Verified, Tracked, and Visible: a History of The

Total Page:16

File Type:pdf, Size:1020Kb

Verified, Tracked, and Visible: a History of The VERIFIED, TRACKED, AND VISIBLE: A HISTORY OF THE CONFIGURATION OF THE INTERNET USER by CHRISTOPHER J. ST. LOUIS A THESIS Presen ed " #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n an! #e Grad'( e S$#""l "& #e Un)+ers) y "& Oreg"n )n -art)al &'%&)%%*en "& #e re.')remen s &"r #e !egree "& Master "& S$)en$e Sep ember 0123 THESIS APPROVAL PAGE S '!en : C#rist"-#er J. S . L"')s T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#)s #esis #as been ($$ep ed an! (--ro+ed )n -art)al &'%&)%%*en "& #e req')remen s &"r #e Master "& S$)en$e !egree )n #e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n by: Peter A%)%'nas C#()rperson B)swaru- Sen Member Tara F)$kle Member an! Sara D. H"!,es In eri* V)$e Pr"+"st an! Dean "& #e Gra!'( e S$#""l Or),)nal (--r"+al s),n( 'res are "n &)%e 5) # #e Un)+ers) y "& Oreg"n Grad'( e S$#""l. Degree (5arded Sep ember 0123. ii 6 0123 C#r)s "-#er J. S . L"')s SO/E RIGHTS RESERVED T#)s 5"r4 )s %)$ense! 'n!er ( Cre( )+e C"**"ns Attribution-ShareAlike 4.0 International License # -s:77$re( )+e$"**"ns."r,7%)$enses7by8s(79.17 iii THESIS ABSTRACT Chr)st"-#er J. S . L"')s Master "& S$)en$e S$#""l "& J"'rn(%)sm an! Co**'n)$( )"n Sep ember 0123 T) le: Ver)&)ed, Tracke!, an! V)sible: A H)st"ry "& #e C"n&),'rat)"n "& #e In ernet User T#e &),'re "& #e 'ser )s "& en "+erlo"ked )n In ernet #)st"r)es, 5#)$# &re.'en ly &"$'s "n %arger reat*en s "& )n&rastru$ 're, ,"+ernan$e, "r *(:"r $"n r)b' )"ns "& spec)&)$ )n!)+)!'als. T#)s #es)s $"nstru$ s a -#)%"so-#)$al an! )!e"%",)$al #)st"ry "& #e In ernet 'ser an! ex(*)nes #"5 #( &),'re #as $#an,ed #"',# #e ev"%' )"n "& #e In ernet. Beg)nn)n, 5) # #e <eb 0.1 -arad),* )n #e early 0111s, a ,ro5)n, st( e an! $"rp"rate )n erest )n #e In ernet -ro!'$e! substan )al $#an,es " #e stru$ 're an! %",)$ "& #e In ernet #( sa5 #e 'ser be)n, -%($ed )n$reas)n,ly ( #e -eri-#ery "& "n%)ne sp($e as #e "bjec "& st( e surveillan$e "r beh(+)"ral ra$4)n,. T#e #ree $ase st'!)es )n #)s #es)s )n+est),( e #e $"*b)n( )"n "& ec#n"%",)$al $"nstra)n s an! !)sc'rsi+e strateg)es 5#)$# #(+e ()!ed )n s#(-)n, #e $"n em-"rary 'ser &ro* ($ )+e ar$#) ec "& #e In ernet ) sel& " -assi+e, )!eal $"nsu*er "& -redeterm)ne! "n%)ne ex-erien$es. iv CURRICULUM VITAE NAME OF AUTHOR: C#rist"-#er J. S . L"')s GRADUATE AND UNDERGRADUATE SCHOOLS ATTENDED: Un)+ersi y "& Ore,"n, E',ene, OR Un)+ersi y "& T"ky", B'nky"84', T"ky", J(-an S"' #ern Oreg"n Un)+ersi y DEGREES A<ARDED: Master "& S$)en$e, Me!)a S '!)es, 0123, Un)+ers) y "& Oreg"n Master "& Arts an! S$)en$es, In&"rm( )"n S '!)es, 0129, Un)+ersi y "& T"ky" B($#el"r "& Arts, En,%)s#, 011=, S"' #ern Ore,"n Un)+ers) y AREAS OF SPECIAL INTEREST: In ernet S '!)es Med)a H)st"ries S$)en$e an! Te$#n"%",y S '!)es PROFESSIONAL EXPERIENCE: D()ly O-erat)"ns /an(,er, In+en 're In$., Jan. 012? " Sep . 012? Con en /an(,er, @A an! Cust"*er Care Lead, F"%)'* Partners In$., O$ . 0121 " A-r. 0120 v ACKNO<LEDG/ENTS I 5"'%! %)4e " #(n4 *y #es)s $"**) ee *e*bers Drs. B)s5(r'- Sen (n! T(r( F)$4%e &"r #e)r $"**en s (n! (!+)$e 5#en I 5(s )n #e -%(nn)n, (n! -r"-"s(% s (,es "& #)s -r":e$ , (n! es-e$)(%%y &"r #e)r !e ()%e! &ee!b($4 "5(r!s &' 're -"ss)b)%) )es &"r #)s 5"r4 ( #e !e&ense. I (* +ery ,r( e&'% " *y (!+)ser (n! $"**) ee $#()r, Dr. Pe er A%)%'n(s, &"r #e%-)n, " s eer *e #r"',# #)s 5#"%e -r":e$ : &"r ser+)n, (s ( s"'n!)n, b"(r! (s I r)e! "' ne5 )!e(s, &"r en$"'r(,)n, *e " s )$4 5) # #e ,""! )!e(s 5#en I #(! se$"n! #"',# s, (n! &"r 4ee-)n, *e "n r($4 5#en #e 5r) )n, -r"$ess #re( ene! " "+er5#e%*. vi T" He( #er (n! H(Ae%, 5#" $"n )n'(%%y re*)n!e! *e 5#y I 5(s !")n, #)s 5#en I #(! r"'b%e re*e*ber)n,. vii TABLE OF CONTENTS Ch(- er Pa,e I. INTRODUCTION: <HENCE THE INTERNET USERB.................................... 2 In ernet H)st"ries........................................................................................ 2 Tra$4)n, #e H)st"ry "& #e User................................................................. 0 Def)n)n, CUser”........................................................................................... ? Case S '!)es................................................................................................ E II. LITERATURE REVIE<................................................................................. = In ro!'