tag:blogger.com,1999:blog-42969420541473104212023-11-16T06:02:45.789-06:00LIS 661: Information Ethics and PolicyExploring issues of information ethics and policy from the perspective of Library and Information Studies. Fair use, copyright, remix culture, information access, professional guidelines, library policies and more are on the menu here. Informed by John Stuart Mill, numerous scholarly works and the keen observations of LIS Master's students!Sarah. R.http://www.blogger.com/profile/13495338005089494192noreply@blogger.comBlogger158125tag:blogger.com,1999:blog-4296942054147310421.post-90576023308444457672010-12-08T19:11:00.000-06:002010-12-08T19:11:22.951-06:00Final PostIf <i>1984</i> was re-written to be <i>2084</i> I strongly suspect that 'Big Brother is watching you' would be changed to 'Big Business is watching you' or perhaps just 'We are watching you.' After reading Andrejevic it is hard not to imagine a future where the big information and technology businesses, secure in the fortified Googleplex HQ will monitor the generation of an entire world worth of information in real time, all the while supplying the government with information it might require. How could real freedom exist in such a system?<br />
<br />
This is a bleak outlook, and not the only possible future, but it is disconcerting how far we have already gone down this road without even noticing. How much farther will we get before enough people notice that change is possible? The college I work for just switched over to Google Apps to handle all our e-mail and communication needs on campus - all students, faculty, staff and administration are now on Gmail all day every day. I wonder if the people in the upper echelon even stopped to consider the possible implications of it - more likely they are unaware of them all together.<br />
<br />
Sorry for the burst of dystopia, a lot of what we discuss brings it out in me. There is always a chance that it will all work out. That Google and others will use their powers for good and not evil, right?<br />
<br />
<br />
Is the fact that this is the second time I have referenced <i>1984</i> in these discussions indicative of something?<br />
<br />
I very much enjoyed my time in this class. I will admit that I felt a little out of my depth at times, but overall I think that I was given a great deal to think about and the things I have read and discussed here will influence the rest of my time in grad school and, hopefully, my career. I think that overall, the modules I appreciated the most, the ones that I think I got the most out of in practical terms, were 3 and 4 dealing with copyright laws. I learned a lot about a subject that I had been previously ignorant of and that is very relevant to my future goals. If I had to pick a favorite discussion though, including my personal favorite post, it would be the WikiLeaks module. It was a perfect and timely way to examine so much of what we had discussed and learned about in class and it brought up a lot of complex feelings and ideas. Much like this course as a whole.<br />
<br />
Thanks for a great semester everyone and happy holidays.Zach Berkleyhttp://www.blogger.com/profile/14816981725618294017noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-89959995127504843282010-12-08T09:36:00.002-06:002010-12-08T09:50:09.535-06:00Last Week<!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:trackmoves/> <w:trackformatting/> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:donotpromoteqf/> <w:lidthemeother>EN-US</w:LidThemeOther> <w:lidthemeasian>X-NONE</w:LidThemeAsian> <w:lidthemecomplexscript>X-NONE</w:LidThemeComplexScript> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:splitpgbreakandparamark/> <w:dontvertaligncellwithsp/> <w:dontbreakconstrainedforcedtables/> <w:dontvertalignintxbx/> <w:word11kerningpairs/> <w:cachedcolbalance/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> <m:mathpr> <m:mathfont val="Cambria Math"> <m:brkbin val="before"> <m:brkbinsub val="--"> <m:smallfrac val="off"> <m:dispdef/> <m:lmargin val="0"> <m:rmargin val="0"> <m:defjc val="centerGroup"> <m:wrapindent val="1440"> <m:intlim val="subSup"> <m:narylim val="undOvr"> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" defunhidewhenused="true" defsemihidden="true" defqformat="false" defpriority="99" latentstylecount="267"> <w:lsdexception locked="false" priority="0" semihidden="false" unhidewhenused="false" qformat="true" name="Normal"> <w:lsdexception locked="false" priority="9" semihidden="false" unhidewhenused="false" qformat="true" name="heading 1"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 2"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 3"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 4"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 5"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 6"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 7"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 8"> <w:lsdexception locked="false" priority="9" qformat="true" name="heading 9"> <w:lsdexception locked="false" priority="39" name="toc 1"> <w:lsdexception locked="false" priority="39" name="toc 2"> <w:lsdexception locked="false" priority="39" name="toc 3"> <w:lsdexception locked="false" priority="39" name="toc 4"> <w:lsdexception locked="false" priority="39" name="toc 5"> <w:lsdexception locked="false" priority="39" name="toc 6"> <w:lsdexception locked="false" priority="39" name="toc 7"> <w:lsdexception locked="false" priority="39" name="toc 8"> <w:lsdexception locked="false" priority="39" name="toc 9"> <w:lsdexception locked="false" priority="35" qformat="true" name="caption"> <w:lsdexception locked="false" priority="10" semihidden="false" unhidewhenused="false" qformat="true" name="Title"> <w:lsdexception locked="false" priority="1" name="Default Paragraph Font"> <w:lsdexception locked="false" priority="11" semihidden="false" unhidewhenused="false" qformat="true" name="Subtitle"> <w:lsdexception locked="false" priority="22" semihidden="false" unhidewhenused="false" qformat="true" name="Strong"> <w:lsdexception locked="false" priority="20" semihidden="false" unhidewhenused="false" qformat="true" name="Emphasis"> <w:lsdexception locked="false" priority="59" semihidden="false" unhidewhenused="false" name="Table Grid"> <w:lsdexception locked="false" unhidewhenused="false" name="Placeholder Text"> <w:lsdexception locked="false" priority="1" semihidden="false" unhidewhenused="false" qformat="true" name="No Spacing"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 1"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 1"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 1"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 1"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 1"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 1"> <w:lsdexception locked="false" unhidewhenused="false" name="Revision"> <w:lsdexception locked="false" priority="34" semihidden="false" unhidewhenused="false" qformat="true" name="List Paragraph"> <w:lsdexception locked="false" priority="29" semihidden="false" unhidewhenused="false" qformat="true" name="Quote"> <w:lsdexception locked="false" priority="30" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Quote"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 1"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 1"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 1"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 1"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 1"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 1"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 1"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 1"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 2"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 2"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 2"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 2"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 2"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 2"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 2"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 2"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 2"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 2"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 2"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 2"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 2"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 2"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 3"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 3"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 3"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 3"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 3"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 3"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 3"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 3"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 3"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 3"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 3"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 3"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 3"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 3"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 4"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 