{"id":221,"date":"2017-05-16T19:51:51","date_gmt":"2017-05-16T19:51:51","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/chapter\/11-5-issues-and-trends\/"},"modified":"2017-05-16T19:51:51","modified_gmt":"2017-05-16T19:51:51","slug":"11-5-issues-and-trends","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/chapter\/11-5-issues-and-trends\/","title":{"raw":"11.5 Issues and Trends","rendered":"11.5 Issues and Trends"},"content":{"raw":"<div class=\"bcc-box bcc-highlight\" id=\"fwk-luleapollo-ch11_s04_n01\">\n        <h3 class=\"title\">Learning Objectives<\/h3>\n        <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_o01\"><li>Define <em class=\"emphasis\">information superhighway<\/em> as it relates to the Internet.<\/li>\n            <li>Identify ways to identify credible sources online.<\/li>\n            <li>Define <em class=\"emphasis\">net neutrality<\/em>.<\/li>\n            <li>Describe some of the effects of the Internet and social media on traditional media.<\/li>\n        <\/ol><\/div>\n    <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p01\">By 1994, the promise of the \u201c<span class=\"margin_term\"><a class=\"glossterm\">information superhighway<\/a><\/span>\u201d had become so potent that it was given its own summit on the University of California Los Angeles campus. The country was quickly realizing that the spread of the web could be harnessed for educational purposes; more than just the diversion of computer hobbyists, this new vision of the web would be a constant learning resource that anyone could use.<\/p>\n    <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p02\">The American video artist pioneer Nam June Paik takes credit for the term <em class=\"emphasis\">information superhighway<\/em>, which he used during a study for the Rockefeller Foundation in 1974, long before the existence of Usenet. In 2001, he said, \u201cIf you create a highway, then people are going to invent cars. That\u2019s dialectics. If you create electronic highways, something has to happen (The Biz Media, 2010).\u201d Paik\u2019s prediction proved to be startlingly prescient.<\/p>\n    <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p03\">Al Gore\u2019s use of the term in the House of Representatives (and later as vice president) had a slightly different meaning and context. To Gore, the promise of the Interstate Highway System during the Eisenhower era was that the government would work to allow communication across natural barriers, and that citizens could then utilize these channels to conduct business and communicate with one another. Gore saw the government as playing an essential role in maintaining the pathways of electronic communication. Allowing business interests to get involved would compromise what he saw as a necessarily neutral purpose; a freeway doesn\u2019t judge or demand tolls\u2014it is a public service\u2014and neither should the Internet. During his 2000 presidential campaign, Gore was wrongly ridiculed for supposedly saying that he \u201cinvented the Internet,\u201d but in reality his work in the House of Representatives played a crucial part in developing the infrastructure required for Internet access.<\/p>\n    <div style=\"text-align: center;\"><div style=\"text-align: center; font-size: .8em; max-width: 500px;\" id=\"fwk-luleapollo-ch11_s04_f01\">\n        <p class=\"title\"><span class=\"title-prefix\">Figure 11.10<\/span> <\/p>\n        <a href=\"http:\/\/open.lib.umn.edu\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/11\/11.5.0.jpg\"><img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195148\/11.5.0.jpg\" alt=\"11.5.0\" width=\"500\" class=\"aligncenter size-full wp-image-1318\"\/><\/a><p class=\"para\">Although Al Gore did not invent the Internet, he did popularize the term <em class=\"emphasis\">information superhighway<\/em> in an effort to build support for Internet infrastructure and neutrality.<\/p><p class=\"para\">Dan Farber - <a href=\"https:\/\/www.flickr.com\/photos\/farber\/3010981299\/\">Al Gore at Web 2.0 Summit<\/a> - CC BY-NC 2.0.<\/p>\n    <\/div><\/div>\n    <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p04\">However, a certain amount of money was necessary to get connected to the web. In this respect, AOL was like the Model T of the Internet\u2014it put access to the information superhighway within reach of the average person. But despite the affordability of AOL and the services that succeeded it, certain demographics continued to go without access to the Internet, a problem known as the \u201cdigital divide,\u201d which you will learn more about in this section.<\/p>\n    <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p05\">From speed of transportation, to credibility of information (don\u2019t trust the stranger at the roadside diner), to security of information (keep the car doors locked), to net neutrality (toll-free roads), to the possibility of piracy, the metaphor of the information superhighway has proved to be remarkably apt. All of these issues have played out in different ways, both positive and negative, and they continue to develop to this day.<\/p>\n    <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s01\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">Information Access Like Never Before<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_p01\">In December 2002, a survey by the Pew Internet &amp; American Life Project found that 84 percent of Americans believed that they could find information on health care, government, news, or shopping on the Internet (Jesdanun, 2002). This belief in a decade-old system of interconnected web pages would in itself be remarkable, but taking into account that 37 percent of respondents were not even connected to the Internet, it becomes even more fantastic. In other words, of the percentage of Americans without Internet connections, 64 percent still believed that it could be a source of information about these crucial topics. In addition, of those who expect to find such information, at least 70 percent of them succeed; news and shopping were the most successful topics, government was the least. This survey shows that most Americans believed that the Internet was indeed an effective source of information. Again, the role of the Internet in education was heralded as a new future, and technology was seen to level the playing field for all students.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_p02\">Nowhere was this more apparent than in the Bush administration\u2019s 2004 report, \u201cToward a New Golden Age in Education: How the Internet, the Law, and Today\u2019s Students Are Revolutionizing Expectations.\u201d By this time, the term <em class=\"emphasis\">digital divide<\/em> was already widely used and the goal of \u201cbridging\u201d it took everything from putting computers in classrooms to giving personal computers to some high-need students to use at home.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_p03\">The report stated that an \u201cexplosive growth\u201d in sectors such as e-learning and virtual schools allowed each student \u201cindividual online instruction (U.S. Department of Education, 2004).\u201d More than just being able to find information online, people expected the Internet to provide virtually unlimited access to educational opportunities. To make this expectation a reality, one of the main investments that the paper called for was increased <span class=\"margin_term\"><a class=\"glossterm\">broadband Internet access<\/a><\/span>. As Nam June Paik predicted, stringing fiber optics around the world would allow for seamless video communication, a development that the Department of Education saw as integral to its vision of educating through technology. The report called for broadband access \u201c24 hours a day, seven days a week, 365 days a year,\u201d saying that it could \u201chelp teachers and students realize the full potential of this technology (U.S. Department of Education, 2004).\u201d<\/p>\n        <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s01_s01\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Rural Areas and Access to Information<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s01_p01\">One of the founding principles of many public library systems is to allow for free and open access to information. Historically, one of the major roadblocks to achieving this goal has been a simple one: location. Those living in rural areas or those with limited access to transportation simply could not get to a library. But with the spread of the Internet, the hope was that a global library would be created\u2014an essential prospect for rural areas.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s01_p02\">One of the most remarkable educational success stories in the Department of Education\u2019s study is that of the Chugach School District in Alaska. In 1994, this district was the lowest performing in the state: over 50 percent staff turnover, the lowest standardized test scores, and only one student in 26 years graduating from college (U.S. Department of Education, 2004). The school board instituted drastic measures, amounting to a complete overhaul of the system. They abolished grade levels, focusing instead on achievement, and by 2001 had increased Internet usage from 5 percent to 93 percent.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s01_p03\">The Department of Education study emphasizes these numbers, and with good reason: The standardized test percentile scores rose from the 1920s to the 1970s in a period of 4 years, in both math and language arts. Yet these advances were not exclusive to low-performing rural students. In Florida, the Florida Virtual School system allowed rural school districts to offer advanced-placement coursework. Students excelling in rural areas could now study topics that were previously limited to districts that could fill (and fund) an entire classroom. Just as the Interstate Highway System commercially connected the most remote rural communities to large cities, the Internet has brought rural areas even further into the global world, especially in regard to the sharing of information and knowledge.<\/p>\n        <\/div>\n        <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s01_s02\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">The Cloud: Instant Updates, Instant Access<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p01\">As technology has improved, it has become possible to provide software to users as a service that resides entirely online, rather than on a person\u2019s personal computer. Since people can now be connected to the Internet constantly, they can use online programs to do all of their computing. It is no longer absolutely necessary to have, for example, a program like Microsoft Word to compose documents; this can be done through an online service like Google Docs or Zoho Writer.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p02\">\u201c<span class=\"margin_term\"><a class=\"glossterm\">Cloud computing<\/a><\/span>\u201d is the process of outsourcing common computing tasks to a remote server. The actual work is not done by the computer attached to the user\u2019s monitor, but by other (maybe many other) computers in the \u201ccloud.\u201d As a result, the computer itself does not actually need that much processing power; instead of calculating \u201c1 + 1 = 2,\u201d the user\u2019s computer asks the cloud, \u201cWhat does 1 + 1 equal?\u201d and receives the answer. Meanwhile, the system resources that a computer would normally devote to completing these tasks are freed up to be used for other things. An additional advantage of cloud computing is that data can be stored in the cloud and retrieved from any computer, making a user\u2019s files more conveniently portable and less vulnerable to hardware failures like a hard drive crash. Of course, it can require quite a bit of <span class=\"margin_term\"><a class=\"glossterm\">bandwidth<\/a><\/span> to send these messages back and forth to a remote server in the cloud, and in the absence of a reliable, always-on Internet connection, the usefulness of these services can be somewhat limited.<\/p>\n            <div style=\"text-align: center;\"><div style=\"text-align: center; font-size: .8em; max-width: 497px;&#x201D; id=\">\n                <p class=\"title\"><span class=\"title-prefix\">Figure 11.11<\/span> <\/p>\n                <a href=\"\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/04\/0fb75e6fbfcce6e0ac165115a52a578e.jpg\"> <img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195150\/0fb75e6fbfcce6e0ac165115a52a578e.jpg\" alt=\"image\" style=\"max-width: 497px;\"\/><\/a><p class=\"para\">Cloud computing allows a computer to contain very little actual information. Many of the programs used by the now-popular \u201cnetbooks\u201d are stored online.<\/p>\n            <\/div><\/div>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p03\">The concept of the cloud takes into account all the applications that are hosted on external machines and viewed on a user\u2019s computer. Google Docs, which provides word processors, spreadsheets, and other tools, and Microsoft\u2019s Hotmail, which provides e-mail access, both constitute aspects of the \u201ccloud.\u201d These services are becoming even more popular with the onset of mobile applications and netbooks, which are small laptops with relatively little processing power and storage space that rely on cloud computing. A netbook does not need the processing power required to run Microsoft Word; as long as it has a web browser, it can run the Google Docs word processor and leave (almost) all of the processing to the cloud. Because of this evolution of the Internet, computers can be built less like stand-alone machines and more like interfaces for interacting with the larger system in the cloud.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p04\">One result of cloud computing has been the rise in web applications for mobile devices, such as the iPhone, BlackBerry, and devices that use Google\u2019s Android operating system. <span class=\"margin_term\"><a class=\"glossterm\">3G networks<\/a><\/span>, which are cell phone networks capable of high-speed data transfer, can augment the computing power of phones just by giving the phones the ability to send data somewhere else to be processed. For example, a Google Maps application does not actually calculate the shortest route between two places (taking into account how highways are quicker than side roads, and numerous other computational difficulties) but rather just asks Google to do the calculation and send over the result. 