$ )"n................................................................................................ = Creat)n, #e User........................................................................................ 21 In #e V)rt'al C"**'n) y........................................................................... 23 Co**"!)&y)n, #e User: <eb 0.1 an! #e Cal)&"rn)an Ideo%",y................. 02 <( $#)n, #e User: S'rvei%lan$e Cap) (%)sm an! #e Post8User In ernet....................................................................................... 0? Con$%'si"n.................................................................................................. 0F III. METHODOLOGY......................................................................................... G1 Rea!)n, In ernet H)st"ries.......................................................................... G1 <eb S"'rces an! Arc#)+al Problems........................................................... G2 D)sc"'rses "& #e User................................................................................. G? viii Ch(- er Pa,e IV. CASE STUDY I: THE USER IS VERIFIED—AUTHENTICATING LEGITIMATE USERS UNDER MICROSOFT <INDO<S XP......................... GF In ro!'$ )"n................................................................................................ GF T#e H)st"ry "& <)n!"5s Pro!'$ A$ )+( )"n............................................... 92 User Rea$ )"ns " Pro!'$ A$ )+( )"n.......................................................... 9F T#e Ban(%) y "& Ver)&)$( )"n........................................................................ ?0 Con$%'si"n.................................................................................................. ?F V. CASE STUDY II: THE USER IS TRACKED—ONLINE ADVERTISING AND ADBLOCK PLUS.................................................................................. E1 In ro!'$ )"n................................................................................................ E1 A Brief H)st"ry "& A!+ert)sin, On%)ne.......................................................... E9 T#e User )s A%5ays Trac4ed........................................................................ EF A!b%"$4)n, an! #e E*-"5ere! User......................................................... 3G T#e B( le "+er A!b%"$4)n,......................................................................... 3E A$$ep able A!s............................................................................................ 3= Ob%),( "ry A!s............................................................................................ F9 Con$%'si"n.................................................................................................. FF VI. CASE STUDY III: THE USER IS VISIBLE—THE KILTON PUBLIC LIBRARY AND THE TOR ANONYMITY NET<ORK.................................... =2 In ro!'$ )"n................................................................................................ =2 A Brief H)st"ry "& T"r.................................................................................. =0 T#e K)% "n Pub%)$ L)brary............................................................................ =E ix Ch(- er Pa,e Cri*)n(%)A)n, An"ny*) y............................................................................ 211 Con$%'si"n.................................................................................................. 213 VII. CONCLUSION............................................................................................ 21= One /"re E;(*-le..................................................................................... 21= Con$%'si"ns................................................................................................. 220 T#e"riA)n, #e User..................................................................................... 22G REFERENCES CITED........................................................................................ 