The African Challenge: Internet, Networking and Connectivity

Total Page:16

File Type:pdf, Size:1020Kb

The African Challenge: Internet, Networking and Connectivity ThirdWorld Quarterly, Vol 18, No 5, pp 883± 898, 1997 TheAfrican challenge: internet, networkingand connectivity activities ina developingenvironment OLIVIERCOEUR DEROY LeMonde s’ est trouve Âouverta Átoutela race humaine ViveÂs,1531 Theaim of this article is tohighlight the importance of electronic communi- cationnetworks such as theinternet in helping the development processes initiatedseveral decades ago in Africa. First, I describebrie¯ y thenetworking environmentin Africa, the technologies, the networking systems andinitiatives. Next,I undertakea cogitationon the development of these networks in Africa anddescribe the obstacles to their expansion and challenges to theirdevelopment inthe current African environment. Why is theinternet useful for the African continent?Are there other priorities? Can electronic communication networks be developmenttools? Are they useful for the African continent? Are there other priorities?My answers andthe presentation of several initiatives and network projectsshed light on the vital and desperate need for such information and communicationtechnologies in theacademic, development and research sectors, thereforefor all of African society. Theinternet might be seen bysome typesof peoplein developedcountries as apasttime,a game,an entertainment, a newmultimedia medium providing nice graphicsand images. Its needand value are notfully understood in a society `stuffed’with information. Information, information technologies and data net- workshave a fundamentalrole in the development of our societal and cultural environments.Their role is betterunderstood in the context of developing countries.The internet and other communication networks are actualdevelop- menttools, as importantas educational,agricultural and training programmes. The Africanmatrix TheAfrican continent has theleast developed telecommunication network in the world.The International Telecommunication Union ( ITU)indicatesfor the Africancontinent in 1994a teledensity 1 of1.6 (45 in Europe)and 1.2 outside the largeurban centres. These numbers are muchlower in sub-Saharan Africa (SouthAfrica is theexception) where the number of telephonesis lowerthan in Olivier Coeurde Royis ate-mail , [email protected] . 0143-6597/97/050883-16$7.00 Ó 1997Third World Quarterly 883 OLIVIER COEUR DEROY Manhattan.The telecommunications infrastructure is insuf®cient, not well adaptedto theneed of theAfrican environment and unequally distributed on the continent.Equipment is concentratedin urban zones and not rural zones where mostof the population’ s livesare forgotten.The following paragraphs describe thecurrent status of the development of electroniccommunication networks. The term`matrix’ refers tothe set ofall networks, the internet as wellas other networkssuch as BitNet,FidoNet and Unix to Unix Copy ( UUCP). Table 1 presentsthe four main types of networking connectivity in Africa. Themost recent survey shows that 40 African countries have full connection tothe internet. 2 Thesecountries are mainlylocated in the north and west of the continentand South Africa. A fullinternet connection means thatusers cantake advantageof networking services suchas email,conferences, newsgroups, distributionlists, remote log-in, File Transfer Protocol, ( FTP)gopher,Wide Area InformationServers ( WAIS)andthe Web. Other countries are alsoconnected to othernetworks such as BitNet,FidoNet and UUCP withwhich an internet connectionis possible. TheBitNet network offers threebasic communication tools: messages, ftpand electronicmail. The electronic bulletin board can be used interactively. BitNet isconnectedto othernetworks such as theinternet. In Africa, Egypt and Burundi are theonly countries connected to BitNet. TheFidoNet network was establishedin 1984 to support electronic mail and thenewsgroup service between different Bulletin Board System ( BBS), with an attractiveprice. More than 25 000computers are connectedto the FidoNet network.FidoNet uses thetraditional telephone network as acommunication toolbetween computers equipped with networks. FidoNet Systems are batch- basedstore and forward technology widely used in Africa because they offer a low-costnetworking platform optimised for use onlow-quality phone lines. Fidonetsystems are notinternet-upgradeab le,but are connectedto the internet and to the UUCP Network.In