Week 2 Housekeeping: You did amazing things this Summer! Thanks for - - PowerPoint PPT Presentation

week 2 housekeeping
SMART_READER_LITE
LIVE PREVIEW

Week 2 Housekeeping: You did amazing things this Summer! Thanks for - - PowerPoint PPT Presentation

Welcome back to [occ]! Online Communities & Crowds Welcome back to [occ]! Week 2 Housekeeping: 2014-09-29 You did amazing things this Summer! Thanks for sharing. Keep website bug reports coming! Thank you. Plan for the


slide-1
SLIDE 1

Welcome back to [occ]!

Week 2 Housekeeping:

◮ You did amazing things this Summer! Thanks for sharing. ◮ Keep website “bug reports” coming! Thank you. ◮ Plan for the week. ◮ All readings for Wednesday and Friday are posted. ◮ Watch email for a practice “assignment” on Canvas. ◮ Discussion Questions to be explained/distributed Wednesday. ◮ Never to early to meet with Sneha (or me).

1 / 9

Welcome back to [occ]!

Week 2 Housekeeping:

◮ You did amazing things this Summer! Thanks for sharing. ◮ Keep website “bug reports” coming! Thank you. ◮ Plan for the week. ◮ All readings for Wednesday and Friday are posted. ◮ Watch email for a practice “assignment” on Canvas. ◮ Discussion Questions to be explained/distributed Wednesday. ◮ Never to early to meet with Sneha (or me).

2014-09-29

Online Communities & Crowds Welcome back to [occ]!

slide-2
SLIDE 2

Today’s Flight Plan:

◮ Foundations: Code and other architectures of control. ◮ Dynamic: Governance & regulation ◮ Cases: TCP/IP , the WELL. ◮ (Challenge: Managing conflict, rules, and power within communities.)

2 / 9

Today’s Flight Plan:

◮ Foundations: Code and other architectures of control. ◮ Dynamic: Governance & regulation ◮ Cases: TCP/IP , the WELL. ◮ (Challenge: Managing conflict, rules, and power within communities.)

2014-09-29

Online Communities & Crowds Today’s Flight Plan:

These are the touchstones for today’s class.

  • First, we’re going to addres some of this through a group demonstration of how

TCP/IP works.

  • Then we’ll talk more about Lessig’s ideas on the subject.
  • Then we return to the WELL to apply Lessig’s ideas and bring out some of the key

tensions there.

  • Synthesize key takeaways.
slide-3
SLIDE 3

TCP/IP (grossly simplified) demo!

Packet routing principles:

3 / 9

TCP/IP (grossly simplified) demo!

Packet routing principles:

2014-09-29

Online Communities & Crowds TCP/IP (grossly simplified) demo!

Key rules here:

  • We’re going to count how many hops it takes.
  • Packet start positions will be “random”
  • Your job is to transfer the packet closer to its destination (“best effort delivery”).
  • No peeking inside packets (“neutral network”).
  • (Round 2) If Sneha taps you on the shoulder, you are down for maintenance.
  • (Round 3) If Sneha taps you on the shoulder, you are going to start routing things to

the wrong destination.

  • End of round 3: endpoints open your packets.
slide-4
SLIDE 4

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room.

3 / 9

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room.

2014-09-29

Online Communities & Crowds TCP/IP (grossly simplified) demo!

Key rules here:

  • We’re going to count how many hops it takes.
  • Packet start positions will be “random”
  • Your job is to transfer the packet closer to its destination (“best effort delivery”).
  • No peeking inside packets (“neutral network”).
  • (Round 2) If Sneha taps you on the shoulder, you are down for maintenance.
  • (Round 3) If Sneha taps you on the shoulder, you are going to start routing things to

the wrong destination.

  • End of round 3: endpoints open your packets.
slide-5
SLIDE 5

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board.

3 / 9

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board.

2014-09-29

Online Communities & Crowds TCP/IP (grossly simplified) demo!

Key rules here:

  • We’re going to count how many hops it takes.
  • Packet start positions will be “random”
  • Your job is to transfer the packet closer to its destination (“best effort delivery”).
  • No peeking inside packets (“neutral network”).
  • (Round 2) If Sneha taps you on the shoulder, you are down for maintenance.
  • (Round 3) If Sneha taps you on the shoulder, you are going to start routing things to

the wrong destination.

  • End of round 3: endpoints open your packets.
slide-6
SLIDE 6

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board. ◮ Your job is to get the packet closer to its destination & to keep count of the cumulative number of hops for each packet.

3 / 9

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board. ◮ Your job is to get the packet closer to its destination & to keep count of the cumulative number of hops for each packet.

2014-09-29

Online Communities & Crowds TCP/IP (grossly simplified) demo!

