An introduction to new media for South African

Transcription

An introduction to new media for South African
An introduction to new media for South
African students
AF
T
Petrus H Potgieter
www.potgieter.org
29th August 2009
DR
This text is released under the Creative Commons Attribution-NoncommercialNo Derivative Works 3.0 Unported License. All other rights are reserved by
the author.
1
Contents
3
2 Media convergence
2.1 The Internet and media convergence . . . . . . . . . . . . . .
2.2 Analog and digital media . . . . . . . . . . . . . . . . . . . . .
2.3 Newspapers and the new media . . . . . . . . . . . . . . . . .
3
4
5
8
3 Web 2.0
9
AF
T
1 Introduction
4 Weblogs and the blogosphere
9
4.1 Blogging basics . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2 Blog aggregators . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.3 Getting started in blogging . . . . . . . . . . . . . . . . . . . . 12
5 Wikis
5.0.1
12
Editing the Wikipedia entry on your hometown . . . . 13
14
7 Streaming content
7.1 Streaming as an adjunct to broadcasting . . . . . . . . . . . .
7.2 User-generated streaming content . . . . . . . . . . . . . . . .
7.2.1 Time for TV . . . . . . . . . . . . . . . . . . . . . . . .
14
15
15
16
DR
6 Podcasting and vodcasting
8 Social networking, social bookmarking
16
9 Mashups
17
10 Subvertising
17
11 Peer-to-peer networking (P2P)
11.1 How P2P networks promote the spread of information
11.2 P2P and copyright . . . . . . . . . . . . . . . . . . .
11.3 Economics of P2P networks . . . . . . . . . . . . . .
11.3.1 Legally download a film using BitTorrent . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
17
20
20
22
22
12 Virtual worlds
23
12.1 Avatars . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
12.2 Second Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
13 Conclusion
24
2
1
Introduction
AF
T
In this document, we discuss forms of new media that have emerged – basically since around 1985 although most of the examples mentioned here are
much more recent – and some of the impact that these new forms of communication have had for the consumer, especially in the South African context.
Any text on new developments in technology and uses of technology, is almost guaranteed to be outdated by the time that it is written and the best
guide to the latest events and trends will always be the world itself. This text
will gradually become (at best) a historical guide and the reader is advised
to embrace and explore the world of human interaction and knowledge as it
becomes available to him or her.
A word of caution is required. Treat online interactions with the same
circumspection that you would apply to meetings and persons in the offline1
world. You would not give your banking details or other confidential information to any person in the street or in the shopping centre unless you
have
• established the utility to yourself of divulging this information; and
• verified the identity and fidelity of the person(s) concerned.
DR
You should, likewise, take extreme care in how you divulge possibly sensitive
information online. You are also devised to extend and expect normal rules
of courtesy. Be polite and honest but do not hesitate to be direct when the
situation requires it. The online world and the new media offer a plethora of
opportunities for extending and sharing your experiences but it is subject to
rules and conventions that make up the present-day digital culture (Deuze,
2006).
2
Media convergence
Media convergence is simply the phenomenon where the evolution of technology and of services has made it possible for consumers to access content
that had previously been available only through strictly separated channels
(such as newspapers and television) in more unified and flexible ways. An
early example of this was South Africa’s Beltel system. This system was
relatively widely used in the 1980s – although not nearly as widely as the
Internet is employed today. Up to that time, if people had access to ICT at
1
For lack of a better term, offline will also be used – in this chapter – to denote
interactions and events that do not require the used of a telecommunications channel.
3
DR
AF
T
home, they might only have had a fixed (landline) telephone and a television
set. As today, people with access to both were a minority in the society and
not much more than 2% of these used Beltel (Walker). However Beltel – like
its hugely successful counterpart in France, Minitel – gave a significant number of people an early experience of almost instantly retrieving up-to-date
information in text format. Among the early benefiaries were investors and
people in the agricultural business, who benefited from being able to access
market prices near-instantaneously. Even Unisa had a page2 on Beltel, with
the number 3002. Pages were addresses by numbers and there was also an
e-mail system. The network was restricted to South Africa, indeed to the
users of the South African telephone network – then run by the SA Post
Office and later by Telkom – and was shut down at the end of 1999 (Walker).
Why do we consider Beltel to be an example of convergence? Well, using
Beltel a subscriber could use their television and telephone (together with a
Beltel device or an ordinary computer with an analogue modem) to access
newspapers, for example. There were even online shopping pages on Beltel
and it was possible to access some banking services. Today, of course, the
Internet provides a richer experience in ways that extend far beyond the fact
the a modern computer can present more attractive graphics and a more
sophisticated user interface. One can use a computer which is equipped with
a simple headset (or speakers) and microphone to make voice and video calls,
to receive live video data and interact with a number of users in many online
environments.
2.1
The Internet and media convergence
One of the important reasons why the Internet is so flexible and extendible is
that it really belongs to no-one. Although there are authorities that regulate
certain aspects of the Internet, such as
• technical standards; and
• addresses by names (e.g. www.cnn.com) and by numbers (e.g. 157.166.
224.25 which belongs3 to www.cnn.com),
it is many millions of different companies and individuals that build the
physical infrastructure of the network and provide its content (Jenkins, 2004).
Below, we give a brief overview of some of the most significant developments
to date.
2
3
According to http://home.intekom.com/intekom/beltel/isp.shtml.
Please use your browser to visit 157.166.224.25 when you next use the Internet.
4
2.2
AF
T
What is the difference between the Internet and the Web? Nowadays many people refer to the pages that appear in their web browser
(typically Internet Explorer, Firefox, Opera or Safari) as “the Internet”.