3G networks have made this possible in large part because the speed of data transfer has now surpassed the speed of cell phones\u2019 calculation abilities. As cellular transmission technology continues to improve with the rollout of the next-generation <span class=\"margin_term\"><a class=\"glossterm\">4G networks<\/a><\/span> (the successors to 3G networks), connectivity speeds will further increase and allow for a focus on ever-more-comprehensive provisions for multimedia.<\/p>\n        <\/div>\n    <\/div>\n    <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s02\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">Credibility Issues: (Dis)information Superhighway?<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_p01\">The Internet has undoubtedly been a boon for researchers and writers everywhere. Online services range from up-to-date news and media to vast archives of past writing and scholarship. However, since the Internet is open to any user, anyone with a few dollars can set up a credible-sounding website and begin to disseminate false information.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_p02\">This is not necessarily a problem with the Internet specifically; any traditional medium can\u2014knowingly or unknowingly\u2014publish unreliable or outright false information. But the explosion of available sources on the Internet has caused a bit of a dilemma for information seekers. The difference is that much of the information on the Internet is not the work of professional authors, but of amateurs who have questionable expertise. On the Internet, anyone can self-publish, so the vetting that usually occurs in a traditional medium\u2014for example, by a magazine\u2019s editorial department\u2014rarely happens online.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_p03\">That said, if an author who is recognizable from elsewhere writes something online, it may point to more reliable information (Kirk, 1996). In addition, looking for a trusted name on the website could lead to more assurance of reliability. For example, the site <a class=\"link\" href=\"http:\/\/krugmanonline.com\">krugmanonline.com<\/a>, the official site of Princeton economist Paul Krugman, does not have any authorial data. Even statements like \u201cNobel Prize Winner and Op-Ed Columnist for the <em class=\"emphasis\">New York Times<\/em>\u201d do not actually say anything about the author of the website. Much of the content is aggregated from the web as well. However, the bottom-left corner of the page has the mark \u201c\u00a9 2009 W. W. Norton &amp; Company, Inc.\u201d (Krugman\u2019s publisher). Therefore, a visitor might decide to pick and choose which information to trust. The author is clearly concerned with selling Krugman\u2019s books, so the glowing reviews may need to be verified elsewhere; on the other hand, the author biography is probably fairly accurate, since the publishing company has direct access to Krugman, and Krugman himself probably looked it over to make sure it was valid. Taking the authorship of a site into account is a necessary step when judging information; more than just hunting down untrue statements, it can give insight into subtle bias that may arise and point to further research that needs to be done.<\/p>\n        <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s02_s01\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Just Trust Me: Bias on the web<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p01\">One noticeable thing on Paul Krugman\u2019s site is that all of his book reviews are positive. Although these are probably real reviews, they may not be representative of his critical reception at large. Mainstream journalistic sources usually attempt to achieve some sort of balance in their reporting; given reasonable access, they will interview opposing viewpoints and reserve judgment for the editorial page. Corporate sources, like on Krugman\u2019s site, will instead tilt the information toward their product.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p02\">Often, the web is viewed as a source of entertainment, even in its informational capacity. Because of this, sites that rely on advertising may choose to publish something more inflammatory that will be linked to and forwarded more for its entertainment value than for its informational qualities.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p03\">On the other hand, a website might attempt to present itself as a credible source of information about a particular product or topic, with the end goal of selling something. A website that gives advice on how to protect against bedbugs that includes a direct link to its product may not be the best source of information on the topic. While so much on the web is free, it is worthwhile looking into how websites actually maintain their services. If a website is giving something away for free, the information might be biased, because it must be getting its money from somewhere. The online archive of <em class=\"emphasis\">Consumer Reports<\/em> requires a subscription to access it. Ostensibly, this subscription revenue allows the service to exist as an impartial judge, serving the users rather than the advertisers.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p04\">Occasionally, corporations may set up \u201ccredible\u201d fronts to disseminate information. Because sources may look reliable, it is always important to investigate further. Global warming is a contentious topic, and websites about the issue often represent the bias of their owners. For example, the Cato Institute publishes anti-global-warming theory columns in many newspapers, including well-respected ones such as the <em class=\"emphasis\">Washington Times<\/em>. Patrick Basham, an adjunct scholar at the Cato Institute, published the article \u201cLive Earth\u2019s Inconvenient Truths\u201d in the <em class=\"emphasis\">Washington Times<\/em> on July 11, 2007. Basham writes, \u201cUsing normal scientific standards, there is no proof we are causing the Earth to warm, let alone that such warming will cause an environmental catastrophe (Basham, 2007).\u201d<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p05\">However, the website <a class=\"link\" href=\"http:\/\/ExxposeExxon.com\">ExxposeExxon.com<\/a> states that the Cato Institute received $125,000 from the oil giant ExxonMobil, possibly tainting its data with bias (Exxon, 2006). In addition, <a class=\"link\" href=\"http:\/\/ExxposeExxon.com\">ExxposeExxon.com<\/a> is run as a side project of the international environmental nonprofit Greenpeace, which may have its own reasons for producing this particular report. The document available on Greenpeace\u2019s site (a scanned version of Exxon\u2019s printout) states that in 2006, the corporation gave $20,000 to the Cato Institute (Greenpeace, 2007) (the other $105,000 was given over the previous decade).<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p06\">This back-and-forth highlights the difficulty of finding credible information online, especially when money is at stake. In addition, it shows how conflicting sources may go to great lengths\u2014sorting through a company\u2019s corporate financial reports\u2014in order to expose what they see as falsehoods. What is the upside to all of this required fact-checking and cross-examination? Before the Internet, this probably would have required multiple telephone calls and plenty of time waiting on hold. While the Internet has made false information more widely available, it has also made checking that information incredibly easy.<\/p>\n        <\/div>\n    <\/div>\n    <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s03\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">\n<em class=\"emphasis\">Wikipedia<\/em>: The Internet\u2019s Precocious Problem Child<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p01\">Nowhere has this cross-examination and cross-listing of sources been more widespread than with <em class=\"emphasis\">Wikipedia<\/em>. Information free and available to all? That sounds like a dream come true\u2014a dream that <em class=\"emphasis\">Wikipedia<\/em> founder Jimmy Wales was ready to pursue. Since the site began in 2001, the Wikimedia Foundation (which hosts all of the <em class=\"emphasis\">Wikipedia<\/em> pages) has become the sixth-most-visited site on the web, barely behind eBay in terms of its unique page views.<\/p>\n        <div class=\"table block\" id=\"fwk-luleapollo-ch11_s04_s03_t01\">\n            <p class=\"title\"><span class=\"title-prefix\">Table 11.3<\/span> Top 10 Global Web Parent Companies, Home and Work<\/p>\n            <table cellpadding=\"0\" style=\"border-spacing: 0px;\"><thead><tr><th align=\"left\">\n                                    <p class=\"para\">Rank<\/p>\n                                <\/th>\n                        <th align=\"left\">\n                                    <p class=\"para\">Parent<\/p>\n                                <\/th>\n                        <th align=\"left\">\n                                    <p class=\"para\">Unique Audience (Millions)<\/p>\n                                <\/th>\n                        <th align=\"left\">\n                                    <p class=\"para\">Active Reach %<\/p>\n                                <\/th>\n                        <th align=\"left\">\n                                    <p class=\"para\">Time<\/p>\n                                <\/th>\n                    <\/tr><\/thead><tbody><tr><td align=\"left\">\n                                    <p class=\"para\">1<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">Google<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">362,006<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">84.29<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">2:27:15<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">2<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">Microsoft<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">322,352<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">75.06<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">2:53:48<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">3<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">Yahoo!<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">238,035<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">55.43<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">1:57:26<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">4<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">Facebook<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">218,861<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">50.96<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">6:22:24<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">5<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">eBay<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">163,325<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">38.03<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">1:42:46<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">6<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">Wikimedia<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">154,905<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">36.07<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">0:15:14<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">7<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">AOL LLC<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">128,147<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">29.84<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">2:08:32<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">8<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">Amazon<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">128,071<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">29.82<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">0:23:24<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">9<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">News Corp.<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">125,898<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">29.31<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">0:53:53<\/p>\n                                <\/td>\n                    <\/tr><tr><td align=\"left\">\n                                    <p class=\"para\">10<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">InterActiveCorp<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">122,029<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">28.41<\/p>\n                                <\/td>\n                        <td align=\"left\">\n                                    <p class=\"para\">0:10:52<\/p>\n                                <\/td>\n                    <\/tr><\/tbody><tfoot><tr><th align=\"left\">\n                                    <p class=\"para\">Source: The Nielsen Company<\/p>\n                                <\/th>\n                        <th>\n                        <\/th><th>\n                        <\/th><th>\n                        <\/th><th>\n                    <\/th><\/tr><\/tfoot><\/table><\/div>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p02\">Organizations had long been trying to develop factual content for the web but <em class=\"emphasis\">Wikipedia<\/em> went for something else: <span class=\"margin_term\"><a class=\"glossterm\">verifiability<\/a><\/span>. The guidelines for editing <em class=\"emphasis\">Wikipedia<\/em> state: \u201cWhat counts is whether readers can verify that material added to <em class=\"emphasis\">Wikipedia<\/em> has already been published by a reliable source, not whether editors think it is true (Wikipedia).\u201d The benchmark for inclusion on <em class=\"emphasis\">Wikipedia<\/em> includes outside citations for any content \u201clikely to be challenged\u201d and for \u201call quotations.