Metaphoric Interaction with the Internet

Total Page:16

File Type:pdf, Size:1020Kb

Metaphoric Interaction with the Internet USERS’ METAPHORIC INTERACTION WITH THE INTERNET AMY LOUISE HOGAN A thesis submitted for the degree of Doctor of Philosophy University of Bath Department of Psychology March 2008 COPYRIGHT Attention is drawn to the fact that copyright of this thesis rests with its author. This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and that no quotation from the thesis and no information derived from it may be published without the prior written consent of the author. This thesis may be made available for consultation within the University Library and may be photocopied or lent to other libraries for the purposes of consultation. .................................................................................. TABLE OF CONTENTS TABLE OF CONTENTS _____________________________________________ ii LIST OF TABLES __________________________________________________ xi LIST OF FIGURES ________________________________________________ xvi ACKNOWLEDGEMENTS __________________________________________ xix ABSTRACT ______________________________________________________ xxi STRUCTURE OF THESIS _________________________________________ xxii DEFINITIONS ___________________________________________________ xxvi CHAPTER 1. INTRODUCTION TO THE RESEARCH _________________1 1.1 OVERVIEW _____________________________________________________ 2 1.2 THE INTERNET _________________________________________________ 7 1.2.1 The contemporary Internet: 2001-2004 ____________________________ 9 1.2.2 The current Internet: 2005-2009 ________________________________ 11 1.2.3 The future of the Internet ______________________________________ 12 1.3 CONTEXTUALISING THE RESEARCH _____________________________ 13 CHAPTER 2. USABILITY, MODELS AND METAPHORS ____________ 15 2.1 INTRODUCTION _______________________________________________ 16 2.2 MODELS IN HUMAN-COMPUTER INTERACTION __________________ 16 2.3 METAPHOR ___________________________________________________ 18 2.3.1 Defining metaphor ___________________________________________ 18 2.3.2 Visual metaphors ____________________________________________ 19 2.3.3 This thesis' approach to defining metaphor ________________________ 20 2.4 THE FUNCTION OF METAPHOR __________________________________ 21 2.4.1 Metaphors enable comprehension _______________________________ 21 2.4.2 Metaphors provide insight _____________________________________ 22 2.4.3 Metaphors facilitate communication _____________________________ 22 2.4.4 Metaphors aid technological comprehension ______________________ 23 ii 2.5 THE FUNCTION OF METAPHORS IN HCI _______________________ 23 CHAPTER 3. COMMON INTERNET METAPHORS AND THEIR ORIGINS 25 3.1 INTRODUCTION _______________________________________________ 26 3.2 POPULAR METAPHORS OF THE INTERNET _______________________ 26 3.2.1 Metaphors shape and are shaped by technologies ___________________ 28 3.3 METAPHORICAL MODELS OF THE INTERNET _____________________ 32 3.4 INTERFACE METAPHORS _______________________________________ 35 3.4.1 Desktop metaphor ___________________________________________ 35 3.4.2 Iconic metaphors ____________________________________________ 37 3.4.3 Document metaphors _________________________________________ 38 3.5 SYSTEM METAPHORS __________________________________________ 38 3.5.1 Spatial metaphors ___________________________________________ 39 3.5.2 Container metaphors _________________________________________ 40 3.5.3 Orientation metaphors ________________________________________ 40 3.5.4 Personification metaphors _____________________________________ 40 3.6 MAPPING THE INTERNET _______________________________________ 40 CHAPTER 4. CULTURAL AND INTERFACE METAPHORS ___________ 44 4.1 INTRODUCTION _______________________________________________ 45 4.2 CULTURAL METAPHORS _______________________________________ 45 4.3 INTERFACE METAPHORS _______________________________________ 47 4.3.1 Problems with interface metaphors ______________________________ 51 4.4 DESIGNERS' METAPHORS VERSUS USERS' METAPHORS __________ 54 4.5 PROBLEMS WITH THE USER CENTRED DESIGN LITERATURE ______ 57 CHAPTER 5. USERS AND THEIR INTERNET METAPHORS __________ 59 5.1 INTRODUCTION _______________________________________________ 