Program Name: Internet Communications
Program Code: Net 11
Instructor: Cynthia Verspaget
__________________________________________________________
Assignment 1:
Concept 7: Netiquette
Concept 22: Public Space and Regulation
Concept 26: Privacy and Security
Concept 33: Information and Attention
__________________________________________________________
Student Name: Mr. Michael Bachmayer
Student No.: 13537779
Concept 7: Netiquette
________________________________________________________________________________
“Good communication practice on the Internet is not something one 'learns', but something one 'practices' so
as to teach others, less familiar than yourself, how it is done.”
Discussion and reflection:
People meeting on the internet are a social group as per the definition: ‘people sharing some social relation’ www.dictionary.com which is how they will be defined for this discussion. Every social group interacts along a basic set of social rules or norms that govern what is acceptable behavior and what is not Etzioni 2000. Because a social group is made up of constantly changing individuals and members entering and leaving the group the social rules that govern interaction and communication also change and are fluid and social norms change regularly Coleman 1990 . Because of this, members who have been in a social group longer must pass these values on to new members of the group.
The internet comprises of many differing groups and each has a different set of values and social norms. For example: discussions on the discussions page of the Net11 subject are expected to be of an academic standard and comply with university standards. Flame wares would be completely unacceptable, profanity would be frowned on, as would non-relevant discussion. On the other hand, the ‘news site’ I have been investigating www.shoutwire.com prides itself on free speech and largely user moderated news stories that are moderated via ‘shouts’ and ‘bashes’ similar to www.Digg.com. In this user moderated environment profanity is closer to being the rule than the exception, flame wars are often encouraged, and offensive material is regularly posted and must be expected. People are expected to NOT mince their words to make them acceptable but say precisely what they think. IMVU or SecondLife on the other hand abide by a different set of rules again. The focus is far less on serious discussion and tends to be more light hearted and flirty. In my experience serious discussion is largely unpopular on these sites.
Given the size of the groups and often limited and brief interactions between individual members it is unlikely that one senior member will come together with one junior member to pass on the groups values. The junior member is far more likely to learn from the general behavior of the group or by watching other member’s behavior. In this way every small action from existing members may help to form the netiquette guidelines the new member will follow.
The rules that define appropriate conduct within a social group are constantly changing due to the members changing and the composition of membership changing. Therefore the rules governing that social group must also constantly change. As the internet allows access to an unlimited amount of social groups with different members, values, and social norms; the rules as to what is good netiquette must also be different for each group. It is impossible to learn a universal code of conduct that will apply to every group. The groups’ values and ethics are passed on from senior members of the group to newer members and is the process referred to in the topic quote. (490 words)
Further Reading: Concept 7 Netiquette
_________________________________________________________________________
Site Title: Netiquette Guidelines
Site Link: www.ietf.org/rfc/rfc1855.txt
This site provides a simple guide to general netiquette rules for beginners and is useful in that it provides a simple set of rules for behaviour. Netiquette is about social interactions regulated by social norms so it is useful to have a general list of suggested behavior as a starting point used to base internet behavior. The intended result of this site is to introduce new users to the internet culture and values. The site is owned by the ‘Internet Engineering Task Force’ which is non-profit organization intended to assist in creating and provide internet standards indicating it should be a credible site.
Site Title: Net Etiquette
Site Link: www.albion.com/netiquette/book/index.html
While the previous site provides a good overview and introduction to the basics of the topic this site delves much deeper into theoretical aspects and concepts of netiquette. It considers netiquette not as a rigid structure as does the first site but as an evolving concept that is bound to change and evolve based on the users in a particular group. It also considers that groups have differing rules and there is not one single ‘netiquette’ guideline that is appropriate for all situations on the internet. This site is therefore a good contrast to the first site provided and builds on the knowledge shown in the first site. The author has received considerable media attention for her netiquette guidelines and would be considered a respectable source.
