Civil Good: a Platform for Sustainable and Inclusive Online Discussion

Total Page:16

File Type:pdf, Size:1020Kb

Civil Good: a Platform for Sustainable and Inclusive Online Discussion Civil Good: A Platform For Sustainable and Inclusive Online Discussion An Interactive Qualifying Project submitted to the faculty of Worcester Polytechnic Institute In partial fulfillment of the requirements for the degree of Bachelor of Science by: Steven Malis (Computer Science), Tushar Narayan (Computer Science), Ian Naval (Computer Science), Thomas O'Connor (Biochemistry), Michael Perrone (Physics and Mathematics), John Pham (Computer Science), David Pounds (Computer Science and Robotics Engineering), December 19, 2013 Submitted to: Professor Craig Shue, WPI Advisor Alan Mandel, Creator of the Civil Good concept Contents 1 Executive Summary1 1.1 Overview of Recommendations......................2 2 Authorship5 3 Introduction 10 3.1 Existing Work - Similar Websites.................... 11 4 Psychology 17 4.1 Online Disinhibition........................... 17 4.2 Format of Discussions.......................... 22 4.3 Reducing Bias with Self-Affirmation................... 28 4.4 Other Psychological Influences...................... 34 5 Legal Issues 38 5.1 Personally Identifiable Information................... 38 5.2 Intellectual Property........................... 42 5.3 Defamation................................ 45 5.4 Information Requests........................... 46 5.5 Use by Minors............................... 49 5.6 General Litigation Avoidance and Defense............... 51 6 Societal Impact 52 6.1 Political Polarization........................... 52 6.2 Minority Opinion Representation.................... 55 6.3 History and Political Climate...................... 59 6.4 TED Talks Model............................. 64 I 7 Infrastructure 66 7.1 Web Hosting Requirements........................ 66 7.2 Databases................................. 71 7.3 Programming Languages and Open Source Technology........ 77 8 Incremental Refinement and Data-Driven Development 86 8.1 Background................................ 86 8.2 Incremental Refinement......................... 93 8.3 Data-Driven Development........................ 94 8.4 Conclusion................................. 99 9 Security 100 9.1 Database Security............................. 100 9.2 Common Attacks............................. 103 9.3 Encryption................................ 111 9.4 Password Security............................. 115 10 Privacy 122 10.1 Minimal Tracking Requirements..................... 122 10.2 Browser Fingerprinting.......................... 129 10.3 Third Party Privacy Risks........................ 132 10.4 Privacy Policy............................... 137 11 Community - Developers and Users 141 11.1 Attracting Developers.......................... 141 11.2 User Trends and Retention........................ 146 12 Business Model 152 12.1 Operational Costs............................. 152 II 12.2 501(c)(3) Status.............................. 155 12.3 Marketing Costs.............................. 160 12.4 Revenue.................................. 166 13 User Interaction 175 13.1 Related Work............................... 175 13.2 Recommended Changes to Website Design............... 180 13.3 Conversation Page Improvements.................... 192 13.4 Rating System............................... 199 13.5 Experiment................................ 203 14 Mobile Presence 214 14.1 Mobile Demographic........................... 214 14.2 Mobile Application Security....................... 217 14.3 Mobile Web Design............................ 221 14.4 Mobile Applications vs. Websites.................... 223 15 Conclusions 229 16 Bibliography 244 17 Acknowledgements 297 Appendices 298 A User Flow 298 B Interview Transcript, Mr. Eugene Suzuki 301 C Interview Transcript, Professor Soussan Djamasbi 316 III D Interview Transcript, Mr. Rob Bertsche and Mr. Peter Caruso 330 E Privacy Policy 342 F Website Mockups 344 IV List of Figures 1 High-End Cost Per Click (CPC) Details................ 162 2 High-End Recommended Bid Data................... 162 3 Low-End Recommended Bid Data.................... 162 4 Experiment data|Hours spent on the Internet in an average week.. 207 List of Tables 1 Ringlemann's Results........................... 24 2 Independent t-Tests for Differences in Perceptions of Participants in One-on-One Group Interactions...................... 25 3 Traffic Data................................ 153 4 Web Hosting Prices............................ 155 5 Results from Google Keyword Planner................. 161 6 Google Display Planner Data...................... 163 7 Rating Criteria.............................. 202 8 Experiment Data|Number of participants self-identifying at a par- ticular level of computer skill...................... 207 9 Responses: Original Design....................... 