Compsci 182s, Spring 2011, Case Studies
Compsci 182s
Syllabus
Readings
Cases
Technical
Assignments
Groups
Help
About
Resources Developed by Section 2 for the Case Studies
Wikileaks
Background
Wikileaks
(Just check it out, and browse a bit; thorough reading is not necessary)
Video released by Wikileaks
Articles
WikiLeaks: The Ethics of Revealing Secrets
, Discovery News, Nov 2010
Dealing With Assange and the WikiLeaks Secrets
, New York Times, January, 2011
Taliban Seeks Vengeance in Wake of WikiLeaks
, Newsweek, Aug 2010
China/Green Dam, Censorship
Background
The Open Net Initiative's page "About Filtering"
The Great Firewall: How China Polices Internet Traffic
, Certification Magazine, Nov 2009
Green Dam Enforcement Watered Down
, ZDNet Asia News, Oct 2009
Articles
China's Green Dam: The Implications of Government Control Encroaching on the Home PC
, Bulletin from OpenNet Initiative
Ignoring the Great Firewall of China
, Clayton and others, Univ. of Cambridge
An Inadequate Metaphor: The Great Firewall and Chinese Internet Censorship
, Lokman Tsui, GLOBAL DIALOGUE Volume 9, Number 1-2, Winter/Spring 2007
Open Source, Goldman Sachs, Aleynikov
Articles
Aleynikov Guilty of Stealing Firm's Software Secrets
, Bloomberg, Dec 2010
Aleynikov trial turns on open source issues
, FierceFinanceIT, Dec 2010
Blog post by Steve Hsu
, Professor of Physics at the University of Oregon
Algorithmic Approaches: Ad Auctions, SEO, Trading
Background
The Rise of Crowdsourcing
, Wired, June 2006
The Good, the Bad, and the Ugly of Online Auctions
, Blog post, Feb 2008
Articles
Designing Real Terrorism Futures
, Robin Hanson, George Mason University
Un(der)paid Innovators: The Commercial Utiliza-tion of Consumer Work through Crowdsourcing
, Frank Kleemann, G. Gunter Vob, and Kerstin Rieder
A Bully Finds a Pulpit on the Web
, New York Times, Nov 2010