Concept 22: Public Space and Regulation
____________________________________________________________________________
“Advanced Internet users are alert to regulatory processes in public discussion and ensure that they do not break them without good cause”
Discussion and Reflection:
Definition of Social Norms:
“The rules that a group uses for appropriate and inappropriate values, beliefs, attitudes and behaviors. These rules may be explicit or implicit. Failure to stick to the rules can result in severe punishments, the most feared of which is exclusion from the group.” (ChangingMinds.org 2008)
This seems to imply that a social group will moderate itself by ostracizing those who act inappropriately. Cranor (1995) suggests that on the internet social regulation is far more predominant than legal regulation. An example of such censorship can be seen when a user posts offensive content (to the group) and then is immediately bombarded with angry responses. The result of these responses is to harass the poster to the extent that they do not post similar content again or to ostracize them from the group entirely.
However, strict application of social norms to regulate behavior is becoming weakened by several trends and forces. One of these forces is the advent of ‘Trolls’ and ‘Trolling’ on the internet. Trolls are people who specifically make comments that go against social norms in order to elicit angry responses (Schwartz 2008). The aim of a troll is to make as many people angry as possible for ‘lulz’ (defined as the joy of disrupting another person’s equilibrium – at expense of their pain) (Schwartz 2008). The other force that prevents efficient social regulation is the anonymity of the internet (Brooks et al 1997). A clear example of this is www.4chan.org which allows users to post completely anonymous messages and thus is a haven for offensive content. The user is safe in knowing that nobody else will know who they are the next time they post and so have no fear of being ostracized from the group. Due to this anonymity; extremist views, terrorist threats, etc are regularly posted on 4chan (Smith 2008). In an anonymous environment (such as the internet) containing parties that deliberately go against social norms the use of social norms to regulate behavior is weakened.
The Interviews:
I interviewed the two of the three site operators of www.shoutwire.com and asked several questions regarding their views of censorship on ShoutWire. Their views had a definite inclination towards liberal relatively unregulated content. Both interviewees differentiated between submitted items (pictures, articles, essays) and comments. The consensus was that submitted items needed some censorship while comments should be uncensored. They also believed that excessive censorship would have a negative impact on the site, while they had mixed views on whether user’s moderated themselves via social norms as suggested in the previous paragraph. Interestingly one of the editors pointed out that not enough censorship led from pressure from advertisers and the current owner Tuberoo (Appendices I & II). Although the moderators in this instance have great powers ranging from deleting content to banning users as per the site guidelines (Shoutwire 2008) the moderators were loath to use these powers except for extreme circumstances (Appendices I & II). The conclusion I draw from this is that the users of the website www.shoutwire.com expect largely uncensored content and excess censorship would have some form of negative financial result, while excess freedom gives advertisers and the publicly listed holding company concerns.
Internet users need to be aware of the rules that apply to the public communication they undertake. These rules are social norms and also moderator enforced rules. Breaking these rules can lead to the user being shunned or ostracized by other users or even banned by a moderator. I agree with the topic statement. (579 words)
Further Reading: Concept 22 Public Space and Regulation
________________________________________________________________________
Site Title: Social Interaction on the Internet
Site Link: http://socserv2.mcmaster.ca/soc/courses/soc4j3/stuweb/cyber9/front.htm
This website examines the social implications that the new technology of the internet brings. The internet changes people’s social interactions drastically due to the ease and distance that can be covered by the communication. The authors then go on to discuss specific features of the changing social interactions and characteristics that make the internet environment different and influence communications. ‘Anonymity’, ‘Privacy’, and ‘Flaming’ are specifically examined for social consequences. This site is on a university server and written by academic’s. It is both highly relevant and reliable.
Site Title: Internet Censorship: Law & Policy around the world
Site Link: http://www.efa.org.au/Issues/Censor/cens3.html
This website looks at internet censorship around the world and the laws and regulations pertaining to content. These laws and regulations flow on to the sites and domains that are located within jurisdictions, however are difficult to enforce in other regions. It examines specific characteristics of several countries legal requirements and censorship powers and compares these with other countries. This site is relevant to the topic as it discusses the legal environment that a internet user becomes a part of by using the site registered within the countries jurisdiction. The site is published by a non-profit organization that provides the Australian Government with advice regarding new censorship laws.