\u201d<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p03\">While this may seem like it\u2019s a step ahead of many other sources on the Internet, there is a catch: Anyone can edit <em class=\"emphasis\">Wikipedia<\/em>. This has a positive and negative side\u2014though anyone can vandalize the site, anyone can also fix it. In addition, calling a particularly contentious page to attention can result in one of the site\u2019s administrators placing a warning at the top of the page stating that the information is not necessarily verified. Other warnings include notices on articles about living persons, which are given special attention, and articles that may violate <em class=\"emphasis\">Wikipedia<\/em>\u2019s neutrality policy. This neutrality policy is a way to mitigate the extreme views that may be posted on a page with open access, allowing the community to decide what constitutes a \u201csignificant\u201d view that should be represented (Wikipedia).<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p04\">As long as users do not take the facts on <em class=\"emphasis\">Wikipedia<\/em> at face value and make sure to follow up on the relevant sources linked in the articles they read, the site is an extremely useful reference tool that gives users quick access to a wide range of subjects. However, articles on esoteric subjects can be especially prone to vandalism or poorly researched information. Since every reader is a potential editor, a lack of readers can lead to a poorly edited page because errors, whether deliberate or not, go uncorrected. In short, the lack of authorial credit can lead to problems with judging bias and relevance of information, so the same precautions must be taken with <em class=\"emphasis\">Wikipedia<\/em> as with any other online source, primarily in checking references. The advantage of <em class=\"emphasis\">Wikipedia<\/em> is its openness and freedom\u2014if you find a problem, you can either fix it (with your own verifiable sources) or flag it on the message boards. Culturally, there has been a shift from valuing a few reliable sources to valuing a multiplicity of competing sources. However, weighing these sources against one another has become easier than ever before.<\/p>\n    <\/div>\n    <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s04\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">Security of Information on the Internet<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_p01\">As the Internet has grown in scope and the amount of personal information online has proliferated, securing this information has become a major issue. The Internet now houses everything from online banking systems to highly personal e-mail messages, and even though security is constantly improving, this information is not invulnerable.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_p02\">An example of this vulnerability is the Climategate scandal in late 2009. A collection of private e-mail messages were hacked from a server at the University of East Anglia, where much of the Intergovernmental Panel on Climate Change research takes place. These e-mails show internal debates among the scientists regarding which pieces of data should be released and which are not relevant (or helpful) to their case (Revkin, 2009). In these e-mails, the scientists sometimes talk about colleagues\u2014especially those skeptical of climate change\u2014in a derisive way. Of course, these e-mails were never meant to become public.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_p03\">This scandal demonstrates how easy it can be to lose control of private information on the Internet. In previous decades, hard copies of these letters would have to be found, and the theft could probably be traced back to a specific culprit. With the Internet, it is much more difficult to tell who is doing the snooping, especially if it is done on a public network. The same protocols that allow for open access and communication also allow for possible exploitation. Like the Interstate Highway System, the Internet is impartial to its users. In other words: If you\u2019re going to ride, lock your doors.<\/p>\n        <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s04_s01\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Hacking E-mail: From LOVE-LETTER-FOR-YOU to Google in China<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s01_p01\">Another explosive scandal involving e-mail account hacking also occurred in late 2009, when Google\u2019s Gmail service was hacked by IP addresses originating in China. Gmail was one of the primary services used by human rights activists due to its location in the United States and its extra encryption. To understand the magnitude of this, it is important to understand the history of e-mail hacking and the importance of physical server location and local laws.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s01_p02\">In 2000, a <span class=\"margin_term\"><a class=\"glossterm\">computer virus<\/a><\/span> was unleashed by a student in the Philippines that simply sent a message with the subject line \u201cI Love You.\u201d The e-mail had a file attached, called LOVE-LETTER-FOR-YOU.TXT.vbs. The suffix \u201c.txt\u201d is generally used for text files and was meant, in this case, as a distraction; the file\u2019s real suffix was \u201c.vbs,\u201d which means that the file is a script. When run, this script ran and e-mailed itself across the user\u2019s entire address book, before sending any available passwords to an e-mail address in the Philippines. One of the key aspects of this case, however, was a matter of simple jurisdiction: The student was not prosecuted, due to the lack of computer crime laws in the Philippines (Zetter, 1983).<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s01_p03\">The encryption that Gmail uses resulted in only two of the accounts being successfully hacked, and hackers were only able to see e-mail subject lines and timestamps\u2014no message content was available (Zetter, 2010). Since the chaos that ensued after the \u201cI Love You\u201d virus, e-mail users and service providers have become more vigilant in their defensive techniques. However, the increased reliance on e-mail for daily communication makes it an attractive target for hackers. The development of cloud computing will likely lead to entirely new problems with Internet security; just as a highway brings two communities together, it can also cause these communities to share problems.<\/p>\n        <\/div>\n        <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s04_s02\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Can\u2019t Wait: Denial of Service<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s02_p01\">Although many people increasingly rely on the Internet for communication and access to information, this reliance has come with a hefty price. Most critically, a simple exploit can cause massive roadblocks to Internet traffic, leading to disruptions in commerce, communication, and, as the military continues to rely on the Internet, national security.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s02_p02\">Distributed denial-of-service (DDoS) attacks work like cloud computing, but in reverse. Instead of a single computer going out to retrieve data from many different sources, DDoS is a coordinated effort by many different computers to bring down (or overwhelm) a specific website. Essentially, any web server can only handle a certain amount of information at once. While the largest and most stable web servers can talk to a huge number of computers simultaneously, even these can be overwhelmed.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s02_p03\">During a DDoS attack on government servers belonging to both the United States and South Korea in July 2009, many U.S. government sites were rendered unavailable to users in Asia for a short time (Gorman &amp; Ramstad, 2009). Although this did not have a major effect on U.S. cyber-security, the ease with which these servers could be exploited was troubling. In this case, the DDoS attacks were perpetuated by an e-mail virus known as MyDoom, which essentially turned users\u2019 computers into server-attacking \u201czombies.\u201d This exploit\u2014coupling an e-mail scam with a larger attack\u2014is difficult to trace, partly because the culprit is likely not one of the original attackers, but rather the victim of a virus used to turn vulnerable computers into an automated hacker army. Since the attack, President Barack Obama has committed to creating a new post for a head of cyber-security in the government.<\/p>\n        <\/div>\n    <\/div>\n    <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s05\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">Net Neutrality<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_p01\">Most Internet users in the United States connect through a commercial Internet service provider (ISP). The major players\u2014Comcast, Verizon, Time Warner Cable, AT&amp;T, and others\u2014are portals to the larger Internet, serving as a way for anyone with a cable line or phone line to receive broadband Internet access through a dedicated data line.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_p02\">Ideally, ISPs treat all content impartially; any two websites will load at the same speed if they have adequate server capabilities. Service providers are not entirely happy with this arrangement. ISPs have proposed a new service model that would allow corporations to pay for a \u201chigher tier\u201d service. For example, this would allow AOL Time Warner to deliver its Hulu service (which Time Warner co-owns with NBC) faster than all other video services, leading to partnerships between Internet content providers and Internet service providers. The service providers also often foot the bill for expanding high-speed Internet access, and they see this new two-tiered service as a way to cash in on some of that investment (and, presumably, to reinvest the funds received).<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_p03\">The main fear\u2014and the reason the FCC introduced <span class=\"margin_term\"><a class=\"glossterm\">net neutrality<\/a><\/span> rules\u2014is that such a service would hamper the ability of an Internet startup to grow its business. Defenders of net neutrality contend that small businesses (those without the ability to forge partnerships with the service providers) would be forced onto a \u201csecond-tier\u201d Internet service, and their content would naturally suffer, decreasing inventiveness and competition among Internet content providers.<\/p>\n        <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s05_s01\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Net Neutrality Legislation: The FCC and AT&amp;T<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s01_p01\">One of the key roadblocks to Internet legislation is the difficulty of describing the Internet and the Internet\u2019s place among communication bills of the past. First of all, it is important to realize that legislation relating to the impartiality of service providers is not unheard-of. Before the 1960s, AT&amp;T was allowed to restrict its customers to using only its own telephones on its networks. In the 1960s, the FCC launched a series of \u201cComputer Inquiries,\u201d stating, in effect, that any customer could use any device on the network, as long as it did not actually harm the network. This led to inventions such as the fax machine, which would not have been possible under AT&amp;T\u2019s previous agreement.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s01_p02\">A key point today is that these proto\u2013net neutrality rules protected innovation even when they \u201cthreatened to be a substitute for regulated services (Cannon, 2003).\u201d This is directly relevant to a controversy involving Apple\u2019s iPhone that culminated in October 2009 when AT&amp;T agreed to allow VoIP (voice over Internet protocol) on its 3G data networks. VoIP services, like the program Skype, allow a user to place a telephone call from an Internet data line to a traditional telephone line. In the case of the iPhone, AT&amp;T did not actually block the transmission of data\u2014it just had Apple block the app from its App Store. Since AT&amp;T runs the phone service as well as the data lines, and since many users have plans with unlimited data connections, AT&amp;T could see its phone profits cut drastically if all its users suddenly switched to using Skype to place all their telephone calls.<\/p>\n        <\/div>\n        <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s05_s02\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Misleading Metaphors: It\u2019s Not a Big Truck<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s02_p01\">Senator Ted Stevens, the former head of the committee in charge of regulating the Internet, said on the floor of the Senate that the Internet is \u201cnot a big truck\u2026it\u2019s a series of tubes (Curtis, 2006).\u201d According to this metaphor, an e-mail can get \u201cstuck in the tubes\u201d for days behind someone else\u2019s material, leading to poorer service for the customer. In reality, service providers sell data-usage plans that only set a <em class=\"emphasis\">cap<\/em> on the amount of data that someone can send over the Internet (measured in <span class=\"margin_term\"><a class=\"glossterm\">bits per second<\/a><\/span>, where a bit is the smallest measurement of data). If a service is rated at 1.5 million bits per second (megabits per second, or 1.5 Mbps), it may only reach this once in a while\u2014no one can \u201cclog the tubes\u201d without paying massive amounts of money for the service. Theoretically, the company will then invest this service fee in building more robust \u201ctubes.\u201d<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s02_p02\">Net neutrality is difficult to legislate in part because it can be confusing: It relies on understanding how the Internet works and how communications are regulated. Stevens\u2019s metaphor is misleading because it assumes that Internet capacity is not already regulated in some natural way. To use the superhighway analogy, Stevens is suggesting that the highways are congested, and his solution is to allow companies to dedicate express lanes for high-paying customers (it should be noted that the revenue would go to the service providers, even though the government has chipped in quite a bit for information superhighway construction). The danger of this is that it would be very difficult for a small business or personal site to afford express-lane access. Worse yet, the pro\u2013net neutrality organization Save the Internet says that a lack of legislation would allow companies to \u201cdiscriminate in favor of their own search engines\u201d and \u201cleave the rest of us on a winding dirt road (Save the Internet, 2010).