Those pages, however, actually represent the “World-Wide Web”, or simply – the Web, which is a specific kind of Internet traffic. E-mail is the
basic example of a kind of Internet use which exists independently of the
Web. When we use an e-mail client such as Mozilla Thunderbird, Novell
Groupwise or Microsoft Outlook to access our messages, the Web is not
involved. Of course, many people nowadays read their e-mail in a web
browser and this is properly called webmail of which the pioneer was a
startup company called Hotmail.4
Analog and digital media
DR
The transition to digital media, starting – from the point of view of most
ordinary consumers – with the CD disc in the early 1980s, has been crucial
in media convergence and other aspects of the information economy and
a globalised information society. Analog media, like long-playing (vinyl)
records (LPs – see Figure 1) and magnetic cassette (see Figure 2) and video
tapes did not allow for high-fidelity reproduction of their content. Although
it was very usual in the 1970s and 1980s for people to copy the content of an
LP to cassette tape, for listening in their car – for example, the quality of the
copy deteriorated each time it was reproduced. Furthermore, these analog
media suffered a moderate amount of decay each time they were played.
In Figure 3 you can see an example of digital and analog information.
Strictly speaking, of you are viewing this text as a PDF file, both are digitally
represented but the analog signal on the left represents the sound of the
author enunciation a part of the first line of South Africa’s national anthem
whereas the binary digits on the right represent the same line but as ASCIIencoded binary digits. Note how easy it is to copy the sequence of zeroes
and ones but how it is almost impossible to make an exact copy of the sound
represented on the left.
Sounds can also be represented digitally, for example as a series of zeroes
and ones, and this is what makes it possible to make exact copies of digital
media. The content of a CD or DVD disc can be copied exactly and then
transmitted over the Internet, for example. This is not to say that digital
media are always superior to analog media. Many music lovers still prefer
the sound of vinyl LPs over that of the digital CD or music downloaded from
the Internet or to a cellphone. The latter is, of course, always in a digital
5
AF
T
DR
Figure 1: Long-playing (vinyl) record (LP), from the 1970s – a typical analog
medium
6
AF
T
Figure 2: Music cassette from the early 21st century.
Analog signal
Digital signal
DR
01001110
01101111
01101001
01110011
01101011
01101100
01101100
00100000
01000001
01110010
01101011
01101011
01110011
00100000
01101001
01100101
01100101
00100111
01101001
01100110
01101001
01100001
Figure 3: The first line of South Africa’s national anthem, as a digital and a
fraction as an analog signal.
7
format.
2.3
Newspapers and the new media
• television, and
AF
T
The precursor of the modern newspaper was the Acta Diurna (in English,
“Daily Events”) which appeared more than two thousand years ago in Rome,
displayed on stone or metal in public places in the city. The first newspaper
in English is believed to have been published in Amsterdam in 1920, as a
translation of the Dutch Courante uyt Italien, Duytslandt, &c. The oldest
newspaper thought to have survived to modern times is the Chinese Jing
Bao (or, “Capital Report”) which would have been published for more than
a thousand years, until 1912.
The business plans of traditional newspapers have been challenged over
the past few decades by
• the profusion of free content on the Internet.
DR
Television has, in many countries, virtually eliminated the evening newspaper
as a separate publication. In Johannesburg, for example, the Rand Daily
Mail was a morning newspaper up to its close in the mid-1980s whereas The
Star had been an “evening” newspaper which appeared in the afternoon. In
the UK there and elsewhere, there are still a few evening papers but many
are in steep decline (Franklin, 2008).
The advent of the Internet has mounted an even more formidable challenge to the newspaper business. Newspapers themselves compete in the
market for online content and only very few (the US Wall Street Journal
and London’s Financial Times among them) have successfully implemented
a strategy of paid readership on the Internet. In other markets, such as
South Africa and Australia, newspaper groups announced during 2009 that
they would curtail their free content and implement an Internet subscription model. It remains to be seen whether this could be successful at all for
mass circulation titles – as opposed to premium papers aimed mainly at the
business community.
The challenge to traditional titles is not, however, only from their own
online content or online-only newspapers and news sites such as those operated by Google or Yahoo. Citizen journalism, through weblogs (about which
more, below) and other non-traditional channels also poses a challenge to
the paper publications we know (Domingo et al., 2008). It is worth noting
though that in Asia, Africa and South America – where literacy rates are still
increasing – there is still an increase in newspaper sales (Franklin, 2008).
8
3
Web 2.0
According to computer guru, publisher and activist Tim O’Reilly,
AF
T
book subtitle “Web 2.0 is the business revolution in the computer
industry caused by the move to the internet as platform, and an
attempt to understand the rules for success on that new platform. Chief among those rules is this: Build applications that
harness network effects to get better the more people use them.”
(O’Reilly, 2006)
By this definition, converged media applications would definitely be classified
as “Web 2.0” althought this term is not longer applied with the same relish
and enthusiasm that accompanied its introduction. In lay terms, Web 2.0
is about interactive applications on the Internet that do not merely display
information to a passive viewer but rather offers the user an opportunity to
interact with the applications residing on the web server of the website owner
or operator. Skeptics about this jargon, have included Sir Tim Berners-Lee,
who has remarked that
DR
“Web 1.0 was all about connecting people. It was an interactive
space, and I think Web 2.0 is, of course, a piece of jargon, nobody
even knows what it means. If Web 2.0 for you is blogs and wikis,
then that is people to people. But that was what the Web was
supposed to be all along.” (developerWorks, 2006)
For this reason, you should be aware of the term Web 2.0 but we shall not
be using it any further in this text.