4"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 4"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 4"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 4"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 4"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 4"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 4"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 4"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 4"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 4"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 4"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 4"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 4"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 5"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 5"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 5"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 5"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 5"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 5"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 5"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 5"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 5"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 5"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 5"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 5"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 5"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 5"> <w:lsdexception locked="false" priority="60" semihidden="false" unhidewhenused="false" name="Light Shading Accent 6"> <w:lsdexception locked="false" priority="61" semihidden="false" unhidewhenused="false" name="Light List Accent 6"> <w:lsdexception locked="false" priority="62" semihidden="false" unhidewhenused="false" name="Light Grid Accent 6"> <w:lsdexception locked="false" priority="63" semihidden="false" unhidewhenused="false" name="Medium Shading 1 Accent 6"> <w:lsdexception locked="false" priority="64" semihidden="false" unhidewhenused="false" name="Medium Shading 2 Accent 6"> <w:lsdexception locked="false" priority="65" semihidden="false" unhidewhenused="false" name="Medium List 1 Accent 6"> <w:lsdexception locked="false" priority="66" semihidden="false" unhidewhenused="false" name="Medium List 2 Accent 6"> <w:lsdexception locked="false" priority="67" semihidden="false" unhidewhenused="false" name="Medium Grid 1 Accent 6"> <w:lsdexception locked="false" priority="68" semihidden="false" unhidewhenused="false" name="Medium Grid 2 Accent 6"> <w:lsdexception locked="false" priority="69" semihidden="false" unhidewhenused="false" name="Medium Grid 3 Accent 6"> <w:lsdexception locked="false" priority="70" semihidden="false" unhidewhenused="false" name="Dark List Accent 6"> <w:lsdexception locked="false" priority="71" semihidden="false" unhidewhenused="false" name="Colorful Shading Accent 6"> <w:lsdexception locked="false" priority="72" semihidden="false" unhidewhenused="false" name="Colorful List Accent 6"> <w:lsdexception locked="false" priority="73" semihidden="false" unhidewhenused="false" name="Colorful Grid Accent 6"> <w:lsdexception locked="false" priority="19" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Emphasis"> <w:lsdexception locked="false" priority="21" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Emphasis"> <w:lsdexception locked="false" priority="31" semihidden="false" unhidewhenused="false" qformat="true" name="Subtle Reference"> <w:lsdexception locked="false" priority="32" semihidden="false" unhidewhenused="false" qformat="true" name="Intense Reference"> <w:lsdexception locked="false" priority="33" semihidden="false" unhidewhenused="false" qformat="true" name="Book Title"> <w:lsdexception locked="false" priority="37" name="Bibliography"> <w:lsdexception locked="false" priority="39" qformat="true" name="TOC Heading"> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; text-align:center; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;} </style> <![endif]--> <p class="MsoNormal" style="text-align: left;" align="left">While reading Andrejevic’s article (or rather skimming it after I saw the word “ubiquitous” a handful of times), I was surprised at how much Big Brother is watching.<span style=""> </span>The story of his friend with the DVD in Australia was a bit scary in that the computer knew where the friend was and wouldn’t play parts of the DVD.<span style=""> </span>Why not?<span style=""> </span>Does Australia have restrictions on their information?<span style=""> </span>In some ways, it is nice because then the news that people receive can be tailored to where that person is.<span style=""> </span>In other ways, I don’t like that people know what I’m looking at online (not that I have anything to hide, but that it is none of their business).<span style=""> </span>But see, there we go again.<span style=""> </span>If a terrorist is looking at information, wouldn’t we want to know it so we can stop him before he kills anyone?<span style=""> </span>So, I guess it’s a fine line there on whether to allow this or not.<span style=""> </span></p> <p class="MsoNormal" style="text-align: left;" align="left"> </p> <p class="MsoNormal" style="text-align: left;" align="left">My favorite topic would have to be the Challenged and Banned books topic.<span style=""> </span>I felt that this topic was the most relevant to my library work.<span style=""> </span>I wasn’t too impressed with the Wikileaks discussion as I felt that he had no right to post any of the information he did.<span style=""> </span>I’m almost glad that he’s been caught and put into jail.<span style=""> </span>I had a feeling about him and it wasn’t good and the fact that he ran and tried to hide from authorities just helps to make it so.<span style=""> </span>But that’s just my opinion…..</p> <p class="MsoNormal" style="text-align: left;" align="left"> </p> <p class="MsoNormal" style="text-align: left;" align="left">Happy Holidays to everyone!</p>aingallshttp://www.blogger.com/profile/10224419823043050518noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-89086263693809604502010-12-07T20:14:00.000-06:002010-12-07T20:15:00.495-06:00its been a trip<style>@font-face { font-family: "Cambria"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: "Times New Roman"; }div.Section1 { page: Section1; }</style> <p class="MsoNormal">Everything in moderation…</p> <br /> <p class="MsoNormal">It’s a maxim we learned as children…to be observant and circumspect of excess.<span style=""> </span>Like my classmates, I’m often concerned about the seemingly omnipresent and omnipotent nature of electronic surveillance.<span style=""> </span>But then I remember that the computer…the Internet…is just a tool (albeit a culturally significant tool…).<span style=""> </span>And when one realizes the ease at which a step back can be taken, and how the scene widens with a little distance, one can possibly realize then too that it is a tool we wield.<span style=""> </span>I would argue that the Internet does not control us…but that we control it. <span style=""> </span>If become concerned with the availability of personal information - like buying habits, topics of interest, relationship status, etc – then we have wandered into the realm of observation and understanding.<span style=""> </span>We can moderate what we provide – there is no rule stating otherwise.<span style=""> </span>You know me as Tecumseh – a name that I’ve never used on the Internet before – and a name I will never use again.<span style=""> </span>And though I’m a bit more suspicious than some, there is a rebelliously empowering feeling one gets by relying on cash rather than credit – on the postal service rather than Google – in an attempt to tread lightly without leaving behind a trial.<span style=""> </span>The power has always been with us.<span style=""> </span></p> <p class="MsoNormal"> </p> <p class="MsoNormal">I learned a lot and was enticed to venture out of my ‘comfort zone’ by many of your posts and responses.<span style=""> </span>One thing about a blog I find interesting is the ability to retrace one’s steps and relive specific topics.<span style=""> </span>I look forward to re-reading the posts, this time backwards - from most recent to the very first.<span style=""> </span>Its been a trip! thanks</p>Tecumsehhttp://www.blogger.com/profile/14600510373663959503noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-67249148881724775042010-12-06T23:12:00.002-06:002010-12-06T23:14:48.683-06:00Well, what do you know...I thought my previous post was my last. Lo and behold, I was doing some headline scanning and found this post on the FTC's proposed online privacy plan. <a href="http://www.huffingtonpost.com/2010/12/06/ftcs-online-privacy_n_792548.html">http://www.huffingtonpost.com/2010/12/06/ftcs-online-privacy_n_792548.html</a>Davidhttp://www.blogger.com/profile/05652824085802653117noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-10006395803097064722010-12-06T21:27:00.004-06:002010-12-06T22:42:26.769-06:00ReflectionsThe Andrejevic article made some interesting points. However, I couldn't help but wonder if I might have gotten more out of it if I was more up on my Marx. The central point I took away from the article is that many of the applications and services on the web that many of us have come to expect to use for free, aren't really free at all but come at the cost of us surrendering some of our personal data. This isn't a surprise to me, and I find it hard to get overly upset about this type of transaction. After all the companies that develop applications and are making massive R&D investments in computing and networks must recoup these expenses somehow. If we were to pay a true market cost for some of these services, I'm not sure many of us would think it to be affordable. For example, none of us had to pay a subscription fee to use Blogger this semester, even though the costs to Google (i.e. hosting, tech support, etc.) to maintain Blogger are not insignificant (well maybe to Google they are). For now, at least, I think the trade-off is a worthwhile, though slightly worrisome, one.