Final Exam Flashcards

1
Q

Digital Divide

A

The gulf between those who have ready access to computers and the Internet, and those who do not. • We have discussed Facebooks attempt to bridge the digital divide through solar-powered unmanned aircraft and Google attempt to bridge the digital divide through Project Loon (the hot air balloons).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cute Cat Theory

A

Most internet users use the internet and social media tools for harmless activities, like looking at pictures of kittens online. However, an open social media site is open to political content as well as pictures of kittens. Repressive governments might attempt to block this political content by blocking access to, say, all Twitter, but in doing so they also block people from looking at non-political content, like pictures of cute kittens. When the government blocks DailyMotion, it impacts a much wider swath of Tunisians than those who are politically active. Cute cats are collateral damage when governments block sites. And even those who could care less about presidential shenanigans are made aware that their government fears online speech so much that they’re willing to censor the millions of banal videos on DailyMotion to block a few political ones. We have discussed the implications of the Cute Cat Theory in the Arab Springs. These governments may have underestimated the power of Twitter and Facebook because people used them often to share pictures of cute cats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital Dualism

A

The belief that the on and offline are largely separate and distinct realities.Digitaldualists viewdigitalcontent as part of a “virtual” world separate from a “real” world found in physical space. We see this belief in Barlow’s A Declaration of the Independence of Cyberspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Technological Determinism

A

The theory that a society’s technology determines its cultural values, social structure, and history. According to the theory, social progress follows an inevitable course that is driven by technological innovation. We see arguments about technological determinism in Sanvig’s paper about indigienous Internet infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Copyright

A

A legal right created by the law of a country that grants the creator of an original work exclusive rights for its use and distribution. This is usually only for a limited time. We have seen numerous copyright cases involving peer-to-peer file sharing (Napster) and software code (Google v Oracle).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Net Neutrality

A

The principle that Internet service providers (ISPs) must enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites. We read Tim Wu’s paper proposing net neutrality. Recently, however, the Trump administration ended net neutrality in the US.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Public Key Cryptography

A

An encryption scheme that uses two mathematically related, but not identical, keys - a public key and a private key. Unlike symmetric key algorithms that rely on one key to both encrypt and decrypt, each key performs a unique function. The public key is used to encrypt and the private key is used to decrypt. We read Rogaway’s paper on the moral and ethical implications of cryptography. We have seen how it was traditionally within the domain of the military/government and has huge political implications: it greatly contributed to the Allies’ victory in WWII, it inspired the founding the NSA, and it allows users to privately communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Open Source Software

A

Software with source code that anyone can inspect, modify, and enhance. We enjoyed a guest lecture by Gilli Vidan about Bitcoin, an open source software, which was able to grow, improve, and gain value largely because of this feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In “Election Day: The Construction of Democracy through Technique,” Kimberly Coles writes that “the deployment of things and processes, such as invisible ink, ballots, polling, results forms, and voters, do not affect democracy and its possibilities so much as they articulate them.” Based on the lectures and the readings, choose one technology discussed in the “counting” unit to illustrate Coles’s claim. How has the paper ballot, electronic voting machine, the census, or public opinion polls constituted the possibilities of democracy?

A

The census illustrates Cole’s claim that technology constitutes the possibilities of democracy because it forms the basis of free and fair elections—it defines the voting electorate, determines representation, and impacts civil rights and liberties.

  1. 3/5 Compromise, Undercounting (Lecture, Bowker)
  2. Advancements in counting techniques (Hollerith)
  3. 2020 Census (Lecture)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Undercounting (Bowker)

A

As Bowker highlights, even after the country counted African-Americans as full persons, it still undercounted them in the census.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Advancements in counting techniques (Hollerith)

A

Advancements in technology like the mechanization of counting in the 1890s by Cameron Hollerith (described in his paper), introduction of punch cards in the 1930s, and use of digital computers for data processing in the 1940s has allowed the Census to ask more nuanced questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2020 Census (Lecture)

A

On the one hand, the DOJ wants to ask the respondent whether he/she is a citizen or not to comply with Section II of the Voting Rights Act. On the other hand, however, people argue that in the current political climate, to include this question would have an effect on minorities and they will avoid being counted in the census and therefore be undercounted in the census.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Twenty-two years have passed since John Perry Barlow published his “Declaration of the Independence of Cyberspace.” With the historical hindsight available to you today, evaluate Barlow’s manifesto. Is his vision of the Internet still applicable today? If your answer is yes, can you think of contemporary technologists who advocate similar ideas? What are the similarities and what are the differences? If your answer is no, explain why. Draw from the lectures and readings to support your argument.