\u201d For areas that only have access to one Internet service, this would amount to a lack of access to all the available content.<\/p>\n        <\/div>\n    <\/div>\n    <div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s06\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">Digital Technology and Electronic Media<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s06_p01\">Content on the Internet competes with content from other media outlets. Unlimited and cheap digital duplication of content removes the concept of scarcity from the economic model of media; it is no longer necessary to buy a physical CD fabricated by a company in order to play music, and digital words on a screen convey the news just as well as words printed on physical newspaper. Media companies have been forced to reinvent themselves as listeners, readers, and watchers have divided into smaller and smaller subcategories.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s06_p02\">Traditional media companies have had to evolve to adapt to the changes wrought by the Internet revolution, but these media are far from obsolete in an online world. For example, social media can provide a very inexpensive and reliable model for maintaining a band\u2019s following. A record company (or the band itself) can start a Facebook page, through which it can notify all its fans about new albums and tour dates\u2014or even just remind fans that it still exists. MySpace has been (and still is, to an extent) one of the main musical outlets on the Internet. This free service comes with a small web-based music player that allows people interested in the band to listen to samples of its music. Coupling free samples with social networking allows anyone to discover a band from anywhere in the world, leading to the possibility of varying and eclectic tastes not bound by geography.<\/p>\n        <div class=\"bcc-box bcc-success\" id=\"fwk-luleapollo-ch11_s04_s06_n01\">\n            <h3 class=\"title\">Key Takeaways<\/h3>\n            <ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch11_s04_s06_l01\"><li>On one hand, the information superhighway has opened up rural areas to global connections and made communication and trade much easier. One downside, however, is that illicit and unwanted information can move just as quickly as positive information\u2014it is up to the recipient to decide.<\/li>\n                <li>The lack of authorial attribution on many online forums can make it difficult to find credible information. However, <em class=\"emphasis\">Wikipedia<\/em>\u2019s concept of \u201cverifiability,\u201d or citing verified sources, has provided a good check to what can become a matter of mere my-word-against-yours. It is important to gauge possible bias in a source and to judge whether the author has an economic interest in the information.<\/li>\n                <li>Net neutrality is a general category of laws that seek to make it illegal for service providers to discriminate among types of Internet content. One downside of content discrimination is that a service provider could potentially make competitors\u2019 sites load much more slowly than their own.<\/li>\n            <\/ul><\/div>\n        <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n02\">\n            <h3 class=\"title\">Exercises<\/h3>\n            <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o01\"><li>Find a website about a single product, musician, or author. Does the site have a stated or strongly implied author?<\/li>\n                <li>Look for a copyright notice and a date, usually at the bottom of the page. How might that author\u2019s point of view bias the information on the site?<\/li>\n                <li>How can one determine the author\u2019s credibility?<\/li>\n            <\/ol><\/div>\n        <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n03\">\n            <h3 class=\"title\">End-of-Chapter Assessment<\/h3>\n            <p class=\"simpara\">Review Questions<\/p>\n            <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o02\"><li>\n                    <p class=\"para\">Section 1<\/p>\n                    <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o03\"><li>What are two of the original characteristics of the Internet, and how do they continue to affect it?<\/li>\n                        <li>What were some of the technological developments that had a part in the \u201cdemocratization\u201d of the Internet, or the spread of the Internet to more people?<\/li>\n                        <li>What were the causes and effects of the dot-com boom and crash? How did the dot-com boom and crash influence the Internet in later years, particularly with regards to content providers\u2019 income streams?<\/li>\n                    <\/ol><\/li>\n                <li>\n                    <p class=\"para\">Section 2<\/p>\n                    <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o04\"><li>What are some of the differences between social networking sites, and how do they reflect a tendency to cater to a specific demographic?<\/li>\n                        <li>How might blogs help the flow of information around the world? How might they damage that information?<\/li>\n                        <li>How has privacy been treated on social networking sites, and how does this affect the culture?<\/li>\n                        <li>How have marketers tried to use social networking to their advantage?<\/li>\n                    <\/ol><\/li>\n                <li>\n                    <p class=\"para\">Section 3<\/p>\n                    <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o05\"><li>How has globalization on the Internet changed the way culture is distributed?<\/li>\n                        <li>What are the implications of the Internet overtaking print media as a primary source for news, and how might that affect the public discourse?<\/li>\n                        <li>What is the \u201cInternet paradox,\u201d and how have various websites and services tried to combat it? How do Internet users socialize on the Internet?<\/li>\n                    <\/ol><\/li>\n                <li>\n                    <p class=\"para\">Section 4<\/p>\n                    <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o06\"><li>How does the metaphor of an \u201cinformation superhighway\u201d relate to both the positive and negative aspects of the Internet?<\/li>\n                        <li>What are some threats to credibility online, and how can users proactively seek only credible sources?<\/li>\n                        <li>What is net neutrality, and how could it change the way we access information on the Internet?<\/li>\n                        <li>How has the Internet affected the music business? How has the Internet affected the music from an artistic perspective?<\/li>\n                    <\/ol><\/li>\n            <\/ol><\/div>\n        <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n04\">\n            <h3 class=\"title\">Critical Thinking Questions<\/h3>\n            <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o07\"><li>One of the repeated promises of the Internet is that it is truly democratic and that anyone can have a voice. Has this played out in a viable way, or was that a naive assumption that never really came to fruition?<\/li>\n                <li>How do the concepts of decentralization and protocol play a part in the way the Internet works?<\/li>\n                <li>How have social networks transformed marketing? What are some of the new ways that marketers can target specific people?<\/li>\n                <li>How has the Internet changed the way people socialize online? Are there entirely new forms of socializing that did not exist before the Internet?<\/li>\n                <li>How has the concept of <em class=\"emphasis\">verifiability<\/em> changed the way that \u201ctruth\u201d is regarded on the Internet\u2014even in the culture at large? Has the speed and volume with which new information becomes available on the Internet made verifiable information more difficult to come by?<\/li>\n            <\/ol><\/div>\n        <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n05\">\n            <h3 class=\"title\">Career Connection<\/h3>\n            <p class=\"para\" id=\"fwk-luleapollo-ch11_s04_s06_p03\">There is a constantly growing market for people who know how to use social media effectively. Often, companies will hire someone specifically to manage their Facebook and Twitter feeds as another aspect of public relations and traditional marketing.<\/p>\n            <p class=\"para\" id=\"fwk-luleapollo-ch11_s04_s06_p04\">Read the article \u201c5 True Things Social Media Experts Do Online,\u201d written by social media writer Glen Allsopp. You can find it at <a class=\"link\" href=\"http:\/\/www.techipedia.com\/2010\/social-media-expert-skills\/\">http:\/\/www.techipedia.com\/2010\/social-media-expert-skills\/<\/a>.<\/p>\n            <p class=\"para\" id=\"fwk-luleapollo-ch11_s04_s06_p05\">Then, explore the site of Jonathan Fields, located at <a class=\"link\" href=\"http:\/\/www.jonathanfields.com\/blog\/\">http:\/\/www.jonathanfields.com\/blog\/<\/a>. After exploring for a bit, read the \u201cAbout\u201d section (the link is at the top). These two sites will help you answer the following questions:\n<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o08\"><li>How has Jonathan Fields made \u201ceverything else irrelevant\u201d? What are some of the indications that he gives in his biography that he is passionate about his industry doing well?<\/li>\n                    <li>Review Jonathan\u2019s Twitter feed on the right column of his site. Who are some of the other people he features, and how might this relate to Glen Allsopp\u2019s advice to \u201chighlight others\u201d?<\/li>\n                    <li>Also look at Jonathan\u2019s \u201cSmall Business Marketing\u201d section. What are some of the things he does to help businesses reach customers? How might this be potentially rewarding?<\/li>\n                    <li>Think about the ways that you may use social media in your own life, and how you might be able to use those skills to help a business. Pick an activity that you might (or do) participate in online and write down how you might do the same thing from the perspective of a company. For example, how would you write the \u201cAbout Me\u201d section of a company\u2019s Facebook profile? How could you start turning this skill into a career?<\/li>\n<\/ol><\/div>\n    <\/div>\n\n<h2>References<\/h2>\n\nBasham, Patrick. \u201cLive Earth\u2019s Inconvenient Truths,\u201d Cato Institute, July 11, 2007, <a class=\"link\" href=\"http:\/\/www.cato.org\/pub_display.php?pub_id=8497\">http:\/\/www.cato.org\/pub_display.php?pub_id=8497<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nCannon, Robert. \u201cThe Legacy of the Federal Communications Commission\u2019s Computer Inquiries,\u201d <em class=\"emphasis\">Federal Communication Law Journal<\/em> 55, no. 2 (2003): 170.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nCurtis, Alex. \u201cSenator Stevens Speaks on Net Neutrality,\u201d Public Knowledge, June 28, 2006, <a class=\"link\" href=\"http:\/\/www.publicknowledge.org\/node\/497\">http:\/\/www.publicknowledge.org\/node\/497<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nExxon, Exxpose. \u201cGlobal Warming Deniers and ExxonMobil,\u201d 2006, <a class=\"link\" href=\"http:\/\/www.exxposeexxon.com\/facts\/gwdeniers.html\">http:\/\/www.exxposeexxon.com\/facts\/gwdeniers.html<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nGorman, Siobhan and Evan Ramstad, \u201cCyber Blitz Hits U.S., Korea,\u201d <em class=\"emphasis\">Wall Street Journal<\/em>, July 9, 2009, <a class=\"link\" href=\"http:\/\/online.wsj.com\/article\/SB124701806176209691.html\">http:\/\/online.wsj.com\/article\/SB124701806176209691.html<\/a>.\t\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nGreenpeace, <em class=\"emphasis\">ExxonMobil 2006 Contributions and Community Investments<\/em>, October 5, 2007, <a class=\"link\" href=\"http:\/\/research.greenpeaceusa.org\/?a=view&amp;d=4381\">http:\/\/research.greenpeaceusa.org\/?a=view&amp;d=4381<\/a>.\t\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nJesdanun, Anick. \u201cHigh Expectations for the Internet,\u201d December 30, 2002, <a class=\"link\" href=\"http:\/\/www.crn.com\/it-channel\/18822182;jsessionid=3Z2ILJNFKM1FZQE1GHPCKH4ATMY32JVN\">http:\/\/www.crn.com\/it-channel\/18822182;jsessionid=3Z2ILJNFKM1FZQE1GHPCKH4ATMY32JVN<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nKirk, Elizabeth E. \u201cEvaluating Information Found on the Internet,\u201d Sheridan Libraries, Johns Hopkins University, 1996, <a class=\"link\" href=\"http:\/\/www.library.jhu.edu\/researchhelp\/general\/evaluating\/\">http:\/\/www.library.jhu.edu\/researchhelp\/general\/evaluating\/<\/a>.\t\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nRevkin, Andrew C. \u201cHacked E-Mail Is New Fodder for Climate Dispute,\u201d <em class=\"emphasis\">New York Times<\/em>, November 20, 2009, <a class=\"link\" href=\"http:\/\/www.nytimes.com\/2009\/11\/21\/science\/earth\/21climate.html\">http:\/\/www.nytimes.com\/2009\/11\/21\/science\/earth\/21climate.html<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nSave the Internet, \u201cFAQs,\u201d 2010, <a class=\"link\" href=\"http:\/\/www.savetheinternet.com\/faq\">http:\/\/www.savetheinternet.com\/faq<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nThe Biz Media, \u201cVideo and the Information Superhighway: An Artist\u2019s Perspective,\u201d <em class=\"emphasis\">The Biz Media<\/em>, May 3, 2010, <a class=\"link\" href=\"http:\/\/blog.thebizmedia.com\/video-and-the-information-superhighway\/\">http:\/\/blog.thebizmedia.com\/video-and-the-information-superhighway\/<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nU.S. Department of Education, <em class=\"emphasis\">Toward a New Golden Age in American Education: How the Internet, the Law and Today\u2019s Students Are Revolutionizing Expectations<\/em>, National Education Technology Plan, 2004, <a class=\"link\" href=\"http:\/\/www2.ed.gov\/about\/offices\/list\/os\/technology\/plan\/2004\/site\/theplan\/edlite-intro.html\">http:\/\/www2.ed.gov\/about\/offices\/list\/os\/technology\/plan\/2004\/site\/theplan\/edlite-intro.html<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nWikipedia, s.v. \u201cWikipedia:Neutral point of view,\u201d <a class=\"link\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Neutral_point_of_view\">http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Neutral_point_of_view<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nWikipedia, s.v. \u201cWikipedia:Verifiability,\u201d <a class=\"link\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Verifiability\">http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Verifiability<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nZetter, Kim. \u201cGoogle to Stop Censoring Search Results in China After Hack Attack,\u201d <em class=\"emphasis\">Wired<\/em>, January 12, 2010, <a class=\"link\" href=\"http:\/\/www.wired.com\/threatlevel\/2010\/01\/google-censorship-china\/\">http:\/\/www.wired.com\/threatlevel\/2010\/01\/google-censorship-china\/<\/a>.