<br /><br />For anyone interested in a dystopian vision of where "ubiquitous computing" may be headed in the future, I strongly recommend the book <span style="font-style: italic;">Feed</span> by the excellent YA author M.T. Anderson. It imagines a world where humans have a device implanted in their heads that allow them to have the Internet in their field of vision 24/7. It is a nightmarish book and Anderson makes some startling points about the Internet and the commercialism it has become associated with.<br /><br />It's hard to pick out a favorite unit because I found the subject matter every week to be engaging and contemporary. The units on copyright were particularly interesting for me being a long time music geek. It was nice to take a peek behind the curtains and to think about the ways in which copyright can negatively impact artistic expression.<br /><br />However, I have to say that the WikiLeaks unit could not have been better timed and I've found myself swept up in the ongoing drama surrounding WikiLeaks these past couple of weeks. As an aside, does anyone else think it strange that this leak of diplomatic cables brought far greater blow back than did the Iraq or Afghanistan document dumps? Since Cablegate, WikiLeaks has suffered DoS attacks, been chased from Amazon's servers (at the apparent request of Joe Lieberman) their bank accounts in Switzerland have been frozen and some on the right (Sarah Palin & Newt Gingrich in particular) have called for the US to treat Assange as an "enemy combatant." I find this to be slightly curious.<br /><br />Also, in relation to WikiLeaks, and tangentially related to our topic this week of the shifting notions of privacy in our digitally connected world, did anyone else see that Colombia University's School of International and Public Affairs warned its students not to discuss WikiLeaks on social networks, such as, Twitter or Facebook. Apparently, the concern was that doing so may impact students' prospects for government jobs. Colombia has since walked back that advice, but my initial thought when I saw the story was, "I hope no one in class has an application pending with the State Department."<br /><br />For those interested here's the link: <a href="http://www.huffingtonpost.com/2010/12/06/columbia-university-walks_n_792684.html">http://www.huffingtonpost.com/2010/12/06/columbia-university-walks_n_792684.html<br /></a><br />My favorite post was <a href="http://lis661.blogspot.com/2010/10/barriers-to-access.html">Barriers to Access</a>. Because I got to use the words defecate and micturate.<br /><br />Good night, good luck, Happy Holidays. It has been a pleasure to discuss these topics with everyone.Davidhttp://www.blogger.com/profile/05652824085802653117noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-73038353324835452782010-12-06T18:29:00.006-06:002010-12-06T19:47:52.056-06:00Wrapping UpI agree with my other classmates thus far about Andrejevic, this issue doesn't seem like such a big deal. Giving up something like my shopping history to Amazon doesn't bother me at all. I just do not believe they would ever do anything malicious with it, for one it'd be bad business for them to do such things and for two I just doubt they care for me as an individual beyond my buying power. In fact I find it helpful, just today I was doing a chunk of Christmas shopping and found recommendations for other things to purchase very helpful. I suppose it's someone who is looking out for us all, but even for me as someone who is mildly paranoid about my internet privacy, I like the advances in cloud technology and other things and to give up a bit of info about me to make it better seems a good trade off. <br /><br />Having someone looking out for us relates well to my favorite part of the class, WikiLeaks. I was surprised how interested and yet interested I was in it. On one hand, it <i>seems</i> very important, but since it's just a big fat dump of information without any good organization I can't get excited about sifting through it. That said, following the story that has been developing recently has been very interesting to me. I just read today how Amazon and Paypal have cut off WikiLeaks, things certainly are changing at a rapid pace. <br /><br /><a href="http://lis661.blogspot.com/2010/11/wikileaks-info-supreme.html">http://lis661.blogspot.com/2010/11/wikileaks-info-supreme.html</a>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-20937619701207492882010-12-06T17:50:00.001-06:002010-12-06T17:50:37.698-06:00T-Voh and 1984 - The Last Post![sarcasm] Oh the wonders of technology…thank goodness that a company keeps track of our actions online so that a company, any company, can tell us what to buy or how to think because we may have purchased Dan Brown’s Lost Symbol from Amazon.com because we checked the ILL waiting list and were like number 278 in line…and we didn’t feel like waiting several months to read the tomb of mystery and fictitious controversy which every Dan Brown book brings, apparently. [/sarcasm]<br />Actually, I am somewhat concerned that companies can track us wherever we go and see whatever we do online….all in the name of profit. It’s not the “1984” motif that scares me…it’s the realization that people actually purchase items based on the suggestions presented by the companies…sometimes in frightening blind faith. However, the advertisement strategy must be working or they wouldn’t be doing it. What does it say about our collective psyche as a society? “Please tell us what to buy/watch/think?” Frightening.<br />One of my friends is a TV addict and has this thing called T-Voh (sp?) which he can use to record tv programs and play them back later. Sounds great! He was all “T-Voh is awesome!” Then, after a few days, T-Voh began making suggestions and telling him what to watch. He tried to turn off the “make suggestions” function but T-Voh wouldn’t stop. Many times it pre-recorded its suggestions allotting no free space to the programs my friend wanted to record. Way to go T-Voh. <br />Maybe the digitized world will become like T-Voh. A world where nothing that is suggested is what we want and where there are so many suggestions that it becomes impossible to find what we actually need. For example, I have a heart condition and may need another open heart surgery. In the digitized world, I may be looking heart surgeons but, because I have my teeth clean every year, all I find are “suggested dentists in my area”. How the bleep does that help me T-Voh? ;)<br />Kidding aside, it is for us to decide scenario would make the world a better place? Which is more likely to become the reality? With luck, those two questions have the same answers.<br />My favorite post this semester was Daniel’s Ban Hammer Blog. I especially like the comment “I keep thinking about how it seems many people are of the opinion that if a library possessing a piece of material it also means they agree/approve of said piece of material.” I am also a fan of the picture. It reminds me of a D&D character I played once…I realize that this may not be the most “academic” of comments, but it is the one truest to my personality. GEEKS UNITE!!!!!<br />Thanks for a wonderful semester and a great finish to my grad degree!!! Good luck Everyone!LibraryRPGamerhttp://www.blogger.com/profile/13721585353795044422noreply@blogger.com2tag:blogger.com,1999:blog-4296942054147310421.post-75867321426939007042010-12-05T15:43:00.000-06:002010-12-05T15:43:46.834-06:00Come on, Librarians!I am continually frustrated by the lack of librarian involvement in policy issues. It's our own fault. Even our cataloging tools are only designed for the physical. MARC can't be used effectively for organizing the giant abyss of information online. Yet, shouldn't we be taking steps to get involved in the online world of information? Seriously, why aren't we?<div><br />