Concept 26: Privacy and Security
______________________________________________________________________________
“The Internet is a profoundly ‘open’ system and advanced Internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form. Conceptually, the Internet challenges us to take greater responsibility for the protection of privacy and security than perhaps we are used to when dealing with the media.”
Discussion and reflection:
Cyber Crime is rapidly increasing with a increase of 20% in the last quarter of 2005 (Cassovoy 2005). Hackers are now largely not the stereotypical pimply student seeking notoriety, but are now more likely to be well funded gangs operating to a strict plan. Better funding and planning means that users have to fend off ever more devious attacks (Cassovoy 2005).
Due to the rise of cybercrime and constant new threats in the form of virus’s, trojans, adware, spam, phishing, hacking, etc have cause alert internet users to be far more cautious on the internet. This has caused a proliferation of protection tools available to easily ensure anonymity and privacy on the internet. Several of these are listed below:
Hide my Ip (www.hide-my-ip.com)
This is a tool that hides the ip of the computer being used on the internet. Hiding the ip has several benefits. A simple packet sniffer being used by a hacker could easily discover large amounts of information including security weaknesses on the computer. Randomizing the ip provides some level of protection against this threat (Boswell 2007).
Hide Search Habits
There are a few simple ways to hide your search history. Browser history should be clear regularly along with cookies and Cached files stored by the browser. Other simple tricks are to use a proxy when searching and avoid registering for sites. If a site requires registration either us bugmenot (www.bugmenot.com) or register using a false email that contains false personal details (Boswell 2007).
Several basic programs that greatly increase internet security (sorted by their function) are:
• Anti spyware programs: Spyware is a collective term for programs installed on the user’s computer without their permission that track the users activities (Lavasoft 2008) . This poses an obvious security risk. The easiest way to combat this threat is to use a free spyware removal tool such as Spybot S&D or Adaware
• Firewall: There are two kinds of firewall. Hardware based and Software based. Ideally both should be used a software based firewall and a hardware based firewall (Microsoft 2008). The easiest way to get a hardware based firewall is to use a router to access the internet.
• Antivirus: A program for protecting the computer from viruses which will automatically isolate infected files and delete the malicious code.
• A hard drive eraser such as ‘Windows and Internet Washer’ When files are deleted from the computer only the header is removed making it possible to recover the data. This program removes tracks of browsing and automatically clears cache etc while making it harder for a unauthorized person to retrieve deleted files.
Security is more important than ever with an ever increasing amount of virus and threats. Constantly changing technology also means that it is vital to have up to date security to keep up with the constantly changing threats (Fisher 2005).
The programs and measures listed are easy to use and adopt and will increase internet security exponentially. Due to constant new threats the internet users face a challenge in staying ahead of security loopholes. The discerning internet user takes appropriate precautions to avoid the security risks listed. (529 words)
Further Reading: Concept 26 Privacy and Security
_____________________________________________________________________________
Site Title: Phishing, Spoofing, Spam, Hacking, Spyware, Identity Theft, Cyber Scams and Computer Hoaxes
Site Link:
www.azdoa.gov/isd/ais/viruses-and-hoax-alert-warnings
This site lists out many of the threats faced by everyday users on the internet along with a description of what they are and symptoms by which they can be spotted. The information contained is both easy to understand and contains advanced definitions serving as a great starting point for the discussion on internet security. It is published by a government department signifying it is a reliable resource and also links to other relevant sites. It also presents practical advice on how to avoid these security problems and protect against future attacks.
Site Title: Home Computer Security
Site Link:
http://www.cert.org/homeusers/HomeComputerSecurity
This site is highly relevant and provides detailed information regarding every aspect of computer security. It describes safety measures computer users can use without installing software such as: ensuring personal information is not disclosed, and by examining the psyche for weaknesses in the ‘person’ rather than the system. It then goes on to examine system weaknesses and methods used to overcome these weaknesses such as firewalls and antivirus programs. An analysis is carried out on usefulness of these programs and step by step instructions are provided for maintaining maximum security. The site is published CERT which is a non-profit organization within Carnegie-Mellon University indicating the site is a reputable source.