Key rules here:

  • We’re going to count how many hops it takes.
  • Packet start positions will be “random”
  • Your job is to transfer the packet closer to its destination (“best effort delivery”).
  • No peeking inside packets (“neutral network”).
  • (Round 2) If Sneha taps you on the shoulder, you are down for maintenance.
  • (Round 3) If Sneha taps you on the shoulder, you are going to start routing things to

the wrong destination.

  • End of round 3: endpoints open your packets.
slide-7
SLIDE 7

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board. ◮ Your job is to get the packet closer to its destination & to keep count of the cumulative number of hops for each packet. ◮ No peeking inside packets!

3 / 9

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board. ◮ Your job is to get the packet closer to its destination & to keep count of the cumulative number of hops for each packet. ◮ No peeking inside packets!

2014-09-29

Online Communities & Crowds TCP/IP (grossly simplified) demo!

Key rules here:

  • We’re going to count how many hops it takes.
  • Packet start positions will be “random”
  • Your job is to transfer the packet closer to its destination (“best effort delivery”).
  • No peeking inside packets (“neutral network”).
  • (Round 2) If Sneha taps you on the shoulder, you are down for maintenance.
  • (Round 3) If Sneha taps you on the shoulder, you are going to start routing things to

the wrong destination.

  • End of round 3: endpoints open your packets.
slide-8
SLIDE 8

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board. ◮ Your job is to get the packet closer to its destination & to keep count of the cumulative number of hops for each packet. ◮ No peeking inside packets! ◮ More instructions tba in subsequent rounds...

3 / 9

TCP/IP (grossly simplified) demo!

Packet routing principles:

◮ Four packets need to make it from “random” start positions to their destination (1 of 4) corners of the room. ◮ I’m assigning the person in each corner an “address” on the board. ◮ Your job is to get the packet closer to its destination & to keep count of the cumulative number of hops for each packet. ◮ No peeking inside packets! ◮ More instructions tba in subsequent rounds...

2014-09-29

Online Communities & Crowds TCP/IP (grossly simplified) demo!

Key rules here:

  • We’re going to count how many hops it takes.
  • Packet start positions will be “random”
  • Your job is to transfer the packet closer to its destination (“best effort delivery”).
  • No peeking inside packets (“neutral network”).
  • (Round 2) If Sneha taps you on the shoulder, you are down for maintenance.
  • (Round 3) If Sneha taps you on the shoulder, you are going to start routing things to

the wrong destination.

  • End of round 3: endpoints open your packets.
slide-9
SLIDE 9

Analyze the network we just made

4 / 9

Analyze the network we just made

2014-09-29

Online Communities & Crowds Analyze the network we just made

Key observations/questions:

  • Why does addressing matter?
  • Does identity of machines/people behind them matter?
  • End-to-end principle: what about this network is “dumb”?
  • Anything that can be broken up into a packet can travel through the network! e.g.,

different packet contents.

  • Robust to failure of many nodes.
  • Robust to some infections (viruses).
  • Threats include: knocking out whole neighborhoods; overwhelming a single point;

breaking address system

slide-10
SLIDE 10

Analyze the network we just made

Key design elements & rules? Effects of the architecture?

4 / 9

Analyze the network we just made

Key design elements & rules? Effects of the architecture?

2014-09-29

Online Communities & Crowds Analyze the network we just made

Key observations/questions:

  • Why does addressing matter?
  • Does identity of machines/people behind them matter?
  • End-to-end principle: what about this network is “dumb”?
  • Anything that can be broken up into a packet can travel through the network! e.g.,

different packet contents.

  • Robust to failure of many nodes.
  • Robust to some infections (viruses).
  • Threats include: knocking out whole neighborhoods; overwhelming a single point;

breaking address system

slide-11
SLIDE 11

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms?

4 / 9

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms?

2014-09-29

Online Communities & Crowds Analyze the network we just made

Key observations/questions:

  • Why does addressing matter?
  • Does identity of machines/people behind them matter?
  • End-to-end principle: what about this network is “dumb”?
  • Anything that can be broken up into a packet can travel through the network! e.g.,

different packet contents.

  • Robust to failure of many nodes.
  • Robust to some infections (viruses).
  • Threats include: knocking out whole neighborhoods; overwhelming a single point;

breaking address system

slide-12
SLIDE 12

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms? Potential abuses?

4 / 9

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms? Potential abuses?

2014-09-29

Online Communities & Crowds Analyze the network we just made

Key observations/questions:

  • Why does addressing matter?
  • Does identity of machines/people behind them matter?
  • End-to-end principle: what about this network is “dumb”?
  • Anything that can be broken up into a packet can travel through the network! e.g.,

different packet contents.