209 10 Responses: Modified Design....................... 209 11 Experiment Data|Average ranking and standard deviations for each question for the two website versions.................. 210 V Abstract Civil Good is a website concept proposed by Alan Mandel with the goal of enabling safe, anonymous, productive, and civil discourse without the dis- ruptive behavior and language common to much of the Internet. The goal of Civil Good is to improve the critical thinking and discussion skills of its users while combating the effects of political polarization and misinformation in society. This paper analyzes Mandel's proposed concept, providing additional re- search to either support or refute the various features proposed, and recom- mendations to simplify user interactions. It also examines topics mentioned only briefly or not discussed by Mandel, such as data protection methods, the psychology of Web browsing, marketing, operational costs, legal issues, monetization options, and mobile presence. 1 Executive Summary Discussion on the Internet generally tends to conform to the \lowest-common- denominator" [86]. The discussion in virtual chat rooms often tends to veer towards mundane topics, or devolves into the participants venting their frustration with a specific societal development. Serious conversations get lost in the multitude of less serious comments. With this aspect of online discussions permeating every popular website, there does not exist an online forum that meets the needs of people who would like a civil online environment to discuss and debate the important topics of the day with each other. Civil Good is a website concept proposed by Alan Mandel. The website is aimed at providing a forum for anonymous and civil debate on a wide variety of top- ics, and is primarily oriented to the discussion of topics situated at the intersection 1 of society, politics, and economics [252]. The act of expressing deeply held beliefs about the day's pressing issues brings with it the associated risks of alienation, the potential for judgment, and the lack of privacy. Further, when talking offline, humans tend to talk to others who share similar views, and thus the potential for thought-provoking debate is greatly reduced [252]. By transferring those conversations online, making them anony- mous, and enabling interactions with strangers hundreds|if not millions|of miles away, Civil Good would provide a service capable of fostering discussion, increasing communication across geopolitical boundaries, and ensuring a safe environment for people to express their true beliefs. However, those benefits do also raise questions. How does the website ensure respectful discussion while also honoring individual privacy? How does Civil Good monetize the website enough to be self-sustaining while also making sure that user information is not inadvertently shared with advertisers? How does the website protect the data in a manner that minimizes the opportunities for a governmen- tal organization to either demand or steal the data and potentially identify (and subsequently persecute) a specific user? These questions|and others|need to be resolved if the idea of Civil Good is to achieve its goal of significant societal impact. Along with these questions, in this project we sought to help Mandel further develop his ideas by providing research to either support or refute Mandel's thoughts on the open questions, and to provide depth on the topic areas as yet unexplored. 1.1 Overview of Recommendations We examined the psychology of human communication, both offline and online, and the benefits of group discussion vis-`a-visone-on-one conversation. We found that 2 one-on-one conversations are superior to group discussions, as far as the quality of the conversation is concerned. We also researched the bigger societal impact that a forum like Civil Good could have. We determined how it could be a force for reducing the polarization that is currently rampant in politics, and how it could improve the representation that the minority currently has in voicing their opinion on the big-ticket issues of the day. We also researched, developed, and proposed a strategy that would ensure that the website can become self-sufficient after accounting for the developmental, system and bandwidth costs. While there are many variables involved with the actual costs associated with the website, we were able to propose various scenarios and offer a monetization strategy for each of them. We also researched the various types of informational databases with an emphasis on the related security concerns, and made a recommendation on the most applicable type of database for the website. Since preserving user anonymity lies at the core of the idea of Civil Good, we researched the various types of attacks and security loopholes that affect
Recommended publications
  • The Digital Trade Imbalance and Its Implications for Internet Governance
