Monday, May 9, 2011
Virtual Emotions
The machine allows a person in one place to have their emulation of kissing transformed to another machine at another place. Kind of like the idea of the virtual workplace, you are experiencing another person without actually being together. This could easily be manipulated, as the article says, to fantasies where people are kissing someone like a celebrity (perhaps celebrities selling their “kissing” style). This explores the ethics of removing emotion from the physical.
(Extra Credit)
What this relates to is the idea of net neutrality, especially in terms of the freedom social networks provide. Athar was able to comment on the event happening in his town because of the freedom that the Internet allows for every person to have a profile on Twitter and the ability to post on it. People were able to understand this event in the way people in the town did thanks to the freedom Twitter allows. Twitter allowed Athar a voice, which has led to him having 104,589 followers and coverage on the national media. Without the freedom of the Internet, this likely would have never been possible.
(Extra Credit)
Thursday, May 5, 2011
Net neutrality
Panopticon
Having a panopticon on the internet might decrease undesirable behavior on the internet because internet users would not know if they were being watched or not. Not knowing if you are being watched would decrease undesirable behavior because the individuals using the undesirable websites, or doing undesirable things while on the internet, would know that there is a possibility that they would be caught doing the things they should not be doing, resulting in getting them in trouble.
Today, our actions are being tracked on the internet because information is being gathered through our internet searches. This is creating a daily me internet because the ads that will then pop up on the website that you are currently looking at will be similar to the information that you are searching for. This can be turned off to a certain extent by turning off your cookies in your web browser. Some websites will not allow you to use their website if you do not have your cookies on because they gather information from you to give to marketers.
Obama = Steve Jobs
“Is the distribution and dissemination of ideas sufficient to foster and create a social revolution?” “The Internet is nothing more than binary code”
Although the author of this article clearly understands that the Internet is important, he may be kicking himself today as he (and many, many others), were downright wrong as they underestimated in their predictions of what the internet was capable of. But besides the outdated techno information from this article, the principals remain the same, and it gives us a transformation identity that shows what we as people and users want to use the internet for.
“The ultimate corporate goal may be to develop a cultural structure that assists producers of products to know what consumers want before the consumers even know. When private groups take control of public institutions, individual constitutional rights no longer apply”
The important thing to note here is that the private institutions have taken control of the internet completely, and were able to do this because of the way they were able to convince the users. Facebook has convinced us that it is cool to have more friends, in turn addicting us to the site and giving us a base that we didn’t even know we needed- but everyone else is doing it. They are able to use all of our information and violate privacy because they simply don’t have any rules against it- we let them, but we didn’t really KNOW we let them. An article from Advertising Age explains some of the tricky practices that go on behind the scenes, that make us users think certain things are cool, or the new ‘trend,’ even though it’s skewed. http://goliath.ecnext.com/coms2/gi_0199-14565085/ALL-HAIL-OUR-DIGITAL-OVERLORDS.html When dealing with the new mobile apps, there is only one government overlord that owns the rights to everyones souls (aka their iphone)- Apple. An quote from Apple states, "Apps must comply with all local laws and may not put an individual or targeted group in harm's way," This sounds an awful lot like a governing rule, and it is. Any company or individual that wants to put out an app- must go through Apple. This structure seems to have taken over the government since this article. Although the government has some control, for example, Obama’s new internet governing law that was proposed in 2010- http://www.time.com/time/magazine/article/0,9171,2022653,00.html Although this attempts to control the internet, it doesn’t hold a dime to the rest of the marketplace that is owned and controlled by Google, Apple, Facebook, Yahoo and other e-giants
Facebook Privacy
The S in the https stands for secure. When this appears in the browser link the website is no longer able to other people 'ease-drop' on your computers communication with the website. If you fill out any forms or submit any information about yourself on a non https:// webpage other people can be watching and collecting data allowing your information to be sent out anywhere on the internet. The main thing to remember about https:// websites is to never enter your credit card numbers or social security number on an unsecured site.
Commercial Privacy Bill of Rights are currently working on online privacy protection along with friends and people looking out for others by posting alerts. The well circulated facebook post began in February and got copied and pasted all over the net:
'While on facebook, look at your URL address; if you see http: instead of https: then you dont have a secure session and you can be hacked. Go to Account, Account Settings, Account Security and click change. Check at least the first setting, FB defaults to the non-secure setting.'