Concept 33: Information and Attention
_____________________________________________________________________________
“In the era of the ‘attention economy’, readers and users of Internet information must be carefully craft, in their own minds, the kind of metadata which will – almost instinctively – ‘fit’ with the metadata of the information sources they want, so that – in the few brief moments of initial exchange, when a seeker of information encounters information being sought, rapid, effective judgments are made that ‘pay off’ in terms of further reading, accessing and saving.”
Discussion and reflection:
In ‘The attention economy and the net’ (Goldhaber 1997) suggests that the new environment of the internet is introducing us to a new form of economics – namely the attention economy. The internet contains fast amounts of information that we could not possibly hope to interpret due to sheer size and location. Due to this excess of information, (Goldhaber 1997) argues that the one thing that is becoming scarce is not information as in the past but our attention and time to absorb this information. Attention is limited as there is only so much attention a person can give to the internet. The bounds of attention are the time available for ‘net surfing’ and also the interests of the user. Unfortunately most people can only focus on one or two things at a time so this attention can be very limited. When a website is able to capture a persons’ attention then it could be considered to be successful to a degree as it was able to control a part of a limited resource that a large number of other sites failed to do.
The internet user is bombarded by incredible amounts of information in the way of websites, news feeds, advertising, spam, and many other things on the internet. It could be argued that as we cannot decipher all this information at once our minds must learn to differentiate between desired information and irrelevant information. This arguably changes the browsing habits of users to skim reading (Iskold 2007). However, numerous authors suggest there is a change going on in the way our minds function. This is seen in the change in our attention from full concentration on one item to partial concentration on many different things (Iskold 2007). This would suggest that the topic statement is at least partially incorrect as the users habits are formed subconsciously and it is not so much the user who ‘chooses to skim read and pick up select relevant information’ as ‘the users attention is shorter forcing them to skim read and if the information is relevant and stands out it will catch their eye’. In either case the information that the user picks up is relevant and attention catching.
Alex Iskold (2007) suggests that the key to holding the users attention is for websites to contain content relevant to the user. The websites providing the data need to advertise their data to the internet user to allow the user to choose the site over the thousands of other search results. Due to the large volumes of information available it is vital that the resource descriptions are adequate and allow efficient discovery of the resource. This means the proper use of metadata to allow the site to be discovered by search engines is crucial to attracting hits and a good position on search engine results (Safari 2004). It is this metadata that allows the internet user to search and retrieve information.
Due to our limited attention and the need to select an appropriate website from thousands of other hits; it is necessary to use appropriate keywords to assist the search. It is vital that correct keywords are used to search the metadata listed on search engines to provide relevant results. Essentially the user finding relevant internet sites boils down to several keywords in the metadata of the website that the person searching used to find the site. (533 words)
Further Reading: Concept 33 Information and Attention
_________________________________________________________________________________
Site Title: The Attention Economy and the Net
Site Link:
www.firstmonday.dk/issues/issue2_4/goldhaber/
This site discusses what is termed ‘the attention economy’ which refers to the concept that the most valuable thing on the internet is the attention of the internet users. The article describes the characteristics of this ‘attention economy’ and how to make it monetary. To know the fundamentals of this attention economy is crucial to effectively advertising the site and having the site listed highly on search engines. The attention economy is crucial to the discussion of internet user browsing habits, conscious and subconscious browsing habits and is relevant to this discussion.
Site Title: Continuous Partial Attention
Site Link:
www.readwriteweb.com/archives/continuous_partial_attention.php
Alex Iskold discusses the shrinking attention span of internet users in this article. It is relevant to the topic as it discusses many of the key issues that internet users face and key characteristics of internet users behavior on the internet. As sites must cater for users; shrinking attention spans directly influence how sites advertise themselves and the content. This article provides much background information to explaining how and why internet users act the way they do and is relevant to this topic. Although the site (readwriteweb) is a public site the author of the article has the relevant industry experience and qualifications.