22E x CHAPTER I INTRODUCTION: WHENCE THE INTERNET USER? Internet Histories Histories of the Internet—and of personal o!p"tin# in #eneral—tend to approa h their su$ject fro! one of t&o parti "lar an#les. The first is a fo "s pri!arily on the te hnolo#i al aspects: the proto ols, standards, and ph(si al ad*an es &hi h have enabled the easeless a eleration of information and o!!"ni ations te hnolo#( o*er the past +, (ears. The second an#le is $i$lio#raphi al, sit"atin# the te hnolo#i al &ithin the lifespan and ac o!plish!ents of an i!portant fi#"re in the su ess of the Internet' The $i$lio#raphi al &orks either restate kno&n i!portant ontri$"tions or attempt a sort of reclamation of the histori al re ord $( hitherto "nkno&n fi#"res; in either ase, they take on a ha#io#raphi note &hi h &rites the su$je t larger than life, representin# it as an absolutely indispensable agent &itho"t &ho! o!p"tin# today &o"ld not exist' So!e of the !ost ex ellent histories—Janet A$$ate’s Inventing the Internet and Steven 2ev(1s Hackers: Heroes of the Computer Revolution $ein# t&o examples—are a !i/ of the t&o approaches, $"t *ery rarely do #eneral histories have as their fo "s one of the !ost riti al o!ponents to the su ess of the Internet) perhaps even !ore so than all of the te hnolo#i al ad*an es: the fi#"re of the "ser. Users of the Internet) in the sense of *ario"s
Recommended publications
  • Satchel Paige
    Comprehension Skill Lessons Additional Objective: Understand author’s purpose Author’s Purpose Intervention/Remediation Author’s Purpose Materials Student Book pp. 150–151 Explain Write the following on the board and Explain Tell students that the author’s purpose read it aloud: Skiing is fun, but snowboarding is the reason he or she wrote a selection. To is the best winter sport. It may cost more than find the author’s purpose, make inferences some sports, but it’s worth it. You get speed and and analyze the text. An author might write to excitement. You can snowboard even if you can’t ski! persuade, to entertain, or to inform the reader. Go snowboarding. You won’t regret it! Discuss the passage and ask questions, such as Do you learn Model Read aloud “Women Pick up the Ball” on how to snowboard in this passage? Is this a story Student Book pages 150–151. Say, On page 150, about snowboarding? Then have students identify I began to think about why the author wrote this the author’s purpose for writing the passage. (to passage. At first, I thought it was a story. As I kept persuade the reader to try snowboarding) reading, I began finding information. I am getting information about how the girls’ league started. Practice Read this text aloud to students and have them listen for the purpose: Where I used Guided Practice Have students list three to live, the train ran by my house twice a day. At things they learned from the selection on pages five in the morning and five at night, a horrid blast 150–151.
    [Show full text]
  • Sense of Community and Political Mobilization in Virtual Communities: the Role of Dispositional and Situational Variables
    Butler University Digital Commons @ Butler University Scholarship and Professional Work - Communication College of Communication 2010 Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables Kevin Y. Wang Butler University, [email protected] Follow this and additional works at: https://digitalcommons.butler.edu/ccom_papers Part of the Communication Technology and New Media Commons, Social Influence and oliticalP Communication Commons, and the Social Media Commons Recommended Citation Wang, Kevin Y., "Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables" (2010). Scholarship and Professional Work - Communication. 115. https://digitalcommons.butler.edu/ccom_papers/115 This Article is brought to you for free and open access by the College of Communication at Digital Commons @ Butler University. It has been accepted for inclusion in Scholarship and Professional Work - Communication by an authorized administrator of Digital Commons @ Butler University. For more information, please contact [email protected]. Observatorio (OBS*) Journal, vol.4 - nº1 (2010), 073-096 1646-5954/ERC123483/2010 073 Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables Kevin Y. Wang, University of Minnesota – School of Journalism and Mass Communication Abstract This paper explores the psychological processes that connect virtual communities to political behavior.
