Author Archives: Elizabeth Castillo

50 Years From Now

What will communication be like 50 years from now?

To be realistic how was communication 50 years ago , 1964. In 1964, color tv and  picturephone appeared at the World Fair.  Technology typically evolves from existing items.  So what would communication be like 50 years from today. Today we have smartphones, tablets, google glass, and a few others.  I think smartphones would start to decline and technology would grow from the google glass. Laptops would be outdated and and flexible tablets would take its place. The types of technology would still be touch screen and would also be more voice controlled.  There would be more programs like Siri that would be capable of actually producing a conversation and not a limited conversation.

 

“Assessing Anonymous Communication on the Internet: Policy Deliberations.” Summary

Assessing Anonymous Communication on the Internet: Policy Deliberations.

 

This reading talks about Anonymous accounts and communication on the Internet. Anonymous communication can be bad or good. The good things included whistle-blowing and helping the government, whereas the bad can be linked to criminal activity.

Personal identification normally includes legal name, locatability, traceable/untraceable pseudonymity, pattern knowledge, social categorization, and symbols of eligibly.  Anonymous communication is normally based on factors of relational, confidentiality, pseudonymity, and psudo-anonymity.  The four type of anonymous communication traceable anonymous communication, untraceable anonymous communication, traceable pseudonymous communication, and untraceable pseudonymous.

Some benefits of anonymous sources  is helping journalist investigate stores, help provide law enforcement with tips, whistleblowing, self-help, protection, and avoiding persecution.

 

 

 

http://web.ebscohost.com.ezproxy.umw.edu/ehost/detail?sid=a8803320-53f6-4cff-9fb6-36124c5780f3%40sessionmgr114&vid=1&hid=127&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bth&AN=4451867

Kling, Rob, et al. “Assessing Anonymous Communication On The Internet: Policy Deliberations.” Information Society 15.2 (1999): 79-90. Business Source Complete. Web. 26 Jan. 2014.

“Government, Business, and the Making of the Internet” Summary

Government, Business, and the Making of the Internet

This article provides background information of the Internet.  It starts off stating that in 1969,  the U.S. Defense Department research agency created a system that would become the Internet.   The ARPAnet was created by researchers at the Advanced Research Projects Agency.  It begun in 1969.  The goals were to “promote a collaboration among computer scientist and to reduce ARPA’s computer costs.  In the 1970s, the Internet began to develop from the ARPAnet.   The ARPA was a research network and “not a military command and control system.” The ARPAnet was meant to be reliable.

 

http://web.ebscohost.com.ezproxy.umw.edu/ehost/detail?sid=87097982-d1d5-4b89-bc9f-9933d7ec393c%40sessionmgr111&vid=1&hid=127&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=ofm&AN=510149254

Abbate, Janet. “Government, Business, And The Making Of The Internet.”Business History Review 75.1 (2001): 147-176. OmniFile Full Text Mega (H.W. Wilson). Web. 26 Jan. 2014.

“A Brief History of the Internet” Summary

A Brief History of the Internet

This article goes in depth about the history of the Internet.   It addresses packet switching and the ARPANET, the expansion of the infrastructure.  ”The Internet today is a widespread information infrastructure, the initial pro type of what is often called the National(or Global or Galactic) Information Infrastructure.

1961- Leonard Kleinrock published first paper on packet switching theory

1966- Lawrence Roberts went to DARPA “to develop the computer network concept and quickly put together his plan for the ARPANET”

ARPANET became the Internet. The Internet was based on multiple independent networks.

http://arxiv.org/html/cs/9901011v1

 

“Digital identity and mistake.” Summary

Digital identity and mistake
This article focused on “mistake in contract when an individual’s digital identity is misused by another person.” There is questions of what constitutes a person’s identity. Communication for contracts have been once been conducted in person and have now moved to without face-to-face interaction and sometimes without and human to human interaction.  Even the government have moved to a digital identity.  This included digitalized services and transactions. (Ex. “Electronic benefits  and debit cards replaced paper food coupons.  This system uses digital identity for transactions.”)
“Digital identity is an individual’s identity which is composed of

information stored and transmitted in digital form. Digital identity is all
the information digitally recorded about an individual which is accessible
under the scheme.”

Sullivan, Clare. “Digital Identity And Mistake.” International Journal Of Law & Information Technology 20.3 (2012): 223-241. OmniFile Full Text Mega (H.W. Wilson). Web. 26 Jan. 2014.

“Introduction of the Internet and World Wide Web.” Summary

Introduction of the Internet and World Wide Web.

This articles provides a brief history of the Internet. It says that the Internet developed originally from studies during the Cold War.  The reason of this was to find a way for US authorities to communicate and provide a way for command centers to function in case of a nuclear strike.  A “command-and-control network” was needed.

  • 1969- 1st network (ARPAnet -Advanced Research Project Agency) was created by commission of the US Department of Defense.  ”It was designed to be decentralized so that even if part of the network malfunctioned, the remainder of the network would keep functioning. In reality, researchers were using the ARPAnet to “collaborate on projects, to trade notes on work, and eventually , to barter gossip and rumors.
  • 1984-NSFnet built by the National Science Foundation (NSF.)
  • Other networks consisted of AARNet (Australian Academic and Research Network), NSI (NASA Science Internet), SWITCH (Swiss Academic and Research Internet.)

The NFSnet took over the ARPAnet because of its “more advanced communication technology.” This is the Internet today.

http://web.ebscohost.com.ezproxy.umw.edu/ehost/detail?sid=79eff7c7-5764-4586-9d5f-9d0532d4d9be%40sessionmgr114&vid=1&hid=127&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=ofm&AN=500498548

He, J. “Introduction Of The Internet And World Wide Web.” Experimental Techniques 21.(1997): 29-33. OmniFile Full Text Mega (H.W. Wilson). Web. 26 Jan. 2014.

“Who Visits Online Dating Sites? Exploring Some Characteristics of Online Daters.” Summary

Who Visits Online Dating Sites? Exploring Some Characteristics of Online Daters

This article addresses the characteristics of online dating. As of 2007, the “web” became the 4th strategy for finding a date followed by “work or school”, “friends or family”, “nightclubs, bars, cafes”, and other “social gatherings.”  With online dating, proximity to the person is irrelevant, meeting people is easier, and online dating can take place without the help of friends.  The online dating sites can be constantly accessed  and users want further interaction.  ”The anticipation of further interaction increases the depth of communication and may thereby encourage relationship formation” (Walther JB.) The stereotype of online dating is the users are “people who are socially inept, and who have difficulty making a relationship work in the offline world.” The use of Internet has changed over the years for more social purposes.

 

 

http://web.ebscohost.com.ezproxy.umw.edu/ehost/detail?sid=4150c0ff-2972-4d87-9f03-d78f14622ecd%40sessionmgr110&vid=1&hid=127&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=bth&AN=27949158

Valkenburg, Patti M., and Jochen Peter. “Who Visits Online Dating Sites? Exploring Some Characteristics Of Online Daters.” Cyberpsychology & Behavior10.6 (2007): 849-852. Business Source Complete. Web. 26 Jan. 2014.