teaching

From P2P to social sharing

From Clay Shirky’s “File-sharing Goes Social“:

The RIAA has taken us on a tour of networking strategies in the last few years, by constantly changing the environment file-sharing systems operate in. In hostile environments, organisms often adapt to become less energetic but harder to kill, and so it is now. With the RIAA’s waves of legal attacks driving experimentation with decentralized file-sharing tools, file-sharing networks have progressively traded efficiency for resistance to legal attack. …

There are several activities that are both illegal and popular, and these suffer from what economists call high transaction costs. Buying marijuana involves considerably more work than buying roses, in part because every transaction involves risk for both parties, and in part because neither party can rely on the courts for redress from unfair transactions. As a result, the market for marijuana today (or NYC tattoo artists in the 1980s, or gin in the 1920s, etc) involves trusted intermediaries who broker introductions.

These intermediaries act as a kind of social Visa system; in the same way a credit card issuer has a relationship with both buyer and seller, and an incentive to see that transactions go well, an introducer in an illegal transaction has an incentive to make sure that neither side defects from the transaction. And all parties, of course, have an incentive to avoid detection. …

There are many ways to move to such membrane-bounded systems, of course, including retrofitting existing networks to allow sub-groups with controlled membership (possibly using email white-list or IM buddy-list tools); adopting any of the current peer-to-peer tools designed for secure collaboration (e.g. Groove, Shinkuro, WASTE etc); or even going to physical distribution. As Andrew Odlyzko has pointed out, sending disks through the mail can move enough bits in a 24 hour period to qualify as broadband, and there are now file-sharing networks whose members simply snail mail one another mountable drives of music. …

The disadvantage of social sharing is simple — limited membership means fewer files. The advantage is equally simple — a socially bounded system is more effective than nothing, and safer than Kazaa. …

From P2P to social sharing Read More »

The value of Group-Forming Networks

From David P. Reed’s “That Sneaky Exponential – Beyond Metcalfe’s Law to the Power of Community Building“:

Bob Metcalfe, inventor of the Ethernet, is known for pointing out that the total value of a communications network grows with the square of the number of devices or people it connects. This scaling law, along with Moore’s Law, is widely credited as the stimulus that has driven the stunning growth of Internet connectivity. Because Metcalfe’s law implies value grows faster than does the (linear) number of a network’s access points, merely interconnecting two independent networks creates value that substantially exceeds the original value of the unconnected networks. …

But many kinds of value are created within networks. While many kinds of value grow proportionally to network size and some grow proportionally to the square of network size, I’ve discovered that some network structures create total value that can scale even faster than that. Networks that support the construction of communicating groups create value that scales exponentially with network size, i.e. much more rapidly than Metcalfe’s square law. I will call such networks Group-Forming Networks, or GFNs. …

What kind of value are we talking about, when we say the value of a network scales as some function of size? The answer is the value of potential connectivity for transactions. That is, for any particular access point (user), what is the number of different access points (users) that can be connected or reached for a transaction when the need arises. …

The value of potential connectivity is the value of the set of optional transactions that are afforded by the system or network. …

Metcalfe’s law, simply derived, says that if you build a network so that any customer can choose to transact with any other customer, the number of potential connections each of the N customers can make is (N-1), giving a total number of potential connections as N(N-1) or N2-N. Assuming each potential connection is worth as much as any other, the value to each user depends on the total size of the network, and the total value of potential connectivity scales much faster than the size of the network, proportional to N2. …

In networks like the Internet, Group Forming Networks (GFNs) are an important additional kind of network capability. A GFN has functionality that directly enables and supports affiliations (such as interest groups, clubs, meetings, communities) among subsets of its customers. Group tools and technologies (also called community tools) such as user-defined mailing lists, chat rooms, discussion groups, buddy lists, team rooms, trading rooms, user groups, market makers, and auction hosts, all have a common theme—they allow small or large groups of network users to coalesce and to organize their communications around a common interest, issue, or goal. Sadly, the traditional telephone and broadcast/cable network frameworks provide no support for groups. …

What we see, then, is that there are really at least three categories of value that networks can provide: the linear value of services that are aimed at individual users, the “square” value from facilitating transactions, and exponential value from facilitating group affiliations. What’s important is that the dominant value in a typical network tends to shift from one category to another as the scale of the network increases. Whether the growth is by incremental customer additions, or by transparent interconnection, scale growth tends to support new categories of killer apps, and thus new competitive games. …