References_____________________________________________________________________________
Arizona Department of Administration. (2008). Phishing, Spoofing, Spam, Hacking, Spyware, Identity Theft, Cyber Scams, and Computer Hoaxes. Retrieved August 3, 2008, from,
http://www.azdoa.gov/isd/ais/viruses-and-hoax-alert-warningsBoswell, W. (2007). 7 Ways to Hide your Online Identity. Retrieved August 2, 2008, from
http://websearch.about.com/od/anonymoussurfingsafety/tp/hideandseek.htmBrooks, E., Heyman, N. & Pyon, J. (1997). Social Interaction on the internet: An Application of Erving Goffman’s Sociological Theories. Retrieved August 6, 2008, from h
http://socserv2.mcmaster.ca/soc/courses/soc4j3/stuweb/cyber9/front.htmCassavoy, L. (2005). Web of Crime: Internet Gangs Go Global. Retrieved July 25, 2008, from
http://www.pcworld.com/article/122242/web_of_crime_internet_gangs_go_global.htmlChangingMinds.org. (2008). Social Norms: Description. Retrieved August 6, 2008, from
http://changingminds.org/explanations/theories/social_norms.htmColeman, J. (1990). Foundations of Social Theory. Retrieved July 25, 2008, from
http://books.google.com.au/books?id=a4Dl8tiX4b8C&dq=Foundations+of+Social+Theory&pg=PP1&ots=qA_vZ-NZHg&sig=isRrXzpxIFolbI-0Z8FQOtRoXGE&hl=en&sa=X&oi=book_result&resnum=1&ct=result#PPP1,M1Cranor, L. (1995). It shouldn’t be allowed. Retrieved August 6, 2008, from
http://www.acm.org/crossroads/xrds2-2/lorrie.htmlDictionary.com. (2008). Social Group. Retrieved July 19, 2008, from
http://dictionary.reference.com/browse/social%20groupElectronic Frontiers Australia. (2002). Internet Censorship: Law & Policy around the world. Retrieved August 2, 2008, from
http://www.efa.org.au/Issues/Censor/cens3.htmlEtzioni, A. (2000). Social Norms: Internalization, Persuasion, and History. Law & Society Review, Vol 34, No. 1 (2000), 157-178. Retrieved July 19, 2008, from
http://findarticles.com/p/articles/mi_qa3757/is_200001/ai_n8898934 Fisher, D. (2005). New Virus Attack Technique Bypasses Filters. Retrieved July 27, 2008, from
http://www.eweek.com/c/a/Security/New-Virus-Attack-Technique-Bypasses-Filters/Goldhabor, M, (1997). The Attention Economy and the Net. Retrieved August 6, 2008, from
http://www.firstmonday.dk/issues/issue2_4/goldhaber/Hambridge, S. (1995). RFC 1855: Netiquette Guidelines. Retrieved July 19, 2008, from
http://www.ietf.org/rfc/rfc1855.txtIskold, A. (2007). Continuous Partial Attention: Software & Solutions. Retrieved July 29, 2008, from
http://www.readwriteweb.com/archives/continuous_partial_attention.phpLavasoft. (2008). Glossary. Retrieved August 2, 2008, from
http://lavasoft.com/support/spywareeducationcenter/spyware_glossary.php#SpywareSafari, M. (2004). Metadata and the web. Retrieved August 6, 2008, from
http://www.webology.ir/2004/v1n2/a7.htmlSchwartz, M. (2008). Malwebolence. Retrieved August 6, 2008, from
http://www.nytimes.com/2008/08/03/magazine/03trolls-t.html?_r=3&ei=5058&partner=IWON&pagewanted=all&oref=slogin&oref=slogin&oref=sloginShea, V. (2004). Netiquette Contents. Retrieved July 19, 2008, from
http://www.albion.com/netiquette/book/index.htmlShoutwire. (2008). Shoutwire Official Guidelines. Retrieved August 1, 2008, from
http://www.shoutwire.com/guidelineSmith, D. (2008). The 20 year old at the heart of the webs most anarchic and influential site. Retrieved August 6, 2008, from,
http://www.guardian.co.uk/technology/2008/jul/20/internet.googleSoftware Engineering Institute. (2008) Home Computer Security. Retrieved August 6, 2008, from
http://www.cert.org/homeusers/HomeComputerSecurity/ Appendix 1:
Interview with Bulshoy, a Senior Site Operator of www.ShoutWire.com which is a commercial site similar to www.digg.com which allows users to submit content. It is owned by Tuberoo.M -- Michael (Interviewer)B -- Bulshoy (Interviewee)M: Hello Bulshoy! I am working on an assignment for my university about censorship and I’d like to ask your views on censorship and ShoutWire.