</div><div>After reading <span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;">Andrejevic's article I was even more frustrated. Alcibiades mentions that advertising is no big deal. I don't agree. :) I really think Andrejevic's telling us it's <i>more</i> than that. That's just the beginning. As the article mentions, we are using forms of communication willingly, yet we are unaware of what they are doing with our data. Now that we can be tracked with network access points, they can really start to use layers of information to find trends and analyze our next move. I don't want to be monitored, nor do I think it's okay that I am neither aware or have the option to become involved in this data collection. It's a violation of my basic right to privacy, and it really bothers me. Andrejevic mentions how this will work in the very near future (if not already): "We can access the data we have turned over to them (Google, Microsoft, you name it), but only in exchange for willing submission to, among other conditions, the forms of monitoring and control facilitated by the interactive infrastructure." (311). This really bothers me. Just because I use a particular technology out of convenience, doesn't mean I should lose my right to privacy. Plus, could you imagine telling someone fifty years ago that when they accessed information in the library there would be someone outside waiting to sell them something in relation to their inquiry? Because, that's what is happening on the web and we are just so inured to this behavior it doesn't seem like a violation anymore. (Sorry for the hyperbole, but it's not too far off.)</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;">All that being said, it's our job as librarians to get involved, be on the front lines of information policy decisions and stand up for our patrons and ourselves. The right to privacy is important. We take a threat to privacy seriously when it is threatened at the brick and mortar library by federal agents, yet when marketers watch your every click on a library computer we just shrug it off? </span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;">Something's not right here and we have to be willing to step in and provide guidance to policy makers on several fronts. Or we are not going to be able to stay afloat and work with policy that was decided for us -- and again, we'll have no one to blame but ourselves (because we weren't involved). I </span><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;">am extremely thankful I took this course so I can get involved with these issues in the future because I am no longer ignorant to their impact on libraries and their patrons.</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;">My favorite blog post was the post I had the most fun writing: http://lis661.blogspot.com/2010/10/banned-books-policy-and-protocol.html</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;">I'm glad I took the time to review my own policy at the library I work at, while at the same time I was able to provide a valuable resource to the rest of the class.</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 20px;">Thanks for a great semester everyone!</span></div>Melhttp://www.blogger.com/profile/08402678236374981190noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-64037813407958900712010-12-05T15:12:00.005-06:002010-12-05T15:47:17.129-06:00Wrapping It UpForgive me for waxing sentimental in this (probably) last blog post. <br /><br />Thank you, Sarah and colleagues, for making me really think and question my own role in the world of information at my local level and also on a much larger scale. I wish this could've been a face-to-face class because I think the conversations would've been awesome! As a middle-ager, I have to say I am excited for the future of our profession due to the intelligence, passion, and commitment I sense from online interactions I've had with all of you. <br /><br />I've found WikiLeaks absolutely riveting, and down the road, I think we'll be telling others that we were taking this class during the height of the controversy. These are strange times indeed and also pivotal on a number of fronts. An informed constituency is more important now than ever. <br /><br />I think I've been most struck by the diversity of opinions during class and the nuances of meaning that class members brought to issues. I thank all of you for making me stretch my frame of reference and opinions. For me, Week 6's discussion about the ethics of access was particularly personal and important. Week 9's module on TCEs was also interesting. I've been exposed to so much that I may never have otherwise seen/read/listened to. How cool is that!<br /><br />One of my favorite blog posts is Diana's from the TCE week. Hopefully, I've correctly added its link below:<br /><a href="http://lis661.blogspot.com/2010/11/module-ix-tces.html">http://lis661.blogspot.com/2010/11/module-ix-tces.html</a><br /><br />Happy holidays to you all! All the best both professionally and personally, and I hope our paths cross again!Kathy Clairhttp://www.blogger.com/profile/00696040836349835043noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-41724165374924458622010-12-05T14:07:00.000-06:002010-12-05T14:07:02.295-06:00WikiLeaks Debate: A "Transparency Activist" Takes Issue with Assange; WikiLeaksIf you haven't noticed by now, the <a href="http://www.democracynow.org/">Democracy Now!</a> program is an excellent resource for the kinds of topics and issues we've been covering in class and/or we're covering via the tracking papers. Host Amy Goodman frequently brings guests on to discuss contemporary issues such as net neutrality, media conglomeration, access to information and so on. She's been one of the go-to journalists staying on top of the WikiLeaks story, and the other day, she hosted a very interesting debate from two people. One is a "transparency activist," a person dedicated to some of the same principles WikiLeaks espouses, but who feels WikiLeaks will ultimately do more harm than good to open information principles. The other is a Constitutional scholar and writer who is in favor of WikiLeaks.<br />
<br />
The nuances and standpoints in this debate are very interesting, and go well beyond the kind of black-and-white soundbites you might hear on network news, for example. Check it out if you have a few minutes.<br />
<br />
Here is the <a href="http://www.democracynow.org/2010/12/3/is_wikileaks_julian_assange_a_hero">link to the debate</a>, which you can also read as a transcript on the same site.Sarah. R.http://www.blogger.com/profile/13495338005089494192noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-9269434632749414832010-12-05T13:57:00.003-06:002010-12-05T14:56:59.282-06:00module 14I agree with <span class="post-author vcard"><span class="fn">Alcibiades that the author does seem to spend a lot of time focused on the use of gathered information to create targeted advertising, but I think the author is also trying to draw attention to possible problems with allowing private companies to control information and data. I Personally, the targeted advertising does not bother me much; maybe it is because I have always assumed that whatever I do online can be tracked, recorded, and then analyzed. I would, however, be bothered by the collection of data from my desktop, like the one Andrejevic points on on page 305. I can not explain why I feel mining data off my desktop, as opposed to what I store, buy, or search online, crosses a privacy.<br /><br />At any rate, I think the other concerns the author mentions worry me more. I think we really do need to consider who is gathering information and how that organization will control and leverage that information. That is, private companies have motives, namely profits, that do not necessarily align with the public's interests. As some of Andrejevic's examples show, private companies may find it more profitable to bow to the requests for censorship from governments, like China (example about censoring of a blog, pg. 311-312), rather than support freedom of information. It is the possibility that private companies will use the networks and, as Andrejevic refers to them, enclosures to censor ideas, create and enforce strict intellectual property protections, and use information and data stored on their servers to their commercial advantage but the disadvantage of the public or certain subsets of the public.<br /><br />As I read the article, I thought of a lecture one of my law professors (Shubha Ghosh) gave on the commercialization of data. He suggested that in the context of the commercialization of data/information the profit seeking goals of private companies conflict with the public's interest of transparency and accountability. I think that is an interesting concept because the public does want information to be accessible and free but private companies want to keep information private so that they can charge organizations and individuals large amounts of money in order to access the information.<br /><br />I found this course very interesting and thought provoking; I enjoyed reading others views on the issues covered. I think this final article was a nice way to end the course because it draws in many ideas we already discussed and made me think about many topics we have already discussed: privacy and whether loss of privacy will hinder intellectual freedom because people will not search for certain things or read certain things because they know everything they do online is monitored; do we want the government to have control or a hand in providing access to information; and do intellectual property rights and laws fit into a networked, digital society.<br /><br />Like </span></span><span class="post-author vcard"><span class="fn">Alcibiades, I am not going to link back to a post of my own but a classmate's post; I liked Diana's post on tensions in libraries because it is a good reminder that the issues we have discussed really do pop up in real life situations, <a href="http://lis661.blogspot.com/2010/10/module-6-tensions-in-access.html">http://lis661.blogspot.com/2010/10/module-6-tensions-in-access.html</a>.<br /></span></span>Joannahttp://www.blogger.com/profile/11198620176160222447noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-74957817722245253672010-12-04T10:44:00.000-06:002010-12-04T10:44:11.471-06:00Oh no! I've been advertised to!Andrejevic: There are some points for concern here. As we give up control of our data in exchange for free storage, endless interconnectivity, and general convenience, we are certainly signing away a large amount of our privacy. That said, the writer has himself whipped up into such a fury over....advertising? I mean, isn’t that what his article comes down to? These companies aren’t using our information to oppress us, but to sell us stuff. And his contention that by playing video games or grocery shopping we are laboring on behalf of Google is REALLY stretching things.<br />