What’s important in a network changes as the network scale shifts. In a network dominated by linear connectivity value growth, “content is king.” That is, in such networks, there is a small number of sources (publishers or makers) of content that every user selects from. The sources compete for users based on the value of their content (published stories, published images, standardized consumer goods). Where Metcalfe’s Law dominates, transactions become central. The stuff that is traded in transactions (be it email or voice mail, money, securities, contracted services, or whatnot) are king. And where the GFN law dominates, the central role is filled by jointly constructed value (such as specialized newsgroups, joint responses to RFPs, gossip, etc.). …

I’d like to close with a speculative thought. As Francis Fukuyama argues in his book Trust, there is a strong correlation between the prosperity of national economies and social capital, which he defines culturally as the ease with which people in a particular culture can form new associations. There is a clear synergy between the sociability that Fukuyama discusses and the technology and tools that support GFNs-both are structural supports for association. As the scale of interaction grows more global via the Internet, isn’t it possible that a combination of social capital and GFN capital will drive prosperity to those who recognize the value of network structures that support free and responsible association for common purposes?

The value of Group-Forming Networks Read More »

Good description of Fair Use & 1st Sale

From Scott Kleper’s “An Introduction to Copyfighting“:

I think a lot of people incorrectly assume that Copyfighters are people who believe that copyright should be abolished and that everything should be free. Copyfighters aren’t saying that all media should be freely distributed. We are saying that as consumers of media (film, television, software, literature, etc.) we have certain rights that we would like to protect. One of these rights is Fair Use. Fair Use means that you can reuse copyrighted work without permission as long as you are commenting on it, or copying/parodying the original. Fair Use is what allows you to quote song lyrics when writing a review of a new CD. Another right is First Sale. First Sale means that when you buy something, you own it and are thus entitled to sell it to someone else. First Sale is what allows you to buy a book, read it, then sell it on half.com for someone else to enjoy.

Most of all, we simply want the right to use the products we buy in the way that we see fit. We don’t want to be sued by a manufacturer for opening up a product to see how it works or sued by a media company for moving a file from one device to another. We believe that when we buy a CD, we should be able to convert it to another format to play on another device. We shouldn’t have to pay again to turn it into a ring tone. …

Songs bought on the Apple iTunes music store can be played only on a fixed number of devices that you have unlocked with your iTunes ID. Sounds reasonable, but after a few system reinstalls, maybe a replaced motherboard, a change of jobs, etc., all of a sudden, you no longer have access to any of your “authorized computers” and you have to get Apple to remove them all so you can start again. You can’t play iTunes purchased music on your non-Apple portable music player and you can’t play Windows DRM files on your iPod. Consumers are supposed to understand and care about this?

The worst part is that these schemes end up only hurting the people who are trying to be good. If you use a commercial downloading service, like iTunes Music Store, it means that you have rejected the dubious legality and poor user experience of the “illegal” services. You have paid your 99 cents and been handed something that is less valuable than what you could have gotten for free. You get a file with complex and arbitrary restrictions in a proprietary format. Meanwhile, the people who decided to keep on infringing aren’t suffering — they get unrestricted files.

Good description of Fair Use & 1st Sale Read More »

Developing nations stand up to US/UN bullying on copyright

From “Statement by India at the Inter-Sessional Intergovernmental Meeting on a Development Agenda For WIPO, April 11-13, 2005” (emphasis added):

“Development”, in WIPO’s terminology means increasing a developing country’s capacity to provide protection to the owners of intellectual property rights. This is quite a the opposite of what developing countries understand when they refer to the ‘development dimension’. The document presented by the Group of Friends of Development corrects this misconception – that development dimension means technical assistance.