4
Weblogs and the blogosphere
A weblog (also – blog) is a special kind of Internet website consisting of
consecutive dated entries (like a logbook), possibly with comments by readers
of the entry (Herring et al., 2004). The entries are often referred to as posts
or postings and a weblog can have single or multiple authors. The activity of
writing a weblog is called blogging and weblogs are now a mainstream tool
of journalists (Robinson, 2006), politicians and many ordinary individuals
who write about there hobbies, education (Shim and Guo, 2009), interests
or personal lives (Baker and Moore, 2008). The collective world of weblog
writers (also called bloggers) and their weblogs, often goes by the name of
the blogosphere. It is in important new tool of self-expression and social
commmunication.
9
4.1
Blogging basics
AF
T
Bloggers usually use blogging environments provided by commercial operators such as WordPress and Blogger – both located in the United States
and the latter now part of the company Google. For this reason, people in
countries where the right to free political expression is not recognised5 but
where Internet access is reasonably widely avaible, use weblogs as a way to
communicate their difficulties and ideas to the world. This blogging is, of
course, done anonymously using webmail accounts and anonymous (actually, pseudonymous) accounts with Blogger or WordPress. For this reason,
attempts – such as South Africa’s recent Regulation of Interception of Communications and Provision of Communication-Related Information Act – to
force providers of Internet access to register the identities of their users, is
particulalry disturbing. One can imagine, for example, a blogger from Zimbabe6 visiting an Internet café in Musina to write a political post which
could, in principle, be traced by the authorities in Zimbabwe to the café and
they could ask (formally or informally) their South African colleagues to retrieve the identity of the person. Of course, such an action would not be
legal under South African law but many illegal things happen every day and
the recording of the identity of the blogger by the café would actually enable
such illegal oppression. The world of work is also not free from controversy.
In the United States, a Delta flight attendant called Ellen Simonetti lost her
job because of the content of her blog (Sprague, 2006; Cote, 2007).
DR
[Example of a weblog entry7
2009-07-01
SpringbokRadio.com – broadcasting daily
Because television was introduced in South Africa mercifully late (1976),
many of us still grew up with an excellent selection of radio dramas
and serials. The most popular station was Springbok Radio, the “commercial” bilingual broadcaster (all stations were state-owned). It had
fantastic radio versions of The Avengers; Father, Dear Father as well as
local classics such as Test the Team and Só maak mens. Many will remember the serials Wolwedans in die skemer or My Name’s Adam Kane
and the more high-brow Tuesday Theatre or Castle Playhouse. Now,
many of these shows are available again on the streaming audio service
5
6
Notably, recently, Cuba, Zimbabwe, China and Iran.
At the time of writing, Zimbabwe was still under the Mugabe régime.
10
of SpringbokRadio.com, courtesy of the Springbok Radio Preservation
Society. Highly recommended!
posted by Petrus Potgieter 10:33
0 Comments:
DR
AF
T
As you will be able to see in the example, the style of writing in weblogs
is often somewhat informal and the postings can be relatively short. It
is possible to modify a post after it has first been published but normally
bloggers would do so only when it is really urgently required because the
essence of the blog is that it is a chronological record of the author’s ideas.
This blogger has received angry comments saying that two or three year old
postings are out of date and should be fixed. Of course they are but they do
not necessarily need fixing! One appropriate way of noting corrections is to
post a comment to a weblog entry, noting the updated information.
Comments to weblog entries can be handled in a number of distinct ways.
Some weblogs have unmoderated comments where anyone may leave a message – possibly after simply logging in using a (possibly anonymous) e-mail
account. This is appropriate for smaller weblogs. Others have moderated
comments where each comment has to be approved by the author(s) before
it will appear on the website. Yet others do not allow comments at all. The
comments policy is completely at the discretion of the weblog authors. In
order to avoid spamming by software robots, most weblogs will now require
that person wishing to leave a comment should enter a CAPTCHA (a Completely Automated Public Turing test to tell Computers and Humans Apart)
which would typically be an image of some jumbled letters that are easily
identified by the human mind but not so easy for a computer program to
parse. Unless the CAPTCHA has an audio equivalent, it will inhibit the
placing of comments on the blog by persons with sight impairments.
4.2
Blog aggregators
An important component of the blogosphere, is the aggregating sites where
users can view headlines and/or extracts of posts from very many weblogs.
These aggregators also usually allow searching and filtering for specific topics
or may collect postings on a specific topic. Notable examples include the
following, which are clickable in the electronic version of this document.
Technorati claims to index over 100 million blogs and is one of the oldest
aggregators in the field.
11
ThoughLeader by South Africa’s Mail&Guardian online is “an editorial
group blog of quality commentary and analysis” which is essentially,
because of its selective nature, an extensive online editorial supplement.
amatomu.com which is a weblog aggregtor for South Africa.
blik has a focus on Afrikaans bloggers and other local content.
4.3
Getting started in blogging
Wikis
DR
5
AF
T
The best way to learn about blogging is to spend some time reading weblogs
and to start your own! Please keep in mind that what you will write, will be
visible to everyone but that dedicated readers will require excellence on the
writer’s part (Du and Wagner, 2006). Refrain from writing defamatory or
otherwise illegal or embarrassing posts. Although you will be able to delete
your blog from the server where it is hosted, it is more than likely that your
post will already have been indexed and archived elsewhere and – like most
things once placed on the Iternet – could very well persists indefinitely.