  • Robust to failure of many nodes.
  • Robust to some infections (viruses).
  • Threats include: knocking out whole neighborhoods; overwhelming a single point;

breaking address system

slide-13
SLIDE 13

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms? Potential abuses? Vulnerabilities to disruption?

4 / 9

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms? Potential abuses? Vulnerabilities to disruption?

2014-09-29

Online Communities & Crowds Analyze the network we just made

Key observations/questions:

  • Why does addressing matter?
  • Does identity of machines/people behind them matter?
  • End-to-end principle: what about this network is “dumb”?
  • Anything that can be broken up into a packet can travel through the network! e.g.,

different packet contents.

  • Robust to failure of many nodes.
  • Robust to some infections (viruses).
  • Threats include: knocking out whole neighborhoods; overwhelming a single point;

breaking address system

slide-14
SLIDE 14

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms? Potential abuses? Vulnerabilities to disruption?

4 / 9

Analyze the network we just made

Key design elements & rules? Effects of the architecture? Potential freedoms? Potential abuses? Vulnerabilities to disruption?

2014-09-29

Online Communities & Crowds Analyze the network we just made

Key observations/questions:

  • Why does addressing matter?
  • Does identity of machines/people behind them matter?
  • End-to-end principle: what about this network is “dumb”?
  • Anything that can be broken up into a packet can travel through the network! e.g.,

different packet contents.

  • Robust to failure of many nodes.
  • Robust to some infections (viruses).
  • Threats include: knocking out whole neighborhoods; overwhelming a single point;

breaking address system

slide-15
SLIDE 15

Connect this to Lessig’s core concepts:

5 / 9

Connect this to Lessig’s core concepts:

2014-09-29

Online Communities & Crowds Connect this to Lessig’s core concepts:

Architectures of control:

  • Rules/laws
  • Norms
  • Code
  • Prices (markets)

Label in examples:

  • specific architectures/manifestations
  • opportunities & strengths
  • limitations & constraints
  • vulnerabilities
slide-16
SLIDE 16

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?”

5 / 9

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?”

2014-09-29

Online Communities & Crowds Connect this to Lessig’s core concepts:

Architectures of control:

  • Rules/laws
  • Norms
  • Code
  • Prices (markets)

Label in examples:

  • specific architectures/manifestations
  • opportunities & strengths
  • limitations & constraints
  • vulnerabilities
slide-17
SLIDE 17

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?” ◮ How does Lessig’s example of “Ibex” (the abusive student in his law class) illustrate this idea?

5 / 9

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?” ◮ How does Lessig’s example of “Ibex” (the abusive student in his law class) illustrate this idea?

2014-09-29

Online Communities & Crowds Connect this to Lessig’s core concepts:

Architectures of control:

  • Rules/laws
  • Norms
  • Code
  • Prices (markets)

Label in examples:

  • specific architectures/manifestations
  • opportunities & strengths
  • limitations & constraints
  • vulnerabilities
slide-18
SLIDE 18

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?” ◮ How does Lessig’s example of “Ibex” (the abusive student in his law class) illustrate this idea? ◮ Lessig argues that architectures of control are unavoidable. Why?

5 / 9

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?” ◮ How does Lessig’s example of “Ibex” (the abusive student in his law class) illustrate this idea? ◮ Lessig argues that architectures of control are unavoidable. Why?

2014-09-29

Online Communities & Crowds Connect this to Lessig’s core concepts:

Architectures of control:

  • Rules/laws
  • Norms
  • Code
  • Prices (markets)

Label in examples:

  • specific architectures/manifestations
  • opportunities & strengths
  • limitations & constraints
  • vulnerabilities
slide-19
SLIDE 19

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?” ◮ How does Lessig’s example of “Ibex” (the abusive student in his law class) illustrate this idea? ◮ Lessig argues that architectures of control are unavoidable. Why? ◮ w/r/t architectures, Lessig says “limitations can be freedoms.” What does this mean?

5 / 9

Connect this to Lessig’s core concepts:

◮ What are “architectures of control?” ◮ How does Lessig’s example of “Ibex” (the abusive student in his law class) illustrate this idea? ◮ Lessig argues that architectures of control are unavoidable. Why? ◮ w/r/t architectures, Lessig says “limitations can be freedoms.” What does this mean?

2014-09-29

Online Communities & Crowds Connect this to Lessig’s core concepts:

Architectures of control:

  • Rules/laws
  • Norms
  • Code
  • Prices (markets)

Label in examples:

  • specific architectures/manifestations
  • opportunities & strengths
  • limitations & constraints
  • vulnerabilities
slide-20
SLIDE 20

Back to the WELL...