60 5.2 USERS’ METAPHORS OF THE INTERNET __________________________ 60 5.2.1 User variation in Internet metaphors _____________________________ 63 5.3 USERS OF THE INTERNET _______________________________________ 65 5.3.1 Internet self-efficacy _________________________________________ 66 5.3.2 Attitudes __________________________________________________ 68 iii 5.4 USING THE INTERNET __________________________________________ 69 5.4.1 Communication _____________________________________________ 70 5.4.2 Information gathering ________________________________________ 71 5.4.3 Entertainment and Commerce __________________________________ 71 CHAPTER 6. METHODOLOGICAL AND EPISTEMOLOGICAL ISSUES __ 73 6.1 INTRODUCTION _______________________________________________ 74 6.2 METHODOLOGICAL APPROACHES IN HCI ________________________ 74 6.3 BEYOND USABILITY TESTING __________________________________ 75 6.4 MEASURING SUBJECTIVTY _____________________________________ 77 6.4.1 Using Q Methodology to measure subjective understanding __________ 78 6.4.2 Q as a mixed method _________________________________________ 80 CHAPTER 7. RESEARCH GOALS AND RATIONALE _______________ 82 7.1 INTRODUCTION _______________________________________________ 83 7.2 RESEARCH QUESTIONS AND GOALS _____________________________ 83 7.2.1 Users’ metaphors of the Internet ________________________________ 84 7.2.2 Textual and visual metaphors __________________________________ 86 7.2.3 User variation in metaphor use _________________________________ 88 CHAPTER 8. Q SORT: METHODOLOGY _______________________ 91 8.1 INTRODUCTION _______________________________________________ 92 8.2 CONDUCTING A Q STUDY ______________________________________ 92 8.2.1 Concourse generation ________________________________________ 93 8.2.2 Q Sample selection __________________________________________ 93 8.2.2.1 Structured Q samples ____________________________________ 94 8.2.2.2 Unstructured Q samples __________________________________ 94 8.2.2.3 Q samples, representativeness and emergent meaning __________ 95 8.2.2.4 Q sample size __________________________________________ 96 8.2.2.5 Preparing the Q sample __________________________________ 96 8.2.3 P Set selection ______________________________________________ 98 8.2.4 Q Sorting procedure _________________________________________ 98 8.2.4.1 Post Q sort ____________________________________________ 99 8.2.5 Factor Analysis ____________________________________________ 100 iv 8.2.5.1 Extraction and rotation of factors _________________________ 100 8.2.5.2 Factor loadings _______________________________________ 101 8.2.6 Interpretation ______________________________________________ 102 8.2.6.1 Bipolar loadings _______________________________________ 102 8.2.6.2 Distinguishing and consensus items _______________________ 103 8.2.6.3 Interpretation and context _______________________________ 103 8.2.6.4 Synthesising Q and R data _______________________________ 104 8.3 ONLINE Q SORTING ___________________________________________ 104 CHAPTER 9. Q STUDY PREPARATION: PILOT STUDIES __________ 107 9.1 INTRODUCTION ______________________________________________ 108 9.2 PILOT STUDIES _______________________________________________ 108 9.3 PILOT 1: CONCOURSE GENERATION ____________________________ 109 9.3.1 Aims ____________________________________________________ 109 9.3.2 Participants _______________________________________________ 109 9.3.3 Method ___________________________________________________ 109 9.3.4 Outcomes _________________________________________________ 111 9.3.4.1 Internet vs. World Wide Web _____________________________ 112 9.3.4.2 Concourse generation __________________________________ 112 9.4 PILOT 2: Q SAMPLE SELECTION ________________________________ 120 9.4.1 Aims ____________________________________________________ 121 9.4.2 Participants _______________________________________________ 121 9.4.3 Method ___________________________________________________ 121 9.4.4 Outcomes _________________________________________________ 123 9.4.4.1 Number of Q sample items _______________________________ 123 9.4.4.1 Combining Q sort mediums ______________________________ 123 9.5 PILOT 3: Q SAMPLE REFINEMENT ______________________________ 124 9.5.1 Aims ____________________________________________________ 