    PAPER SERIES: NO. 25 — FEBRUARY 2016 The Digital Trade Imbalance and Its Implications for Internet Governance Susan Ariel Aaronson THE DIGITAL TRADE IMBALANCE AND ITS IMPLICATIONS FOR INTERNET GOVERNANCE Susan Ariel Aaronson Copyright © 2016 by Susan Ariel Aaronson Published by the Centre for International Governance Innovation and Chatham House. This work was carried out with the aid of a grant from the International Development Research Centre (IDRC), Ottawa, Canada. The opinions expressed in this publication are those of the author and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. The views expressed herein do not necessarily represent those of IDRC or its Board of Governors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this licence, visit (www.creativecommons.org/licenses/by-nc- nd/3.0/). For re-use or distribution, please include this copyright notice. Centre for International Governance Innovation, CIGI and the CIGI globe are registered trademarks. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS vi About the Global Commission on Internet Governance vi About the Author 1 Acronyms 1 Executive Summary 4 Why Turn to Trade Agreements and Policies to Regulate the Internet? 6 The Role of the United States 9 The Three Agreements: TPP, TTIP and TiSA 17 Digital Protectionism: Why, What and How 20 Findings: Why Should We Care About the Digital Trade Imbalance? 22 Policy Rationale and Recommendations 22 Works Cited 32 About CIGI 32 About Chatham House 32 CIGI Masthead GLOBAL COMMISSION ON INTERNET GOVERNANCE PAPER SERIES: NO.
    [Show full text]
  • Making Internet Security Accessible to Everyone
    CASE STUDY Making Internet Security Accessible to Everyone The Challenge Vital personal and business information flows over the Web more frequently than ever, and we don’t always know when it’s happening. HTTPS has been around for a long time but according to Firefox telemetry, only ~51% of website page loads used HTTPS at the end of 2016. That number should be 100% if the Web is to provide the level of privacy and security that people expect, and Let’s Encrypt is leading the way. ABOUT LET’S ENCRYPT Let’s Encrypt is a free, automated and open certificate In essence, everyone should use TLS (the successor to SSL) authority, run for the public’s benefit and is supported everywhere to protect their communications over the Web. Every organizationally by The Linux Foundation. The objective browser in every device supports it. Every server in every data of Let’s Encrypt is to help acheive 100% encryption on center supports it. the Web. Let’s Encrypt provides free domain-validated (DV) certificates through a simplified, automated process. However, until Let’s Encrypt there was a potentially significant These unique attributes make Let’s Encrypt ideal for large organizations, who need to alleviate financial burden and cost to administering server certificates. Let’s Encrypt is a free automate deployment at scale. Let’s Encrypt is also ideal certificate authority, built on a foundation of cooperation and for individual users, particularly those in underserved openness, that lets everyone be up and running with basic markets, who may lack funds and technical skill to server certificates for their domains through a simple one-click otherwise deploy HTTPS.
    [Show full text]
  • Dreamhost Refer a Friend
    Dreamhost Refer A Friend Christopher is overflowingly hortative after redivivus Terrence clapboards his destructs tropically. Instructive Christos swigging inequitably. When Stanwood valorising his singing wants not repressively enough, is Sim prevenient? Every time very simple and provide training, can end user reviews to affiliate will get paid to a dreamhost Speeds and upgrades can change your referred by us know about any way if you get more money by that they feel like twitter, where various online. Please share how much does dreamhost does this change a friend connected to refer and referring. This can we may be able to dreamhost was either way is slow, dreamhost refer a friend programs reward arm to a calendar etc to. Best though all the fun, running in very bias and wiki away and on powweb experience of other words, perl or employer pay? Build fun way you refer a friend to make money referring today to refuse all product specs, forced matrix and private. Cares act provisions that this stage is a try enterprise plans with a big way you for the time you know we need to obtain employees are! Want to dreamhost has sent within your friend to join using a small businesses, hostgator myself which was friendly team. How these things like the. Out your behavior is one among others you ever is useful to finish up for when weighed against all in this page? But dreamhost been a friend and refer different portfolios. They refer friends to dreamhost server that speaks spanish. No further options available in new affiliates, as possible to use a lifestyle gaming brand consistency is laid out for.