The real “development” imperative is ensuring that the interest of Intellectual Property owners is not secured at the expense of the users of IP, of consumers at large, and of public policy in general. …

The legal monopoly granted to IP owners is an exceptional departure from the general principle of competitive markets as the best guarantee for securing the interest of society. The rationale for the exception is not that extraction of monopoly profits by the innovator is, of and in itself, good for society and so needs to be promoted. Rather, that properly controlled, such a monopoly, by providing an incentive for innovation, might produce sufficient benefits for society to compensate for the immediate loss to consumers as a result of the existence of a monopoly market instead of a competitive market. Monopoly rights, then, granted to IP holders is a special incentive that needs to be carefully calibrated by each country, in the light of its own circumstances, taking into account the overall costs and benefits of such protection. …

The current emphasis of Technical Assistance on implementation and enforcement issues is misplaced. IP Law enforcement is embedded in the framework of all law enforcement in the individual countries. It is unrealistic, and even undesirable to expect that the enforcement of IP laws will be privileged over the enforcement of other laws in the country. Society faces a considerable challenge to effectively protect, and resolve disputes over, physical property. To expect that the police, the lawyers and the courts should dedicate a sizable part of society’s enforcement resources for protecting intangible intellectual property, is unrealistic. …

In conclusion, it is important that developed countries and WIPO acknowledge that IP protection is an important policy instrument for developing countries, one that needs to be used carefully. While the claimed benefits of strong IP protection for developing countries are a matter of debate – and nearly always in the distant future – such protection invariably entails substatial real an immediate costs for these countries. In formulating its IP policy, therefore, each country needs to have sufficient flexibility so that the cost of IP protection does not outweigh the benefits.

Developing nations stand up to US/UN bullying on copyright Read More »

Copyright stupidity: arguments & numbers

From Financial Times” “James Boyle: Deconstructing stupidity“:

Thomas Macaulay told us copyright law is a tax on readers for the benefit of writers, a tax that shouldn’t last a day longer than necessary. …

Since only about 4 per cent of copyrighted works more than 20 years old are commercially available, this locks up 96 per cent of 20th century culture to benefit 4 per cent. The harm to the public is huge, the benefit to authors, tiny. …

We need to deconstruct the culture of IP stupidity, to understand it so we can change it. But this is a rich and complex stupidity, like a fine Margaux. I can only review a few flavours.

Maximalism: The first thing to realize is that many decisions are driven by honest delusion, not corporate corruption. The delusion is maximalism: the more intellectual property rights we create, the more innovation. This is clearly wrong; rights raise the cost of innovation inputs (lines of code, gene sequences, data.) Do their monopolistic and anti-competitive effects outweigh their incentive effects? That’s the central question, but many of our decision makers seem never to have thought of it.

The point was made by an exchange inside the Committee that shaped Europe’s ill-starred Database Directive. It was observed that the US, with no significant property rights over unoriginal compilations of data, had a much larger database industry than Europe which already had significant “sweat of the brow” protection in some countries. Europe has strong rights, the US weak. The US is winning.

Did this lead the committee to wonder for a moment whether Europe should weaken its rights? No. Their response was that this showed we had to make the European rights much stronger. …

Authorial Romance: Part of the delusion depends on the idea that inventors and artists create from nothing. Who needs a public domain of accessible material if one can create out of thin air? But in most cases this simply isn’t true; artists, scientists and technologists build on the past. …

An Industry Contract: Who are the subjects of IP? They used to be companies. You needed a printing press or a factory to trigger the landmines of IP. The law was set up as a contract between industry groups. This was a cosy arrangement, but it is no longer viable. The citizen-publishers of cyberspace, the makers of free software, the scientists of distributed data-analysis are all now implicated in the IP world. The decision-making structure has yet to adjust. …

Fundamentally, though, the views I have criticised here are not merely stupidity. They constitute an ideology, a worldview, like flat earth-ism. …

Copyright stupidity: arguments & numbers Read More »

What can we use instead of gasoline in cars?

From Popular Mechanics‘ “How far can you drive on a bushel of corn?“:

It is East Kansas Agri-Energy’s ethanol facility, one of 100 or so such heartland garrisons in America’s slowly gathering battle to reduce its dependence on fossil fuels. The plant processes about 13 million bushels of corn to produce approximately 36 million gal. of ethanol a year. “That’s enough high-quality motor fuel to replace 55,000 barrels of imported petroleum,” the plant’s manager, Derek Peine, says. …

It takes five barrels of crude oil to produce enough gasoline (nearly 97 gal.) to power a Honda Civic from New York to California. …

Ethanol/E85

E85 is a blend of 85 percent ethanol and 15 percent gasoline. … A gallon of E85 has an energy content of about 80,000 BTU, compared to gasoline’s 124,800 BTU. So about 1.56 gal. of E85 takes you as far as 1 gal. of gas.