Africa FidoNet is mainlyused by NGOs. Table 1 showsthat FidoNet is availablein Eritrea and Rwanda. UUCP isaset ofprotocolsdeveloped to copy® les betweenUnix systems, using phonelines and modems. UUCP was initiallydeveloped for Unix systems and alsoperforms on other operating systems. UUCP is abatch-basedsystem, only suitablefor low-volume data transmission. UUCP canrun over different networks (packetswitching, X.25 lines, leased line). Indirect connections to the internet are possiblevia a computerconnected to theinternet and transmission via a UUCP call. UUCP is widelyused in Africa because the system makes possiblean easy transitiontowards the TCP/IP protocol,3 whichprovides a directconnection to the internet.In other words, UUCP systems are TCP/IP compatibleand internet upgradeable.The UUCP technologyis welladapted to the African communica- tionsinfrastructure. The UUCP networkis ableto work with the simplest equipment,with bad telephone lines and on different types of networks. The mainnetworks that use thistechnology are RIO inFrancophone Africa and UNINET-ZA insouthern Africa. Thedifferences between the types of services offeredby the FidoNet and UUCP networksand by the internet are explainedby the lack of interactivity,the unavailabilityof telnet and rlog-in applications that allow users towork on 884 INTERNET ACTIVITIES INADEVELOPING ENVIRONMENT TABLE 1 Networkingconnectivity in Africa Release:97.09.04, last-modi® ed: 1997/ 09/19 Code Country Connection Comments AOAngola (Republic of) FI BFBurkina Faso FI BJ Benin FI BW Botswana FI CFCentral African Republic FI FI CICoÃte’Ivoire FImeans Full internet CM Cameroon FIConnection DJ Djibouti FIThis includes remote DZ Algeria FIapplications such as telnet, ftp EG Egypt FIBand internet E-mail ET Ethiopia FI GH Ghana FI PFI KE Kenya FIstands fora provisional LS Lesotho FIfull internet connection MA Morocco FIThis is used when one or more MGMadagascar FIof the following is true: ML Mali FIaddress not veri® ed MRMauritania FIor lack of address NA Namibia FInet connection possible but NE Niger FInot of® cially announced NG Nigeria FIpremature of® cial SN Senegal FIannouncement of connection SZSwaziland FI TN Tunisia FI TZ Tanzania FI B UG Uganda FIstands forBitNet connection ZASouth Africa FI ZM Zambiaa FI ZW Zimbabwe FI TG Togo FI GQEquatorial Guinea FI GWGuinea Bissau FI GA Gabon FI SD Sudan FI BI Burundi FI-B CDDemocratic Republic of Congo (Zaire) b PFI GN Guinea PFI CG Congo PFI MW Malawi FFidoNet Network Connection RW Rwandac FIt is assumed that the connection ER Eritrea F is stable and reliable SLSierra Leone U UUCPConnection TD Chad UThe country is reachable GM Gambia U by e-mail SO Somalia 0 LY Libya 0No connection LR Liberia 0 FI 5 Full internet connection, including remote applications such as telnet, ftp and internet email. PFI 5 Provisional full internet connection. This is used when one or more of the following is true: address not veri® ed or lack of address; net connection possible but not of® cially announced; premature of® cial announcement of connection. B 5 BitNet connection. F 5 FidoNet connection. Itis assumed that the network is stable and reliable. U 5 UUCPconnection. The country is reachable by email. 0 5 Noconnection. aIntermittent; bUnstable Connectivity; cCurrently Cut. Source: Compiled fromdata obtained on the internet, on the World Wide Web Site developed by Olivier Crepin-Leblond, `International e-mail accessibility’ ,available at: http://www.ee.ic.ac.uic/misc/country-codes.html. 885 OLIVIER COEUR DEROY remotecomputers and by thelack of internetservices suchas WAIS,FileTransfer Protocol FTP andthe World Wide Web ( WWW)inan interactive mode. 4 Resources offeredby the electronic mail in batch mode are nevertheless important.They allow participation in forums,discussion lists, the WAIS database and FTP,documentand computer programs research viaArchie and Trickel servers, access toinformation available on the WWW viaelectronic mail, searchingfor electronic directories such as WHOIS andX500 and the reading of newsand articles available on UseNet. Compared to the costs ofvoice and fax telecommunications,electronic mail is theonly type of technology that Africa canafford for international communications. Whenthe main objective is toget new data which Africa has lackedfor severalyears, these networks are, in the short term, an excellent basis for trainingusers whowill know in the future the conviviality and ef® ciencyof full directinternet connections. The maincommunication