Big Brother or Big Sister?
What is really interesting to me about this is that Osama Bin Laden did not have the Internet or phone service hooked up to his Pakistani hideout. It is pretty obvious to me that he knew that are ways in which we are monitored everyday and by taking himself back into a time before the Internet he forced a surveillance industry that is based largely on technology to go back in time with him. Of course he hid with the Pakistani's help, but nonetheless I think the lack of the Internet and a phone helped him hide.
Power is going to be abused. In the 21st century they monitor our phones, our computers, and basically everything about us. The only way to escape it is to live somewhere remote literally disconnected from it all, but are those that do this hiding from something or are they just not wanting to be apart of the digital era?
There was obviously a mix here. http://news.yahoo.com/s/livescience/20110502/sc_livescience/hitechsurveillanceplusoldfashionedintelligenceworkfoundosamabinladen
Watching and Being Watched
Early in the mass consumption of the Internet, many remember experiences of using screen names as our identity. There was nothing that necessarily identified that screen name to an offline identity. More commonly, however, we have evolved into creating an online identity that mirrors our actual self in some manner. Facebook, for example, uses a person’s actual name. Twitter allows for screen names but often has a person’s actual name below the screen name. As a group, we enjoy being able to identify the real life person behind the screen name. We encourage this sort of behavior. There can be many reasons, perhaps we just prefer to have a way to construct a reality of ourselves as we see fit. However, it does create an easy way for companies (especially social networking companies where we freely deliver information about ourselves) to watch us. This is the modern panopticon, we are being watched because we want to be watched.
Wednesday, May 4, 2011
Invasion of Privacy?
For the past 10 years, we have been worried about terrorist attacks and the age of the Internet has been up for debate if we should monitor emails and other private sectors to find those plotting against us. Not only this but other things that need to be monitored like pornography, hate groups, viruses, hackers, and other things that we are concerned about on the world wide web. “According to Miller, (1996) the FBI is using a program called Carnivore to randomly monitor all email. Carnivore could eventually be modified to allow individuals to monitor chat conversations, news posts, and peer-to-peer networks online.” They do this monitoring program by looking for keywords in the emails. Emails should be protected by our right to privacy, but the law passed in 1994 says that emails stored in the computer do not follow this. The military does have programs that are trained to find a terrorist threat within the Internet. Many people are against this kind of invasion of privacy. “According to the ACLU ‘to accept the FBI’s arguments in favor of Carnivore is to reject that core premise of the Fourth Amendment by giving the FBI carte blanche access to the communications of innocent people”’ Jeremy Benetham invented the Panopticon model to monitor cities, prisons and other types of dangerous areas. Is the Internet turning into this?
New Panopticism
Corporate Ambitions for an Online Panopticon
Tom Brignall discusses the economic and social dangers of the privatization of the Internet in his piece, The New Panopticon. Many of his concerns stem from many service providers such as America Online conglomerating into much larger corporations. This, he argues, lessens competition and gives more control to the select few. “When private groups take control of public institutions,” he writes, “individual constitutional rights no longer apply.” This is certainly true, as we have seen in the case of cable television. In that instance Rupert Murdoch has seized control of a considerable share of the entirety of the news spectrum. It is then possible for the elite members of society to institute their ideologies on the greater community. If this were to become the case with internet there would be a much greater watchdog presence, as companies and service providers aim to learn as much about their customers behaviors as possible. That is exactly what Brignall argues, and the argument holds weight. The Internet, he argues, is in danger of becoming a new age panopticon, where service providers could theoretically monitor all behaviors of their customers in order to protect them but also to sell to them. Brignall’s final thesis is that if the government drops federal funding toward the Internet and allows for privatization, it will become a marketing machine with no sense of ethical responsibility. All privacy will be lost and our online behaviors will reflect a corporate mission. In fact just last month the House of Representatives approved a bill that would overturn Net Neutrality. If such a measure were enforced the Internet would change as we know it and would reflect the fear that Mr. Brignall and several others have expressed.