Case For: Ethanol is an excellent, clean-burning fuel, potentially providing more horsepower than gasoline. In fact, ethanol has a higher octane rating (over 100) and burns cooler than gasoline. However, pure alcohol isn’t volatile enough to get an engine started on cold days, hence E85. …

Cynics claim that it takes more energy to grow corn and distill it into alcohol than you can get out of the alcohol. However, according to the DOE, the growing, fermenting and distillation chain actually results in a surplus of energy that ranges from 34 to 66 percent. Moreover, the carbon dioxide (CO2) that an engine produces started out as atmospheric CO2 that the cornstalk captured during growth, making ethanol greenhouse gas neutral. Recent DOE studies note that using ethanol in blends lowers carbon monoxide (CO) and CO2 emissions substantially. In 2005, burning such blends had the same effect on greenhouse gas emissions as removing 1 million cars from American roads. …

One acre of corn can produce 300 gal. of ethanol per growing season. So, in order to replace that 200 billion gal. of petroleum products, American farmers would need to dedicate 675 million acres, or 71 percent of the nation’s 938 million acres of farmland, to growing feedstock. Clearly, ethanol alone won’t kick our fossil fuel dependence–unless we want to replace our oil imports with food imports. …

Biodiesel

Fuels for diesel engines made from sources other than petroleum are known as biodiesel. Among the common sources are vegetable oils, rendered chicken fat and used fry oil. …

Case For: Modern diesel engines can run on 100 percent biodiesel with little degradation in performance compared to petrodiesel because the BTU content of both fuels is similar–120,000 to 130,000 BTU per gallon. In addition, biodiesel burns cleaner than petrodiesel, with reduced emissions. Unlike petrodiesel, biodiesel molecules are oxygen-bearing, and partially support their own combustion.

According to the DOE, pure biodiesel reduces CO emissions by more than 75 percent over petroleum diesel. A blend of 20 percent biodiesel and 80 percent petrodiesel, sold as B20, reduces CO2 emissions by around 15 percent.

Case Against: Pure biodiesel, B100, costs about $3.50–roughly a dollar more per gallon than petrodiesel. And, in low temperatures, higher-concentration blends–B30, B100–turn into waxy solids and do not flow. Special additives or fuel warmers are needed to prevent fuel waxing. …

Electricity

Case For: Vehicles that operate only on electricity require no warmup, run almost silently and have excellent performance up to the limit of their range. Also, electric cars are cheap to “refuel.” At the average price of 10 cents per kwh, it costs around 2 cents per mile. …

A strong appeal of the electric car–and of a hybrid when it’s running on electricity–is that it produces no tailpipe emissions. Even when emissions created by power plants are factored in, electric vehicles emit less than 10 percent of the pollution of an internal-combustion car.

Case Against: Pure electric cars still have limited range, typically no more than 100 to 120 miles. In addition, electrics suffer from slow charging, which, in effect, reduces their usability….

And then there’s the environmental cost. Only 2.3 percent of the nation’s electricity comes from renewable resources; about half is generated in coal-burning plants.

Hydrogen

Hydrogen is the most abundant element on Earth, forming part of many chemical compounds. Pure hydrogen can be made by electrolysis–passing electricity through water. This liberates the oxygen, which can be used for many industrial purposes. Most hydrogen currently is made from petroleum.

Case For: Though hydrogen can fuel a modified internal-combustion engine, most see hydrogen as a way to power fuel cells to move cars electrically. The only byproduct of a hydrogen fuel cell is water.

Case Against: … And, despite the chemical simplicity of electrolysis, producing hydrogen is expensive and energy consuming. It takes about 17 kwh of electricity, which costs about $1.70, to make just 100 cu. ft. of hydrogen. That amount would power a fuel cell vehicle for about 20 miles.

What can we use instead of gasoline in cars? Read More »

Malware focused on theft above all

From AFP’s “70 percent of malicious software aimed at theft: survey“:

Seventy percent of malicious software being circulated is linked to various types of cybercrime, a study by security firms Panda Software showed. …

The survey confirms a shift from several years ago, when malicious software was often aimed at garnering attention or exposing security flaws.