networks in Africa Themain networking projects being developed or in working condition on the Africancontinent have chie¯ y beencreated by non-governmental agencies and are mainlyresearch± education networks. The following section brie¯ y presents themain communications networks in Africa. GreenNet GreenNetis thenetwork of a nongovernmentalorganisation ( NGO) member of theAlliance for Global Communication ( APC).Thenetwork is basedon Fidonet technology.The Fido Gateway of GreeNet (GnFido), with the `store and forward’technology allows access tobasic services ofthe internet (email). GreenNetworks conjointly with other networks helping the development of local initiativeslike HealthNet and SDN participatein
Recommended publications
  • Flashback As a Rhetorical Online Battleground
    http://www.diva-portal.org This is the published version of a paper published in Social Media + Society. Citation for the original published paper (version of record): Blomberg, H., Stier, J. (2019) Flashback as a rhetorical online battleground: Debating the (dis)guise of the Nordic Resistance Movement Social Media + Society https://doi.org/10.1177/2056305118823336 Access to the published version may require subscription. N.B. When citing this work, cite the original published paper. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:du-29134 SMSXXX10.1177/2056305118823336Social Media <span class="symbol" cstyle="Mathematical">+</span> SocietyBlomberg and Stier 823336research-article20192019 Article Social Media + Society January-March 2019: 1 –10 Flashback as a Rhetorical Online © The Author(s) 2019 Article reuse guidelines: sagepub.com/journals-permissions Battleground: Debating the (Dis)guise DOI:https://doi.org/10.1177/2056305118823336 10.1177/2056305118823336 of the Nordic Resistance Movement journals.sagepub.com/home/sms Helena Blomberg1 and Jonas Stier2 Abstract The right-wing Swedish Nordic Resistance Movement (NRM) is increasingly active on social media. Using discursive psychology, this text explores the rhetorical organization of text and rhetorical resources used on the Swedish online forum Flashback. The aim is to reveal and problematize truth claims about NRM made by antagonists and protagonists. Questions are (1) how and what do NRM antagonists and protagonists convey in Flashback posts about NRM, and its ideology and members? (2) how do NRM antagonists and protagonists make truth claims about NRM in Flashback posts? The empirical material consisting of 1546 Flashback posts analyzed to identify typical discussions on “NMR’s true nature”; accomplished social actions stemming from the posts.
    [Show full text]
  • Mapping Networks and Services Proc
    Mapping Networks and Services Proc. INET ´93 J.S. Quarterman Mapping Networks and Services John S. Quarterman1 Smoot Carl-Mitchell2 Gretchen Phillips3 Abstract I . Introduction Four global networks carry most of the Computer networking is widespread, supported by international network traffic; FidoNet, UUCP, the global Matrix of interconnected computer BITNET, and the Internet. The first step in networks such as the Internet, BITNET, UUCP, looking at these networks involves collecting and FidoNet. Perhaps 20,000,000 people use this appropriate data for each and performing some global Matrix of computer networks, and several consistency checking. The data for these maps major global computer networks are growing was initially derived from their node lists exponentially, rapidly reaching new countries and (BITNET and FidoNet) or host lists (UUCP). The new classes of users. This growth prompts Internet data came from a domain walk by Mark network users and service providers to ask Lottor. questions like: The data available from the node lists, public d Where are these users? maps and the domain walk is not in a format that d What is the magnitude of the various network is readily usable for this type of mapping. Each communities? map or other source of network information tends d What are the available services? to include different details. We have correlated the d How are services distributed? data by using telephone country codes, area codes d And, finally, how can this data be represented and local exchanges for determining locations. A in a meaningful graphical way? more complete discussion of the methods is We have chosen Latin America and the Caribbean available in issues of Matrix News[5-7] (ALyC) as the geographic region for discussing these issues and demonstrating the mapping of II .