Posted by: Mike Anderson
Tuesday, May 3, 2011
Why does Apple keep tabs on its users?
I think that this software is inherently good for most people including myself. I like being able to use the GPS function in relation to Google maps in order to find directions to places I seek to go. Obviously, bad scenarios can come into play, nothing is 100% fail safe. But, the advantages far outweigh the disadvantages in my opinion. In the big picture sense of it, this will not affect me very much at all. I feel that if The Wire was still around, this issue might be used as a plot device in trying to bust criminals in the seedy streets of Baltimore. Hopefully, it would not be as easy as one of the drug dealers forgetting to turn off the location services on his iTouch, but it is certainly something that first comes to mind if implemented into the season narrative.
Isn't Corporational Control over Internet Better?
Taking Facebook as an example, while it has been concerned and criticized because of its increasingly commercial orientation, Facebook in the U.S. still serves as a free speech platform. In China, however, the basic function of Facebook (free expression) is even questioned because the government considers online discourses as a crucial source of resistance. The most recent news suggests that Facebook’s evasion to China will comply with its strict censorship, which proves my point. According to the news, “When Facebook users outside China connect with users inside China, sources said they will need to click through a warning that any material visible to Chinese users may also be visible to the Chinese government.” This open claim ironically tells how closed and monitored the Internet is for Chinese users. While I don't support corporation utilizing Internet to collect personal information, the government-owned Internet service is clearly more coercive.
The Internet Panopticon: A Breach of Privacy
The Panopticon, as proposed by Jeremy Bentham, is an effective prison model and neighborhood control that reinforces social control. In essence, it works by forming the belief that one is under constant inspection at any given time. Bentham’s theory is applied in journal article “The New Panopticon,” to make the argument that the panopticon is inherently similar to the Internet; however, a defining difference is that the Internet has no physical structure or permanent location. The article further argues that the Internet is used as a tool for governing bodies, such as corporations, to capture information of users. The flow of information online has led to the opportunity for corporations to collect details on consumers and maximize their profits.
Until recently, many network users were unaware of the tracking and surveillance of their information and location by network providers and corporations. There have been a number of lawsuits against corporations that claim tracking users information violates one’s privacy. This idea of violation of privacy by the panopticon model of the Internet to collect user data is also mentioned in the article. In recent news, Google faces a $50 million lawsuit over its Android location tracking. Clearly, many people were unhappy to discover that their information was being collected and used without them being aware of it. I would like to make my own argument that the difference with the Internet panopticon model is that it does not truly exist if the user is unaware of their tracking. It would be more accurate to apply a panopticon model, one where a user monitors his/her behavior because of the belief they are being watched, to the Verizon’s tracking model. Verizon’s plan to put location tracking warning stickers on their phones I argue follows a more traditional method of applying the panopticon model since the users are aware of their surveillance. Either way, it can be said that our privacy will decrease in the interactive digital word.
Net Neutrality and Municipal Governance
On the other hand, we should not forget the big ambitious municipalities had about becoming the single provider of Wi-Fi services in city areas. This has resulted in failure due to the great investment and risk whatever the infrastructure builder was carried on. Additionally, in a recent blog post from Joel Shurkin, it seems that not only the business model didn’t work out, but also some natures of the Wi-Fi technology do not permit such big installations. Same with the net neutrality issue, a question for municipalities to remember is the technological plausibility.
Monday, May 2, 2011
Net Neutrality and Media Conglomerates
Meinrath and Pickard continue to point out that network neutrality does not solve the existing telecommunications problems such as media conglomerization and the lack of diverse ownership. The authors continue to advocate for more competition and different perspectives within the broadband market. This topic reminds me of the ad-supported cable industry, also referred to as basic cable. The ad-supported cable networks industry is evolving as media conglomerates and new advancements are changing the traditional methods of programming distribution. The ad-supported cable industry mainly consists of several major companies owning a large percentage of the basic cable networks. Walt Disney, Time Warner, General Electric, Viacom, and News Corporation are some of the major players in the basic cable industry. This type of media outlet is also encountering problems concerning a lack of competition, diversity, and few large mega-media corporations, leaving little room for smaller companies to thrive.