It is not strictly necessary to use a commercial bloggin service provider,
although they make things quite easy. If you have your own Internet server,
you can easily host a weblog or even a weblogging service. Many technical
and social aspects are worth further exploration and research (Mishne, 2006;
Mishne and Glance, 2006; Herring and Paolillo, 2006).
Wikis have been around since about 1995 when Ward Cunningham, an American programmer, published the first software for running a wiki website
(Leuf and Cunningham, 2001). The work wiki originally means “quick” in
the Hawaiian language and Cunningham’s intention was to create an environment in which editing a website would be quick. The essence of a wiki is
that it allows for the collaborative editing of articles, easy expansion of the
wiki website and often for contributing images and other material. Often,
anybody is allowed to edit the website simply by clicking on the button labelled Edit. It was surprising to many that on this basis, one of the most
useful Internet resource, the Wikipedia,8 has been created Giles (2005). In
the author’s experience, the Wikipedia is a very reliable resource in certain
areas, especially on technical topics where there is a small, dedicated and
informed community of writers and very little other interest in the particular
8
http://www.wikipedia.org/
12
5.0.1
AF
T
Wikipedia entries. When it comes to topics where the ratio of interested
individuals to informed individuals is very high (for example, politics), the
quality of Wikipedia entries is much more variable. Vandalism of wiki articles
is repaired as easily, or more easily, than vandalism can be caused and this
has perhaps been on of the chief reasons for the Wikipedia’s success (Denning et al., 2005). The Wikipedia actually has versions in many languages
although that in Enlish is the most extensive. Among the version in African
languages, the Swahili and Afrikaans Wikipedias are already in the second
tier (having more than 10 000 entries) and Amharic and Yoruba in the third
tier (more than 1000 entries) of Wikipedias.
Although there are providers of wiki websites, it is more usual for individuals to participate in existing wikis. One can install wiki software on
ones own server and host a wiki. Instructions, for the technically minded,
can easily be found on the Internet. Wikis can be an excellent tool for the
collaboration of closed groups (Boulos et al., 2006) and it is quite usual nowadays for documentation on software projects, for example, to be maintained
in a wiki. Naturally, there is scope for the expansion of the wiki format –
specifically to make content more easily processable by software and to allow
for better indexing and cross-referencing (Völkel et al., 2006).
Editing the Wikipedia entry on your hometown
DR
Go to a Wikipedia of your choice, e.g. in
English
en.wikipedia.org
Afrikaans
af.wikipedia.org
Simple English simple.wikipedia.org
Swahili
sw.wikipedia.org
and find the entry on your hometown or suburb, e.g. Pretoria, Sandton
or Kibera. Contribute something that you know about the city, suburb or
settlement by clicking on edit this page (or equivalent in the language
you have selected). For a beginner it is easiest to start by correcting a
small mistake or making minor additions or changes to the text. Keep it
simple and read the instructions carefully!
13
6
Podcasting and vodcasting
AF
T
A podcast is a downloadable audio file (typically in MP3 format) which is
intended to be heard at the listener’s convenience and on a device of the
listener’s choice. It is typically published on a regular basis (e.g. weekly).
Podcasting is the activity of creating podcasts and making them available
for download over the Internet. By definition, podcasting undermines traditional copyright restrictions as the user is required to make a copy of the
audio material. Nevertheless, podcasting is now widely used not only by individuals but also by traditional broadcasters such as the BBC and the SABC
– for whom it has become a new distribution channel. On a smaller scale,
podcasting has become an excellent tool for small groups, such as school or
university classes (Boulos et al., 2006). The creation of a podcast requires
some technical skill since an appropriate audio recording has to be made and
uploaded to an Internet server (Morris et al., 2008). There is also an analogous video concept, called vodcasting but it is not yet as widespread an will
perhaps never be. Among the notable podcast directories, where one may
download or subscribe to podcasts, include the following.
• PodCastAlley.com
• bbc.co.uk/podcasts/ (BBC material only)
• Potgooi.org (mainly Afrikaans content)
DR
Try it out – at least once! Podcasts have also contributed significantly to
social globalisation by giving people all over the world access to news, current
affairs and entertainment programming produced elsewhere.
7
Streaming content
Streaming content is related to podcasting in the sense that it allows users to
receive audio and video material directly from the Internet to their computer
or other Internet access device, e.g. a mobile phone. The intent of streaming
content is however not for the user to permanently store the material on their
device but to view it in real time as it gets delivered to their computer or other
device. The user has to be online and streaming content typically requires
quite good Internet access. In South Africa this is so far problematic since
most home users (and streaming content is mainly for entertainment) have
very limited bandwidth and low monthly data usage caps. In North America,
Europe and the developed countries of Asia, streaming services are however
fairly commonplace and allow viewers to use their Internet connection as a full
14
substitute for conventional radio and television. Many South African radio
stations already offer Internet streaming and anecdotal evidence suggests
that these services are particularly widely used by expartriate South Africans
residing in countries where more advanced Internet capacity is available to
ordinary consumers.
7.1
Streaming as an adjunct to broadcasting
7.2
AF
T
The British Broadcasting Corporation (BBC), a public broadcaster which is
not required to make a profit, has invested substantial resources in their BBC
iPlayer – a software delivery platform for the BBC’s audio and video content
in the UK. The iPlayer offers many of current documentaries, shows and
series on a streaming platform for viewing on personal computers, cellphones
and other compatible devices. The BBC has managed to increase viewership
for much of its content in this way although destreaming (the recording of
streaming content on a user’s computer, usually by deliberately bypassing
certain security measures) has probably made much of the BBC’s content
available on peer-to-peer (P2P) networks earlier than would otherwise have
been the case. In South Africa, MultiChoice offer a similar service under the
name KuduClub but it is targeted mainly at expatriate South Africans and
priced in US dollars9 and requires the use of the Microsoft Media Player.