    [Show full text]
  • Monitoring of Online Offenders by Researchers
    SGOC STUDYING GROUP ON ORGANISED CRIME https://sgocnet.org Sifting through the Net: Monitoring of Online Offenders by Researchers Research note Sifting through the Net: Monitoring of Online Offenders by Researchers David Décary-Hétu and Judith Aldridge* Abstract: Criminologists have traditionally used official records, interviews, surveys, and observation to gather data on offenders. Over the past two decades, more and more illegal activities have been conducted on or facilitated by the Internet. This shift towards the virtual is important for criminologists as traces of offenders’ activities can be accessed and monitored, given the right tools and techniques. This paper will discuss three techniques that can be used by criminologists looking to gather data on offenders who operate online: 1) mirroring, which takes a static image of an online resource like websites or forums; 2) monitoring, which involves an on- going observation of static and dynamic resources like websites and forums but also online marketplaces and chat rooms and; 3) leaks, which involve downloading of data placed online by offenders or left by them unwittingly. This paper will focus on how these tools can be developed by social scientists, drawing in part on our experience developing a tool to monitor online drug “cryptomarkets” like Silk Road and its successors. Special attention will be given to the challenges that researchers may face when developing their own custom tool, as well as the ethical considerations that arise from the automatic collection of data online. Keywords: Cybercrime – Internet research methods – Crawler – Cryptomarkets avid e cary- e tu is Assistant Professor at the School of Criminology, University of Montreal, and Researcher at the International Centre of Comparative Criminology (ICCC).
    [Show full text]
  • 3.3.5.Haulath.Pdf
    CONTENTS SL. PAGE NO. ARTICLE NO 1 DATA PRE-PROCESSING FOR EFFECTIVE INTRUSION DETECTION RIYAD AM 5 2. AN ENHANCED AUTHENTICATION SYSTEM USING MULTIMODAL BIOMETRICS MOHAMED BASHEER. K.P DR.T. ABDUL RAZAK 9 6. GRADIENT FEATURE EXTRACTION USING FOR MALAYALAM PALM LEAF DOCUMENT IMAGEGEENA K.P 19 7. INTERNET ADDICTION JESNA K 23 8. VANETS AND ITS APPLICATION: PRESENT AND FUTURE.JISHA K 26 9. DISTRIBUTED OPERATING SYSTEM AND AMOEBAKHAIRUNNISA K 30 5. INDIVIDUAL SOCIAL MEDIA USAGE POLICY: ORGANIZATION INFORMATION SECURITY THROUGH DATA MINING REJEESH.E1, MOHAMED JAMSHAD K2, ANUPAMA M3 34 3. APPLICATION OF DATA MINING TECHNIQUES ON NETWORK SECURITY O.JAMSHEELA 38 4. SECURITY PRIVACY AND TRUST IN SOCIAL MEDIAMS HAULATH K 43 10. SECURITY AND PRIVACY ISSUES AND SOLUTIONS FOR WIRELESS SYSTEM NETWORKS (WSN) AND RFID RESHMA M SHABEER THIRUVAKALATHIL 45 11. ARTIFICIAL INTELLIGENCE IN CYBER DEFENSESHAMEE AKTHAR. K. ASKARALI. K.T 51 SECURITY PRIVACY AND TRUST IN SOCIAL MEDIA Haulath K, Assistant professor, Department of Computer Science, EMEA College, Kondotty. [email protected] Abstract— Channels social interactions using 2. Social Blogs extremely accessible and scalable publishing A blog (a truncation of the expression weblog) is a methods over the internet. Connecting individuals, discussion or informational site published on communities, organization. Exchange of idea Sharing the World Wide Web consisting of discrete entries message and collaboration through security privacy (“posts”) typically displayed in reverse chronological and trust. order (the most recent post appears first). Until 2009, Classification of Social Media blogs were usually the work of a single individual, occasionally of a small group, and often covered a 1.