124 9.5.2 Participants _______________________________________________ 125 9.5.3 Method ___________________________________________________ 125 9.5.4 Outcomes _________________________________________________ 128 9.5.4.1 Image Q sample selection ________________________________ 128 9.5.4.2 Text Q sample selection _________________________________ 129 9.5.4.3 Development of online Q sorting interface __________________ 130 v 9.5.4.3.1 FEATURES OF THE ONLINE INTERFACE ___________________ 130 9.5.4.4 Testing the Characteristics Profile Questionnaire _____________ 133 9.5.4.4.1 ORIGINAL QUESTIONNAIRE SETUP ______________________ 133 9.5.4.4.2 MODIFICATIONS TO THE QUESTIONNAIRE _________________ 136 CHAPTER 10. METHOD AND PROCEDURE_____________________ 137 10.1 INTRODUCTION _____________________________________________ 138 10.2 P SET SELECTION ____________________________________________ 138 10.2.1 Website indexing (self-selection)
Recommended publications
  • RFID) That Can Be "Read" When Close to a Sensor
    PRESS RELEASE, Immediate distribution__ We are working on a new release of materials that includes the audio files of the press conference. Thanks to all the people interested in following up the case, we will keep you informed. We are translating the report to different languages, we have translated already to english, spanish and swedish. Mail us if you can translate the information presented in this website. Thanks! THE PHYSICAL ACCESS SECURITY TO WSIS: A PRIVACY THREAT FOR THE PARTICIPANTS. [IN PICTURES] PRESS RELEASE, Immediate distribution URL: http://www.contra.info/wsis | [email protected] PRESS CONFERENCE Friday 12th December 2003 at 11.30 am à « La Pastorale », Route de Ferney 106 à Genève http://www.pressclub.ch/archives/events_2003/event_121203_1130.htm [Press Release English PDF] - [Nota Prensa en Castellano] - Ass. Prof. Dr. Alberto Escudero-Pascual, Researcher in Computer Security and Privacy, Royal Institute of Technology, Stockholm, Sweden (EN, SP) Tel: + 41786677843 , +46 702867989 - Stephane Koch, President Internet Society Geneva, Executive Master of Economic Crime Investigations, Geneva, Switzerland. (FR, EN) Tel: +41 79 607 57 33 - George Danezis, Researcher in Privacy Enhancing Technologies and Computer Security, Cambridge University, UK. (FR, EN, GR) GENEVA, 10th DEC 2003 An international group of independent researchers attending the Word Summit on the Information Society (WSIS) has revealed important technical and legal flaws, relating to data protection and privacy, in the security system used to control access to the UN Summit. The system not only fails to guarantee the promised high levels of security but also introduces the very real possibility of constant surveillance of the representatives of the civil society.
    [Show full text]
  • Violent Victimization in Cyberspace: an Analysis of Place, Conduct, Perception, and Law
    Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law by Hilary Kim Morden B.A. (Hons), University of the Fraser Valley, 2010 Thesis submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts IN THE SCHOOL OF CRIMINOLOGY FACULTY OF ARTS AND SOCIAL SCIENCES © Hilary Kim Morden 2012 SIMON FRASER UNIVERSITY Summer 2012 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Hilary Kim Morden Degree: Master of Arts (School of Criminology) Title of Thesis: Violent Victimization in Cyberspace: An Analysis of Place, Conduct, Perception, and Law Examining Committee: Chair: Dr. William Glackman, Associate Director Graduate Programs Dr. Brian Burtch Senior Supervisor Professor, School of Criminology Dr. Sara Smyth Supervisor Assistant Professor, School of Criminology Dr. Gregory Urbas External Examiner Senior Lecturer, Department of Law Australian National University Date Defended/Approved: July 13, 2012 ii Partial Copyright Licence iii Abstract The anonymity, affordability, and accessibility of the Internet can shelter individuals who perpetrate violent acts online. In Canada, some of these acts are prosecuted under existing criminal law statutes (e.g., cyber-stalking, under harassment, s. 264, and cyber- bullying, under intimidation, s. 423[1]). However, it is unclear whether victims of other online behaviours such as cyber-rape and organized griefing have any established legal recourse.