    [Show full text]
  • The Portrayal of Hikikomori in Japanese Anime
    Social Problems through Contemporary Culture: The Portrayal of Hikikomori in Japanese Anime J. P. Tuinstra s1044796 July 15, 2016 Master thesis Asian Studies - Japan Faculty of Humanities Leiden University Word Count: 15.126 Supervisor: Prof. I. B. Smits Second Reader: Prof. K. N. Paramore ©Jeroen Tuinstra 2016 S1044796 Table of contents Introduction 3 Chapter 1: Explaining the hikikomori -phenomenon 6 How are Hikikomori commonly defined? 6 What are their numbers? 7 Causes of hikikomori 8 Sustaining the problem 11 A negative image 14 Development of social attention 15 Chapter 2: Hikikomori in Popular Culture 19 Hikikomori as side characters 19 Hikikomori as main characters 21 Portrayal of hikikomori in Welcome to the N.H.K! and No Game No Life 22 Causes 22 Continuing the hikikomori lifestyle 23 Manifestation 24 Escaping from hikikomori 25 Image 27 Criticism on Society 28 Summary 28 Chapter 3: The Relationship of Popular Culture and Society 30 Resonance of reality in anime 31 Fieldwork and the challenges of recovery 35 Japanese society, anime and their producers 37 Summary 41 Conclusion 42 Bibliography 45 Appendix: Summaries of Welcome to the N.H.K! and No Game No Life 48 Welcome to the N.H.K! 48 No Game No Life 50 2 S1044796 Introduction In recent years, Japanese society has witnessed the birth of several social problems. One of the main problems that the country, whose population of post-war baby-boomers is slowly reaching retirement age, is facing is a great decline in the birth rate. On top of that, many young people are unwilling or unable to reach the economical haven of permanent employment in a large company, and work as part-timers, also called freeters , or are jobless altogether.
    [Show full text]
  • Applying Library Values to Emerging Technology Decision-Making in the Age of Open Access, Maker Spaces, and the Ever-Changing Library
    ACRL Publications in Librarianship No. 72 Applying Library Values to Emerging Technology Decision-Making in the Age of Open Access, Maker Spaces, and the Ever-Changing Library Editors Peter D. Fernandez and Kelly Tilton Association of College and Research Libraries A division of the American Library Association Chicago, Illinois 2018 The paper used in this publication meets the minimum requirements of Ameri- can National Standard for Information Sciences–Permanence of Paper for Print- ed Library Materials, ANSI Z39.48-1992. ∞ Cataloging-in-Publication data is on file with the Library of Congress. Copyright ©2018 by the Association of College and Research Libraries. All rights reserved except those which may be granted by Sections 107 and 108 of the Copyright Revision Act of 1976. Printed in the United States of America. 22 21 20 19 18 5 4 3 2 1 Contents Contents Introduction .......................................................................................................ix Peter Fernandez, Head, LRE Liaison Programs, University of Tennessee Libraries Kelly Tilton, Information Literacy Instruction Librarian, University of Tennessee Libraries Part I Contemplating Library Values Chapter 1. ..........................................................................................................1 The New Technocracy: Positioning Librarianship’s Core Values in Relationship to Technology Is a Much Taller Order Than We Think John Buschman, Dean of University Libraries, Seton Hall University Chapter 2. ........................................................................................................27
    [Show full text]
  • Lexical Innovation on the Internet - Neologisms in Blogs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.
    [Show full text]
  • September 2, 2015 Dear Kilton Library Community, As Guardians Of
    September 2, 2015 Dear Kilton Library community, As guardians of knowledge and the freedom to read, librarians have long led the fight for free expression. In the Information Age —which has produced unprecedented access to information and mass surveillance— librarians are eager as ever to help their communities better understand and protect their privacy and intellectual freedom. Across the nation and around the globe, librarians are working with the Library Freedom Project (LFP) to make real the promise of intellectual freedom in the digital age. LFP, along with our partners the ACLU and the Tor Project, provides privacy trainings for library communities, teaching people their rights under the law, and how to find and use free and open source, privacy protective technologies. Thanks to generous funding from the Knight Foundation, LFP has over the past year run dozens of privacy workshops for libraries of all sizes across the United States. In a pilot project in the summer of 2015, the Kilton Library in Lebanon, New Hampshire, worked with LFP and the Tor Project to setup a Tor relay.1 Tor is a free, open network that helps people defend against mass surveillance by providing them anonymity online. While the Tor Project is responsible for maintaining the source code for Tor, the technology depends on thousands of volunteers who run "relays", or computer servers that support the Tor network. Libraries are ideal locations to host Tor relays because they are staunch supporters of intellectual freedom and privacy, and because they provide access to other essential internet services. The Kilton Library, with LFP's help, sought to become one among many such nodes in Tor's worldwide internet freedom system.