    [Show full text]
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • How Special Librarians Really Use the Internet: Summary of Findings and Implications for the Library of the Future
    DOCUILIff RESUME ED 345 751 IR 054 097 AUTHOR Ladner, Sharyn J.; Tillman, Hope N. TITLE How Special Librarians Really Use the Internet: Summary of Findings and Implications for the Library of the Future. PUB DATE 29 Nar 92 NOTE 12p.; "This report was posted on March 29, 1992, to nine computer conferences where call for participation announcements had been posted in the summer of 1991: BUSLIB-L, LIBREF-L, LIfflES, NEDLIB-L, PACS-L, LAW-LIB, LIBADMIN, MAPS-L, and PANnet." AVAILABLE FROM Internet, through anonymous file transfer protocol (ftp), using the following location (hydra.uwo.ca), directory (LibSoft), and filename (SPEC underscore Libs.txt). PUB TYPE Reports - Research/Technical (143) EDRS PRICE NF01/PC01 Plus Postage. DESCRIPTORS Access to Information; *Computer Networks; Databases; *Electronic Rail; Electronic Publishing; Information Networks; *Librarians; Library Surveys; Online Searching; Online Systems; *Special Libraries; Telecommunications; Teleconferencing; User Needs (Information); *Use Studies IDENTIFIERS BITNET; *INTERNET ABSTRACT A five-page electronic questionnaire was sent to 113 special librarians who responded to "Call for Participation" announcements posted on nine computer conferences in July 1991 and a similar announcement in the August 1991 issue of the monthly newsletter of the Special Libraries Association. Fifty-four librarians completed the questionnaire, which sought information on the computer conferences to which they subscribed; the length of time they had been using either BITNET or the Internet; and the type of training they had had in using either of the two networks. In addition, the respondents were asked to rank five functions or capabilities available on either BITNET or Internet--electronic mail and computer forums, remote database searching, file transiur and data exchange, research and publication on the Internet--by extent of use.
    [Show full text]
  • The Future of the Internet and How to Stop It the Harvard Community Has
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]
  • The Internet Is a Semicommons
    GRIMMELMANN_10_04_29_APPROVED_PAGINATED 4/29/2010 11:26 PM THE INTERNET IS A SEMICOMMONS James Grimmelmann* I. INTRODUCTION As my contribution to this Symposium on David Post’s In Search of Jefferson’s Moose1 and Jonathan Zittrain’s The Future of the Internet,2 I’d like to take up a question with which both books are obsessed: what makes the Internet work? Post’s answer is that the Internet is uniquely Jeffersonian; it embodies a civic ideal of bottom-up democracy3 and an intellectual ideal of generous curiosity.4 Zittrain’s answer is that the Internet is uniquely generative; it enables its users to experiment with new uses and then share their innovations with each other.5 Both books tell a story about how the combination of individual freedom and a cooperative ethos have driven the Internet’s astonishing growth. In that spirit, I’d like to suggest a third reason that the Internet works: it gets the property boundaries right. Specifically, I see the Internet as a particularly striking example of what property theorist Henry Smith has named a semicommons.6 It mixes private property in individual computers and network links with a commons in the communications that flow * Associate Professor, New York Law School. My thanks for their comments to Jack Balkin, Shyam Balganesh, Aislinn Black, Anne Chen, Matt Haughey, Amy Kapczynski, David Krinsky, Jonathon Penney, Chris Riley, Henry Smith, Jessamyn West, and Steven Wu. I presented earlier versions of this essay at the Commons Theory Workshop for Young Scholars (Max Planck Institute for the Study of Collective Goods), the 2007 IP Scholars conference, the 2007 Telecommunications Policy Research Conference, and the December 2009 Symposium at Fordham Law School on David Post’s and Jonathan Zittrain’s books.