    [Show full text]
  • Internet Trends 2015 – Code Conference
    INTERNET TRENDS 2015 – CODE CONFERENCE Mary Meeker May 27, 2015 kpcb.com/InternetTrends Outline 1) Internet – Two-Thirds of a Generation In... 2) Key Internet Trends 3) Re-Imagining Continues... 4) America’s Evolving Work Environment... 5) Big Internet Markets = China / India 6) Public / Private Company Data 7) One More Thing... 8) Ran Outta Time Thoughts / Appendix 2 INTERNET TRENDS – TWO-THIRDS OF A GENERATION IN... TWO-THIRDS OF NEXT GENERATION OUT... Internet Users – 1995 2014... <1% to 39% Population Penetration Globally 1995 2014 35MM+ Internet Users 2.8B Internet Users 0.6% Population Penetration 39% Population Penetration 10% 21% 5% 22% 23% 12% 61% 0% 19% 28% USA China Asia (ex. China) Europe Rest of World Source: Euromonitor, ITU, US Census. 4 Mobile Phone Users – 1995 2014... 1% to 73% Population Penetration Globally 1995 2014 80MM+ Mobile Phone Users 5.2B Mobile Phone Users 1% Population Penetration 73% Population Penetration 40% 60% Smartphone Feature Phone Source: Informa, World Cellular Information Service (WCIS). Assumes in 1995, one mobile phone subscription per unique user (no duplication). Note: In 2014, user base per KPCB estimates based on Morgan Stanley Research and ITU data. Smartphone users & mobile phone users represent unique individuals owning mobile devices; mobile 5 subscribers based on number of connections & may therefore overstate number of mobile users. Public Internet Company Market Capitalizations – 1995 2015... Top 15 Companies by Market Capitalization = 1995 @ $17 Billion 2015 @ $2.4 Trillion Global
    [Show full text]
  • Metaphors of Big Data
    International Journal of Communication 8 (2014), 1690–1709 1932–8036/20140005 Metaphors of Big Data CORNELIUS PUSCHMANN Humboldt University of Berlin, Germany JEAN BURGESS Queensland University of Technology, Australia Metaphors are a common instrument of human cognition, activated when seeking to make sense of novel and abstract phenomena. In this article we assess some of the values and assumptions encoded in the framing of the term big data, drawing on the framework of conceptual metaphor. We first discuss the terms data and big data and the meanings historically attached to them by different usage communities and then proceed with a discourse analysis of Internet news items about big data. We conclude by characterizing two recurrent framings of the concept: as a natural force to be controlled and as a resource to be consumed. Keywords: data, big data, conceptual metaphor, semantics, science, technology, discourse analysis Introduction The media discourse around big data is rife with both strong claims about its potential and metaphors to illustrate these claims. The opening article of a 2011 special issue of the magazine Popular Science reads: “A new age is upon us: the age of data” (”Data Is Power,” 2011). On the magazine’s cover, the headline “Data Is Power” appears next to a Promethean hand bathed in light. In this and similar accounts, big data is suggested to signal the arrival of a new epistemological framework, a Kuhnian paradigm shift with the potential to displace established models of knowledge creation and do away with scientific tenets such as representative sampling and the notion of theory (Anderson, 2008; Mayer- Schönberger & Cukier, 2013; Weinberger, 2012).
