SlideShare a Scribd company logo
1 of 20
Y490 Politics of the Internet November 15, 2011
Some of our original concerns: ,[object Object],[object Object],[object Object]
User-Generated Content and Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Long Tail Hypothesis Pareto Distribution (aka Power Law)
Another Way to Look at the Long Tail
Questions ,[object Object],[object Object],[object Object]
Zittrain Contrasts PCs with iPhones PC iPhone Type of  Technology Generative Appliancized/ Tethered Type of Software Open Proprietary Type of Network Anarchic Controlled
Definition of Generativity ,[object Object]
Features of a Generative System (pp. 71-73) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Propositions (Zittrain, p. 64) ,[object Object],[object Object],[object Object]
Layer Model ,[object Object],[object Object],[object Object],[object Object]
Advantages of Layers ,[object Object],[object Object]
Problems with Generative Technologies and Anarchic Networks ,[object Object],[object Object],[object Object],[object Object]
Identity Theft ,[object Object],[object Object],[object Object]
Identity Theft and Fraud ,[object Object],[object Object],FTC video on identity theft
Examples of Hate Speech on the Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dangers Inherent in Tethered Systems ,[object Object],[object Object],[object Object],Controversy over Amazon e-books
Examples of Censorship on Tethered Networks ,[object Object],[object Object],[object Object],[object Object],Flexispy software for cell phones
The News Corporation Scandal ,[object Object],[object Object],[object Object],[object Object]
Should Cell Phones Networks be more like the PC-Based Internet? ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
Ashley Raymond
 

What's hot (20)

Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Hackers
HackersHackers
Hackers
 
Cybercrime and IT ACT
Cybercrime and IT ACTCybercrime and IT ACT
Cybercrime and IT ACT
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
Digital Breadcrums: Investigating Internet Crime with Open Source Intelligenc...
 
FBI–Apple encryption dispute
FBI–Apple encryption disputeFBI–Apple encryption dispute
FBI–Apple encryption dispute
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Apple vs. FBI
Apple vs. FBIApple vs. FBI
Apple vs. FBI
 
Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not Alone
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
The dark side of IA
The dark side of IAThe dark side of IA
The dark side of IA
 
Countering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from ChinaCountering the Cyber Espionage Threat from China
Countering the Cyber Espionage Threat from China
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cs cpresentation police
Cs cpresentation policeCs cpresentation police
Cs cpresentation police
 
Piracy
PiracyPiracy
Piracy
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 

Viewers also liked (8)

Supporting information
Supporting informationSupporting information
Supporting information
 
Personal Debt Annual Conference Slide Show
Personal Debt Annual Conference Slide ShowPersonal Debt Annual Conference Slide Show
Personal Debt Annual Conference Slide Show
 
Techinnovation
TechinnovationTechinnovation
Techinnovation
 
The European Union: Challenges and Opportunities
The European Union: Challenges and OpportunitiesThe European Union: Challenges and Opportunities
The European Union: Challenges and Opportunities
 
花鞋Flower shoes
花鞋Flower shoes花鞋Flower shoes
花鞋Flower shoes
 
International politics in the age of the internet
International politics in the age of the internetInternational politics in the age of the internet
International politics in the age of the internet
 
Net neutrality
Net neutralityNet neutrality
Net neutrality
 
Politics of competitiveness
Politics of competitivenessPolitics of competitiveness
Politics of competitiveness
 

Similar to Polinter11

Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Komal003
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
whittemorelucilla
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
Freedom House
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
Hassan Nasir
 

Similar to Polinter11 (20)

Polinter11
Polinter11Polinter11
Polinter11
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
PP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptxPP Lec15n16 Sp2020.pptx
PP Lec15n16 Sp2020.pptx
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Lessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber securityLessons on netfreedom+best practices in cyber security
Lessons on netfreedom+best practices in cyber security
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
Social and legal issues in i
Social and legal issues in   iSocial and legal issues in   i
Social and legal issues in i
 

More from Jeffrey Hart (20)

Berkeley Internet.pptx
Berkeley Internet.pptxBerkeley Internet.pptx
Berkeley Internet.pptx
 
Essays on the History and Politics of the.pptx
Essays on the History and  Politics of the.pptxEssays on the History and  Politics of the.pptx
Essays on the History and Politics of the.pptx
 
Right-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United StatesRight-Wing Populism in Europe and the United States
Right-Wing Populism in Europe and the United States
 
Isa12a
Isa12aIsa12a
Isa12a
 
Ipe21
Ipe21Ipe21
Ipe21
 
Polinter12
Polinter12Polinter12
Polinter12
 
Ipe19
Ipe19Ipe19
Ipe19
 
Ipe20
Ipe20Ipe20
Ipe20
 
Ipe18
Ipe18Ipe18
Ipe18
 
Isa12b
Isa12bIsa12b
Isa12b
 
Ipe17
Ipe17Ipe17
Ipe17
 
Polinter10
Polinter10Polinter10
Polinter10
 
Ipe16
Ipe16Ipe16
Ipe16
 
Ipe15
Ipe15Ipe15
Ipe15
 
Rkcsi2012
Rkcsi2012Rkcsi2012
Rkcsi2012
 
Ipe14
Ipe14Ipe14
Ipe14
 
Ipe13
Ipe13Ipe13
Ipe13
 
Polinter09
Polinter09Polinter09
Polinter09
 
Polinter08
Polinter08Polinter08
Polinter08
 
Polinter07
Polinter07Polinter07
Polinter07
 

Recently uploaded

Recently uploaded (20)

Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Buy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdfBuy Epson EcoTank L3210 Colour Printer Online.pdf
Buy Epson EcoTank L3210 Colour Printer Online.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 

Polinter11

  • 1. Y490 Politics of the Internet November 15, 2011
  • 2.
  • 3.
  • 4. The Long Tail Hypothesis Pareto Distribution (aka Power Law)
  • 5. Another Way to Look at the Long Tail
  • 6.
  • 7. Zittrain Contrasts PCs with iPhones PC iPhone Type of Technology Generative Appliancized/ Tethered Type of Software Open Proprietary Type of Network Anarchic Controlled
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.