<br />
First of all, let’s assume all this is true: companies like Google are tracking your spending habits, the websites you visit, and even monitoring your location via your wireless devices. Computers then take all that information, process it, and send you an advertisement. Wow. I feel so alienated from my labor. Attention: nobody is forcing you to buy that product! It’s a suggestion, an enticement, not a gun to your head. Andrejevic makes it seem as if we are mindless cattle who will respond to whatever ads we receive. He goes so overboard, it’s hard to take him seriously. While all this is certainly a developing issue for our current age, and one that deserves a national dialogue, he needs to present the threat better. People won't be motivated by receiving advertisements. And what is his proposed solution? Municipal wi-fi networks? That seems like a pretty small response to the EXTREME privacy threat he perceives. And it ignores the fact that people are more and more liable to access the internet from their mobile devices, which would still be under the constraints of that encroaching cloud, the “prison” he fears.<br />
<br />
OK, I could go on and on ripping Andrejevic. But better to use this as a chance to reflect on the broader issue of information privacy. We are facing an unprecedented situation, and we do need to start thinking about the implications of allowing companies like Google and Microsoft to control our data. This, as I said above, requires a national dialogue. How many people are aware that these companies are tracking all that information? Some, certainly. Most won’t care, because the trade off is real convenience and (let’s face it) some pretty cool technology. But there is a significant segment of America’s population that is very protective of its privacy. How can we present the threat in a way that will mobilize this segment into action? In my opinion, Andrejevic needs to reconfigure his message in a way that will resonate with the public. Continually invoking Karl Marx, and making vague references to the enclosure of the English commons is probably not the best strategy in this country. Just saying.<br />
<br />
My reflections on the course lead me to this conclusion: it is up to us to find a means and a message to more effectively communicate the potential danger to the American public. We are the ones equipped with the knowledge of what Google is doing, and what the implications are for privacy and liberty. We are the ones who must work to lobby congress and other governing institutions to ensure our constitutionally protected freedoms are not imperiled by the corporate machinery. To do so, we must investigate the potential dangers, beyond just targeted advertisements. I think we all have a vague idea about what those dangers are, but let’s put some real effort into formulating a concrete message to deliver to the public. We must draft serious policy. We must work with Google and Microsoft to find common ground. These corporations are not totally evil: Google has been involved in a recent dispute with China over censorship, and Microsoft’s founder is one of the world’s greatest philanthropists. It’s too simplistic to paint these companies as unstoppable forces of evil out to enslave us.<br />
<br />
I feel as if I could go on and on, but blog posts are supposed to be short and sweet. I have enjoyed this course tremendously, especially the opportunity to engage the rest of you on this blog. Rather than fulfilling Sarah’s request to link to a favorite post of mine, I am instead linking to a post by Tecumseh. This one really connected with me at the time and still gives me chills.<br />
<br />
<a href="http://lis661.blogspot.com/2010/10/censor-censor.html">http://lis661.blogspot.com/2010/10/censor-censor.html</a>Alcibiadeshttp://www.blogger.com/profile/16637372557433190165noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-62395091726042453262010-12-02T23:25:00.001-06:002010-12-02T23:25:59.848-06:00Amazon Issues Statement on WikiLeaks<style type="text/css">
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica}
p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 12.0px Helvetica; min-height: 14.0px}
</style> <br />
<div class="p1">From <a href="http://thelede.blogs.nytimes.com/2010/12/02/latest-updates-on-leak-of-u-s-cables-day-5/">the New York Times's "Lede" Blog</a>:</div><div class="p1"><br />
</div><div class="p1">"Late on Thursday, after refusing to comment for more than 24 hours, Amazon issued a statement explaining why it stopped hosting the WikiLeaks.org Web site after getting a phone call from Sen. Joe Lieberman's office...Responding on Twitter, James Ball a journalist and WikiLeaks volunteer,called the statement "disingenuous," and noted that when Amazon decided to stop hosting the site, it had published just 300 cables, all of which had been redacted by news organizations, like The Times and the Guardian, which had discussed them in detail with the U.S. government."</div><div class="p2"><br />
</div><div class="p1"><a href="http://aws.amazon.com/message/65348/">Amazon's own statement</a> is reproduced below:</div><div class="p2"><br />
</div><div class="p1">"There have been reports that a government inquiry prompted us not to serve WikiLeaks any longer. That is inaccurate.</div><div class="p2"><br />
</div><div class="p1">There have also been reports that it was prompted by massive DDOS attacks. That too is inaccurate. There were indeed large-scale DDOS attacks, but they were successfully defended against.</div><div class="p2"><br />
</div><table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb7pqKHQl7P7QptSkMz3M3tZRdsgUSYcSM0uXBVVE0Gb9nYXgPpY-qSYbpHrGEA-9-yuzu_PF1m00-RP2EmhyphenhyphenwLw62uGR1YV7GHCgOcfiME3BYPN1qGMRRAyoczROvTmSkq1vxfoLf1GPo/s1600/Screen+shot+2010-12-02+at+11.16.26+PM.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="208" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb7pqKHQl7P7QptSkMz3M3tZRdsgUSYcSM0uXBVVE0Gb9nYXgPpY-qSYbpHrGEA-9-yuzu_PF1m00-RP2EmhyphenhyphenwLw62uGR1YV7GHCgOcfiME3BYPN1qGMRRAyoczROvTmSkq1vxfoLf1GPo/s320/Screen+shot+2010-12-02+at+11.16.26+PM.png" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Amazon's Web Statement</td></tr>
</tbody></table><div class="p1"><br />
</div><div class="p1">Amazon Web Services (AWS) rents computer infrastructure on a self-service basis. AWS does not pre-screen its customers, but it does have terms of service that must be followed. WikiLeaks was not following them. There were several parts they were violating. For example, our terms of service state that “you represent and warrant that you own or otherwise control all of the rights to the content… that use of the content you supply does not violate this policy and will not cause injury to any person or entity.” It’s clear that WikiLeaks doesn’t own or otherwise control all the rights to this classified content. Further, it is not credible that the extraordinary volume of 250,000 classified documents that WikiLeaks is publishing could have been carefully redacted in such a way as to ensure that they weren’t putting innocent people in jeopardy. Human rights organizations have in fact written to WikiLeaks asking them to exercise caution and not release the names or identities of human rights defenders who might be persecuted by their governments.</div><div class="p1"><br />
</div><div class="p1">We’ve been running AWS for over four years and have hundreds of thousands of customers storing all kinds of data on AWS. Some of this data is controversial, and that’s perfectly fine. But, when companies or people go about securing and storing large quantities of data that isn’t rightfully theirs, and publishing this data without ensuring it won’t injure others, it’s a violation of our terms of service, and folks need to go operate elsewhere.</div><div class="p1"><br />
</div><div class="p1">We look forward to continuing to serve our AWS customers and are excited about several new things we have coming your way in the next few months.</div><div class="p1">— Amazon Web Services"</div>Sarah. R.http://www.blogger.com/profile/13495338005089494192noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-35205700666111710672010-12-01T14:00:00.002-06:002010-12-01T14:02:59.386-06:00Daily Show: WikiLeaksHere's a clip from the Daily Show about WikiLeaks, be warned: it's a bit cruder than normal.