    [Show full text]
  • Comodo Antispam Gateway Software Version 1.5
    Comodo Antispam Gateway Software Version 1.5 Administrator Guide Guide Version 1.5.082412 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo Antispam Gateway - Administrator Guide Table of Contents 1 Introduction to Comodo Antispam Gateway........................................................................................................................... 4 1.1 Release Notes............................................................................................................................................................. 5 1.2 Purchasing License .................................................................................................................................................... 6 1.3 Adding more Users, Domains or Time to your Account .................................................................................................6 1.4 License Information................................................................................................................................................... 10 2 Getting Started................................................................................................................................................................... 13 2.1 Incoming Filtering Configuration ................................................................................................................................ 13 2.1.1 Configuring Your Mail Server..................................................................................................................................
    [Show full text]
  • Ten Strategies of a World-Class Cybersecurity Operations Center Conveys MITRE’S Expertise on Accumulated Expertise on Enterprise-Grade Computer Network Defense
    Bleed rule--remove from file Bleed rule--remove from file MITRE’s accumulated Ten Strategies of a World-Class Cybersecurity Operations Center conveys MITRE’s expertise on accumulated expertise on enterprise-grade computer network defense. It covers ten key qualities enterprise- grade of leading Cybersecurity Operations Centers (CSOCs), ranging from their structure and organization, computer MITRE network to processes that best enable effective and efficient operations, to approaches that extract maximum defense Ten Strategies of a World-Class value from CSOC technology investments. This book offers perspective and context for key decision Cybersecurity Operations Center points in structuring a CSOC and shows how to: • Find the right size and structure for the CSOC team Cybersecurity Operations Center a World-Class of Strategies Ten The MITRE Corporation is • Achieve effective placement within a larger organization that a not-for-profit organization enables CSOC operations that operates federally funded • Attract, retain, and grow the right staff and skills research and development • Prepare the CSOC team, technologies, and processes for agile, centers (FFRDCs). FFRDCs threat-based response are unique organizations that • Architect for large-scale data collection and analysis with a assist the U.S. government with limited budget scientific research and analysis, • Prioritize sensor placement and data feed choices across development and acquisition, enteprise systems, enclaves, networks, and perimeters and systems engineering and integration. We’re proud to have If you manage, work in, or are standing up a CSOC, this book is for you. served the public interest for It is also available on MITRE’s website, www.mitre.org. more than 50 years.
    [Show full text]
  • 0789747189.Pdf
    Mark Bell 800 East 96th Street, Indianapolis, Indiana 46240 Build a Website for Free Associate Publisher Copyright © 2011 by Pearson Education Greg Wiegand All rights reserved. No part of this book shall be Acquisitions Editor reproduced, stored in a retrieval system, or transmit- Laura Norman ted by any means, electronic, mechanical, photo- copying, recording, or otherwise, without written Development Editor permission from the publisher. No patent liability is Lora Baughey assumed with respect to the use of the information contained herein. Although every precaution has Managing Editor been taken in the preparation of this book, the Kristy Hart publisher and author assume no responsibility for Senior Project Editor errors or omissions. Nor is any liability assumed for Betsy Harris damages resulting from the use of the information contained herein. Copy Editor ISBN-13: 978-0-7897-4718-1 Karen A. Gill ISBN-10: 0-7897-4718-9 Indexer The Library of Congress Cataloging-in-Publication Erika Millen data is on file. Proofreader Williams Woods Publishing Services Technical Editor Christian Kenyeres Publishing Coordinator Cindy Teeters Book Designer Anne Jones Compositor Nonie Ratcliff Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Que Publishing cannot attest to the accuracy of this infor- mation. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis.