    [Show full text]
  • THE SIGNIFICANCE of AVATARS for INTERNET FORUMS USERS Mikail PUŞKİN1
    Cilt: 4/Sayı: 6 Temmuz İMGELEM ISSN: 2602- 4446 2020 THE SIGNIFICANCE OF AVATARS FOR INTERNET FORUMS USERS Mikail PUŞKİN1 ABSTRACT The questions of virtual representation and online identity are growing in salience for academicians ever since the inception of the Internet. Although the main flow of public online interaction and research into it have shifted towards social networks such as Facebook, Twitter and Instagram, or audio-visual environments of digital games, online forums still occupy a sizable niche for thematic and more professional or hobby-oriented communication. Current paper is analyzing one of the main visual elements used to create identity of forum users, the avatars: small (usually static) images that users choose to represent their virtual selves with. The focus of this research is on the degree of attachment and the kinds of meanings that users attribute to their avatars in online forums’ asynchronous interactive environments. This research applies grounded theory approach and relies heavily on triangulation of data collection and coding. The implemented sampling strategies are typical case sampling on the forums selection level, criterion sampling on the respondents’ replies level and subsequent diversity case sampling as means of collected data reduction. Coding procedures are applied consecutively as follows: open coding, selective coding, theoretical coding, resulting in 29 sets of data produced from 75 pages of raw data. The main findings suggest that key factor determining users’ attitude towards their avatars is the forum thematic. As a result, although overall attitude patterns diversity is rather high, such patterns are consistent and stable within the specific microcosms of individual forums.
    [Show full text]
  • Copyrighted Material
    Index AAAS (American Association for adolescence Mali; Mauritania; the Advancement of Science), identity development among, Mozambique; Namibia; 91 306 Nigeria; Rwanda; Senegal; Aakhus, M., 178 identity practices of boys, 353 South Africa; Tanzania; Aarseth, Espen, 292n revelation of personal Uganda; Zambia abbreviations, 118, 120, 121, 126, information by, 463 African-Americans, 387 127, 133, 134 psychological framework of, 462 identity practices of adolescent ABC (American Broadcasting advertising, 156, 329, 354, 400, boys, 353 Company), 413, 416 415, 416, 420–1 political discussion, 174 ABC (Australian Broadcasting banner, 425 African Global Information Commission), 420 elaborate and sophisticated, 409 Infrastructure Gateway Aboriginal people, 251, 253, porn, 428 Project, see Leland 257–8, 262, 263 revenues, 417, 418, 419, 435 age, 280, 431, 432 abusive imageries, 431 Advertising Age, 417 porn images, 433 accessibility, 13, 50–1, 53, 424 aesthetics, 391, 425, 428, 430, agency, 44, 53, 55, 62, 312 balancing security and, 278 434 conditioned and dominated by control of, 388 alternative, 427 profit, 428 increasing, 223 digital, 407 technologically enhanced, 195 limited, 26 familiar, 435 AHA (American Historical private, 94 games designer, 75 Association), 86 public, 94, 95 play and, 373 Ahmed, Sara, 286–7, 288 see also Internet access promotional, 409 AILLA (Archive of the Indigenous accountability, 151, 191, 199, Afghanistan, 205 Languages of Latin America), 207, 273, 276, 277 AFHCAN (Alaska Federal 263 balancing privacy and, 278 Healthcare
    [Show full text]