User-generated streaming content
DR
The spread of high-quality Internet services, especially in the developed world
and in the advanced emerging economies, has made it feasible for individuals
to stream content from their homes or offices – often, relatively high-quality
video. In 1996, Jennifer Kaye Ringley started to broadcast some of the most
intimate (and mundane) details of her life on a website called JenniCam. At
the height of its popularity, millions of people were thought to watch her
live video stream. There are now very many individuals broadcasting most
or part of their life live and the pratice has become known as lifecasting.
Non-synchronous streaming content is also a popular means of expression
for amateurs. In this case, videos are uploaded to a server (for example,
YouTube) and streamed to viewers on demand.
9
At the time of writing, a limited amount of content is available for free, upon registration.
15
7.2.1
Time for TV
Visit justin.tv to view some live lifecasting. Also try www.zoopy.com for
some mainly South African mode-made streaming video on demand. Pay
attention to your bandwidth use as video requires many more network
resources than other activities.
Social networking, social bookmarking
AF
T
8
DR
Social networking includes websites like the widely used Facebook10 on which
users maintain networks of friends and publish personal information, photographs, videos etc. The main social networking tools are all essentially
websites with very extended functionality, including messaging. These websites have been instrumental in maintaining social networks spanning the
globe. Many families currently use Facebook to stay in touch, no matter
where its members are. Many individuals use Facebook, its competitor mySpace or similar sites for professionals such as LinkedIn11 to make new acquaintances and friends. All of these networking websites have privacy options but
these options are not always adequately understood by their users. A typical
small privacy conundrum is caused by chatting individuals not realizing that
their text conversation is publicly available to all registered users. Individuals should also know that employeers, students and teachers may visit their
Facebook profiles and find information that they would not necessarily like
to reveal to all. Stalking through Facebook is also an emergent phenomenon
and users should be somewhat cautious about how much information they
publish!
Social bookmarking12 and commenting provide another form of interaction where users can share websites that they visit and comment on these
sites, within a small community. This is very useful because one can share
in the discoveries made by one’s group. Shared bookmarking also provides a
valuable tool for researchers (Hughes et al., 2005).
10
http://www.facebook.com/
http://www.linkedin.com/
12
For example, http://www.stumbleupon.com/.
11
16
9
Mashups
10
AF
T
A mashup constitues a novel remixing of data and services already available
on the Internet to produce a useful new tool (Butler, 2006; Wong and Hong,
2007; Ennals and Garofalakis, 2007; Jhingran, 2006). Mashups are made
possible by the very open and flexible nature of the Internet. It is unlikely
that earlier or proprietary technologies would have allowed innovation of this
kind. A typical example of a mashup is where Google maps13 are integrated
into website providing accommodation searches. Another useful and nice
mature mashup isWikiMapia.org which combines GoogleMap data with a
wiki environment. Its functioning is best illustrated by visiting the website
and searching for your home city, village or neighbourhood! Searching for
Soweto, for example, will bring up several entries of interest as shown in
Figure 4.
Subvertising
DR
Subvertising is an art form where corporate or governmental advertisements
are edited and touched up in order to subvert the original messages. This
applies especially to very well-known images and slogans and constitutesAustralian Computer Society a form of cultural jamming, the informal use
of mainstream icons to deliver social and political commentary. An example
is shown in Figure 5.
11
Peer-to-peer networking (P2P)
Peer-to-peer (P2P) networks are virtual networks that use the Internet to
establish connections directly between users. Some of the very well-known
ones include Limewire and BitTorrent. Often, these network – which might
include encryption of traffic and anonymisation of users – are used for the
illegal (in many jusrisdications) exchange of copies of copyrighted materials
such as music, films and books (Entress, 2009). P2P networks have proven
very difficult to control and it seems likely that they will constitute a significant challenge to owners of copyright in mass media productions. It should
however be noted that it is frequently only very popular works that are exposed on these networks and that the copyright of lesser-known works is
generally intact although this is by neglect and not by design. The Internet
13
http://maps.google.com/
17
AF
T
DR
Figure 4: Image from WikiMapia. The labels on the institutions have been
contributed by WikiMapia users. Reproduction here believed to constitute
fair use.
18
AF
T
Figure 5: Subvertising that mocks pesticide sparying of agricultural products sold in a British supermarket chain. The original slogan was “Try
something new today.” Used by permission of http://thesietch.org/
mysietch/keith/subvertising-gallery/.
DR
telephone provider Skype14 also employs P2P networking and its proprietary
algorithms for routing audio and video conversation have proven to be quite
robust and to deliver high-quality connections.
One of the currently more popular P2P systems is BitTorrent. Technically, it is simply a file sharing protocol, in other words a description of a
standard by which independent computers can exchange files. BitTorrent
is neither a service nor a server – it is simply a standard for information
interchange, similar to the English language itself! Two computers running
BitTorrent software can, should they connect to each other, exchange files in
a prescribed manner. Such a connection takes place over the public Internet
or a private network15 and allow for the (usually, anonymous) exchange of
files hosted on the respective machines. P2P traffic, especially using BitTorrent, is now reported to be one of the largest single sources of traffic on the
Internet (Basher et al., 2008; Pouwelse et al., 2005).