<br />
<br /><table style='font:11px arial; color:#333; background-color:#f5f5f5' cellpadding='0' cellspacing='0' width='360' height='353'><tbody><tr style='background-color:#e5e5e5' valign='middle'><td style='padding:2px 1px 0px 5px;'><a target='_blank' style='color:#333; text-decoration:none; font-weight:bold;' href='http://www.thedailyshow.com'>The Daily Show With Jon Stewart</a></td><td style='padding:2px 5px 0px 5px; text-align:right; font-weight:bold;'>Mon - Thurs 11p / 10c</td></tr><tr style='height:14px;' valign='middle'><td style='padding:2px 1px 0px 5px;' colspan='2'<a target='_blank' style='color:#333; text-decoration:none; font-weight:bold;' href='http://www.thedailyshow.com/watch/tue-november-30-2010/the-informant-'>The Informant!<a></td></tr><tr style='height:14px; background-color:#353535' valign='middle'><td colspan='2' style='padding:2px 5px 0px 5px; width:360px; overflow:hidden; text-align:right'><a target='_blank' style='color:#96deff; text-decoration:none; font-weight:bold;' href='http://www.thedailyshow.com/'>www.thedailyshow.com</a></td></tr><tr valign='middle'><td style='padding:0px;' colspan='2'><embed style='display:block' src='http://media.mtvnservices.com/mgid:cms:item:comedycentral.com:366861' width='360' height='301' type='application/x-shockwave-flash' wmode='window' allowFullscreen='true' flashvars='autoPlay=false' allowscriptaccess='always' allownetworking='all' bgcolor='#000000'></embed></td></tr><tr style='height:18px;' valign='middle'><td style='padding:0px;' colspan='2'><table style='margin:0px; text-align:center' cellpadding='0' cellspacing='0' width='100%' height='100%'><tr valign='middle'><td style='padding:3px; width:33%;'><a target='_blank' style='font:10px arial; color:#333; text-decoration:none;' href='http://www.thedailyshow.com/full-episodes/'>Daily Show Full Episodes</a></td><td style='padding:3px; width:33%;'><a target='_blank' style='font:10px arial; color:#333; text-decoration:none;' href='http://www.indecisionforever.com/'>Political Humor</a></td><td style='padding:3px; width:33%;'><a target='_blank' style='font:10px arial; color:#333; text-decoration:none;' href='www.facebook.com/thedailyshow'>The Daily Show on Facebook</a></td></tr></table></td></tr></tbody></table>Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-46878252910261582252010-11-30T22:28:00.004-06:002010-11-30T22:57:28.917-06:00Yet More LeaksSorry to keep harping on this. I just find everything that is currently going on with WikiLeaks to be endlessly fascinating. Apparently, early next year WikiLeaks are planning to publish a number of documents from a "major US bank" that demonstrate a widespread culture of corruption and possibly a pattern of behavior that may be linked to our current economic crisis. Bank of America's stock was down today amid speculation that they are the bank in question. Now this is a leak that I am awaiting with baited breath. Banks and their lending practices are at the heart of our recent recession (Are we out of it? By definition, I suppose the answer is yes.) and more information has recently emerged about banks and their possibly fraudulently fast-tracking foreclosure proceedings, so I think a peek into the internal memos of this "major US bank" will be infinitely valuable to our understanding of our current economic condition.<br /><br />I'm very excited about these leaks. Despite all of the attention the diplomatic cables are receiving, I'm not quite sure what the goal of releasing them was. The goal is more clear in regards to the dumps of Iraq and Afghanistan war documents, they are meant, as were the Pentagon Papers, to highlight the discrepancies between the official government line and the reality on the ground in two disastrous wars. In regards to whichever bank this happens to be, I can really see the public interest in making these documents available. Wall Street and many other major financial institutions may very well be responsible for pillaging billions of dollars from our economy. These pending leaks could really help to shed a light on what has long been a fundamental injustice in our society, steal a few hundred dollars, end up in an over-crowded California prison, steal a few hundred million, end up in Club-Fed, if it's investigated or prosecuted at all.<br /><br /><br />P.S.<br />Good-googly-moogly I hope the above makes a modicum of sense. Note to self, don't drink Belgian beer and then post on the internet. But, here goes...Davidhttp://www.blogger.com/profile/05652824085802653117noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-73746426903911701832010-11-28T12:43:00.002-06:002010-11-28T12:52:04.645-06:00Follow up on WikiLeaksWikiLeaks is expected to release the classified State Department cables today. The US Government has asked them to refrain from releasing the documents stating that the release will put lives at risk and jeopardize intelligence gathering methods among other reasons. However, the government has refused to work with WikiLeaks to suggest redactions of the documents or to determine which documents should be withheld due to security or other concerns. <br /><a href="http://www.huffingtonpost.com/2010/11/28/wikileaks-document-release-state-department_n_788842.html">http://www.huffingtonpost.com/2010/11/28/wikileaks-document-release-state-department_n_788842.html</a><br /><br />According to WikiLeaks Twitter feed, their website is currently under a denial of service attack.<br /><a href="http://twitter.com/#%21/wikileaks">http://twitter.com/#!/wikileaks</a>Davidhttp://www.blogger.com/profile/05652824085802653117noreply@blogger.com2tag:blogger.com,1999:blog-4296942054147310421.post-84944503269899905692010-11-26T19:45:00.000-06:002010-11-26T19:45:23.295-06:00Wikileaks on NBC Nightly News Tonight:<object width="420" height="245" id="msnbc7fabc5" classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=10,0,0,0"><param name="movie" value="http://www.msnbc.msn.com/id/32545640" /><param name="FlashVars" value="launch=40386575&width=420&height=245" /><param name="allowScriptAccess" value="always" /><param name="allowFullScreen" value="true" /><param name="wmode" value="transparent" /><embed name="msnbc7fabc5" src="http://www.msnbc.msn.com/id/32545640" width="420" height="245" FlashVars="launch=40386575&width=420&height=245" allowscriptaccess="always" allowFullScreen="true" wmode="transparent" type="application/x-shockwave-flash" pluginspage="http://www.adobe.com/shockwave/download/download.cgi?P1_Prod_Version=ShockwaveFlash"></embed></object><p style="font-size:11px; font-family:Arial, Helvetica, sans-serif; color: #999; margin-top: 5px; background: transparent; text-align: center; width: 420px;">Visit msnbc.com for <a style="text-decoration:none !important; border-bottom: 1px dotted #999 !important; font-weight:normal !important; height: 13px; color:#5799DB !important;" href="http://www.msnbc.msn.com">breaking news</a>, <a href="http://www.msnbc.msn.com/id/3032507" style="text-decoration:none !important; border-bottom: 1px dotted #999 !important; font-weight:normal !important; height: 13px; color:#5799DB !important;">world news</a>, and <a href="http://www.msnbc.msn.com/id/3032072" style="text-decoration:none !important; border-bottom: 1px dotted #999 !important; font-weight:normal !important; height: 13px; color:#5799DB !important;">news about the economy</a></p>Melhttp://www.blogger.com/profile/08402678236374981190noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-72554923034668704002010-11-26T16:56:00.002-06:002010-11-26T17:02:55.359-06:00More Leaks from WikiLeaksSometime this weekend WikiLeaks is set to release another cache of documents. This time the documents are believed to pertain to US diplomatic discussions of foreign leaders and their governments. In an effort at damage control the US has already been in contact with many foreign leaders to brief them on the likely contents of the documents. So far, WikiLeaks has been mum on the official schedule for the release of these documents. <br /><a href="http://www.huffingtonpost.com/2010/11/26/wikileaks-release-us-brie_n_788614.html"><br />http://www.huffingtonpost.com/2010/11/26/wikileaks-release-us-brie_n_788614.html</a>Davidhttp://www.blogger.com/profile/05652824085802653117noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-88467839862258991932010-11-23T21:01:00.000-06:002010-11-23T21:01:57.753-06:00WikiLeaks Discussion<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8U2c9VRqhTE4S8XVILkgMMs906kIsMU5bUNcDsYMFQ0giKDwz1zDn2sj6JZwSUqVZQhEg2isX2NaHorR88Ti7BFDqdI8J8v-MZ8KzpUsXkkRA8zs9_1XIOUTJTc_Q5e0Kw-tjZZr9mPSK/s1600/Screen+shot+2010-11-23+at+8.55.58+PM.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="260" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8U2c9VRqhTE4S8XVILkgMMs906kIsMU5bUNcDsYMFQ0giKDwz1zDn2sj6JZwSUqVZQhEg2isX2NaHorR88Ti7BFDqdI8J8v-MZ8KzpUsXkkRA8zs9_1XIOUTJTc_Q5e0Kw-tjZZr9mPSK/s320/Screen+shot+2010-11-23+at+8.55.58+PM.png" width="320" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">With some puréed potatoes and heavy cream, they make a lovely winter soup.</td></tr>