Limiting Net Neutrality Influences the Digital Divide
Media Conglomerates

The article about the 'new net neutrality' got me thinking about current events going on in the world. Last week the 'birther' issue was the topic of interest from every major news publication, but as on last night, the shift has changed to the killing of bin Laden.
The net, that is treated as a reliable source to many people, is often forgotten for what it actually is. The net is controlled by mega media magnates with a global interest in mind. The net used to its advantage the fact that this issue was gaining popularity and spun every storyline imaginable about the President and his birth certificate. One option for this is the the FCC licensees have been warned that damage to the President will be hard for their personal license and ability to make a profit in marketing and advertising.
Because of this it seems that the media has now merged into a uniformed system to protect Obama, especially after his praise for the recent killing of al qaeda leader.
After examining all of this, the bottom line is to question what the news and media conglomerates are telling us. It is wondering what we aren't being told when citizens are too busy worrying about whether or not a birth certificate is legitimate or not.
Thursday, April 28, 2011
Blessing or a Curse?

Cell phones. Are they a blessing, or a curse? In most situations, many people would classify them as a blessing. Parents, on the other hand, may consider cell phones a curse when kids ignore them, text at dinner, or avoid face-to-face conversation. Cell phones have penetrated our culture so thoroughly that being without one puts an individual at a severe disadvantage. It’s almost gotten to the point where being without a cell phone capable of connecting to the Internet is a major inconvenience.
In today’s climate, cell phones are basically an extension of ourselves. They function as a form of communication, entertainment, gaming, and more. One function closely related to the content of Howard Rheingold’s Smart Mobs is the ability for phones to coordinate location and assemble meetings. We’ve recently seen the power of mobile technology in action when phones were predominantly used to organize the protests in Egypt.
In the article, Rheingold discusses Lovegety and p2p Journalism providing examples such as a “Mobile cupid service” and ImaHima. These examples are early versions of location-based social networking. As an avid user of social networking sites, I’ve seen a drastic rise in popularity and usage of location-based social networking services, most notably Foursquare and Facebook Places. Applications that at one point would be considered a clear invasion of ones privacy are now being used freely and frequently.
The impact, and potential power, of location-based social networking is already being displayed. As previously stated, the Egyptian protests are prime examples of these services in play, but there are many other practical usages to these social networks. From letting friends know where you’re at on a Saturday night to gaining coupons and other benefits from restaurants, there are plenty of uses for location-based social networking. Yet, it begs the question: in the future will applications like Foursquare and Facebook Places be seen as a blessing, or a curse?
Local Smart Mobs
Locally, there have also been different forms of “smart mobs.” Before the voting on the 21 ordinance, several groups were organized through Facebook to attend City Council meeting that objected the ordinance. According to the Facebook event page, more than 400 members were attending and 430 were awaiting reply. Although not all 400 showed up at the city council meeting, the large numbers of response on the Facebook event page brought media attention and helped publicized students viewpoints on the ordinance. Overall, the event was still successful in that the city council had to turn people away from the doors because the meeting room was filled to capacity. Facebook continued to help groups advocating for both sides of the issue by organizing groups of support or against the ordinance which allowed organizers to plan other events as well. Although this type of organization wasn't to the same extent as the cases Rheingold refers to throughout the article, this shows smart mobs can exist in other forms. I think this type of mobilization will continue and grow as new forms of technology are introduced.
Is this really necessary?
Power of Technology
Howard Rheingold writes about smart mobs, or groups of people that use technology as a device in order to organize an operation to take place. Rheingold gives us many examples of instances where cell phones were used to organize citizens of a country to overthrow their government. For example, on January 20, 2001, President Joseph Estrada of the Philippines became the first head of state to lose power to a smart mob. This overthrowing was done by citizens through text messaging.
After reading this article, I began to analyze how much society uses technology to communicate and how powerful it really is. It is amazing that we can use different forms of technology in order to overturn a government. The recent example of this is in Egypt. President Hosni Mubarak was forced from office due to the citizen’s revolution. How could a President be overthrown by citizens? It was all done by gathering people through social-networks online. Technology has created ways that a large number of people can communicate and at any moment they wish. These advancements help keep people up to date with what is going on. Text messaging helps people find out where people are located at all times.