What sorts of conflicts arose on WELL? Which (if any) of these conflicts seem particularly likely online? Why (not)? What sorts of resolutions were reached? How?

Back to the WELL...

What sorts of conflicts arose on WELL? Which (if any) of these conflicts seem particularly likely online? Why (not)? What sorts of resolutions were reached? How?

2014-09-29

Online Communities & Crowds Back to the WELL...

My old slide from Friday. Didn’t discuss then. Framing questions for next activity, in which I’m going to ask you to tackle some of this (using Lessig’s ideas) in relation to what you read about the WELL (Hafner).

slide-21
SLIDE 21

Critical analysis in groups of four:

◮ Identify architectures of control in the WELL (rules/laws, norms, code, prices, etc.) ◮ Analyze at least two strengths, freedoms, or opportunities afforded by the WELL. ◮ Analyze at least two weaknesses, constraints, and threats afforded by the WELL. ◮ Create at least two proposals to help the WELL managers avoid abuses such as those perpetrated by “Mandel.” ◮ Prepare to discuss your analysis and proposals with the full class.

7 / 9

Critical analysis in groups of four:

◮ Identify architectures of control in the WELL (rules/laws, norms, code, prices, etc.) ◮ Analyze at least two strengths, freedoms, or opportunities afforded by the WELL. ◮ Analyze at least two weaknesses, constraints, and threats afforded by the WELL. ◮ Create at least two proposals to help the WELL managers avoid abuses such as those perpetrated by “Mandel.” ◮ Prepare to discuss your analysis and proposals with the full class.

2014-09-29

Online Communities & Crowds Critical analysis in groups of four:

slide-22
SLIDE 22

Big takeaways?

8 / 9

Big takeaways?

2014-09-29

Online Communities & Crowds Big takeaways?

slide-23
SLIDE 23

Big takeaways?

Code (like most architectures of control) is made by people.

8 / 9

Big takeaways?

Code (like most architectures of control) is made by people.

2014-09-29

Online Communities & Crowds Big takeaways?

slide-24
SLIDE 24

Big takeaways?

Code (like most architectures of control) is made by people. Architectures encode values and choices.

8 / 9

Big takeaways?

Code (like most architectures of control) is made by people. Architectures encode values and choices.

2014-09-29

Online Communities & Crowds Big takeaways?

slide-25
SLIDE 25

Big takeaways?

Code (like most architectures of control) is made by people. Architectures encode values and choices. “Limitations” can be features. “Features” can also be limitations.

8 / 9

Big takeaways?

Code (like most architectures of control) is made by people. Architectures encode values and choices. “Limitations” can be features. “Features” can also be limitations.

2014-09-29

Online Communities & Crowds Big takeaways?

slide-26
SLIDE 26

Big takeaways?

Code (like most architectures of control) is made by people. Architectures encode values and choices. “Limitations” can be features. “Features” can also be limitations. Different regimes offer different degrees of “amenability to control” with real consequences.

8 / 9

Big takeaways?

Code (like most architectures of control) is made by people. Architectures encode values and choices. “Limitations” can be features. “Features” can also be limitations. Different regimes offer different degrees of “amenability to control” with real consequences.

2014-09-29

Online Communities & Crowds Big takeaways?

slide-27
SLIDE 27

Next time: back to the commons!

◮ Reading: Selections from Mancur Olson’s The Logic of

Collective Action.

◮ Reading: Elinor Ostrom brief 2-pager “Understanding

Collective Action.”

◮ Consider: In what ways are communities like the WELL

similar/different from more traditional examples of collective action or commons?

9 / 9

Next time: back to the commons!

◮ Reading: Selections from Mancur Olson’s The Logic of

Collective Action.

◮ Reading: Elinor Ostrom brief 2-pager “Understanding

Collective Action.”

◮ Consider: In what ways are communities like the WELL

similar/different from more traditional examples of collective action or commons?

2014-09-29

Online Communities & Crowds Next time: back to the commons!

slide-28
SLIDE 28

Next time: back to the commons!

◮ Reading: Selections from Mancur Olson’s The Logic of

Collective Action.

◮ Reading: Elinor Ostrom brief 2-pager “Understanding

Collective Action.”

◮ Consider: In what ways are communities like the WELL

similar/different from more traditional examples of collective action or commons?

Thanks and see you soon!

9 / 9

Next time: back to the commons!

◮ Reading: Selections from Mancur Olson’s The Logic of

Collective Action.

◮ Reading: Elinor Ostrom brief 2-pager “Understanding

Collective Action.”

◮ Consider: In what ways are communities like the WELL

similar/different from more traditional examples of collective action or commons?

Thanks and see you soon!

2014-09-29

Online Communities & Crowds Next time: back to the commons!