    [Show full text]
  • Lessons from the History of Internet Studies
    Allen, M. 2020. Lessons from the History of Internet Studies. Cultural Science Journal, 12(1), pp. 68–76. DOI: cultural science https://doi.org/10.5334/csci.139 RESEARCH Lessons from the History of Internet Studies Matthew Allen Institute for Social Change, University of Tasmania, AU [email protected] A Keynote Presentation given at the Open Literacy Digital Games, Social Responsibility and Social Innovation Symposium in celebration of the 20-year anniversary of the founding of Internet Studies at Curtin University. Matthew is Australia’s first Professor of Internet Studies, having established the world-leading Internet Studies department at Curtin University where he worked from 1993 to 2012. Keywords: Internet Studies; Open Literacy; Institutional Change Matthew Allen was invited to give a Keynote Presentation given at the Open Literacy Digital Games, Social Responsibility and Social Innovation Symposium. Matthew is Australia’s first Professor of Internet Studies, hav- ing established the world-leading Internet Studies department at Curtin University where he worked from 1993 to 2012. He then took up the role of Head of School, Communication and Creative Arts at Deakin University (2013–2019). Matthew is former president of the Association of Internet Researchers, and co-editor of the pres- tigious Handbook of Internet Research, now in its second edition. Matthew is also a nationally awarded educa- tor (AAUT, 2000) and Fellow of the Australian Learning and Teaching Council. His research covers topics includ- ing the history of the Internet, drug use and online communication, Australia’s development of broadband usage, and online learning and education. He joined the University of Tasmania’s Institute for Social Change at the start of 2020 and is currently researching the uses of Internet technologies during the COVID-19 pandemic and the response of students to enforced online learning.
    [Show full text]
  • The Digital Divide: the Internet and Social Inequality in International Perspective
    http://www.diva-portal.org This is the published version of a chapter published in The Digital Divide: The Internet and Social Inequality in International Perspective. Citation for the original published chapter: Meinrath, S., Losey, J., Lennett, B. (2013) Afterword. Internet Freedom, Nuanced Digital Divide, and the Internet Craftsman. In: Massimo Ragnedda and Glenn W. Muschert (ed.), The Digital Divide: The Internet and Social Inequality in International Perspective (pp. 309-316). London: Routledge Routledge advances in sociology N.B. When citing this work, cite the original published chapter. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-100423 The Digital Divide This book provides an in-depth comparative analysis of inequality and the stratification of the digital sphere. Grounded in classical sociological theories of inequality, as well as empirical evidence, this book defines “the digital divide” as the unequal access and utility of internet communications technologies and explores how it has the potential to replicate existing social inequalities, as well as create new forms of stratification. The Digital Divide examines how various demographic and socio-economic factors including income, education, age and gender, as well as infrastructure, products and services affect how the internet is used and accessed. Comprised of six parts, the first section examines theories of the digital divide, and then looks in turn at: • Highly developed nations and regions (including the USA, the EU and Japan); • Emerging large powers (Brazil, Russia, India, China); • Eastern European countries (Estonia, Romania, Serbia); • Arab and Middle Eastern nations (Egypt, Iran, Israel); • Under-studied areas (East and Central Asia, Latin America, and sub-Saharan Africa).
    [Show full text]
  • Internet Research in Psychology
    PS66CH33-Gosling ARI 19 November 2014 13:50 Internet Research in Psychology Samuel D. Gosling1 and Winter Mason2 1Department of Psychology, University of Texas, Austin, Texas 78712; email: [email protected] 2Stevens Institute of Technology, Hoboken, New Jersey 07030; email: [email protected] Annu. Rev. Psychol. 2015. 66:877–902 Keywords First published online as a Review in Advance on Internet research, online research September 22, 2014 The Annual Review of Psychology is online at Abstract psych.annualreviews.org Today the Internet plays a role in the lives of nearly 40% of the world’s pop- This article’s doi: ulation, and it is becoming increasingly entwined in daily life. This growing 10.1146/annurev-psych-010814-015321 Annu. Rev. Psychol. 2015.66:877-902. Downloaded from www.annualreviews.org presence is transforming psychological science in terms of the topics studied Access provided by University of British Columbia on 01/01/21. For personal use only. Copyright c 2015 by Annual Reviews. and the methods used. We provide an overview of the literature, consid- All rights reserved ering three broad domains of research: translational (implementing tradi- tional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.