Once I thought about how astounding it is that technology can have such a huge impact on people, I started to think about the other aspects of social mobs. There has also been social mobs that come together to interact with society in other ways than riots. For example, as I was reading this article, I began to think about the idea of flash mobs. Flash mobs are a group of people who assemble suddenly in a public place, perform an unusual or pointless act for a certain period of time. After that time is up, the people then move off to wherever they were originally going and act like nothing just happened. The purpose of this mob is for entertainment. The way that flash mobs are created is through different types of media, such as texting, emails, social networks, etc. If we did not have all of these technology tools, people would not have the easy communication techniques to get the word out to people in a fast amount of time. These mobs would have a more difficult time being so powerful.
Cell Phones: Good or Bad?

Cell phones have come to be part of a movement in protesting the government, such as the Filipinos who SMSed to wear black to break down Estrada. Filipinos could not afford computers or other technologic devices, let alone call anyone, but text messages were so cheap that everyone could successfully organized the protest with the use of them. And yet, the Filipinos then could not stop texting after they succumbed to their cell phones. Before there was texting, people assembled in Manila, like the Battle of Seattle. The Internet as progressed these groups and they operate in small units, dispersed throughout so they can take control when needed. Since this article is a little older, it states that they were testing technologies with GPS systems in them that are mobile. Obviously, we have already seen this in smart phones. This article also says that although these technologies do great things, they can also organize groups that will do the opposite and create groups to destroy something good. Technologies have also been used to create silly things like when Tokyo produced “ImaHima” to alert people when their friends are around. A lot of the examples from the article were much like Apps being used on peoples telephone. This application was also apart of a GPS system. Text messaging has also saved lives, like in September 11th, Alex LeVine texting people to evacuate the building, even though some of the cell phone services were down. Cell phones have done both good and bad for the 21st century.
The power of the mobile
Wednesday, April 27, 2011
Smart Mobs
The Power of "Mob Technology"
Howard Rheingold discusses how many mobile phones were used to overthrow governments between the 1990s as well as part of the early 2000s. This occurred in more than one country as Rheingold talks about. Rheingold touches on the “People Power II” demonstrations that took place in 2001 in the Philippines. The people of this country used text messages to spread jokes and rumors which turned to be very political. This particular form of communication made it possible to actually deteriorate and prove the people’s dislike towards the then current President Estrada. Through text messages they began to protest against the stop of the impeachment of Estrada. Over four days, more than a million people showed up just by hearing about it through text messages. As Rheingold points out this began the hallmark of early smart mob technology.
This reminds me a lot of what happened in Egypt recently. On January 25th, protests started off in Egypt, which was inspired by other protests such as the one that was successful in Tunisia. These protests were the first to take place on this type of level since the 1970s. In response to this the government blocked certain social networking sites such as Twitter and Facebook. Since many of the protesters found other ways around using Facebook and Twitter, the government actually had to block all internet services in the country, including texting. However after reading all of this did they really think it would make things better? Governments turn to these social networking sites and blocking them as if they are a privilege to use, however as seen in Egypt it only makes the people more upset and want to protest and go against the Government even more. This makes me wonder what would happen if something like this occurred in the United States, considering the fact that Twitter and Facebook originated in the U.S.
Informational Cascades
Smart Revolutions
Howard Rheingold’s Smart Mobs is a novel that discusses the power new technologies have had in organizing revolutions and overthrows. The smart mobs, he writes, are a network of people, operating through technologies such as computers, cell phones and other mobile devices. The efforts of these people can be both social and political. In the beginning of the chapter he writes of the Filipino takedown of President Joseph Estrada in 2001. This type of political influence has been felt over the last twenty years and has had remarkable results. Just this past year we have seen social revolutions in Egypt, Tunisia, Bahrain, and Libya. Rheingold’s chapter defines a “network” as including nodes and links, using many possible paths to distribute information from any link to any other. This book was written almost ten years ago and was a precursor to the revolts we see today. These developing technologies are connecting people and orchestrating these revolts. Media theorist Clay Shirky commented on the recent “Twitter Revolution” in Tunisia. Shirky said that, “no one claims social media makes people angry enough to act [but] it helps angry people coordinate their actions.” Indeed these new forms of technologies lead to “smart mobs,” or coordination that was never before possible. In the case of Egypt it took thirty years for the people to overthrow Hosni Mubarak. This is mainly attributed to the overwhelming rallies, coordinated by digital technology. As Rheingold detailed, the network-structured communications hold great potential for enabling democratic forms of decision-making and collective action.