    [Show full text]
  • Metaphors of the World Wide Web
    . Metaphors of the World Wide Web .......... ‘The Web … is limited only by mans’ imagination’ User 3: 249 Amy Hogan [email protected] www.amyhogan.com . Metaphors of the World Wide Web AMY LOUISE HOGAN A dissertation submitted for the degree of Bachelor of Science University of Bath Department of Psychology June 2002 COPYRIGHT Attention is drawn to the fact that copyright of this dissertation rests with its author. This copy of the dissertation has been supplied on condition that anyone who consults it is understood to recognise that its copyright rests with its author and that no quotation from the dissertation and no information derived from it may be published without the prior written consent of the author. Preface . Metaphors of the World Wide Web ACKNOWLEDGEMENTS The greatest thing by far is to be a master of metaphor. It is the one thing that cannot be learned from others; it is also a sign of genius, since a good metaphor implies an eye for resemblance. -Aristotle, De Poetica, 322 B.C. Many thanks are extended to my dissertation supervisor, Professor Helen Haste – a true master of metaphor. Thanks are also extended to Dr. Anne Beaulieu for her insightful comments when the research was in its early stages. Finally, thanks go to all the participants who found time to detangle themselves from the Web. Preface . Metaphors of the World Wide Web Abstract In just nine years since its debut, the ‘Web’ has generated a wide variety of metaphorical expressions. Metaphor, a powerful linguistic device, is used when users try to make sense of the Web’s foreign environment by describing the unfamiliar in terms of the familiar.
    [Show full text]
  • Share Information on Cyber Security Incidents
    © 2015 by Observer Research Foundation Digital Debates 2015: CyFy Journal Volume 2 Authors: Aaron Kleiner, Erin English, Gabi Siboni, Ankur Sarin, Kavitha Ranganathan, Kamlesh Bajaj, Rahul Jain, Fernando Crespo, Renato Flores, Karsten Geier, Jonah Force Hill, Patryk Pawlak, James Lewis, Parminder Jeet Singh, Yu-Chuang Kuek, Siddharth Verma, Sunil Abraham, Elonnai Hickok, Tarun Krishnakumar, Mahima Kaul, Samir Saran Editorial Team: Mahima Kaul, Anahita Mathai, Ritika Passi (ORF) Inside Design: Simi Jaison Designs Printed by: Vinset Advertising, Delhi Most of the papers IN thIS joURNal Were preseNted at CYFY 2014: The INDIA CONfereNce ON Cyber SecURIty AND INterNet GoverNANce, NeW DelhI, INDIA, October 14-16, 2014. Contents Editor’s Note Achieving Digital Proximity and Collective Voice............................................................................................................ 3 Samir Saran India and the Cyberworld 1. Today’s Decisions, Tomorrow’s Terrain: ........................................................................................................ 8 Strategic Directions for India in Shaping the Future of Cyberspace Erin English and Aaron Kleiner 2. Cyber Security: Build-up of India’s National Force ...................................................................................... 15 Gabi Siboni 3. A Case for Leapfrogging the Digital Divide ..................................................................................................... 23 Ankur Sarin and Kavitha Ranganathan 4. Data Security: Challenges
    [Show full text]
  • Marianne Van Den Boomen Trans Coding the Digital How Metaphors Matter in New Media
    MARIANNE VAN DEN BOOMEN TRANS CODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA A SERIES OF READERS PUBLISHED BY THE INSTITUTE OF NETWORK CULTURES ISSUE NO.: 14 MARIANNE VAN DEN BOOMEN TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA Theory on Demand #14 Transcoding the Digital: How Metaphors Matter in New Media Author: Marianne van den Boomen Editorial support: Miriam Rasch Design and DTP: Katja van Stiphout Publisher: Institute of Network Cultures, Amsterdam 2014 Printer: ‘Print on Demand’ First 200 copies printed at Drukkerij Steenman, Enkhuizen ISBN: 978-90-818575-7-4 Earlier and different versions of Chapter 2 has been published in 2008 as ‘Interfacing by Iconic Metaphors’, in Configurations 16 (1): 33-55, and in 2009 as ‘Interfacing by Material Metaphors: How Your Mailbox May Fool You’, in Digital Material: Tracing New Media in Everyday Life and Technology, edited by Marianne van den Boomen, Sybille Lammes, Ann-Sophie Lehmann, Joost Raessens, and Mirko Tobias Schäfer. Amsterdam: Amsterdam University Press, p. 253-266. An earlier and different version of Chapter 6 has been published in 2006 as ‘Transcoding Metaphors after the Mediatic Turn’, in SPIEL 25 (h.1): 47-58. Contact Institute of Network Cultures Phone: +31 20 5951865 Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services. For more information, and a freely downloadable PDF: http://networkcultures.org/publications This publication is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-SA 4.0). TRANSCODING THE DIGITAL 3 TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA De transcodering van het digitale Hoe metaforen ertoe doen in nieuwe media (met een samenvatting in het Nederlands) PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof.dr.