\n<br\/><br\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nZetter, Kim. \u201cNov. 10, 1983: Computer \u2018Virus\u2019 Is Born,\u201d <em class=\"emphasis\">Wired<\/em>, November 10, 2009, <a class=\"link\" href=\"http:\/\/www.wired.com\/thisdayintech\/2009\/11\/1110fred-cohen-first-computer-virus\/\">http:\/\/www.wired.com\/thisdayintech\/2009\/11\/1110fred-cohen-first-computer-virus\/<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t","rendered":"<div class=\"bcc-box bcc-highlight\" id=\"fwk-luleapollo-ch11_s04_n01\">\n<h3 class=\"title\">Learning Objectives<\/h3>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_o01\">\n<li>Define <em class=\"emphasis\">information superhighway<\/em> as it relates to the Internet.<\/li>\n<li>Identify ways to identify credible sources online.<\/li>\n<li>Define <em class=\"emphasis\">net neutrality<\/em>.<\/li>\n<li>Describe some of the effects of the Internet and social media on traditional media.<\/li>\n<\/ol>\n<\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p01\">By 1994, the promise of the \u201c<span class=\"margin_term\"><a class=\"glossterm\">information superhighway<\/a><\/span>\u201d had become so potent that it was given its own summit on the University of California Los Angeles campus. The country was quickly realizing that the spread of the web could be harnessed for educational purposes; more than just the diversion of computer hobbyists, this new vision of the web would be a constant learning resource that anyone could use.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p02\">The American video artist pioneer Nam June Paik takes credit for the term <em class=\"emphasis\">information superhighway<\/em>, which he used during a study for the Rockefeller Foundation in 1974, long before the existence of Usenet. In 2001, he said, \u201cIf you create a highway, then people are going to invent cars. That\u2019s dialectics. If you create electronic highways, something has to happen (The Biz Media, 2010).\u201d Paik\u2019s prediction proved to be startlingly prescient.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p03\">Al Gore\u2019s use of the term in the House of Representatives (and later as vice president) had a slightly different meaning and context. To Gore, the promise of the Interstate Highway System during the Eisenhower era was that the government would work to allow communication across natural barriers, and that citizens could then utilize these channels to conduct business and communicate with one another. Gore saw the government as playing an essential role in maintaining the pathways of electronic communication. Allowing business interests to get involved would compromise what he saw as a necessarily neutral purpose; a freeway doesn\u2019t judge or demand tolls\u2014it is a public service\u2014and neither should the Internet. During his 2000 presidential campaign, Gore was wrongly ridiculed for supposedly saying that he \u201cinvented the Internet,\u201d but in reality his work in the House of Representatives played a crucial part in developing the infrastructure required for Internet access.<\/p>\n<div style=\"text-align: center;\">\n<div style=\"text-align: center; font-size: .8em; max-width: 500px;\" id=\"fwk-luleapollo-ch11_s04_f01\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.10<\/span> <\/p>\n<p>        <a href=\"http:\/\/open.lib.umn.edu\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/11\/11.5.0.jpg\"><img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195148\/11.5.0.jpg\" alt=\"11.5.0\" width=\"500\" class=\"aligncenter size-full wp-image-1318\" \/><\/a><\/p>\n<p class=\"para\">Although Al Gore did not invent the Internet, he did popularize the term <em class=\"emphasis\">information superhighway<\/em> in an effort to build support for Internet infrastructure and neutrality.<\/p>\n<p class=\"para\">Dan Farber &#8211; <a href=\"https:\/\/www.flickr.com\/photos\/farber\/3010981299\/\">Al Gore at Web 2.0 Summit<\/a> &#8211; CC BY-NC 2.0.<\/p>\n<\/p><\/div>\n<\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p04\">However, a certain amount of money was necessary to get connected to the web. In this respect, AOL was like the Model T of the Internet\u2014it put access to the information superhighway within reach of the average person. But despite the affordability of AOL and the services that succeeded it, certain demographics continued to go without access to the Internet, a problem known as the \u201cdigital divide,\u201d which you will learn more about in this section.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_p05\">From speed of transportation, to credibility of information (don\u2019t trust the stranger at the roadside diner), to security of information (keep the car doors locked), to net neutrality (toll-free roads), to the possibility of piracy, the metaphor of the information superhighway has proved to be remarkably apt. All of these issues have played out in different ways, both positive and negative, and they continue to develop to this day.<\/p>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s01\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Information Access Like Never Before<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_p01\">In December 2002, a survey by the Pew Internet &amp; American Life Project found that 84 percent of Americans believed that they could find information on health care, government, news, or shopping on the Internet (Jesdanun, 2002). This belief in a decade-old system of interconnected web pages would in itself be remarkable, but taking into account that 37 percent of respondents were not even connected to the Internet, it becomes even more fantastic. In other words, of the percentage of Americans without Internet connections, 64 percent still believed that it could be a source of information about these crucial topics. In addition, of those who expect to find such information, at least 70 percent of them succeed; news and shopping were the most successful topics, government was the least. This survey shows that most Americans believed that the Internet was indeed an effective source of information. Again, the role of the Internet in education was heralded as a new future, and technology was seen to level the playing field for all students.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_p02\">Nowhere was this more apparent than in the Bush administration\u2019s 2004 report, \u201cToward a New Golden Age in Education: How the Internet, the Law, and Today\u2019s Students Are Revolutionizing Expectations.\u201d By this time, the term <em class=\"emphasis\">digital divide<\/em> was already widely used and the goal of \u201cbridging\u201d it took everything from putting computers in classrooms to giving personal computers to some high-need students to use at home.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_p03\">The report stated that an \u201cexplosive growth\u201d in sectors such as e-learning and virtual schools allowed each student \u201cindividual online instruction (U.S. Department of Education, 2004).\u201d More than just being able to find information online, people expected the Internet to provide virtually unlimited access to educational opportunities. To make this expectation a reality, one of the main investments that the paper called for was increased <span class=\"margin_term\"><a class=\"glossterm\">broadband Internet access<\/a><\/span>. As Nam June Paik predicted, stringing fiber optics around the world would allow for seamless video communication, a development that the Department of Education saw as integral to its vision of educating through technology. The report called for broadband access \u201c24 hours a day, seven days a week, 365 days a year,\u201d saying that it could \u201chelp teachers and students realize the full potential of this technology (U.S. Department of Education, 2004).\u201d<\/p>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s01_s01\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Rural Areas and Access to Information<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s01_p01\">One of the founding principles of many public library systems is to allow for free and open access to information. Historically, one of the major roadblocks to achieving this goal has been a simple one: location. Those living in rural areas or those with limited access to transportation simply could not get to a library. But with the spread of the Internet, the hope was that a global library would be created\u2014an essential prospect for rural areas.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s01_p02\">One of the most remarkable educational success stories in the Department of Education\u2019s study is that of the Chugach School District in Alaska. In 1994, this district was the lowest performing in the state: over 50 percent staff turnover, the lowest standardized test scores, and only one student in 26 years graduating from college (U.S. Department of Education, 2004). The school board instituted drastic measures, amounting to a complete overhaul of the system. They abolished grade levels, focusing instead on achievement, and by 2001 had increased Internet usage from 5 percent to 93 percent.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s01_p03\">The Department of Education study emphasizes these numbers, and with good reason: The standardized test percentile scores rose from the 1920s to the 1970s in a period of 4 years, in both math and language arts. Yet these advances were not exclusive to low-performing rural students. In Florida, the Florida Virtual School system allowed rural school districts to offer advanced-placement coursework. Students excelling in rural areas could now study topics that were previously limited to districts that could fill (and fund) an entire classroom. Just as the Interstate Highway System commercially connected the most remote rural communities to large cities, the Internet has brought rural areas even further into the global world, especially in regard to the sharing of information and knowledge.<\/p>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s01_s02\" xml:lang=\"en\">\n<h2 class=\"title editable block\">The Cloud: Instant Updates, Instant Access<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p01\">As technology has improved, it has become possible to provide software to users as a service that resides entirely online, rather than on a person\u2019s personal computer. Since people can now be connected to the Internet constantly, they can use online programs to do all of their computing. It is no longer absolutely necessary to have, for example, a program like Microsoft Word to compose documents; this can be done through an online service like Google Docs or Zoho Writer.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p02\">\u201c<span class=\"margin_term\"><a class=\"glossterm\">Cloud computing<\/a><\/span>\u201d is the process of outsourcing common computing tasks to a remote server. The actual work is not done by the computer attached to the user\u2019s monitor, but by other (maybe many other) computers in the \u201ccloud.\u201d As a result, the computer itself does not actually need that much processing power; instead of calculating \u201c1 + 1 = 2,\u201d the user\u2019s computer asks the cloud, \u201cWhat does 1 + 1 equal?\u201d and receives the answer. Meanwhile, the system resources that a computer would normally devote to completing these tasks are freed up to be used for other things. An additional advantage of cloud computing is that data can be stored in the cloud and retrieved from any computer, making a user\u2019s files more conveniently portable and less vulnerable to hardware failures like a hard drive crash. Of course, it can require quite a bit of <span class=\"margin_term\"><a class=\"glossterm\">bandwidth<\/a><\/span> to send these messages back and forth to a remote server in the cloud, and in the absence of a reliable, always-on Internet connection, the usefulness of these services can be somewhat limited.<\/p>\n<div style=\"text-align: center;\">\n<div style=\"text-align: center; font-size: .8em; max-width: 497px;&#x201d; id=\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 11.11<\/span> <\/p>\n<p>                <a href=\"\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/04\/0fb75e6fbfcce6e0ac165115a52a578e.jpg\"> <img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195150\/0fb75e6fbfcce6e0ac165115a52a578e.jpg\" alt=\"image\" style=\"max-width: 497px;\" \/><\/a><\/p>\n<p class=\"para\">Cloud computing allows a computer to contain very little actual information. Many of the programs used by the now-popular \u201cnetbooks\u201d are stored online.<\/p>\n<\/p><\/div>\n<\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p03\">The concept of the cloud takes into account all the applications that are hosted on external machines and viewed on a user\u2019s computer. Google Docs, which provides word processors, spreadsheets, and other tools, and Microsoft\u2019s Hotmail, which provides e-mail access, both constitute aspects of the \u201ccloud.\u201d These services are becoming even more popular with the onset of mobile applications and netbooks, which are small laptops with relatively little processing power and storage space that rely on cloud computing. A netbook does not need the processing power required to run Microsoft Word; as long as it has a web browser, it can run the Google Docs word processor and leave (almost) all of the processing to the cloud. Because of this evolution of the Internet, computers can be built less like stand-alone machines and more like interfaces for interacting with the larger system in the cloud.