“Malware has become a took for generating financial returns,” the report said. …

About 40 percent of the problems detected by Panda was spyware, a type of malicious code designed for financial gain, primarily through collecting data on users’ Internet activities.

Another 17 percent was trojans, including “banker trojans” that steal confidential data related to bank services, others that download malicious applications onto systems.

Eight percent of the problems detected were “dialers,” malicious code that dials up premium-rate numbers without users’ knowledge; “bots,” a scheme involving the sale or rental of networks of infected computers, accounted for four percent of the total.

The e-mail worm, which was recently considered a major Internet threat, made up only four percent of the total.

Malware focused on theft above all Read More »

Clay Shirky on why the Semantic Web will fail

From Clay Shirky’s “The Semantic Web, Syllogism, and Worldview“:

What is the Semantic Web good for?

The simple answer is this: The Semantic Web is a machine for creating syllogisms. A syllogism is a form of logic, first described by Aristotle, where “…certain things being stated, something other than what is stated follows of necessity from their being so.” [Organon]

The canonical syllogism is:

Humans are mortal
Greeks are human
Therefore, Greeks are mortal

with the third statement derived from the previous two.

The Semantic Web is made up of assertions, e.g. “The creator of shirky.com is Clay Shirky.” Given the two statements

– Clay Shirky is the creator of shirky.com
– The creator of shirky.com lives in Brooklyn

you can conclude that I live in Brooklyn, something you couldn’t know from either statement on its own. From there, other expressions that include Clay Shirky, shirky.com, or Brooklyn can be further coupled.

The Semantic Web specifies ways of exposing these kinds of assertions on the Web, so that third parties can combine them to discover things that are true but not specified directly. This is the promise of the Semantic Web — it will improve all the areas of your life where you currently use syllogisms.

Which is to say, almost nowhere. …

Despite their appealing simplicity, syllogisms don’t work well in the real world, because most of the data we use is not amenable to such effortless recombination. As a result, the Semantic Web will not be very useful either. …

In the real world, we are usually operating with partial, inconclusive or context-sensitive information. When we have to make a decision based on this information, we guess, extrapolate, intuit, we do what we did last time, we do what we think our friends would do or what Jesus or Joan Jett would have done, we do all of those things and more, but we almost never use actual deductive logic. …

Syllogisms sound stilted in part because they traffic in absurd absolutes. …

There is a list of technologies that are actually political philosophy masquerading as code, a list that includes Xanadu, Freenet, and now the Semantic Web. The Semantic Web’s philosophical argument — the world should make more sense than it does — is hard to argue with. The Semantic Web, with its neat ontologies and its syllogistic logic, is a nice vision. However, like many visions that project future benefits but ignore present costs, it requires too much coordination and too much energy to effect in the real world, where deductive logic is less effective and shared worldview is harder to create than we often want to admit.

Clay Shirky on why the Semantic Web will fail Read More »

The structure & meaning of the URL as key to the Web’s success

From Clay Shirky’s “The Semantic Web, Syllogism, and Worldview“:

The systems that have succeeded at scale have made simple implementation the core virtue, up the stack from Ethernet over Token Ring to the web over gopher and WAIS. The most widely adopted digital descriptor in history, the URL, regards semantics as a side conversation between consenting adults, and makes no requirements in this regard whatsoever: sports.yahoo.com/nfl/ is a valid URL, but so is 12.0.0.1/ftrjjk.ppq. The fact that a URL itself doesn’t have to mean anything is essential — the Web succeeded in part because it does not try to make any assertions about the meaning of the documents it contained, only about their location.

The structure & meaning of the URL as key to the Web’s success Read More »

The 1st software patent

From Robert X. Cringely’s “Patently Absurd: Why Simply Making Spam Illegal Won’t Work“:

Software patents have become inordinately important for something that 25 years ago we didn’t even believe could exist. After several software patent cases had gone unsuccessfully as far as the U.S. Supreme Court, the general thinking when I got in this business was that software could not be patented, only copyrighted. Like the words of a book, the individual characters of code could be protected by a copyright, and even the specific commands could be protected, but what couldn’t be protected by a copyright was the literal function performed by the program. There is no way that a copyright could protect the idea of a spreadsheet. Protecting the idea would have required a patent.