    [Show full text]
  • The State of Broadband 2020: Tackling Digital Inequalities a Decade for Action
    The State of Broadband: Tackling digital inequalities A decade for action September 2020 The State of Broadband 2020: Tackling digital inequalities A decade for action September 2020 © International Telecommunication Union and United Nations Educational, Scientific and Cultural Organization, 2020 Some rights reserved. This work is available under the Creative Commons Attribution- NonCommercial-ShareAlike 3.0 IGO license (CC BY-NC-SA 3.0 IGO; https:// creativecommons .org/ licenses/ by -nc -sa/ 3 .0/ igo). Under the terms of this license, you may copy, redistribute and adapt the work for non-commercial purposes, provided the work is appropriately cited, as indicated below. In any use of this work, there should be no suggestion that ITU or UNESCO endorses any specific organization, products or services. The unauthorized use of the ITU or UNESCO names or logos is not permitted. If you adapt the work, then you must license your work under the same or equivalent Creative Commons license. If you create a translation of this work, you should add the following disclaimer along with the suggested citation: “This translation was not created by the International Telecommunication Union (ITU) or the United Nations Educational, Scientific and Cultural Organization (UNESCO). Neither ITU nor UNESCO are responsible for the content or accuracy of this translation. The original English edition shall be the binding and authentic edition”. Any mediation relating to disputes arising under the license shall be conducted in accordance with the mediation rules of the World Intellectual Property Organization (http:// www .wipo .int/ amc/ en/ mediation/ rules). Suggested citation. State of Broadband Report 2020: Geneva: International Telecommunication Union and United Nations Educational, Scientific and Cultural Organization, 2020.
    [Show full text]
  • Sentiment Analysis for Twitter Users of America
    Sentiment Analysis for Twitter Users of America Karyofyllidis Karyofyllis SID: 3306150008 SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing -i- DECEMBER 2018 THESSALONIKI – GREECE Sentiment Analysis for Twitter Users of America Karyofyllidis Karyofyllis SID: 3306150008 Supervisor: Prof. Apostolos Papadopoulos Supervising Committee Members: Assoc. Prof. Name Surname Assist. Prof. Name Surname SCHOOL OF SCIENCE & TECHNOLOGY A thesis submitted for the degree of Master of Science (MSc) in Mobile and Web Computing -ii- DECEMBER 2018 THESSALONIKI – GREECE Abstract This dissertation was written as a part of the MSc in “Mobile and Web Computing” at the International Hellenic University, Thessaloniki, Greece. Nowadays, social media has noted as a type of online communication where people and organizations connect online to share information, thoughts and ideas. Because of its speed and reach, ease of use, social media influence various topics that range from the politics and environment to entertainment and the technology industry. Examples in- clude Facebook, Twitter, LinkedIn etc. An important part of our information-gathering behavior has always been to find out what other people think, thus as mentioned above with the growing availability and popularity of social Media, people now can make use of information technologies tech- niques to seek out and understand the opinions of others through their posts. Techniques like Data Mining, Machine Learning, Sentiment Analysis will be introduced for the purpose of this thesis to classify opinions into sentiment states. Sentiment is a plain concept, simple to understand. It’s just a feeling or emotion, an atti- tude or opinion.
