisting"? What is "whitelisting"? (1 pt)
blacklisting: = Governments can also attack the third part of the information assembly line, blocking people from accessing certain kinds of information on the Web. - Many repressive governments—including Iran, Tunisia, Saudi Arabia, Ethiopia, and China—use filters to block critical Web sites, whitelisting: = refers to authorizing approved Web sites and blocking the rest ex: Increasingly, governments also require Internet café owners to police the sites that their clients visit; some have installed software that allows the government to do this remotely. [CLASS 29: Simon, Joel. 2010. "Repression Goes Digital: Te Internet has become a chokepoint in the struggle for a free press."]
According to Simon on "Repression Goes Digital: The Internet has become a chokepoint in the struggle for a free press" repressive governments enforce government censorship by practicing Blacklisting and Whitelisting. Compare and contrast these practices. (1 point)
blacklisting: = Governments can also attack the third part of the information assembly line, blocking people from accessing certain kinds of information on the Web. - Many repressive governments—including Iran, Tunisia, Saudi Arabia, Ethiopia, and China—use filters to block critical Web sites, whitelisting: = refers to authorizing approved Web sites and blocking the rest ex: Increasingly, governments also require Internet café owners to police the sites that their clients visit; some have installed software that allows the government to do this remotely. [Class 29: Simon, Joel. 2010. "Repression Goes Digital: The Internet has become a chokepoint in the struggle for a free press."]
What new system of production is the solution for the various problems of production? (1 point)
common-based peer production Individuals self-identify what they want/need to work on, with peer review knocking down errors. Best people can cluster according to their abilities. ("From each according to his abilities, to all regardless of need or willingness to pay") [Class 21, slide 12]
First list the constraints startups faced in the past. Then explain why these constraints are no longer an issue anymore. (3 points)
constraints of startups in the past: 1. The high cost of getting the first customer and the even higher cost of getting the product wrong (more customer input earlier now) 2. Long technology development cycles (shortened now) 3. The limited number of people with an appetite for the risks inherent in founding or working at a start-up. (less risky now) 4. The structure of the venture capital industry, in which a small number of firms each needed to invest big sums in a handful of start-ups to have a chance at significant returns. (Funding available far more widely, including crowdsourcing) 5. The concentration of real expertise in how to build start-ups, which in the United States was mostly found in pockets on the East and West coasts. (spreading widely now, including adoption by traditional companies & universities) why these constraints are no longer an issue: [Class 22: Blank article]
In Gladwell's opinion, how's the activism today based in social media different from the traditional activism? (1pt)
it doesn't involve financial or personal risk a) CMC (and social networks) are great at establishing/ maintaining "weak ties" (more casual, surface friendships) Can be great at sharing info or mobilizing lots of cheap acts = The platforms of social media are built around weak ties. - however weak ties seldom lead to high-risk activism b) social media is not about this kind of hierarchical organization, more build on - Facebook and the like are tools for building networks, which are the opposite, in structure and character, of hierarchies. Unlike hierarchies, with their rules and procedures, networks aren't controlled by a single central authority. Decisions are made through consensus, and the ties that bind people to the group are loose. = This structure makes networks enormously resilient and adaptable in low-risk situations. *Tradition activism did actually made people to go in the streets while today's activism based on social media does not necessarily mobilize people, but often serves as a tool to organize them. Social media increases participation by lessening the motivation that participation requires. Facebook activism does not require real sacrifice.* [Class 29: Gladwell, Malcolm. 2010. "Small Change: Why the Revolution will not be tweeted."]
What is the main characteristic that makes a virus different than a worm? (1 pt)
main characteristic that is different between a virus and a worm is that that a worm operates more or less independently of other files, whereas a virus depends on a host program to spread itself - worms are standalone software and do not require a host program or human help to propagate - virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program [Class 25: Cisco. ND. "What Is the Difference: Viruses, Worms, Trojans, and Bots?"]
According to Blank, what's a lean startup? (1 point)
method "favors experimentation over elaborate planning, customer feedback over intuition, and iterative design over traditional 'big design up front' development" use Responsive development: = short, repeated cycles of development & evaluation. a) Begin with hypotheses in a framework called a "business model canvas." b) Then do customer development to test hypotheses quickly (MVP to immediately get feedback & iterate). c) Agile development of product, working with customer development. [Class 22: Blank 2013]
According to a research conducted by King, Pan and Roberts, what kind of posts are more likely to be censored? (1 point)
posts with the potential to inspire or organize collective action [Class 30: "Reverse-Engineering Censorship in China: Randomized Experimentation and Participant Observation."]
How many books has Google Books scanned in 2016? What genre are the majority of the books scanned? (1 point)
scanned more than 20 million books many of them are nonfiction and out of print [Class 28: Kravets "Fair Use prevails..." article (2016)]
What is a spam? Although with many new advanced technological mechanisms that filter out spam emails why is it still send to millions of people daily?
unwanted e-mail (usually of a commercial nature sent out in bulk) a) Takes interpersonal e-mail; turns into mass ad medium b) Takes advantage of tiny marginal cost c) Low costs mean very tiny response rate might still exceed costs. = This low cost rate might still exceed the costs of smaller response rate d) Also benefits from inability of users to sanction senders; receiver bears burden of filtering (getting better: old spam folder at right) [Class 23: Slide 15]