Then on May 26, 1981, after seven years of legal struggle, S. Pal Asija, a programmer and patent lawyer, received the first software patent for SwiftAnswer, a data retrieval program that was never heard from again and whose only historical function was to prove that all of the experts were wrong — software could be patented. Asija showed that when the Supreme Court had ruled against previous software patent efforts, it wasn’t saying that software was unpatentable, but that those particular programs weren’t patentable.

The 1st software patent Read More »

How patents ruined the Wright brothers

From Robert X. Cringely’s “Patently Absurd: Why Simply Making Spam Illegal Won’t Work“:

Nobody can deny that the Wright brothers were pioneers. Their use of a wind tunnel helped define the science of aerodynamics and had influence far beyond their time. But their secrecy and litigious nature held back the progress of flying, and eventually lost them their technical leadership. The Wrights flew in 1903. They made a small public announcement 100 years ago, then went silent until 1908 as they worked to solidify their patent position. While they continued to fly from pastures around Dayton, Ohio, the brothers generally did so in secret, waiting for patents to be issued.

When the Wrights finally appeared in public again five years later, first in Washington, DC, and later in France, the performance of their aircraft still astounded the world. But that was it. Once the brothers filed a patent infringement suit against rival Glenn Curtiss, their attention was totally turned to litigation and their aeronautical progress stopped. Curtiss and Wright eventually merged and built aircraft into the 1940s, but the creative energy by that time was all from Curtiss. By then, Wilbur had died and Orville was best known as the man who signed every pilot license. Though their patent was upheld, they didn’t in any sense control the industry they had invented.

How patents ruined the Wright brothers Read More »

OmniPerception = facial recognition + smart card

From Technology Review‘s’ “Face Forward“:

To get around these problems, OmniPerception, a spinoff from the University of Surrey in England, has combined its facial-recognition technology with a smart-card system. This could make face recognition more robust and better suited to applications such as passport authentication and building access control, which, if they use biometrics at all, rely mainly on fingerprint verification, says David McIntosh, the company’s CEO. With OmniPerception’s technology, an image of a person’s face is verified against a “facial PIN” carried on the card, eliminating the need to search a central database and making the system less intimidating to privacy-conscious users. …

OmniPerception’s technology creates a PIN about 2,500 digits long from its analysis of the most distinctive features of a person’s face. The number is embedded in a smart card-such as those, say, that grant access to a building-and used to verify that the card belongs to the person presenting it. A user would place his or her card in or near a reader and face a camera, which would take a photo and feed it to the card. The card would then compare the PIN it carried to information it derived from the new photo and either accept or reject the person as the rightful owner of the card. The technology could also be used to ensure passport or driver’s license authenticity and to secure ATM or Internet banking transactions, says McIntosh.

OmniPerception = facial recognition + smart card Read More »

Face recognition software as an example of “function creep”

From Technology Review‘s’ “Creepy Functions“:

Consider one example of function creep. The Electoral Commission of Uganda has retained Viisage Technology to implement a face recognition system capable of enrolling 10 million voters in 60 days. The goal is to reduce voter registration fraud. But Woodward notes that the system might also be put to work fingering political opponents of the regime. And Uganda probably isn’t the first country that springs to mind when someone says “due process” or “civil rights.”

From Technology Review‘s’ “Big Brother Logs On“:

Take the fact that the faces of a large portion of the driving population are becoming digitized by motor vehicles agencies and placed into databases, says Steinhardt. It isn’t much of a stretch to extend the system to a Big Brother-like nationwide identification and tracking network. Or consider that the Electoral Commission of Uganda has retained Viisage Technology to implement a “turnkey face recognition system” capable of enrolling 10 million voter registrants within 60 days. By generating a database containing the faceprint of every one of the country’s registered voters-and combining it with algorithms able to scour all 10 million images within six seconds to find a match-the commission hopes to reduce voter registration fraud. But once such a database is compiled, notes John Woodward, a former CIA operations officer who managed spies in several Asian countries and who’s now an analyst with the Rand Corporation, it could be employed for tracking and apprehending known or suspected political foes. Woodward calls that “function creep.”

Face recognition software as an example of “function creep” Read More »

Smart World of Warcraft Trojan

From Information Week‘s’ “ Trojan Snags World Of Warcraft Passwords To Cash Out Accounts“:

A new password-stealing Trojan targeting players of the popular online game “World of Warcraft” hopes to make money off secondary sales of gamer goods, a security company warned Tuesday.