B: Yeah! Why not?
M: Thank you very much. How would you describe your views on censorship liberal - regulated or in between? B: Realize that these are personal views that do not necessarily reflect SW or site policy
M: Of course, but as one of the three main enforcers your views will be carried out on the site
B: In between; but leaning heavily toward the liberal side
M: ok
B: There are some things that I'd prefer be left off of the site
B: So that people from all walks of life will feel welcome
B: and advertisers and partners will not offend their userbase
M: I see... please all parties
M: what do you think would be the result of excess censorship on shoutwire? B: Excess censorship on SW would ruin the SW experience
B: Users should be welcome to leave any comment that they like
M: So people would leave?
B: Not necessarily
B: but the site would lose some of its appeal
M: That makes sense
B: Lack of censorship is a founding principle of ShoutWire
B: and I’d be betraying that principle if I began censoring
B: still, some things are censored
B: extreme hate speech being one of them
M: Ok do you think shoutwire censors itself to any extent without your assistance? B: Some of the more sane/serious members do members
B: Zero's editorial yesterday is a great case study
B: The internet being the internet though...
B: Some users approve of taboo articles, just because they can
B: It's like a form of rebellion I guess
M: So essentially you would say that the users would NOT regulate content and without your intervention there might be all sorts of stuff on ShoutWire? B: That's a pretty blanket statement
B: They wouldn't regulate comment content although they may regulate submitted content (ie pictures etc)
B: We have policies in place to prevent racist comments, etc
B: But they are rarely exercised
B: I get maybe one racist comment per month
B: So I guess the site does regulate itself to an extent
B: You know that people can pretty much say whatever they want
B: and we've gotten in trouble because of it
M: Who from Tuberoo?B: Yeah from Tuberoo
B: and we've lost our feed on other sites
B: and a user storms out in disgust every now and then
M: arrh so the advertisers spit the dummy
B: Remember that Tuberoo is publically traded
B: and some shareholders check out ShoutWire
M: Thanks for your timeAppendix 2:
Interview with Zero, a Senior Site Operator of ShoutWireM -- Michael (Interviewer)
Z -- Zero (Interviewee) M: Hello Zero! I am doing an assignment for my university about censorship and I just interviewed ‘bulshoy’. Could I ask you some questions? Z: Sure.
M: Thank you very much.
M: How would you describe your views on censorship -- liberal; regulated or in between leaning to one side?Z: Free and open speech is what I believe in
Z: We should be able to say whatever we want if we can handle the consequences
M: How about content?Z: Content needs to be moderated whereas comments should not
M: but you would still lean towards liberal concerning content censorship? Z: Depends on what it is trying to censor
Z: Spam and weak three sentence links should go
M: What do you think would be the result of excess censorship on ShoutWire? Z: I would start to fire people
M: lol, I mean what would be the result on the users
Z: ShoutWire would die
Z: No one would want to go there
M: Do you think that SW socially regulates itself. ie if objectionable content was posted would the other users be able to regulate the content with peer pressure exerted on the poster? Z: I have seen it happen
Z: Plus, that’s what the voting system is about
Z: That’s the whole point behind shouting; to weed out all the rubbish and only good stuff on the front page.The only thing we should take down is spam
M: But some operator censorship is first required to make the whole system work? ie to remove spam etcZ: ShoutWire just needs cleanup, not censorship
M: I see so: comments uncensored, Content (rubbish weeded out) and other than that essentially no form of operator moderation or censorship is basically your view? Z: Pretty much, like the wild wild west
Z: ShoutWire is supposed to be lawless
M: Cool, thanks for your time.