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s01_s02_p04\">One result of cloud computing has been the rise in web applications for mobile devices, such as the iPhone, BlackBerry, and devices that use Google\u2019s Android operating system. <span class=\"margin_term\"><a class=\"glossterm\">3G networks<\/a><\/span>, which are cell phone networks capable of high-speed data transfer, can augment the computing power of phones just by giving the phones the ability to send data somewhere else to be processed. For example, a Google Maps application does not actually calculate the shortest route between two places (taking into account how highways are quicker than side roads, and numerous other computational difficulties) but rather just asks Google to do the calculation and send over the result. 3G networks have made this possible in large part because the speed of data transfer has now surpassed the speed of cell phones\u2019 calculation abilities. As cellular transmission technology continues to improve with the rollout of the next-generation <span class=\"margin_term\"><a class=\"glossterm\">4G networks<\/a><\/span> (the successors to 3G networks), connectivity speeds will further increase and allow for a focus on ever-more-comprehensive provisions for multimedia.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s02\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Credibility Issues: (Dis)information Superhighway?<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_p01\">The Internet has undoubtedly been a boon for researchers and writers everywhere. Online services range from up-to-date news and media to vast archives of past writing and scholarship. However, since the Internet is open to any user, anyone with a few dollars can set up a credible-sounding website and begin to disseminate false information.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_p02\">This is not necessarily a problem with the Internet specifically; any traditional medium can\u2014knowingly or unknowingly\u2014publish unreliable or outright false information. But the explosion of available sources on the Internet has caused a bit of a dilemma for information seekers. The difference is that much of the information on the Internet is not the work of professional authors, but of amateurs who have questionable expertise. On the Internet, anyone can self-publish, so the vetting that usually occurs in a traditional medium\u2014for example, by a magazine\u2019s editorial department\u2014rarely happens online.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_p03\">That said, if an author who is recognizable from elsewhere writes something online, it may point to more reliable information (Kirk, 1996). In addition, looking for a trusted name on the website could lead to more assurance of reliability. For example, the site <a class=\"link\" href=\"http:\/\/krugmanonline.com\">krugmanonline.com<\/a>, the official site of Princeton economist Paul Krugman, does not have any authorial data. Even statements like \u201cNobel Prize Winner and Op-Ed Columnist for the <em class=\"emphasis\">New York Times<\/em>\u201d do not actually say anything about the author of the website. Much of the content is aggregated from the web as well. However, the bottom-left corner of the page has the mark \u201c\u00a9 2009 W. W. Norton &amp; Company, Inc.\u201d (Krugman\u2019s publisher). Therefore, a visitor might decide to pick and choose which information to trust. The author is clearly concerned with selling Krugman\u2019s books, so the glowing reviews may need to be verified elsewhere; on the other hand, the author biography is probably fairly accurate, since the publishing company has direct access to Krugman, and Krugman himself probably looked it over to make sure it was valid. Taking the authorship of a site into account is a necessary step when judging information; more than just hunting down untrue statements, it can give insight into subtle bias that may arise and point to further research that needs to be done.<\/p>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s02_s01\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Just Trust Me: Bias on the web<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p01\">One noticeable thing on Paul Krugman\u2019s site is that all of his book reviews are positive. Although these are probably real reviews, they may not be representative of his critical reception at large. Mainstream journalistic sources usually attempt to achieve some sort of balance in their reporting; given reasonable access, they will interview opposing viewpoints and reserve judgment for the editorial page. Corporate sources, like on Krugman\u2019s site, will instead tilt the information toward their product.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p02\">Often, the web is viewed as a source of entertainment, even in its informational capacity. Because of this, sites that rely on advertising may choose to publish something more inflammatory that will be linked to and forwarded more for its entertainment value than for its informational qualities.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p03\">On the other hand, a website might attempt to present itself as a credible source of information about a particular product or topic, with the end goal of selling something. A website that gives advice on how to protect against bedbugs that includes a direct link to its product may not be the best source of information on the topic. While so much on the web is free, it is worthwhile looking into how websites actually maintain their services. If a website is giving something away for free, the information might be biased, because it must be getting its money from somewhere. The online archive of <em class=\"emphasis\">Consumer Reports<\/em> requires a subscription to access it. Ostensibly, this subscription revenue allows the service to exist as an impartial judge, serving the users rather than the advertisers.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p04\">Occasionally, corporations may set up \u201ccredible\u201d fronts to disseminate information. Because sources may look reliable, it is always important to investigate further. Global warming is a contentious topic, and websites about the issue often represent the bias of their owners. For example, the Cato Institute publishes anti-global-warming theory columns in many newspapers, including well-respected ones such as the <em class=\"emphasis\">Washington Times<\/em>. Patrick Basham, an adjunct scholar at the Cato Institute, published the article \u201cLive Earth\u2019s Inconvenient Truths\u201d in the <em class=\"emphasis\">Washington Times<\/em> on July 11, 2007. Basham writes, \u201cUsing normal scientific standards, there is no proof we are causing the Earth to warm, let alone that such warming will cause an environmental catastrophe (Basham, 2007).\u201d<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p05\">However, the website <a class=\"link\" href=\"http:\/\/ExxposeExxon.com\">ExxposeExxon.com<\/a> states that the Cato Institute received $125,000 from the oil giant ExxonMobil, possibly tainting its data with bias (Exxon, 2006). In addition, <a class=\"link\" href=\"http:\/\/ExxposeExxon.com\">ExxposeExxon.com<\/a> is run as a side project of the international environmental nonprofit Greenpeace, which may have its own reasons for producing this particular report. The document available on Greenpeace\u2019s site (a scanned version of Exxon\u2019s printout) states that in 2006, the corporation gave $20,000 to the Cato Institute (Greenpeace, 2007) (the other $105,000 was given over the previous decade).<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s02_s01_p06\">This back-and-forth highlights the difficulty of finding credible information online, especially when money is at stake. In addition, it shows how conflicting sources may go to great lengths\u2014sorting through a company\u2019s corporate financial reports\u2014in order to expose what they see as falsehoods. What is the upside to all of this required fact-checking and cross-examination? Before the Internet, this probably would have required multiple telephone calls and plenty of time waiting on hold. While the Internet has made false information more widely available, it has also made checking that information incredibly easy.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s03\" xml:lang=\"en\">\n<h2 class=\"title editable block\">\n<em class=\"emphasis\">Wikipedia<\/em>: The Internet\u2019s Precocious Problem Child<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p01\">Nowhere has this cross-examination and cross-listing of sources been more widespread than with <em class=\"emphasis\">Wikipedia<\/em>. Information free and available to all? That sounds like a dream come true\u2014a dream that <em class=\"emphasis\">Wikipedia<\/em> founder Jimmy Wales was ready to pursue. Since the site began in 2001, the Wikimedia Foundation (which hosts all of the <em class=\"emphasis\">Wikipedia<\/em> pages) has become the sixth-most-visited site on the web, barely behind eBay in terms of its unique page views.<\/p>\n<div class=\"table block\" id=\"fwk-luleapollo-ch11_s04_s03_t01\">\n<p class=\"title\"><span class=\"title-prefix\">Table 11.3<\/span> Top 10 Global Web Parent Companies, Home and Work<\/p>\n<table cellpadding=\"0\" style=\"border-spacing: 0px;\">\n<thead>\n<tr>\n<th align=\"left\">\n<p class=\"para\">Rank<\/p>\n<\/th>\n<th align=\"left\">\n<p class=\"para\">Parent<\/p>\n<\/th>\n<th align=\"left\">\n<p class=\"para\">Unique Audience (Millions)<\/p>\n<\/th>\n<th align=\"left\">\n<p class=\"para\">Active Reach %<\/p>\n<\/th>\n<th align=\"left\">\n<p class=\"para\">Time<\/p>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\">\n<p class=\"para\">1<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">Google<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">362,006<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">84.29<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">2:27:15<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">2<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">Microsoft<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">322,352<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">75.06<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">2:53:48<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">3<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">Yahoo!<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">238,035<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">55.43<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">1:57:26<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">4<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">Facebook<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">218,861<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">50.96<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">6:22:24<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">5<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">eBay<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">163,325<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">38.03<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">1:42:46<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">6<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">Wikimedia<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">154,905<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">36.07<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">0:15:14<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">7<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">AOL LLC<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">128,147<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">29.84<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">2:08:32<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">8<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">Amazon<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">128,071<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">29.82<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">0:23:24<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">9<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">News Corp.<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">125,898<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">29.31<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">0:53:53<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\">10<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">InterActiveCorp<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">122,029<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">28.41<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\">0:10:52<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<th align=\"left\">\n<p class=\"para\">Source: The Nielsen Company<\/p>\n<\/th>\n<th>\n                        <\/th>\n<th>\n                        <\/th>\n<th>\n                        <\/th>\n<th>\n                    <\/th>\n<\/tr>\n<\/tfoot>\n<\/table>\n<\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p02\">Organizations had long been trying to develop factual content for the web but <em class=\"emphasis\">Wikipedia<\/em> went for something else: <span class=\"margin_term\"><a class=\"glossterm\">verifiability<\/a><\/span>. The guidelines for editing <em class=\"emphasis\">Wikipedia<\/em> state: \u201cWhat counts is whether readers can verify that material added to <em class=\"emphasis\">Wikipedia<\/em> has already been published by a reliable source, not whether editors think it is true (Wikipedia).\u201d The benchmark for inclusion on <em class=\"emphasis\">Wikipedia<\/em> includes outside citations for any content \u201clikely to be challenged\u201d and for \u201call quotations.\u201d<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p03\">While this may seem like it\u2019s a step ahead of many other sources on the Internet, there is a catch: Anyone can edit <em class=\"emphasis\">Wikipedia<\/em>. This has a positive and negative side\u2014though anyone can vandalize the site, anyone can also fix it. In addition, calling a particularly contentious page to attention can result in one of the site\u2019s administrators placing a warning at the top of the page stating that the information is not necessarily verified. Other warnings include notices on articles about living persons, which are given special attention, and articles that may violate <em class=\"emphasis\">Wikipedia<\/em>\u2019s neutrality policy. This neutrality policy is a way to mitigate the extreme views that may be posted on a page with open access, allowing the community to decide what constitutes a \u201csignificant\u201d view that should be represented (Wikipedia).