Posted by: Mike Anderson
Some Serious Social Networking
In Howard Rheingold’s “Smart Mobs”, he talks about how cell phones were used to organize demonstrations in order to overthrow governments in the 1990’s and early 2000’s in several different countries. More recently, this has happened in Egypt with social networking sites such as Facebook and Twitter. I think it’s crazy that text messages and social networking sites like Facebook can have such a huge impact to organizing a governmental overthrow. I get on Facebook multiple times a day to update my status, upload pictures, and to see what my friends are doing—petty reasons. Never would I have thought that it could have such a serious use, and never ever would I have thought that someone would name their baby “Facebook” because they were so happy that the protests in Egypt were made possible via this site.
In response to the January 25th revolution in Egypt, the government took Internet and cell phone communication away. What I want to know is how the government thinks that by taking away Internet and cell phone usage, it is going to make the problem better? This to me seems like an easy way to make your citizens even angrier which leads to more burning of buildings, violence, and death of your own citizens. With the U.S. having one of the highest usages of social networking sites, it’s scary to think what would happen if a revolution started in our country.
Tuesday, April 26, 2011
External Forces of Smart Mobs
The journal article “Smart Mobs” by Howard Rheingold examines the transforming power of collective intellect and behavior of people derived from digital networks. In his argument he makes the claim that a conservative individual would not take action on his or her own against the government but only if many others were already committed to action. He furthers his argument in his claim, “mobile media that can augment the informal, mostly unconscious information exchanges that take place within the Interaction Order, or affect the size or location of exchanges, have the potential to change the threshold for collective action (pg. 175).” There are many global news examples of this seen today that support this idea of a threshold for collective action.
The recent democratic revolution in China is just one more example of a “smart mob” coming together collectively via Twitter and blogs to demonstrate against an authoritarian government. Social networking sites have allowed for people to come together as a powerful “force.” As with most political reform, there are always external forces that attempt to put down this force. China has recently arrested pro-democratic activists for their organizing of online mobs. As mentioned in the article, these minority activists triggered action of others to jump on the revolution bandwagon. By monitoring and censoring the Internet as well as arresting those initiating action, China has executed efforts to destroy collective behavior among citizens.
In democratic countries where censorship is not much of an issue (with the exception of controversy over WikiLeaks), there are many efforts on expanding collective community through the Internet. Google had recently announced Kansas City as the first place to get new ultrafast broadband Internet. Faster Internet means an even greater threshold for collective action. Google announced its site for “Fiber for Communities” program will “deliver Internet access more than 100 times faster than the home broadband connections. Smart mobs can be predicted to be even more widespread and effective as the spread of “Fiber for Communities” program is spread. This is another external force that plays a role in the development of smart mobs and their effectiveness.
Smart Mobs: Videos in Real Time
The powerful technological tools enables individuals to be powerful nodes in the network of creation and I believe that YouTube will continue to be a huge part of our culture.
Monday, April 25, 2011
Should the Internet Be Restricted By V-chips?
Celebrities And Their Spending Habits
Sunstein states earlier on page 216 that “it seems natural to believe that the more people can “customize,” or individuate, their preferred products, the better things will be.” We see this with cars on almost every episode of “Cribs.” Celebrities own multiple cars, and they customize almost all of them, but is this making them happier inside? I don’t think so. It’s nice to own those nice cars, but how often do they even drive them? Buying more cars and putting thousands of dollars into each of them so they are customized to your liking, in my opinion, is making things worse rather than better for these celebrities.
