scholarly journals The haunting of GeoCities and the politics of access control on the early Web

2020 ◽  
pp. 146144482095160
Author(s):  
CJ Reynolds ◽  
Blake Hallinan

Yahoo’s purchase of make-your-own-website platform GeoCities in 1999 and subsequent implementation of a new Terms of Service agreement led to one of the most notable boycotts in Web history. During the “Haunting,” GeoCities users stripped their homepages of color and content, replacing blinking GIFs with excerpts of the offending Terms of Service. In this landmark battle over content rights and access control, protestors used the platform antagonistically, disrupting the value of user-generated content and undermining the company’s strategic vision for the platform. Within a week, the Haunting of GeoCities successfully forced Yahoo to acquiesce to protestor demands and set enduring standards for Terms of Service that preserved greater rights for content creators. This case study from the early Web demonstrates how access is always bound up in a struggle over control and offers a timely reminder of how users have been—and can be—vital agents of platform politics.

Author(s):  
Heitor Henrique de Paula Moraes Costa ◽  
Aleteia Patricia Favacho de Araujo ◽  
Joao Jose Costa Gondim ◽  
Maristela Terto de Holanda ◽  
Maria Emilia Machado Telles Walter

Author(s):  
Paul J. Stoller ◽  
Anthony LoRe ◽  
William Crellin ◽  
Robert Hauser

This paper discusses one of the key lessons learned from administering the first generation of service agreements for public owners of waste-to-energy (WTE) facilities over the past 22 years and how those experiences were incorporated into a new service agreement for the operation and maintenance of Pinellas County’s 24 year old, 3,000 tpd WTE Facility to better protect the county’s interests. Additionally, a major issue raised by the operating companies during the competitive procurement process for continue operation of the facility is discussed and how that concern was addressed in the new service agreement is also presented. Capitalized words or terms used in this paper are defined within the new service agreement.


2013 ◽  
pp. 148-169
Author(s):  
Valentina Casola ◽  
Antonio Cuomo ◽  
Umberto Villano ◽  
Massimiliano Rak

Resource sharing problem is one of the most important aspects of Cloud architectures whose primary goal is to fully enable the concept of accessing computing resources on-demand. Access control and resource federation are hot research topics and a lot of open issues should be addressed on functionalities, technological interoperability, quality of services and security of the federated infrastructures. This chapter aims at offering a view on the problems of access control on federated Clouds; since they strongly depend on chosen architectures and platforms, the chapter will discuss some solutions applied on a real case study: the PerfCloud framework, which is based on the integration of Grid and Cloud platforms. The proposed architecture is based on the adoption of an interoperability system to cope with identity federation and access control, it is strictly related to the adopted framework nevertheless it helps the reader to have an idea of the involved open issues and available solutions in commercial or experimental clouds.


Author(s):  
Valentina Casola ◽  
Antonio Cuomo ◽  
Umberto Villano ◽  
Massimiliano Rak

Resource sharing problem is one of the most important aspects of Cloud architectures whose primary goal is to fully enable the concept of accessing computing resources on-demand. Access control and resource federation are hot research topics and a lot of open issues should be addressed on functionalities, technological interoperability, quality of services and security of the federated infrastructures. This chapter aims at offering a view on the problems of access control on federated Clouds; since they strongly depend on chosen architectures and platforms, the chapter will discuss some solutions applied on a real case study: the PerfCloud framework, which is based on the integration of Grid and Cloud platforms. The proposed architecture is based on the adoption of an interoperability system to cope with identity federation and access control, it is strictly related to the adopted framework nevertheless it helps the reader to have an idea of the involved open issues and available solutions in commercial or experimental clouds.


Author(s):  
Jeremy O. Turner ◽  
Janet McCracken ◽  
Jim Bizzocchi

This chapter explores the epistemological, and ethical boundaries of the application of a participant-observer methodology for analyzing avatar design in user-generated virtual worlds. We describe why Second Life was selected as the preferred platform for studying the fundamental design properties of avatars in a situated manner. We will situate the specific case study within the broader context of ethnographic qualitative research methodologies, particularly focusing on what it means to live – and role-play - within the context that one is studying, or to facilitate prolonged engagement in order to have the research results accepted as trustworthy or credible (Lincoln & Guba, 1985). This chapter describes a case study where researchers can extract methods and techniques for studying “in-world” workshops and focus groups. Our speculations and research questions drawn from a close analysis of this case study will illuminate the possible limitations of applying similar hybrid iterations of participation-observation tactics and translations of disciplinary frameworks into the study of user-generated content for future virtual world communities. Finally, we will review the broader epistemological and ethical issues related to the role of the participant-observation researcher in the study of virtual worlds.


Author(s):  
Simon R. Reese

Purpose Recognition programs have proven to be a useful tool in engaging employees and helping align them around a common purpose. In this case, study the organization created a recognition program that promoted learning across the organization. The easy to follow steps provided herein can be replicated by leaders in any organization. Design/methodology/approach The case study provides a quick reflection of the steps taken by the organization to create a recognition program that linked behaviors, tactical actions and corporate strategy in a way that engaged all toward learning together. Findings With the new program, the organization not only improved employee engagement and alignment around four critical behaviors, the organization also witnessed employee alignment around strategic vision and revenue improvements. Originality/value Studies find that employee engagement is seriously lacking. Studies also find that employee engagement is beneficial to employee contribution and employee success. Recognition programs have been described as one method to improve engagement. This case study illustrates how an organization was able to implement such a program.


Author(s):  
Saadia Kedjar ◽  
Abdelkamel Tari ◽  
Peter Bertok

With the advancement of web services technology, security has become an increasingly important issue. Various security standards have been developed to secure web services at the transport and message level, but application level has received less attention. The security solutions at the application level focus on access control which cannot alone ensure the confidentiality and integrity of information. The solution proposed in this paper consists on a hybrid model that combines access control (AC) and information flow control (IFC). The AC mechanism uses the concept of roles and attributes to control user access to web services' methods. The IFC mechanism uses labels to control how the roles access to the system's objects and verify the information flows between them to ensure the information confidentiality and integrity. This manuscript describes the model, gives the demonstration of the IFC model safety, presents the modeling and implementation of the model and a case study.


Sign in / Sign up

Export Citation Format

Share Document