    [Show full text]
  • Digital Citizenship Education
    Internet Research Ethics: Digital Citizenship Education Internet Research Ethics: Digital Citizenship Education by Tohid Moradi Sheykhjan Ph.D. Scholar in Education University of Kerala Paper Presented at Seminar on New Perspectives in Research Organized by Department of Education, University of Kerala Venue Seminar Hall, Department of Education, University of Kerala, Thycaud, Thiruvananthapuram, Kerala, India 17th - 18th November, 2017 0 Internet Research Ethics: Digital Citizenship Education Internet Research Ethics: Digital Citizenship Education Tohid Moradi Sheykhjan PhD. Scholar in Education, University of Kerala Email: [email protected] Abstract Our goal for this paper discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in relation to its application for educating digital citizens. In recent years we have witnessed a revolution in Information and Communication Technologies (ICTs) that has transformed every field of knowledge. Education has not remained detached from this revolution. Ethical questions in relation to technology encompass a wide range of topics, including privacy, neutrality, the digital divide, cybercrime, and transparency. In a growing digital society, digital citizens recognize and value the rights, responsibilities and opportunities of living, learning and working in an interconnected digital world, and they engage in safe, legal and ethical behaviors. Too often we see technology users misuse and abuse technology because they are unaware of
    [Show full text]
  • Guidelines for Internet Research with Human Subjects
    Liberty University Institutional Review Board Guidelines for Internet Research with Human Subjects The Internet has become increasingly prominent as a research tool although specific regulations for Internet research compliance are currently only in their early developmental stages. In the absence of rules and policies, researchers and IRBs must use their sense of ethical empathy to adequately protect the rights and welfare of human subjects to guide research design and execution. Information provided by the Internet usually includes, but is not limited to, email, websites and bulletin boards. Generally, Internet-based research should be subject to the same ethical principles as more traditional research with human subjects. Beneficence, justice and respect for persons are paramount. Internet researchers have moral obligations to respect and protect human beings as autonomous agents and thereby to protect human dignity (Ess, 2002). Briefly, Internet researchers must: Do no harm, Protect the anonymity of subjects, Protect the confidentiality of all research data tied to the identity of subjects, Obtain informed consent from subjects. Public or Private Space? The Internet is generally considered a public domain, easily accessible to anyone, yet many Internet community members regard their online interactions to be private conversations embedded in public space. Researchers must be sensitive to the issue that whether a space is public or private is relative to the definitions of those who occupy it (Cavanagh, 1999) and be aware of the implications resulting for the informed consent process. Psychological harm can result when members are unaware that they are being analyzed and when the results of the study are published in a way that allows the participants to identify themselves and their community.
    [Show full text]
  • A Multi-Dimensional Study of the Emotion in Current Japanese Popular Music
    Acoust. Sci. & Tech. 34, 3 (2013) #2013 The Acoustical Society of Japan PAPER A multi-dimensional study of the emotion in current Japanese popular music Ryo Yonedaà and Masashi Yamada Graduate School of Engineering, Kanazawa Institute of Technology, 7–1 Ohgigaoka, Nonoich, 921–8501 Japan ( Received 22 March 2012, Accepted for publication 5 September 2012 ) Abstract: Musical psychologists illustrated musical emotion with various numbers of dimensions ranging from two to eight. Most of them concentrated on classical music. Only a few researchers studied emotion in popular music, but the number of pieces they used was very small. In the present study, perceptual experiments were conducted using large sets of popular pieces. In Experiment 1, ten listeners rated musical emotion for 50 J-POP pieces using 17 SD scales. The results of factor analysis showed that the emotional space was constructed by three factors, ‘‘evaluation,’’ ‘‘potency’’ and ‘‘activity.’’ In Experiment 2, three musicians and eight non-musicians rated musical emotion for 169 popular pieces. The set of pieces included not only J-POP tunes but also Enka and western popular tunes. The listeners also rated the suitability for several listening situations. The results of factor analysis showed that the emotional space for the 169 pieces was spanned by the three factors, ‘‘evaluation,’’ ‘‘potency’’ and ‘‘activity,’’ again. The results of multiple-regression analyses suggested that the listeners like to listen to a ‘‘beautiful’’ tune with their lovers and a ‘‘powerful’’ and ‘‘active’’ tune in a situation where people were around them. Keywords: Musical emotion, Popular music, J-POP, Semantic differential method, Factor analysis PACS number: 43.75.Cd [doi:10.1250/ast.34.166] ‘‘activity’’ [3].
    [Show full text]