MicroWorld, an Indian-based anti-virus and security software maker with offices in the U.S., Germany, and Malaysia, said that the PWS.Win32.WOW.x Trojan horse was spreading fast, and attacking World of Warcraft players.

If the attacker managed to hijack a password, he could transfer in-game goods — personal items, including weapons — that the player had accumulated to his own account, then later sell them for real-world cash on “gray market” Web sites. Unlike some rival multiplayer online games, Warcraft’s publisher, Blizzard Entertainment, bans the practice of trading virtual items for real cash.

Smart World of Warcraft Trojan Read More »

Projecting a murdered woman’s image on a building

From BBC News’ “Police go big with victim picture“:

Murdered Prostitute A 60ft high picture of a murdered prostitute has been projected onto a derelict block of flats in Glasgow.

Detectives hope it will help to turn up clues about the death of Emma Caldwell, whose body was found in woods in South Lanarkshire on 8 May.

The image was displayed for four hours on the multi-storey flats in Cumberland Street, Hutchesontown on Monday night.

Police said the site had been chosen as it was visible across areas frequented by Emma and other prostitutes.

Projecting a murdered woman’s image on a building Read More »

What’s a socio-technical system?

From Ulises Ali Mejias’ “A del.icio.us study: Bookmark, Classify and Share: A mini-ethnography of social practices in a distributed classification community“:

A socio-technical system is conformed of hardware, software, physical surroundings, people, procedures, laws and regulations, and data and data structures.

What’s a socio-technical system? Read More »

Thoughts on tagging/folksonomy

From Ulises Ali Mejias’ “A del.icio.us study: Bookmark, Classify and Share: A mini-ethnography of social practices in a distributed classification community“:

This principle of distribution is at work in socio-technical systems that allow users to collaboratively organize a shared set of resources by assigning classifiers, or tags, to each item. The practice is coming to be known as free tagging, open tagging, ethnoclassification, folksonomy, or faceted hierarchy (henceforth referred to in this study as distributed classification) …

One important feature of systems such as these is that they do not impose a rigid taxonomy. Instead, they allow users to assign whatever classifiers they choose. Although this might sound counter-productive to the ultimate goal of organizing content, in practice it seems to work rather well, although it does present some drawbacks. For example, most people will probably classify pictures of cats by using the tag ‘cats.’ But what happens when some individuals use ‘cat’ or ‘feline’ or ‘meowmeow’ …

It seems that while most people might not be motivated to contribute to a pre-established system of classification that may not meet their needs, or to devise new and complex taxonomies of their own, they are quite happy to use distributed systems of classification that are quick and able to accommodate their personal (and ever changing) systems of classification. …

But distributed classification does not accrue benefits only to the individual. It is a very social endeavor in which the community as a whole can benefit. Jon Udell describes some of the individual and social possibilities of this method of classification:

These systems offer lots of ways to visualize and refine the tag space. It’s easy to know whether a tag you’ve used is unique or, conversely, popular. It’s easy to rename a tag across a set of items. It’s easy to perform queries that combine tags. Armed with such powerful tools, people can collectively enrich shared data. (Udell 2004) …

Set this [an imposed taxonomy] against the idea of allowing a user to add tags to any given document in the corpus. Like Del.icio.us, there needn’t be a pre-defined hierarchy or lexicon of terms to use; one can simply lean on the power of ethnoclassification to build that lexicon dynamically. As such, it will dynamically evolve as usages change and shift, even as needs change and shift. (Williams, 2004)

The primary benefit of free tagging is that we know the classification makes sense to users… For a content creator who is uploading information into such a system, being able to freely list subjects, instead of choosing from a pre-approved “pick list,” makes tagging content much easier. This, in turn, makes it more likely that users will take time to classify their contributions. (Merholz, 2004)

Folksonomies work best when a number of users all describe the same piece of information. For instance, on del.icio.us, many people have bookmarked wikipedia (http://del.icio.us/url/bca8b85b54a7e6c01a1bcfaf15be1df5), each with a different set of words to describe it. Among the various tags used, del.icio.us shows that reference, wiki, and encyclopedia are the most popular. (Wikipedia entry for folksonomy, retrieved December 15, 2004 from http://en.wikipedia.org/wiki/Folksonomy)