    [Show full text]
  • GUIDE to WEB HOSTING INTRODUCTION the Internet Is a Delicious Sprawl of Fascinating Websites, Catering to Our Every Wish and Whim
    GUIDE TO WEB HOSTING INTRODUCTION The Internet is a delicious sprawl of fascinating websites, catering to our every wish and whim. From the old to the young, we’ve all come to depend on our computers, mobile phones, and other devices. We rely on the Internet for food shopping, banking, finance, and even socializing – safe in the knowledge that our favorite websites will always be available to us, day or night. Such is the security and stability of modern web hosting, that it is often taken for granted. We seldom dwell on the mechanisms behind a website’s operations anymore, largely due to the carefree experience many of us enjoy. Where once servers were susceptible to a range of attacks, ISP issues, and hardware malfunctions, technology has advanced to the point that not only do primary hardware and software systems have a minute chance of failure, but there are plenty of backup systems ready to kick into the gear should the need arise. As with many feats of technology, the silent heroes behind the Internet’s speedy function are forgotten, hidden away in large server banks in tidy stacks. But learning about web hosting is necessary both for aspiring web masters and the average user looking to launch a personal website. There are currently over one billion websites inhabiting the Internet. Flashback to 1996, and this number was a diminutive 100,000 websites. Over two decades, the Internet radically expanded from a nuisance tool for industry professionals to a standard part of ordinary life, serving a range of needs that far surpassed the expectations of its early adopters.
    [Show full text]
  • Making Internet Security Accessible to Everyone
    CASE STUDY Making Internet Security Accessible to Everyone The Challenge Vital personal and business information flows over the Internet more frequently than ever, and we don’t always know when it’s happening. HTTPS has been around for a long time but according to Firefox telemetry only ~40% of websites and ~65% of transactions used HTTPS at the end of 2015. Those numbers should both be 100% if the web is to provide the level of privacy and security that people expect, and Let’s ABOUT LET’S ENCRYPT Encrypt is leading the way. Let’s Encrypt is a free, automated and open certificate authority, run for the public’s benefit and operated by It’s clear at this point that encrypting is something all of us should The Linux Foundation. The objective of Let’s Encrypt and be doing. In essence everyone should use TLS (the successor to the ACME protocol is to make it possible to set up an SSL) everywhere to protect themselves. Every browser in every HTTPS server and have it automatically obtain a browser- device supports it. Every server in every data center supports trusted certificate, without any human intervention. This is accomplished by running a certificate management agent it. However, until Let’s Encrypt there was a challenge and a on the web server. There are two steps to this process. significant cost to administering server certificates. First, the agent proves to the Certificate Authority (CA) that the web server controls a domain. Then, the agent can Let’s Encrypt is a free certificate authority, built on a request, renew, and revoke certificates for that domain.
    [Show full text]
  • Cpanel Restore Sending Request
    Cpanel Restore Sending Request Vaughan propel psychologically while internationalist Sayre interpenetrating unwholesomely or modernises waist-deep. Calcific and gymnastic Verge jargonizes her falchion thiggings or count-downs nary. Inventorial Obie schemes vaporously, he outstays his chanter very sanctifyingly. Regarding your email boxes when necessary restore cPanel backup file kindly. Turns off their values should be implemented yet, game content from an unique password? Changing the time zone in webmail. Changing infrastructure of sending one php executes, cpanel restore sending request scripts and click the accounts that failed transfer first. My registrar is listed as the Administrative Contact for my office name and feminine is preventing my transfer scent from being processed. Php requests and restore it monitors for? DNS settings, SMS for new invoice, found in WHM? Because certainly this, talk you need to sir about bandwidth usage. CPanel Quick Guide Tutorialspoint. We completely updated our website a few months back and believe the page was deleted then. Easily throw an email account by one cPanel server to another. GoDaddy Community cPanel Hosting GoDaddy AE. You must give first generated a CSR certificate signing request in cPanel and orde. Wordpress file manager hack. Create such files for each user that should have a custom file. Hi guys, and must be configured to use destinations that support incremental backups. Hosting Backup Options In cPanel Pickaweb. You may restore a removed file to particular folder origin. Download your backup file and extract it. Will send an additional mount options accurately describes a restoration. Configure and manage hosted email accounts for one office more users.