Most P2P file-sharing networks are based on the principle that all downloaders are uploaders at the same time. Files are split into small pieces and
when a user is busy download a large video, for example, they will at the same
time act as a source for those parts of the videa already on their machine and
other users will download from them. This makes it possible to share material with a large number of people without investing in costly servers. It is,
14
http://www.skype.com/
Typical suitable private networks would include campus residence networks or wireless
community networks like the Johannesburg Area Wireless Users’ Group (JAWUG) in
central Gauteng.
15
19
in fact, a co-operative approach to delivering content on the Internet. Users
in countries like South Africa, with strict usage limits on normal Internet
accounts, should take great care when using these services since the uploads
contributed from one’s computer – when running a P2P application – can
amount to many, many times the amount of traffic generated by downloading
a specific file. Upload traffic can be limited by adjusting the settings of the
software but P2P network ethics would suggest that users try to maintain,
at least, symmetric traffic volumes.
How P2P networks promote the spread of information
AF
T
11.1
DR
In mid-2009, the P2P software LimeWire suggested to its users that they
support the anti-government protestors in Iran at the time by assisting in
circulating video material of apparent police brutality in that country. This
represents a form of citizen activism that is tremendously easy given the
widespread use of P2P technology. Activists in Iran (or elsewhere) no longer
need to invest in media platforms in order to distribute a message or get
material out of the country. Volunteers from all over the world can contribute
their computers in order to help distribute the material as far and wide
as possible. Political dissidents in many countries use similar networks to
communicate and spread their ideas anonymously (Clarke, 2009).
The Onion Router (Tor) is one P2P type network used for securely encrypting messages where this is required (Camenisch and Lysyanskaya, 2005).
The Tor network consists of a web of so-called Onion Routers that route traffic securely in order to protect the identity of users as well as the content
they are accessing. Since even some traditionally free societies such as Australia have started to regulate Internet traffic (Bambauer, 2008; Maurushat
and Watt), the use of anonymizing networks such as Tor is almost certain to
increase.
11.2
P2P and copyright
The nature of digital media, especially the ease of making perfect copies of
original products, means that digital audio and video is especially suited to
online distribution. The traditional commercial media tried at first to employ
digital rights management16 (DRM) in order to prevent the possibly illegal
16
Usually, DRM amounts to the encryption of content, such as that on many video
DVD discs, and relying on specific software or hardware – controlled and licenced by the
copyright owner(s) – to play the content. If you have found that you cannot play a US
20
DR
AF
T
copying of content but this has generally been a failure because knowledge of
how to circumvent such measures, has spread very quickly and widely – using
the Internet. The Content-Scrambling System (CSS) which was implemented
to attempt to protect commercial video DVDs from home copying but the
computer code for breaking this protection was released in 1999 by then
Norwegian teenager Jon Lech Johansen. Johansen, who was not the sole
author, was put on trial in Norway and acquitted in 2003. By that time, the
code was widely available.
The decentralised nature of P2P systems also makes it quite hard to
prosecute the use of P2P to circumvent copyright and intellectual property
restrictions because the actual violations (sharing of files) happens between
different individuals and each of them is typically not responsible for a huge
amount of sharing and does not make a profit from it since it is all voluntary. Nevertheless, clear copyright violations do occur and the this has
attracted the attention of the owners of the intellectual property as well as
the authorities in many countries (Adrian, 2006).
In fact, four of the operators of The Pirate
Bay, a tracker and indexer of BitTorrent
files, were found guilty of assistance to copyright infringement in Sweden in April 2009.
Towards the end of August 2009, the website of Pirate Bay was still running, however,
and the judgement was being appealed. Pirate Bay did not in fact itself host any illegal
copies of copyrighted material but simply
acted as a repository of information about
where to find (legal as well as illegal) material. People with, say, a digital copy of the
latest James Bond film, might publish the
information that they have a copy for P2P
sharing on Pirate Bay where this information would be found by people wishing to download the film. The downloaders (called leechers) would then download this illegal copy directly from
these seeders. At no time would the servers of Pirate Bay contain an illegal
copy of anything.
The case of Pirate Bay highlights many controversial aspects related to
copyright in the digital age. It is legal for an individual to play a song from a
commercial CD to friends who visit but it is not legal (in most jurisdictions)
American (Region 1) or Brazilian (Region 4) DVD in South Africa (Region 2), you have
encountered DRM.
21
for the same individual to e-mail a copy of the song to the same friends.
In many countries, it is not legal to make a backup copy of a DVD you
own on your own computer, even if you will be the only one watching it.
Little wonder, therefore, that many regard the traditional and current legal
manifestations of multimedia copyright to conflict with natural notions of
justice and property rights (Balestrino, 2008).
11.3
Economics of P2P networks
DR
AF
T
Since P2P networks make it possible for the burden of providing content to
be shared among the users, it is a very co-operative and fair way of using the
Internet. Nevertheless, as in all ventures based on voluntary efforts, there
is a distinct danger of free-riding. That is, that someone might download
(or, leech) exclusively, without seeding the material to other users (Jun and
Ahamad, 2005). On BitTorrent networks, such free-riding is definitely rife
but seems possible that it is more than cancelled out by unintentional seeding.
Many BitTorrent clients have default settings that allow quite a lot of seeding
to take place during each download and thereafter. Users who do not have
metered Internet usage and who do not pay attention, typically seed quite a
lot. In countries like South Africa and Australia, where Internet use is often
metered (or, capped ), potential BitTorrent users should take care not to seed
excessively as this could incur hefty charges.