Sunday, April 24, 2011
Keeping With The Status Quo
The V Chip was mentioned in this chapter as well, and I found it interesting because I had not heard anything about this device for sometime. This article from 2001 shows that few parents used it back then and I would have to predict that it has dwindled considerably more since then. I suppose most televisions now have ways to block channels, I think you could when I was a kid, but my parents didn't use them but I know parents that did back in the day. I think that kids do need sheltering obviously when they are very young and beginning to learn how to use a remote, but after awhile it is important to teach kids lessons and programs on television are a valuable way to do that. Talking to kids about what they see on TV and what their feelings are is a healthy exercise in that it stimulates the mind rather just idly watching and not making a thoughtful and intelligent connection.
Thursday, April 21, 2011
Group Think
On the Internet, we are allowed to pick and choose that communities we want to be involved in and most of those people will make the same choices as others, even in a wide range of people. In our 2.0 societies, there is an abundance of information, almost too much information, and people continue to stick to their own point of view and forget about the other information. If people pick their own type of entertainment and information, it might be harder for people to connect socially. Some of the websites are dedicated to hate groups, with over one hundred thousand visitors, and with some over a million. One of those groups is called the Unorganized Militia, “’which believes that the federal government is becoming increasingly dictatorial with its regulatory power over taxes, guns and land use.’” They have one main website with links to others on their viewpoints. Group polarization can become a problem within these groups. Group polarization is, “people are likely to move towards more extreme point in the direction to which the group’s members were originally inclined.” If people are discussing the same thing, they will all get to the same conclusion but in a very extreme form. This became part of the Unorganized Militia where they continued with racial hate groups, which probably wasn’t their intention. Two main explanations for group polarization are the role of persuasive arguments and social comparison, which are people who want to look favorably in the eyes of their peers. Group Polarization exists in the present day society as well.
Virtual Cubicle

In, “The Corporate Virtual Workspace” Steve Pruitt and Tom Barrett believe that, “cyber technology will be a primary driver towards new corporate architecture.” Corporations will economically succeed with this new structure. The first part is a future scenario of Austin Curry living in his house and working in his won home of the virtual workspace, projected on a screen in his office, it is a typical office building, making it seem like he is actually there. He can go down hallways, passing is colleagues, and look out the office window as though he is actually there and joins conference rooms for meeting and project purposes. He even has virtualized clothing. His “Daily chores” consist of checking his virtual mail; call up people to talk about assignments, and uses robots to help out with his other work. The reasons for the corporate workspace are that the evolution of software technology as it becomes easier to build and use. Also, economically, it is becoming harder to build large-scale software systems. You can take the best skilled people in the world and have them work for one company. This virtual workspace will also increase productivity. But one of the best reasons is, “cyberspace will free an individual from space and time constraints.” This will allow anyone to live anywhere is the world and work at the company of their choice. For the corporation, it is great because most of the information in the company is just knowledge related, so they don’t need to hire people based on there physical skills. They can also do all of their advertising via cyberspace, which is more affordable and parallel to their company. Companies are starting to experiment with the mobility of virtual workspaces.
Internet Regulation
In Chapter 7 of Cass Sunstein’s Republic 2.0 he discusses regulation of the Internet. In the chapter he argues that there shouldn’t be any Internet regulation because the Internet should be considered a public sphere, and the information is public space.
I find this argument to be severely flawed because the Internet is far from a public sphere. The only real thing that’s public about the Internet is the fact that anyone with access to it can generate content. Businesses, marketers, and advertisers have capitalized the Internet as a way of receiving enormous revenues. There’s an extreme barrier to entry for Internet access, most notably high subscription fees to service providers.
To me, a deregulated public sphere is akin to asking for blanket free speech protection. In order for a meeting, or public gathering (protest, etc) to be protected by free speech it has to be on public property. The Internet, which serves the private interests of businesses, is not public property, or a public sphere, and therefore should be regulated accordingly.
Deregulation and lack of oversight leads to severe problems. I respect freedom of speech protection, and as a journalism student I know its necessity. However, comprehensive deregulation of the Internet would cause far more problems than benefits. There certainly are areas where regulation, or government involvement is unnecessary. For example, the Library of Congress is archiving all tweets on Twitter. I find this to be extremely pointless and a colossal waste of time and resources.
All in all, there needs to be Internet regulation. Freedom of speech, and its protection, should remain as is, but a deregulated Internet is asking for problems. One needs to look no further than the 2008 financial crisis to know that deregulation is absolutely not the answer.