</tbody></table>I want to take a moment to jump in and thank everyone for the rich and truly engaging discussion you are creating around the WikiLeaks issue. As you can see by the many interesting and nuanced points everyone is making, so much of what we've been thinking and talking about this semester - access to information, government documents, technology, public good, ethics of information, who owns and controls information creation and dissemination, the politics of making information available, legal regimes and info access, and much, much more -is coming into play in this one issue. I appreciate very much the way you have taken hold of the issue and grappled with it from many angles. As you are clicking around the web and engaging with news sources in your daily lives, it is likely you will come across more resources on this breaking topic; I encourage you to post and share those when you do. Thanks for the contributions.Sarah. R.http://www.blogger.com/profile/13495338005089494192noreply@blogger.com0tag:blogger.com,1999:blog-4296942054147310421.post-75200531871928960372010-11-23T19:02:00.000-06:002010-11-23T19:02:26.889-06:00WikiLeaksI share in the mixed feelings about WikiLeaks. I always feel a bit guilty when I cannot quickly and efficiently make up my mind on big issues; like I should stop dragging my feet and throw my support (even if it is often a more-or-less silent supporting) behind the side I choose, my side. This time was no exception, at least at first. Then, as I looked at the sheer amount of information present, I realized that I hadn’t fully made up my mind because I, or anyone else, will never be able to fully take it all in. You can get bits and pieces here and there, watch interviews with Assange and get sound bites from the White House, but in the end it is just like everything else, a simplified version of a too-complex reality. It basically comes down to a certain level of blind faith in one side or another (I am, in this case, speaking of the normal everyday person, not the insiders, decision-makers and the zealously committed to the cause). I have never been big on blind faith, but here goes. <br />
I do believe that WikiLeaks is handling some information of value to people that could and would use it for less than altruistic, information-wants-to-be-free purposes. Documents that can lead to the exposure and prosecution, persecution or execution of those in sensitive situations in a war zone are potentially very dangerous… but so are scissors if you don’t use them properly (and I am not about to get rid of my scissors… took me forever to find a left-handed pair big enough to fit my hand comfortably). That, I think, is the trick, knowing what you have and using it properly. By all indication WikiLeaks has done that so far. Despite all of the government’s doom-and-gloom about compromising security and safety in the field the pentagon reported that there were no issues created by any of the leaked information. It would seem that the WikiLeaks people take their redaction seriously. I can’t help but think that with that much info being processed for release by that many people that there is still a good chance of something being released accidentally that might cause issues down the road, maybe a very good chance, but so far it just makes Washington and the military look like they are upset because someone took the power out of their hands. Information is a commodity and they have lost control over a lot of it to a rival – they are afraid of losing face but clearly more concerned over the loss of control. As Assange points out, it is a disturbing and more than a little telling that government has gone after WikiLeaks sources but paid little to no attention to investigating some of the alleged abuses of power and war crimes in Afghanistan and Iraq. Washington is being a petulant child that is still angry about the other kid that got to go first on the slide so they won’t play at all. The pentagon stated that it expected that none of the leaks from the Iraq War Logs would be knew information trying to downplay the whole thing. WikiLeaks points out that it goes without saying that the information wouldn’t be new to them on the War Logs page of their website. In the face of the government’s response to this, with the only thing to counterbalance it being the leaks might potentially be dangerous if something isn’t edited properly, I am going to have to side with the WikiLeaks crew and Julian Assange. Side note: Did anyone else feel really bad for Mr. Assange during the Amy Goodman interview? The man looks haggard, and when she asked him at the end what gave him hope he looked on the verge of breaking down for a moment. I guess making an enemy of the governments and intelligence agencies of the world will do that to you. <br />
I think if there is something that WikiLeaks could be faulted for (and I would not be the one to bring it up to them, given what they have accomplished/risked so far) it is the inaccessibility of this newly accessible information. Like most of you, I found the documents I looked through a confusing maze that had no real relevance for me. This is not even mentioning the massive amount of info. It is great that it is out there, but one has to question the effectiveness of it. All the hactivists and journalists and conspiracy theorists of the world could work on it for years and there could still be valuable things missed. It is almost misdirection through information overload. Again, not that I would bring it up. It is still impressive that it is out there to begin with and that so many people are laboring to do what they think is right by distributing this information.Zach Berkleyhttp://www.blogger.com/profile/14816981725618294017noreply@blogger.com4tag:blogger.com,1999:blog-4296942054147310421.post-69915732827414483372010-11-23T13:06:00.000-06:002010-11-23T13:06:55.457-06:00relativism of secrecy (or something)Does the length of the Afghan war affect how we view the appropriateness of these leaks? What I mean is that I think the public is more willing to give leaders the benefit of the doubt regarding the necessity of classifying information during times of true national emergency. The first month or two of the Afghan campaign, for instance, when the US was making a push to track down Bin Laden, Mullah Omar, etc., is an example of when a level of secrecy is acceptable and warranted. If wikileaks had chosen that moment to publish sensitive information that could have derailed the chance to grab Bin Laden, I have a hard time believing even Mill would have approved. Clearly, there are matters of national security that must be kept confidential, and our democratic system allows us to put in place people we believe we can trust to act appropriately given access to that information. I'm not certain how to establish a strict timeframe after which the government's classification of information becomes less essential, or if it ever does. But I think the government's ability to make a compelling case to keep information secret wanes over time. Since the public has now largely turned against the war, and most Americans want US forces out of Afghanistan, there has been much less public outcry against wikileaks than there might have been under a different political situation. I know that as information professionals we want to have hard and fast rules about this sort of thing. The truth of the matter is that the state of public opinion at any given moment has as much to do with what an entity such as wikileaks can get away with as any rules or guidelines about freedom of information.<br />
<br />
Where do we fit in here? Since the government seems to lack an official entity to advocate for the declassification of information, it is up to us to fill that role. Barring truly compelling situations of national emergency, we should always support the freedom of information, regardless of public opinion. There will be times when that stance can get us into hot water, of course, but since the government will always try to keep information secret, there needs to be a dedicated corps willing to fight on behalf of the public's right to information. Wikileaks helps provide us with the tools to make the fight a bit more even. Hopefully, out of that struggle, somewhere in the middle, there will be a point where the appropriate degree of secrecy vs. access is reached.Alcibiadeshttp://www.blogger.com/profile/16637372557433190165noreply@blogger.com2tag:blogger.com,1999:blog-4296942054147310421.post-20873444123715489712010-11-22T20:20:00.001-06:002010-11-22T20:26:03.156-06:00module xii: wikileaks<!--StartFragment--> <p class="MsoNormal"><span class="Apple-style-span" style="font-family:'Gill Sans';"> <!--StartFragment--> </span></p><span class="Apple-style-span" style="font-family:'Gill Sans';"><p class="MsoNormal"><span style="font-family:"Gill Sans"">As I searched through the WikiLeaks site, I was both amazed and overwhelmed by the information made available. It is organized, searchable and cross-referenced. I was expected a big blob of text 100 million pages long. I did have a hard time making any real sense of it, but I found it interesting nonetheless. I plan to go back and delve further. The maps helped make a connection to the text I was reading. It’s amazing to be able to see exactly where each report is taking place. Somehow, the maps made it all the more real for me.