<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s03_p04\">As long as users do not take the facts on <em class=\"emphasis\">Wikipedia<\/em> at face value and make sure to follow up on the relevant sources linked in the articles they read, the site is an extremely useful reference tool that gives users quick access to a wide range of subjects. However, articles on esoteric subjects can be especially prone to vandalism or poorly researched information. Since every reader is a potential editor, a lack of readers can lead to a poorly edited page because errors, whether deliberate or not, go uncorrected. In short, the lack of authorial credit can lead to problems with judging bias and relevance of information, so the same precautions must be taken with <em class=\"emphasis\">Wikipedia<\/em> as with any other online source, primarily in checking references. The advantage of <em class=\"emphasis\">Wikipedia<\/em> is its openness and freedom\u2014if you find a problem, you can either fix it (with your own verifiable sources) or flag it on the message boards. Culturally, there has been a shift from valuing a few reliable sources to valuing a multiplicity of competing sources. However, weighing these sources against one another has become easier than ever before.<\/p>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s04\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Security of Information on the Internet<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_p01\">As the Internet has grown in scope and the amount of personal information online has proliferated, securing this information has become a major issue. The Internet now houses everything from online banking systems to highly personal e-mail messages, and even though security is constantly improving, this information is not invulnerable.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_p02\">An example of this vulnerability is the Climategate scandal in late 2009. A collection of private e-mail messages were hacked from a server at the University of East Anglia, where much of the Intergovernmental Panel on Climate Change research takes place. These e-mails show internal debates among the scientists regarding which pieces of data should be released and which are not relevant (or helpful) to their case (Revkin, 2009). In these e-mails, the scientists sometimes talk about colleagues\u2014especially those skeptical of climate change\u2014in a derisive way. Of course, these e-mails were never meant to become public.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_p03\">This scandal demonstrates how easy it can be to lose control of private information on the Internet. In previous decades, hard copies of these letters would have to be found, and the theft could probably be traced back to a specific culprit. With the Internet, it is much more difficult to tell who is doing the snooping, especially if it is done on a public network. The same protocols that allow for open access and communication also allow for possible exploitation. Like the Interstate Highway System, the Internet is impartial to its users. In other words: If you\u2019re going to ride, lock your doors.<\/p>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s04_s01\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Hacking E-mail: From LOVE-LETTER-FOR-YOU to Google in China<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s01_p01\">Another explosive scandal involving e-mail account hacking also occurred in late 2009, when Google\u2019s Gmail service was hacked by IP addresses originating in China. Gmail was one of the primary services used by human rights activists due to its location in the United States and its extra encryption. To understand the magnitude of this, it is important to understand the history of e-mail hacking and the importance of physical server location and local laws.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s01_p02\">In 2000, a <span class=\"margin_term\"><a class=\"glossterm\">computer virus<\/a><\/span> was unleashed by a student in the Philippines that simply sent a message with the subject line \u201cI Love You.\u201d The e-mail had a file attached, called LOVE-LETTER-FOR-YOU.TXT.vbs. The suffix \u201c.txt\u201d is generally used for text files and was meant, in this case, as a distraction; the file\u2019s real suffix was \u201c.vbs,\u201d which means that the file is a script. When run, this script ran and e-mailed itself across the user\u2019s entire address book, before sending any available passwords to an e-mail address in the Philippines. One of the key aspects of this case, however, was a matter of simple jurisdiction: The student was not prosecuted, due to the lack of computer crime laws in the Philippines (Zetter, 1983).<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s01_p03\">The encryption that Gmail uses resulted in only two of the accounts being successfully hacked, and hackers were only able to see e-mail subject lines and timestamps\u2014no message content was available (Zetter, 2010). Since the chaos that ensued after the \u201cI Love You\u201d virus, e-mail users and service providers have become more vigilant in their defensive techniques. However, the increased reliance on e-mail for daily communication makes it an attractive target for hackers. The development of cloud computing will likely lead to entirely new problems with Internet security; just as a highway brings two communities together, it can also cause these communities to share problems.<\/p>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s04_s02\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Can\u2019t Wait: Denial of Service<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s02_p01\">Although many people increasingly rely on the Internet for communication and access to information, this reliance has come with a hefty price. Most critically, a simple exploit can cause massive roadblocks to Internet traffic, leading to disruptions in commerce, communication, and, as the military continues to rely on the Internet, national security.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s02_p02\">Distributed denial-of-service (DDoS) attacks work like cloud computing, but in reverse. Instead of a single computer going out to retrieve data from many different sources, DDoS is a coordinated effort by many different computers to bring down (or overwhelm) a specific website. Essentially, any web server can only handle a certain amount of information at once. While the largest and most stable web servers can talk to a huge number of computers simultaneously, even these can be overwhelmed.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s04_s02_p03\">During a DDoS attack on government servers belonging to both the United States and South Korea in July 2009, many U.S. government sites were rendered unavailable to users in Asia for a short time (Gorman &amp; Ramstad, 2009). Although this did not have a major effect on U.S. cyber-security, the ease with which these servers could be exploited was troubling. In this case, the DDoS attacks were perpetuated by an e-mail virus known as MyDoom, which essentially turned users\u2019 computers into server-attacking \u201czombies.\u201d This exploit\u2014coupling an e-mail scam with a larger attack\u2014is difficult to trace, partly because the culprit is likely not one of the original attackers, but rather the victim of a virus used to turn vulnerable computers into an automated hacker army. Since the attack, President Barack Obama has committed to creating a new post for a head of cyber-security in the government.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s05\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Net Neutrality<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_p01\">Most Internet users in the United States connect through a commercial Internet service provider (ISP). The major players\u2014Comcast, Verizon, Time Warner Cable, AT&amp;T, and others\u2014are portals to the larger Internet, serving as a way for anyone with a cable line or phone line to receive broadband Internet access through a dedicated data line.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_p02\">Ideally, ISPs treat all content impartially; any two websites will load at the same speed if they have adequate server capabilities. Service providers are not entirely happy with this arrangement. ISPs have proposed a new service model that would allow corporations to pay for a \u201chigher tier\u201d service. For example, this would allow AOL Time Warner to deliver its Hulu service (which Time Warner co-owns with NBC) faster than all other video services, leading to partnerships between Internet content providers and Internet service providers. The service providers also often foot the bill for expanding high-speed Internet access, and they see this new two-tiered service as a way to cash in on some of that investment (and, presumably, to reinvest the funds received).<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_p03\">The main fear\u2014and the reason the FCC introduced <span class=\"margin_term\"><a class=\"glossterm\">net neutrality<\/a><\/span> rules\u2014is that such a service would hamper the ability of an Internet startup to grow its business. Defenders of net neutrality contend that small businesses (those without the ability to forge partnerships with the service providers) would be forced onto a \u201csecond-tier\u201d Internet service, and their content would naturally suffer, decreasing inventiveness and competition among Internet content providers.<\/p>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s05_s01\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Net Neutrality Legislation: The FCC and AT&amp;T<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s01_p01\">One of the key roadblocks to Internet legislation is the difficulty of describing the Internet and the Internet\u2019s place among communication bills of the past. First of all, it is important to realize that legislation relating to the impartiality of service providers is not unheard-of. Before the 1960s, AT&amp;T was allowed to restrict its customers to using only its own telephones on its networks. In the 1960s, the FCC launched a series of \u201cComputer Inquiries,\u201d stating, in effect, that any customer could use any device on the network, as long as it did not actually harm the network. This led to inventions such as the fax machine, which would not have been possible under AT&amp;T\u2019s previous agreement.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s01_p02\">A key point today is that these proto\u2013net neutrality rules protected innovation even when they \u201cthreatened to be a substitute for regulated services (Cannon, 2003).\u201d This is directly relevant to a controversy involving Apple\u2019s iPhone that culminated in October 2009 when AT&amp;T agreed to allow VoIP (voice over Internet protocol) on its 3G data networks. VoIP services, like the program Skype, allow a user to place a telephone call from an Internet data line to a traditional telephone line. In the case of the iPhone, AT&amp;T did not actually block the transmission of data\u2014it just had Apple block the app from its App Store. Since AT&amp;T runs the phone service as well as the data lines, and since many users have plans with unlimited data connections, AT&amp;T could see its phone profits cut drastically if all its users suddenly switched to using Skype to place all their telephone calls.<\/p>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s05_s02\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Misleading Metaphors: It\u2019s Not a Big Truck<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s02_p01\">Senator Ted Stevens, the former head of the committee in charge of regulating the Internet, said on the floor of the Senate that the Internet is \u201cnot a big truck\u2026it\u2019s a series of tubes (Curtis, 2006).\u201d According to this metaphor, an e-mail can get \u201cstuck in the tubes\u201d for days behind someone else\u2019s material, leading to poorer service for the customer. In reality, service providers sell data-usage plans that only set a <em class=\"emphasis\">cap<\/em> on the amount of data that someone can send over the Internet (measured in <span class=\"margin_term\"><a class=\"glossterm\">bits per second<\/a><\/span>, where a bit is the smallest measurement of data). If a service is rated at 1.5 million bits per second (megabits per second, or 1.5 Mbps), it may only reach this once in a while\u2014no one can \u201cclog the tubes\u201d without paying massive amounts of money for the service. Theoretically, the company will then invest this service fee in building more robust \u201ctubes.\u201d<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s05_s02_p02\">Net neutrality is difficult to legislate in part because it can be confusing: It relies on understanding how the Internet works and how communications are regulated. Stevens\u2019s metaphor is misleading because it assumes that Internet capacity is not already regulated in some natural way. To use the superhighway analogy, Stevens is suggesting that the highways are congested, and his solution is to allow companies to dedicate express lanes for high-paying customers (it should be noted that the revenue would go to the service providers, even though the government has chipped in quite a bit for information superhighway construction). The danger of this is that it would be very difficult for a small business or personal site to afford express-lane access. Worse yet, the pro\u2013net neutrality organization Save the Internet says that a lack of legislation would allow companies to \u201cdiscriminate in favor of their own search engines\u201d and \u201cleave the rest of us on a winding dirt road (Save the Internet, 2010).\u201d For areas that only have access to one Internet service, this would amount to a lack of access to all the available content.