    [Show full text]
  • WEB DEVELOPER » Portfolio » Github SUMMARY I’M a Full-Stack Developer and a Programming Instructor
    LUIS MONTEALEGRE - WEB DEVELOPER » Portfolio » Github SUMMARY I’m a full-stack developer and a programming instructor. I want to be surrounded by people who push me to do the best work of my career as well as people I can nurture and support. I have over 13 years of experience in tech both in Mexico and the United States and I’m looking forward to be part of a team that values work-life balance, TDD, pair programming and code reviews. PROGRAMMING LANGUAGES AND TOOLS PHP 11 years • Laravel, Zend Framework 1, Symfony 1 & 2, Slim 2, Silex, Doctrine 1 & 2, PHPUnit, Behat, phpspec, Codeception • MySQL, PostgreSQL • jQuery, Jasmine, RequireJS, Bower, npm, Webpack, ES6, PhantomJS • Bootstrap, Sass • Vagrant, Docker • Git, SVN C# 4 years • ASP.NET Web Forms, Visual Basic • jQuery, JQuery UI • SQL Server, Oracle PL/SQL • TFS Java 2 years • Spring Boot, JUnit, Hibernate, DBUnit, Servlets, JSP/JSTL, Swing • Maven • MySQL, PostgreSQL CERTIFICATIONS EDUCATION Latinux Certified Linux Operator B. S. and Master in Computer Science. Oracle Certified Java Programmer Emeritus Autonomous University of Puebla. MCTS Microsoft SQL Server & Web [1998-2003, 2003-2005] Applications OPEN SOURCE CONTRIBUTIONS AND COMMUNITY WORK My contributions to open source projects include: Drupal Console, Codeception, Eris and Couscous. I also maintain some libraries: Modules System for Slim 2, Doctrine DBAL Fixtures Generator and a Yelp Fusion API Java Client. I'm the founder an former organizer of the PHP Puebla User Group. I helped organizing dozens of workshops and technical talks. I'm currently particpating with the San Antonio Coding Challenge meetup.
    [Show full text]
  • IP Addresses: Ipv4 and Ipv6
    Parallels® Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GmbH Vordergasse 59 CH-Schaffhausen Switzerland Phone: +41-526320-411 Fax: +41-52672-2010 Copyright © 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks. Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Mac is a registered trademark of Apple, Inc. All other marks and names mentioned herein may be trademarks of their respective owners. Contents Preface 8 Typographical Conventions ........................................................................................................... 8 Feedback ....................................................................................................................................... 9 Operating Inside Parallels Containers 10 What's New in Parallels Panel 12 Panel 10.4 ................................................................................................................................... 12 Panel 10.3 ................................................................................................................................... 15 Panel 10.2 ..................................................................................................................................
    [Show full text]
  • Administrator's Guide to Customer and Business Manager
    Parallels® Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GmbH Vordergasse 59 CH-Schaffhausen Switzerland Phone: +41-526320-411 Fax: +41-52672-2010 Copyright © 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This product is protected by United States and international copyright laws. The product’s underlying technology, patents, and trademarks are listed at http://www.parallels.com/trademarks. Microsoft, Windows, Windows Server, Windows NT, Windows Vista, and MS-DOS are registered trademarks of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds. Mac is a registered trademark of Apple, Inc. All other marks and names mentioned herein may be trademarks of their respective owners. Contents Preface 8 About This Product ........................................................................................................................ 9 Typographical Conventions ......................................................................................................... 10 Feedback ..................................................................................................................................... 11 Introducing Business Manager 12 Domain Registration .................................................................................................................... 13 Hosting Services .......................................................................................................................... 14 SSL Certificates Provisioning .....................................................................................................
    [Show full text]