Of course, this approach is not without its potential problems:

With no one controlling the vocabulary, users develop multiple terms for identical concepts. For example, if you want to find all references to New York City on Del.icio.us, you’ll have to look through “nyc,” “newyork,” and “newyorkcity.” You may also encounter the inverse problem — users employing the same term for disparate concepts. (Merholz, 2004) …

But as Clay Shirky remarks, this solution might diminish some of the benefits that we can derive from folksonomies:

Synonym control is not as wonderful as is often supposed, because synonyms often aren’t. Even closely related terms like movies, films, flicks, and cinema cannot be trivially collapsed into a single word without loss of meaning, and of social context … (Shirky, 2004) …

The choice of tags [in the entire del.icio.us system] follows something resembling the Zipf or power law curve often seen in web-related traffic. Just six tags (python, delicious/del.icio.us, programming, hacks, tools, and web) account for 80% of all the tags chosen, and a long tail of 58 other tags make up the remaining 20%, with most occurring just once or twice … In the del.icio.us community, the rich get richer and the poor stay poor via http://del.icio.us/popular. Links noted by enough users within a short space of time get listed here, and many del.icio.us users use it to keep up with the zeitgeist. (Biddulph, 2004) …

Thoughts on tagging/folksonomy Read More »

Bring down the cell network with SMS spam

From John Schwartz’s “Text Hackers Could Jam Cellphones, a Paper Says“:

Malicious hackers could take down cellular networks in large cities by inundating their popular text-messaging services with the equivalent of spam, said computer security researchers, who will announce the findings of their research today.

Such an attack is possible, the researchers say, because cellphone companies provide the text-messaging service to their networks in a way that could allow an attacker who jams the message system to disable the voice network as well.

And because the message services are accessible through the Internet, cellular networks are open to the denial-of-service attacks that occur regularly online, in which computers send so many messages or commands to a target that the rogue data blocks other machines from connecting.

By pushing 165 messages a second into the network, said Patrick D. McDaniel, a professor of computer science and engineering at Pennsylvania State University and the lead researcher on the paper, “you can congest all of Manhattan.”

Also see http://www.smsanalysis.org/.

Bring down the cell network with SMS spam Read More »

The difficulty of recovering from identity theft

From TechWeb News’s “One In Four Identity-Theft Victims Never Fully Recover“:

Making things right after a stolen identity can take months and cost thousands, a survey of identity theft victims released Tuesday said. Worse, in more than one in four cases, victims haven’t been able to completely restore their good name.

The survey, conducted by Nationwide Mutual Insurance Co., found that 28 percent of identity thieves’ marks aren’t able to reconstruct their identities even after more than a year of work. On average, victims spent 81 hours trying to resolve their case.

According to the poll, the average amount of total charges made using a victim’s identity was $3,968. Fortunately, most were not held responsible for the fraudulent charges; 16 percent, however, reported that they had to pay for some or all of the bogus purchases.

Other results posted by the survey were just as dispiriting. More than half of the victims discovered the theft on their own by noticing unusual charges on credit cards or depleted bank accounts, but that took time: on average, five and a half months passed between when the theft occurred and when it was spotted.

Only 17 percent were notified by a creditor or financial institution of suspicious activity, a figure that’s certain to fuel federal lawmakers pondering legislation that would require public disclosure of large data breaches.

The difficulty of recovering from identity theft Read More »

Laws & enforcement in virtual worlds

From James Grimmelmann’s “Life, Death, and Democracy Online“:

… The necessity of a ‘Quit’ option is obvious; no adventure game yet invented can force an unwilling player to continue playing. She can always give the game the three-finger salute, flip the power switch, or throw her computer in the junk heap. …

Banishment is the absolute worst punishment any multi-player online role-playing game can impose on a player. Which is to say that a painless execution is the absolute worst punishment any game society can impose on the characters who are its citizens. Torture is not an option. Imprisonment and fines can be imposed, true, but as soon as the player behind the character finds that these punishments are too onerous, she can simply terminate her account and stop logging in; the rest of the deterrent value of the punishment evaporates. It’s hard to hold characters accountable.

Laws & enforcement in virtual worlds Read More »