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch11_s04_s06\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Digital Technology and Electronic Media<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s06_p01\">Content on the Internet competes with content from other media outlets. Unlimited and cheap digital duplication of content removes the concept of scarcity from the economic model of media; it is no longer necessary to buy a physical CD fabricated by a company in order to play music, and digital words on a screen convey the news just as well as words printed on physical newspaper. Media companies have been forced to reinvent themselves as listeners, readers, and watchers have divided into smaller and smaller subcategories.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch11_s04_s06_p02\">Traditional media companies have had to evolve to adapt to the changes wrought by the Internet revolution, but these media are far from obsolete in an online world. For example, social media can provide a very inexpensive and reliable model for maintaining a band\u2019s following. A record company (or the band itself) can start a Facebook page, through which it can notify all its fans about new albums and tour dates\u2014or even just remind fans that it still exists. MySpace has been (and still is, to an extent) one of the main musical outlets on the Internet. This free service comes with a small web-based music player that allows people interested in the band to listen to samples of its music. Coupling free samples with social networking allows anyone to discover a band from anywhere in the world, leading to the possibility of varying and eclectic tastes not bound by geography.<\/p>\n<div class=\"bcc-box bcc-success\" id=\"fwk-luleapollo-ch11_s04_s06_n01\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch11_s04_s06_l01\">\n<li>On one hand, the information superhighway has opened up rural areas to global connections and made communication and trade much easier. One downside, however, is that illicit and unwanted information can move just as quickly as positive information\u2014it is up to the recipient to decide.<\/li>\n<li>The lack of authorial attribution on many online forums can make it difficult to find credible information. However, <em class=\"emphasis\">Wikipedia<\/em>\u2019s concept of \u201cverifiability,\u201d or citing verified sources, has provided a good check to what can become a matter of mere my-word-against-yours. It is important to gauge possible bias in a source and to judge whether the author has an economic interest in the information.<\/li>\n<li>Net neutrality is a general category of laws that seek to make it illegal for service providers to discriminate among types of Internet content. One downside of content discrimination is that a service provider could potentially make competitors\u2019 sites load much more slowly than their own.<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n02\">\n<h3 class=\"title\">Exercises<\/h3>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o01\">\n<li>Find a website about a single product, musician, or author. Does the site have a stated or strongly implied author?<\/li>\n<li>Look for a copyright notice and a date, usually at the bottom of the page. How might that author\u2019s point of view bias the information on the site?<\/li>\n<li>How can one determine the author\u2019s credibility?<\/li>\n<\/ol>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n03\">\n<h3 class=\"title\">End-of-Chapter Assessment<\/h3>\n<p class=\"simpara\">Review Questions<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o02\">\n<li>\n<p class=\"para\">Section 1<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o03\">\n<li>What are two of the original characteristics of the Internet, and how do they continue to affect it?<\/li>\n<li>What were some of the technological developments that had a part in the \u201cdemocratization\u201d of the Internet, or the spread of the Internet to more people?<\/li>\n<li>What were the causes and effects of the dot-com boom and crash? How did the dot-com boom and crash influence the Internet in later years, particularly with regards to content providers\u2019 income streams?<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"para\">Section 2<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o04\">\n<li>What are some of the differences between social networking sites, and how do they reflect a tendency to cater to a specific demographic?<\/li>\n<li>How might blogs help the flow of information around the world? How might they damage that information?<\/li>\n<li>How has privacy been treated on social networking sites, and how does this affect the culture?<\/li>\n<li>How have marketers tried to use social networking to their advantage?<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"para\">Section 3<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o05\">\n<li>How has globalization on the Internet changed the way culture is distributed?<\/li>\n<li>What are the implications of the Internet overtaking print media as a primary source for news, and how might that affect the public discourse?<\/li>\n<li>What is the \u201cInternet paradox,\u201d and how have various websites and services tried to combat it? How do Internet users socialize on the Internet?<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"para\">Section 4<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o06\">\n<li>How does the metaphor of an \u201cinformation superhighway\u201d relate to both the positive and negative aspects of the Internet?<\/li>\n<li>What are some threats to credibility online, and how can users proactively seek only credible sources?<\/li>\n<li>What is net neutrality, and how could it change the way we access information on the Internet?<\/li>\n<li>How has the Internet affected the music business? How has the Internet affected the music from an artistic perspective?<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n04\">\n<h3 class=\"title\">Critical Thinking Questions<\/h3>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o07\">\n<li>One of the repeated promises of the Internet is that it is truly democratic and that anyone can have a voice. Has this played out in a viable way, or was that a naive assumption that never really came to fruition?<\/li>\n<li>How do the concepts of decentralization and protocol play a part in the way the Internet works?<\/li>\n<li>How have social networks transformed marketing? What are some of the new ways that marketers can target specific people?<\/li>\n<li>How has the Internet changed the way people socialize online? Are there entirely new forms of socializing that did not exist before the Internet?<\/li>\n<li>How has the concept of <em class=\"emphasis\">verifiability<\/em> changed the way that \u201ctruth\u201d is regarded on the Internet\u2014even in the culture at large? Has the speed and volume with which new information becomes available on the Internet made verifiable information more difficult to come by?<\/li>\n<\/ol>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch11_s04_s06_n05\">\n<h3 class=\"title\">Career Connection<\/h3>\n<p class=\"para\" id=\"fwk-luleapollo-ch11_s04_s06_p03\">There is a constantly growing market for people who know how to use social media effectively. Often, companies will hire someone specifically to manage their Facebook and Twitter feeds as another aspect of public relations and traditional marketing.<\/p>\n<p class=\"para\" id=\"fwk-luleapollo-ch11_s04_s06_p04\">Read the article \u201c5 True Things Social Media Experts Do Online,\u201d written by social media writer Glen Allsopp. You can find it at <a class=\"link\" href=\"http:\/\/www.techipedia.com\/2010\/social-media-expert-skills\/\">http:\/\/www.techipedia.com\/2010\/social-media-expert-skills\/<\/a>.<\/p>\n<p class=\"para\" id=\"fwk-luleapollo-ch11_s04_s06_p05\">Then, explore the site of Jonathan Fields, located at <a class=\"link\" href=\"http:\/\/www.jonathanfields.com\/blog\/\">http:\/\/www.jonathanfields.com\/blog\/<\/a>. After exploring for a bit, read the \u201cAbout\u201d section (the link is at the top). These two sites will help you answer the following questions:\n<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch11_s04_s06_o08\">\n<li>How has Jonathan Fields made \u201ceverything else irrelevant\u201d? What are some of the indications that he gives in his biography that he is passionate about his industry doing well?<\/li>\n<li>Review Jonathan\u2019s Twitter feed on the right column of his site. Who are some of the other people he features, and how might this relate to Glen Allsopp\u2019s advice to \u201chighlight others\u201d?<\/li>\n<li>Also look at Jonathan\u2019s \u201cSmall Business Marketing\u201d section. What are some of the things he does to help businesses reach customers? How might this be potentially rewarding?<\/li>\n<li>Think about the ways that you may use social media in your own life, and how you might be able to use those skills to help a business. Pick an activity that you might (or do) participate in online and write down how you might do the same thing from the perspective of a company. For example, how would you write the \u201cAbout Me\u201d section of a company\u2019s Facebook profile? How could you start turning this skill into a career?<\/li>\n<\/ol>\n<\/div><\/div>\n<h2>References<\/h2>\n<p>Basham, Patrick. \u201cLive Earth\u2019s Inconvenient Truths,\u201d Cato Institute, July 11, 2007, <a class=\"link\" href=\"http:\/\/www.cato.org\/pub_display.php?pub_id=8497\">http:\/\/www.cato.org\/pub_display.php?pub_id=8497<\/a>.<\/p>\n<p>Cannon, Robert. \u201cThe Legacy of the Federal Communications Commission\u2019s Computer Inquiries,\u201d <em class=\"emphasis\">Federal Communication Law Journal<\/em> 55, no. 2 (2003): 170.<\/p>\n<p>Curtis, Alex. \u201cSenator Stevens Speaks on Net Neutrality,\u201d Public Knowledge, June 28, 2006, <a class=\"link\" href=\"http:\/\/www.publicknowledge.org\/node\/497\">http:\/\/www.publicknowledge.org\/node\/497<\/a>.<\/p>\n<p>Exxon, Exxpose. \u201cGlobal Warming Deniers and ExxonMobil,\u201d 2006, <a class=\"link\" href=\"http:\/\/www.exxposeexxon.com\/facts\/gwdeniers.html\">http:\/\/www.exxposeexxon.com\/facts\/gwdeniers.html<\/a>.<\/p>\n<p>Gorman, Siobhan and Evan Ramstad, \u201cCyber Blitz Hits U.S., Korea,\u201d <em class=\"emphasis\">Wall Street Journal<\/em>, July 9, 2009, <a class=\"link\" href=\"http:\/\/online.wsj.com\/article\/SB124701806176209691.html\">http:\/\/online.wsj.com\/article\/SB124701806176209691.html<\/a>.\t<\/p>\n<p>Greenpeace, <em class=\"emphasis\">ExxonMobil 2006 Contributions and Community Investments<\/em>, October 5, 2007, <a class=\"link\" href=\"http:\/\/research.greenpeaceusa.org\/?a=view&amp;d=4381\">http:\/\/research.greenpeaceusa.org\/?a=view&amp;d=4381<\/a>.\t<\/p>\n<p>Jesdanun, Anick. \u201cHigh Expectations for the Internet,\u201d December 30, 2002, <a class=\"link\" href=\"http:\/\/www.crn.com\/it-channel\/18822182;jsessionid=3Z2ILJNFKM1FZQE1GHPCKH4ATMY32JVN\">http:\/\/www.crn.com\/it-channel\/18822182;jsessionid=3Z2ILJNFKM1FZQE1GHPCKH4ATMY32JVN<\/a>.<\/p>\n<p>Kirk, Elizabeth E. \u201cEvaluating Information Found on the Internet,\u201d Sheridan Libraries, Johns Hopkins University, 1996, <a class=\"link\" href=\"http:\/\/www.library.jhu.edu\/researchhelp\/general\/evaluating\/\">http:\/\/www.library.jhu.edu\/researchhelp\/general\/evaluating\/<\/a>.\t<\/p>\n<p>Revkin, Andrew C. \u201cHacked E-Mail Is New Fodder for Climate Dispute,\u201d <em class=\"emphasis\">New York Times<\/em>, November 20, 2009, <a class=\"link\" href=\"http:\/\/www.nytimes.com\/2009\/11\/21\/science\/earth\/21climate.html\">http:\/\/www.nytimes.com\/2009\/11\/21\/science\/earth\/21climate.html<\/a>.<\/p>\n<p>Save the Internet, \u201cFAQs,\u201d 2010, <a class=\"link\" href=\"http:\/\/www.savetheinternet.com\/faq\">http:\/\/www.savetheinternet.com\/faq<\/a>.<\/p>\n<p>The Biz Media, \u201cVideo and the Information Superhighway: An Artist\u2019s Perspective,\u201d <em class=\"emphasis\">The Biz Media<\/em>, May 3, 2010, <a class=\"link\" href=\"http:\/\/blog.thebizmedia.com\/video-and-the-information-superhighway\/\">http:\/\/blog.thebizmedia.com\/video-and-the-information-superhighway\/<\/a>.<\/p>\n<p>U.S. Department of Education, <em class=\"emphasis\">Toward a New Golden Age in American Education: How the Internet, the Law and Today\u2019s Students Are Revolutionizing Expectations<\/em>, National Education Technology Plan, 2004, <a class=\"link\" href=\"http:\/\/www2.ed.gov\/about\/offices\/list\/os\/technology\/plan\/2004\/site\/theplan\/edlite-intro.html\">http:\/\/www2.ed.gov\/about\/offices\/list\/os\/technology\/plan\/2004\/site\/theplan\/edlite-intro.html<\/a>.<\/p>\n<p>Wikipedia, s.v. \u201cWikipedia:Neutral point of view,\u201d <a class=\"link\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Neutral_point_of_view\">http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Neutral_point_of_view<\/a>.<\/p>\n<p>Wikipedia, s.v. \u201cWikipedia:Verifiability,\u201d <a class=\"link\" href=\"http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Verifiability\">http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Verifiability<\/a>.<\/p>\n<p>Zetter, Kim. \u201cGoogle to Stop Censoring Search Results in China After Hack Attack,\u201d <em class=\"emphasis\">Wired<\/em>, January 12, 2010, <a class=\"link\" href=\"http:\/\/www.wired.com\/threatlevel\/2010\/01\/google-censorship-china\/\">http:\/\/www.wired.com\/threatlevel\/2010\/01\/google-censorship-china\/<\/a>.<\/p>\n<p>Zetter, Kim. \u201cNov. 10, 1983: Computer \u2018Virus\u2019 Is Born,\u201d <em class=\"emphasis\">Wired<\/em>, November 10, 2009, <a class=\"link\" href=\"http:\/\/www.wired.com\/thisdayintech\/2009\/11\/1110fred-cohen-first-computer-virus\/\">http:\/\/www.wired.com\/thisdayintech\/2009\/11\/1110fred-cohen-first-computer-virus\/<\/a>.<\/p>\n","protected":false},"author":20,"menu_order":2,"template":"","meta":{"_candela_citation":"","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-221","chapter","type-chapter","status-publish","hentry"],"part":215,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters\/221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters\/221\/revisions"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/parts\/215"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters\/221\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapter-type?post=221"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/contributor?post=221"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/license?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}