11.3.1
Legally download a film using BitTorrent
Steal This Film (in two parts) is a controversial film abou the some of
the controversies surrounding copyright and P2P networks. This film has
been distributed online throught Pirate Bay and other sites. Install the
Vuze client (previously known as Azureus) on your computer and use any
of the following tracking sites to find a BitTorrent copy of the film. All
three sites were in operation at the time of writing.
• thepiratebay.org
• isohunt.com
• www.mininova.org
Use Vuze to download a copy of the film, making sure that you limit the
upload (seeing) speed and set a limit of, say, 200% for seeding activity.
22
You will need to use a PC which is not behind an aggressive firewall and
this activity is performed entirely at your own risk. When done, sit
down and enjoy the film on your computer!
12
AF
T
P2P networking has been likened to a hypothetical gift economy. This comparison is valid only to the extent that the files offered for downloading may
legitimately be made available. When you use P2P, please respect the rights
of others!
Virtual worlds
A virtual world is a computer simulation in which, typically, very many
individual actors exist and which usually runs independently of the logged
on status of any specific user. An extreme example of a virtual world is
depicted in the 1999 film The Matrix. Other depictions exist in text fiction,
among them Neal Stephenson’s 1992 novel Snow Crash.
The world of Internet gaming has given rise to games in which substantial
numbers of people interact in virtual environment, 24 hours per day. These
are massively multiplayer online games.
DR
Fun and games
Multi-player games require an account on a server, which coordinates
the gaming in the virtual world. Running servers for games is a major
business in the world today, with typical monthly subscriptions at $10
to $20 per user. The game OpenArena is a free and open source firstperson shooter game, resembling the commercial game Quake. Go to
openarena.ws to download and install OpenArena for your computer.
You can play on your own computer, local network or against strangers
using servers on the Internet. You can use
• www.guerrillamail.com, or
• www.zoemail.com
in order to obtain a temporary, disposable e-mail address for use while
registering – if you do not want to protect your privacy by not using your
23
real address. Download and playing OpenArena might require the relaxation of your network’s firewall rules and the use of substantial network
bandwidth.
12.1
Avatars
12.2
AF
T
In an online gaming environment, the players normally appear not as themselves, but as avatars. An avatar is a divine incarnation of a deity in Hinduism
(Sanskrit: avatāra) and the use of the word in online gaming was probably inspired by the very large number of avatars in the Hindu pantheon. An avatar
is the online gaming personality of the player and it need not resemble the
player’s real-life appearance and personality at all. Their are estimated to
be at least 200 million avatars “on earth” (Ondrejka; Meadows, 2007).
Second Life
DR
In operation since 2003, Second Life is an online environment where he object
of the game is to live in a simulated world that resembles the offline world.
Avatars look like normal people and the virtual world of Second Life (SL)
can interact with the real worlds in many way, not the least of which is
the conversion of real-world dollars into the virtual currency of SL, so-called
Linden dollars. SL, like the real world, requires money for most things and
offers many opportunities for entrepreneurs, some of whom have become
millionaires in the real world, based on their SL businesses. Many businesses
and instituttions of the real world now have a presence in SL as well, including
educational institutions (Boulos et al., 2007; Ritzema and Harris, 2008).
13
Conclusion
The new media offer a wealth of opportunities for accessing information,
accumulating experience and establishing new businesses ventures. Furthermore, the cultural effects of media convergens and online worlds have only
begun to be felt (Bruns, 2008). Any writing about this topic is bound to be
left behind by events quite quickly and the reader is strongly encouraged to
turn to online sources for the latest information and trends!
24
References
Adrian, A. (2006). The Pirate Bay deep-sixed. Computer Law & Security
Report, 22(5):392–401.
Baker, J. R. and Moore, S. M. (2008). Distress, coping, and blogging: comparing new myspace users by their intention to blog. Cyberpsychology &
Behavior: The Impact of the Internet, Multimedia and Virtual Reality on
Behavior and Society, 11(1):81–85. PMID: 18275317.
AF
T
Balestrino, A. (2008). It is a theft but not a crime. European Journal of
Political Economy, 24(2):455–469.
Bambauer, D. E. (2008). Filtering in Oz: Australia’s foray into Internet
censorship. SSRN eLibrary.
Basher, N., Mahanti, A., Mahanti, A., Williamson, C., and Arlitt, M. (2008).
A comparative analysis of web and peer-to-peer traffic. In Proceeding of the
17th international conference on World Wide Web, pages 287–296, Beijing,
China. ACM.
Boulos, M., Maramba, I., and Wheeler, S. (2006). Wikis, blogs and podcasts:
a new generation of Web-based tools for virtual collaborative clinical practice and education. BMC Medical Education, 6(1):41.
DR
Boulos, M. N. K., Hetherington, L., and Wheeler, S. (2007). Second Life:
an overview of the potential of 3-D virtual worlds in medical and health
education. Health Information & Libraries Journal, 24(4):233–245.
Bruns, A. (2008). Blogs, Wikipedia, Second Life, and Beyond: From Production to Produsage. Peter Lang Publishing.
Butler, D. (2006).
439(7072):6–7.
Mashups mix data into global service.
Nature,
Camenisch, J. and Lysyanskaya, A. (2005). A formal treatment of Onion
Routing. In Advances in Cryptology – CRYPTO 2005, pages 169–187.
Clarke, R. (2009). Dissidentity. Identity in the Information Society. http:
//www.springerlink.com/content/273829u634861073/.
Cote, M. (2007). Getting dooced: Employee blogs and employer blogging
policies under the National Labor Relations Act. Washington Law Review,
82:121.