A

While Barlow’s manifesto reflects the goals and aspirations of the Internet two decades ago, his vision is no longer applicable today.

  1. Internet Independence v Snowden (Rogaway)
  2. Government involvement v Senate hearings (Lecture)
  3. Equality v digital divide (Sandvig)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Independence v Snowden (Rogaway)

A

Barlow states that the Internet is naturally independent from the tyrannies of the government. But as Rogaway highlights, Edward Snowden revealed that governments can monitor almost all our communications to determine our thoughts and behaviors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Government involvement v Senate hearings (Lecture)

A

While governments did not significantly contribute to the development of the Internet twenty years ago, they certain have a seat at the table now, as most recently evidenced in the Mark Zuckerberg hearings with the Senate in which the Senate tried to converse with the head of the largest social media company in the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Equality v digital divide (Sandvig)

A

Rogaway also argues that the Internet creates a world of equality in which all may enter. But yet we still face a digital divide that, in fact, exacerbates the inequalities between those who have access to computers and those who do not. Sandiv highlights these dramatic effects in her paper about indigenous internet usages and underscores that large swaths of area even within the United States lack access to digital devices.

17
Q

Support or contest the claim that cryptography is an inherently political technology. Draw upon examples from lectures and the readings to support your claim.

A

Cryptography is an inherently political technology—it confers military advantages, influences political decisions, and defines power dynamics

  1. Military advantages (Rogaway)
  2. NSA (Lecture)
  3. The cypherpunks (Coleman)
18
Q

Military advantages (Rogaway)

A

As Rogaway highlights, cryptography was historically in the domain of the government, and it was almost exclusively a military technology. For example, cryptography was used extensively during World War II, with a plethora of code and cipher systems fielded by the nations involved. In fact, breaking the German’s Enigma encryption was a turning point in the war.

19
Q

NSA (Lecture)

A

As a result of these advances in cryptographic technology during the war, President Truman created a new government agency, the NSA, in 1952 to surveillance national communcations and anticipate Cold War events like the Cuban Missile Crisis and the foundation of the Berlin Wall.

20
Q

They Cyberpunks (Coleman)

A

As Coleman notes, the growing field of cryptography also contributed to the emergence of the cypherpunks in the late 1980’s, a group unified by a mailing list and some overlapping values. Their core belief was that cryptography can be a key tool for protecting individual autonomy threatened by power. Cypherpunk-styled creations— think of Bitcoin, PGP, Tor, and WikiLeaks—transformed the political environment because they challenge authority and address basic freedoms: freedom of speech, movement, and economic engagement.

21
Q

In 2004, Danger Mouse released The Grey Album, which mixes Jay-Z’s The Black Album with The Beatles’ The White Album. The release initiated a public debate about the limits of copyright and the changing music industry in the age of file sharing. Research the story, and offer an analysis based on class discussion. How does the story reflect changes in the meaning of authorship, ownership, and creative rights in the age of digital media? Was Danger Mouse’s album violating copyright law? Was EMI right in pursuing the case? Use historical example to make your case.

A

While EMI did own the rights to the recording for the Beatles’ White Album, they were wrong in pursuing the case because Danger Mouse’s album did not violate copyright law.

  1. Legal Questions (Boyle)
  2. Napster (Lecture)
  3. Napster & Fair Use
  4. Circumvention (Lecture)
22
Q

Legal Questions (Boyle)

A

Since this case is the first involving a copyright claim against a re-mix album, it raises new questions about the meaning of authorship, ownership, and creative rights in the context of copyright doctrine. As Boyle points out in his chapter about mash-ups, these questions have no clear answer.

23
Q

Contrast to Napster

A
  • Listening, not sharing

- Non-commercial purposes

24
Q

Contrast to circumvention

A

No intent to infringe copyrights

25
Q

In the recent congressional hearings, Mark Zuckerberg repeatedly referred to Artificial Intelligence as the solution to some of the company’s most pressing issues, such as fake news, hate speech, discriminatory ads, and terrorist propaganda. How would you respond to his claim? Is it reasonable to shift such responsibilities from humans to machines?

A

While Artificial Intelligence can surely help Facebook address some of the company’s most pressing issues like fake news, hate speech, discriminatory ads, and terrorist propaganda, it cannot by itself solve these problems. Given the risks of algorithmic bias and unexpected results, humans must be involved in addressing these issues by auditing the algorithms and verifying their results.

  1. Benefits of algorithms (Gillespie)
  2. Algorithmic bias (Bozdag)
  3. COMPAS (Lecture)