Please describe the three drawbacks of email.
Please describe the term WiMax.
WiMax, a technology that will bring wireless Internet access to entire metropolitan areas. Works a lot like WiFi, but instead of a short range (200ft or so), WiMax permits access across a range of approx. 10 miles.
Please describe two examples of click fraud.
Click fraud, “pay per click”. Click fraud can work in two way
• The simplest is for a person to generate a lot of false clicks on a competitor’s link.
o Ex. Bob & Barb sells toothbrushes. Barb pays Google $1 every time someone clicks her sponsored links on a Google search. Bob buys a cheap online robot program that repeatedly clicks on Barb’s link, costing her $1 each time. Pretty soon, Barb is paying a big chunk of her budget for fraudulent clicks. (Bob destroys Barb)
• Second way, more complicated, less dishonest
o Ex. Suppose Barb hires Google to place a sponsored link to her toothbrush site on relevant sites throughout the Web. She pays google $1 for every click. Google passes 50cents of this fee on to the Web page publisher (the one hosting Barb’s link). Now suppose Bob starts a bogus Web site, and Google places Barb’s sponsored link on Bob’s blog. Bob next uses his online ‘bot program to generate thousands of clicks on Barb’s link on his Web site, thus defrauding Barb out of a lot of money.
Please list and describe the three ways to make profit over the Internet.
• First, create a site with content so compelling that people will pay to see it (i.e Wall Street Journal, New York Times, etc. pay subscription fee, “pay for content material”)
• Second, sell merchandise or services online.
• Third, the site can sell advertising.
o Three advertising categories
Paid search ads
Display ads
Classified ads
Please describe the legitimate (white hat) and illegitimate (black hat) ways that websites can help improve their rankings on engines.
SEOs (search engine optimizers)- know search engines algorithms. The number of times search terms turn up in the content of the site, whether the search terms match the key words that describe the site, number of links to the site, and the “credibility” of those linking sites.
Armed with this knowledge, SEOs redesign the site using “white hat” or legitimate methods.
• Making everything on a page visible to the search engine
o Ex. making product listings moved from unsearched database to the site itself.
• Another technique is participating in a Web ring with other high-quality sites, thus increasing the number of links to the site.
• Third, making sure that each page has plenty of text that includes relevant terms
“Black-hat” techniques, unethical methods
• Might include “cloaking”, creating two versions of a site, one that people see and a bogus site that is only visible only to search engines that includes popular search terms, such as “sex”.
• Another is using text containing popular search terms, such as “sex”, that users can’t see (background and foreground colors the same) but that are visible to spider bots.
• Another is “link farming” using software that automatically generates a huge number of pages with links back to the original site.
• There are even illegal software programs that can forcibly inject links into sites that search engines score as more credible.
Please list and describe the four effects of social media.
Please list and describe the three implications of the lack of ‘gatekeeper’ on the Internet.
Traditional mass media have a number of gatekeepers. Internet, none.
• First, the risk of overloading the system with unwanted, trivial, worthless, or inconsequential messages is increased. (do we really need 130 million blogs?)
• Second, gatekeepers also function as evaluators of information. Gatekeepers are not infallible. Info comes without guarantee. At your own risk.
• Having no gatekeepers means having no censorship.
What are the two justifications that advertisers provide when queried about collecting user data over the Internet?
How many days need to pass before law enforcement no longer needs a warrant to search through your email. Please provide an explanation for this rule. (pg. 130)
Under Title II of the Electronic Communications Privacy Act of 1986, if an unopened email has been in storage for 180 days or less, the government must obtain a search warrant to access it.
What are the four broad principles outlined in the Federal Trade Commission’s self-regulatory standards. (pg. 134)
What is peer production? How are the concepts centralization/decentralization related to peer production?
Peer production characterizes a subset of commons-based production practices. It refers to production systems that depend on individual action that is self-selected and decentralized, rather than hierarchically assigned.
“Centralization” is a particular response to the problem of how to make the behavior of many individual agents cohere into an effective pattern or achieve an effective result. Its primary attribute is the separation of the locus of opportunities for action from the authority to choose the action that the agent will undertake.
The most pervasive mode of “decentralization,” however, is the ideal market. Each individual agent acts according to his or her will. Coherence and efficacy emerge because individuals Signal their wishes, and plan their behavior not in cooperation with others, but by coordinating, understanding the will of others and expressing their own through the price system.
What are the three functions involved in the process of information production and exchange in an instance of peer production?
What are the three core characteristics that Wikipedia combine? (pg.5)
What did a study find about the content of Wikipedia and Encyclopedia Britannica?
The journal Nature compared 42 science articles from Wiki to the gold standard of the Encyclopedia Britannica and concluded that the difference in accuracy was not particularly great. McHenry (an author at Encyclopedia Britannica) criticized Wiki as “The Faith-Based Encyclopedia”. Wiki made corrections, and McHenry found himself blessing Wiki in the long term, a robust model of reasonable reliable info.
How often do system operators and server hosts of Wikipedia use their power to block users who are systematically disrupting the website? What is the reason given for their behavior?
Wales — the system operators and server host — have the practical power to block users who are systematically disruption, this power seems to be used rarely. The project relies instead on social norms to secure the dedication of project participants to objective writing.
Wiki participants commonly follow, and enforace, a few basic policies that seem essential to keeping the project running smoothly and productively.
• Because huge variety of particpants, Wiki is committed to making its articles as unbiased as possible.
• Aim in not to write articles from a single objective point of view, to fairly and sympathetically present all views on an issue.