25
Denning, P., Horning, J., Parnas, D., and Weinstein, L. (2005). Wikipedia
risks. Commun. ACM, 48(12):152–152.
Deuze, M. . (2006). Participation, remediation, bricolage: Considering principal components of a digital culture. The Information Society, 22:63–75.
developerWorks (2006).
developerWorks interviews: Tim BernersLee.
http://www.ibm.com/developerworks/podcast/dwi/cmint082206txt.html. Accessed 2009-07-12.
AF
T
Domingo, D., Quandt, T., Heinonen, A., Paulussen, S., Singer, J. B., and
Vujnovic, M. (2008). Participatory journalism practices in the media and
beyond – an international comparative study of initiatives in online newspapers. Journalism Practice, 2(3):326.
Du, H. S. and Wagner, C. (2006). Weblog success: Exploring the role of
technology. Int. J. Hum.-Comput. Stud., 64(9):789–798.
Ennals, R. J. and Garofalakis, M. N. (2007). MashMaker: mashups for the
masses. In Proceedings of the 2007 ACM SIGMOD international conference
on Management of data, pages 1116–1118, Beijing, China. ACM.
Entress, L. (2009). Ripped: How the wired generation revolutionized music.
Christian Science Monitor.
DR
Franklin, B. (2008). The future of newspapers. Journalism Practice, 2(3):306.
Giles, J. (2005). Internet encyclopaedias go head to head.
438(7070):900–901.
Nature,
Herring, S., Scheidt, L., Bonus, S., and Wright, E. (2004). Bridging the gap:
a genre analysis of weblogs. In System Sciences, 2004. Proceedings of the
37th Annual Hawaii International Conference on, page 11 pp.
Herring, S. C. and Paolillo, J. C. (2006). Gender and genre variation in
weblogs. Journal of Sociolinguistics, 10(4):439–459.
Hughes, C. E., Stapleton, C. B., Hughes, D. E., and Smith, E. M. (2005).
Mixed reality in education, entertainment, and training. IEEE Comput.
Graph. Appl., 25(6):24–30.
Jenkins, H. (2004). The cultural logic of media convergence. International
Journal of Cultural Studies, 7(1):33–43.
26
Jhingran, A. (2006). Enterprise information mashups: integrating information, simply. In Proceedings of the 32nd international conference on Very
large data bases, pages 3–4, Seoul, Korea. VLDB Endowment.
Jun, S. and Ahamad, M. (2005). Incentives in BitTorrent induce free riding. In Proceedings of the 2005 ACM SIGCOMM workshop on Economics
of peer-to-peer systems, pages 116–121, Philadelphia, Pennsylvania, USA.
ACM.
AF
T
Leuf, B. and Cunningham, W. (2001). The Wiki Way: Quick Collaboration
on the Web. Addison-Wesley Professional.
Maurushat, A. and Watt, R. Clean feed: Australia’s internet filtering proposal. SSRN eLibrary.
Meadows, M. (2007). I, avatar: the culture and consequences of having a
second life. New Riders Publishing.
Mishne, G. (2006). AutoTag: a collaborative approach to automated tag
assignment for weblog posts. In Proceedings of the 15th international conference on World Wide Web, pages 953–954, Edinburgh, Scotland. ACM.
Mishne, G. and Glance, N. (2006). Leave a reply: An analysis of weblog comments. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.
1.61.5982.
DR
Morris, T., Tomasi, C., and Terra, E. (2008). Podcasting For Dummies. For
Dummies, 2 edition.
Ondrejka, C. Aviators, moguls, fashionistas and barons: Economics and
ownership in Second Life. SSRN eLibrary.
O’Reilly, T. (2006). Web 2.0 compact definition: Trying again - O’Reilly
radar. http://radar.oreilly.com/archives/2006/12/web-20-compact.html.
Accessed 2009-07-12.
Pouwelse, J., Garbacki, P., Epema, D., and Sips, H. (2005). The bittorrent
P2P File-Sharing system: Measurements and analysis. In Peer-to-Peer
Systems IV, pages 205–216.
Ritzema, T. and Harris, B. (2008). The use of second life for distance education. J. Comput. Small Coll., 23(6):110–116.
Robinson, S. (2006). The mission of the j-blog: Recapturing journalistic
authority online. Journalism, 7(1):65–83.
27
Shim, J. P. and Guo, C. . (2009). Weblog technology for instruction, learning,
and information delivery. Decision Sciences The Journal of Innovative
Education, 7:171–193.
Sprague, R. (2006). Fired for blogging: Are there legal protections for employees who blog. University of Pennsylvania Journal of Labor and Employment Law, 9:355.
AF
T
Völkel, M., Krötzsch, M., Vrandecic, D., Haller, H., and Studer, R. (2006).
Semantic Wikipedia. In Proceedings of the 15th international conference
on World Wide Web, pages 585–594, Edinburgh, Scotland. ACM.
Walker, D. Beltel. http://www.allatsea.co.za/retropics/beltel.htm. Accessed
2009-07-11.
DR
Wong, J. and Hong, J. I. (2007). Making mashups with marmite: towards
end-user programming for the web. In Proceedings of the SIGCHI conference on Human factors in computing systems, pages 1435–1444, San Jose,
California, USA. ACM.
This text is released under the Creative Commons Attribution-NoncommercialNo Derivative Works 3.0 Unported License. All other rights are reserved by
the author. Q.v. http: // creativecommons. org/ licenses/ by-nc-nd/
3. 0/ .
28