    [Show full text]
  • Judicial Use of Metaphors for New Technologies
    “A ROSE BY ANY OTHER NAME”: JUDICIAL USE OF METAPHORS FOR NEW TECHNOLOGIES Stephanie A. Gore* It is now fairly established in cognitive science and linguistics that metaphors are an essential tool used to organize thought. It is human nature to reach for metaphors when trying to comprehend new concepts. Metaphors, however, may also selectively guide, or misguide, our cognitive processes. By emphasizing one aspect of a concept, a metaphor may blind us to other aspects that are inconsistent with the metaphor. The power of metaphor raises particular concerns in legal disputes wherein the resolution depends on comprehending new or developing technology. First, concerns have been raised regarding the judiciary’s ability to understand complex technology. Second, fear is a powerful barrier to learning, and fear of technology is a common phenomenon. Third, metaphors can be seductive, and may lead a person to end efforts to understand a new (perhaps daunting) concept too quickly. Finally, metaphors play a particularly powerful role in the law, since a court may inherit as precedent metaphors chosen by another court. All of this leads to the potential for the creation of precedents in which courts substitute poorly fitting metaphors for true comprehension of the technology at issue. This Article examines the use of metaphors by courts to comprehend new and developing technologies. It further examines the danger in the selection of definitional metaphors for new and changing technology, and how courts can avoid such dangers through recognition of both the limits of metaphors and the need to keep the metaphorical door open to information—and even * Assistant Professor of Law, Florida State University College of Law; J.D., University of Chicago Law School, 1994; M.S., Computer and Information Sciences, Georgia Institute of Technology, 1989; B.S., Computer Science, Stanford University, 1988.
    [Show full text]
  • Free Speech and the Internet
    University of Mary Washington Eagle Scholar Student Research Submissions Spring 5-2-2020 Free Speech and the Internet John Huebler Follow this and additional works at: https://scholar.umw.edu/student_research Part of the Philosophy Commons Recommended Citation Huebler, John, "Free Speech and the Internet" (2020). Student Research Submissions. 338. https://scholar.umw.edu/student_research/338 This Honors Project is brought to you for free and open access by Eagle Scholar. It has been accepted for inclusion in Student Research Submissions by an authorized administrator of Eagle Scholar. For more information, please contact [email protected]. Free Speech and the Internet Submitted in partial fulfillment of the requirements for Honors in Philosophy University of Mary Washington Fredericksburg, Virginia John Huebler Philosophy 485 April 24, 2020 Supervised by Professor Craig Vasey Huebler 2 Table of Contents – Free Speech and the Internet Part 1: The Marketplace of Ideas – A Framework on Free Speech ................................................ 3 I. Introduction ............................................................................................................................. 3 II. On Liberty .............................................................................................................................. 4 III. Hate Speech .......................................................................................................................... 6 IV. Misinformation ..................................................................................................................
    [Show full text]
  • ANNEX to ICANN BOARD SUBMISSION NO. 2010-08-05-01 Business Confidential and Proprietary
    ANNEX TO ICANN BOARD SUBMISSION NO. 2010-08-05-!" !"#$%&## ()%*$+&%,$-. -%+ /0)10$&,-02 3 4), 5)0 6$#,0$7",$)% 8",#$+& )* 9(:44 TITLE: Delegation of !"#$%. ("Falasteen") representing the Occupied Palestinian Territory in Arabic IANA REFERENCE: 319775 In accordance with ICANN’s obligations for managing the DNS root zone, IANA1 receives requests to delegate, redelegate and revoke top-level domains. This application has been compiled by IANA for presentation to the ICANN Board of Directors for review and appropriate action. Redacted 1 The term IANA is used throughout this document to refer to the department within ICANN that performed the IANA functions. Page 1 of 243 Redacted Page 2 of 243 Redacted Submitted by: Kim Davies Position: Manager, Root Zone Services Date Noted: 16 July 2010 Email and Phone Number [email protected]; +1 310 430 0455 Page 3 of 243 Separator Page 2010-08-05-01 Annex Palestine-enclosures Page 4 of 243 ENCLOSURE 1 TO ICANN BOARD SUBMISSION NO. 2010-08-05-!" Draft Public Report — Delegation of !"#$%. ("Falasteen") representing the Occupied Palestinian Territory in Arabic ICANN has received a request to delegate !"#$%. as a country-code top-level domain representing the Occupied Palestinian Territory. ICANN Staff have assessed the request, and provide this report for the ICANN Board of Directors to consider. FACTUAL INFORMATION Country The "PS" ISO 3166-1 code, from which this application's eligibility derives, is designated for use to represent the Occupied Palestinian Territory. String The domain under consideration for delegation at the DNS root level is “!"#$%”. This is represented in ASCII-compatible encoding according to the 2003 IDNA specification as “xn--ygbi2ammx”.
    [Show full text]