<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-family:"Gill Sans"">In truth, I am very torn about wikileaks.org. On one hand I do applaud Assange’s work in making available this information. The current conflict in the Middle East has divided this country, especially politically. Furthermore, many have questioned former president Bush’s motivations, tactics and leadership from day one. Some consider him a war criminal. I have no doubt that many government activities would shock American citizens if we knew about them. (Think Watergate, Guantanamo Bay.) From this perspective, WikiLeaks brings about the opportunity to read and analyze government and military information, and gives the media a chance to tell real stories, and not regurgitate the official statements from our government. <o:p></o:p></span></p> <p class="MsoNormal"><span style="font-family:"Gill Sans"">On the other hand, to what degree should this type of information be made available? Will its ultimate use serve the goals of a free democracy, or highlight our secrets to those who would do us harm? Like most of my classmates have already said, John Mill would be cheering Assange from the highest rooftop. The inclusion of all of this formerly hidden information would, in his view, only further discussion from all sides and enhance the search for truth. I agree, but should truth override the safety of other human beings? In Engleberg’s ProPublica article he writes that through the 75,000 documents posted on WikiLeaks, it is “possible to identify Afghans who have cooperated with Western forces.” How ironic if the country they helped only served to facilitate their demise in the end by making their actions know to anyone. (Certainly, WikiLeaks can be accessed from any computer in the world.)<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-family:"Gill Sans"">Should there - can there? - be a line drawn in which “secret” documents remain secret? Through our readings we know that the government secret stamp was used not only to protect information to keep us safe to protect those who made bad mistakes and tried to cover them up. But what if documents on WikiLeaks, or any other such site, truly compromise our national security and our personal safety?<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-family:"Gill Sans"">After three paragraphs, I am still torn. I believe our government has shrouded many of its activities in secrecy, and I believe that we should have the right to be able to access that information and question the motives and decisions of our leaders. Whether it be Assange or any other political hacker, there will always be a select group of people fighting very hard for, as Ludlow wrote in <i style="mso-bidi-font-style:normal">The Nation</i> about Levy and The Mentor’s hacker principles in the 1980s: “information should not be hoarded by powerful constituencies-it needs to be placed in the hands of the general public.” Online, the general public is anyone with a computer and Internet access. It can be a journalist, a library student, a teacher, or a member of an enemy military. Is it even possible for a site such as WikiLeaks to promote free access for all without putting anyone at risk? <o:p></o:p></span></p> <!--EndFragment--> </span><p></p> <!--EndFragment-->Diana Ruschhttp://www.blogger.com/profile/16166076446934181778noreply@blogger.com4tag:blogger.com,1999:blog-4296942054147310421.post-82586073155932872192010-11-22T15:00:00.000-06:002010-11-22T15:00:17.765-06:00Stats - Late NovemberHere's a screenshot grab of our audience stats. I note that my views from Sweden have rolled off. Enjoy!<br />
<br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin7_wSc-kbPdyVr5SuI0bZhwp8eZOyKMpeZdwLqfJDc3ewikooobnLvWeCR5sV6lOrYlL6W4qB0BIErOUkzkjGS9xtNNJSauk1NBfv8G4kfzPMO7ZUFtK3yOvGDbg-jUn8A6iXB8AuCHng/s1600/Screen+shot+2010-11-22+at+2.57.52+PM.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"><img border="0" height="256" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEin7_wSc-kbPdyVr5SuI0bZhwp8eZOyKMpeZdwLqfJDc3ewikooobnLvWeCR5sV6lOrYlL6W4qB0BIErOUkzkjGS9xtNNJSauk1NBfv8G4kfzPMO7ZUFtK3yOvGDbg-jUn8A6iXB8AuCHng/s400/Screen+shot+2010-11-22+at+2.57.52+PM.png" width="400" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Site Audience Stats - All-Time, up to November 22, 2010</td></tr>
</tbody></table>Sarah. R.http://www.blogger.com/profile/13495338005089494192noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-62634020438315222352010-11-22T09:11:00.003-06:002010-11-22T11:33:52.598-06:00wikileaksI am slightly torn about wikileaks. On the one hand, I strongly believe that information should be free and available to the public. However, a part of me believes we should not reveal classified information if it risks causing harm to informants and/or supporters. I am not sure how, or even if we should, weigh the benefit of free access to information against the possible harm done to others; I think ultimately, the public should know what the government is doing, especially militarily, but I do not think information that could identify and compromise informants or supporters should be revealed to the public until the situation has become such that revealing any identities of those involved is no longer a danger.<br /><br />I was also a little surprised at the usability of the wikileaks website. I don't know why, but I was also envisioning long written out reports rather than short little snippets. The subject terms were in plain, understandable language, but there were both terms in all caps and no caps and some terms repeated. Additionally, I got sort of lost in all the abbreviations. The addition of the map feature was definitely cool and really made the events told in the logs more tangible. I think it is hard to really digest and comprehend what is going on in the middle east because it is so removed from our lives; it is physically distant and although we talk about events in the middle east we are not first hand seeing the action. Therefore, I think the maps help create a stronger connection between what is happening in the middle east and our lives here.<br /><br />As others said, I think Mills would support the sharing of information since he argues for listening to both sides. I think the release of information and documents, like on wikileaks, can lead to further discussions about topics from multiple views and allows people to make more informed decisions about what they believe, develop well supported arguments for their beliefs, and have a better understanding of the opposing view.<br /><br />And now a brief aside, relating back to copyright. Last week in my copyright class, my professor mentioned a statement from the UK that the UK copyright law needed to be reformed to include provisions similar to the US's fair use doctrine in order to attract technology companies to the UK. I think that is an interesting proposition, but, as my professor mentioned, hopefully the UK will be able to find a way around the problems with the fair use doctrine in the US; for example, avoiding a doctrine that involves so much judicial discretion in balancing the four factors that no one can guess whether fair use will be found.Joannahttp://www.blogger.com/profile/11198620176160222447noreply@blogger.com1tag:blogger.com,1999:blog-4296942054147310421.post-41662009250697774702010-11-21T14:42:00.001-06:002010-11-21T14:44:02.240-06:00Wikileaks and MillsSo, I got confused and posted this on Wikileaks last week...Here it is again.<br /><br />First, let me say that I found this week’s topic of WikilLeaks to be among the most interesting discussed within this class. I did not know of its existence prior to this week. Thanks for bringing it to my attention.I have to be honest that I did not know what to expect when I searched WikiLeak’s archive, specifically, “Diary Dig”. What I suppose I would find would be complete sections of information – documents which consisted of 20-pages-or-more of juicy information noting edits, deletions, and the “top secret” red stamp of approval. Basically, something that stood out as information which should not be known.This is not what I found in “Diary Dig”.<br /><br />What I DID discover were thousands of short documents which contained the essential elements of information - # of casualties, units involved, target specification, and so forth. Alone, one document with a few numbers and abbreviations does not provide any insight to the happenings of war; but a coalition consisting of tens of thousands of documents paints a full picture – a story of attrition that any war tells.What would Mills say on the ethics of WikiLeaks?Mill’s writings argued, in so many words, that an ignorant argument breeds ignorant thought. Freedom of Information, therefore, is a fight against ignorance. Is not information classified as “top secret” the manifestation of ignorance promoted by government action? Thus, I believe that if Mill’s were alive today, he would be sitting at his own lap top reviewing potential articles to be posted on Diary Dig. In short, Mills would be continuing his fight against ignorance in this new medium.LibraryRPGamerhttp://www.blogger.com/profile/13721585353795044422noreply@blogger.com1