ONI Bulletin on Further China News Restrictions

We at the OpenNet Initiative today released a bulletin on restrictions placed by the Chinese state on online news publishers. In summary:

“China’s new regulations for Internet news content significantly tighten prior requirements that govern all news-related content transmitted through Internet-based technologies. The regulations target not only existing news organizations, but also individuals and groups posting news-related content to personal Web sites, Web logs (blogs), mobile phone text messaging (through Simple Message Service, or SMS), and other Internet communication forums. The regulations provide broad coverage and expansive government discretion in defining and punishing offences, effectively restricting legal Internet news content to that produced or sanctioned by the Chinese government.”

This bulletin points to a key element of the Chinese filtering strategy: it is not just technological controls, but also legal restrictions (which in turn often place a burden on intermediaries) that get the filtering job done. Add that to the pressures of social norms, soft controls, and the economic force of competition (through which companies compete with one another fiercely to curry favor with regulators) and the regime functions highly effectively and on many layers.

Nicholas Carr review of JZ's Generative Internet piece

A thoughtful review/critique, plus commentary, of Prof. Jonathan Zittrain’s Harvard Law Review article, The Generative Internet, on Nicholas Carr’s blog. Mr. Carr concludes, about JZ’s conclusions: “Zittrain concludes that the best course is to ‘try to maintain the fundamental generativity of the existing grid while taking seriously the problems that fuel enemies of the Internet free-for-all. It requires charting an intermediate course to make the grid more secure — and to make some activities to which regulators object more regulable — in order to continue to enable the rapid deployment of the sort of amateur programming that has made the Internet such a stunning success.’ It’s not a question, in other words, of whether there will be limits. There will be. It’s a question of where those limits will be imposed and who will impose them.”

Carr points to the fabulous Ethan Zuckerman’s must-read review of JZ’s piece as his pointer and inspiration.

A cool example of dialogue about serious scholarship happening in public, online.

Jim Moore's Edge2.0 Top10

Jim Moore, my partner in various efforts and a former Berkman fellow, wrote up his experience in creating his own Top10 list, which anyone can do as a public aggregator, and comparing Top10Sources and Technorati Top10 lists.

My own Top10 is here.

Another cool thing is the whole tree of OPML sites that Doc is making from his notes for BloggerCon IV, as a search result in OPML Search.

(Disclosure: Top10 and OPML Search are beta sites in which Jim Moore and I both have an interest.)

"How to Make Money" BloggerCon session

We didn’t start from scratch this morning in talking about how to make money session at BloggerCon IV, and I think the un-conference group made a lot of progress in exploring the topic. (Dave had duct tape over his mouth.) Dan Farber of ZDNet has got a rockin’ round-up of the session, complete with loads of photos. Doc has his amazing outline in real-time of what was said. And the whole thing is available in mp3 format (along with all the others).

Here’s an outline of suggestions people have made — before, during and after — for the “How to Make Money” session:

  1. Making Money By Blogging
    1. Run ads
      1. On your own site
        1. Text/images on your site (BlogAds, Adwords/Adsense)
        2. Sponsorships on site (TechCrunch, or the “Be Mike Arrington” strategy)
      2. In feeds (Feedburner)
      3. In a podcast (Chris Pirillo)
      4. In a vlog (Rocketboom)
    2. Put other thing on your blog that generate money for you
      1. Classifieds (EdgeIo “listing” tag)
      2. Other feeds (Stylefeeder feed)
      3. Affiliate program (e.g., from Amazon with books or other products)
    3. Put up a tip-jar on your blog
      1. (Some) people at BloggerCon said they’d contribute to you (IT Conversations).
      2. Lean into the micropayment movement — it might be $10/year (Dan Farber’s suggestion) or it might be much less — make both possible
    4. Get hyperlocal (Lisa WilliamsH2OTown, Nashville is Blogging)
      1. But maybe we need a new, easier way to give pizza parlors the ability to post ads, for which they’ll pay a higher cost per click/impression/whatever than what they will through Google Ads.
    5. Join a network of blogs
      1. Federated Media: John Battelle approach
      2. Pajama’s Media, Corante, Weblogs.com
    6. Sell your feed or other content itself to publishers (will someone pay? Gather, Squidoo)
    7. Generate payment via aggregators and revenue-sharing (Feedshow)
    8. Promote a specific product or products (Manolo shoe blog)
    9. Give it to charity (Goodstorm, as retold in TechCrunch)
  2. Making Money Off of Blogging
    1. Sell software, services (whether or not you blog)
    2. Blog to brand yourself (establish trust, credibility, relationships, goodwill), then…
      1. Sell consulting
      2. The Dave Winer solution (no ads, get famous, sell a pinger or the like for millions of dollars)
      3. Host a conference (Blogher, Gnomedex, Web 2.0 Conference)
    3. Sell search etc. (Technorati, Feedster)
    4. Become a VC (make money off of other people’s work)
    5. Make money for other people, like charities, through the leverage of your blog

A Wired story about BloggerCon mentions the How to Make Money session. Frank Paynter has posted lots of good stuff in the lead up to the conference and in covering sessions like the Emotional Life of Bloggers.

Post a comment with suggestions for more examples to add to the list and I’ll try to keep the outline up-to-date.

(Disclosure: I have an interest in a few of the companies above — Stylefeeder, Edge.io — and am a part-time investor in other entities that are included by reference above.)

Re-envisioning privacy and security online

The combination of our conference this week on digital identity, JZ’s paper and forthcoming book on Generativity and his OII inaugural lecture, this morning’s WSJ, and all manner of other things has convinced me that we need a new framework for thinking about privacy and security in the digital world.

On a plane this morning from SFO-PDX, I read found (at least) three articles that made this problem plain to me, again. One was the piece on the Consumer Privacy Legislative Forum’s day on the Hill yesterday (see the CDT et al. statement), in the context of which Meg Whitman of eBay and Nicole Wong of Google and others made the case for laying “a foundation for a long-term approach to privacy protection” (Whitman, as quoted in the WSJ). Wong wrote, correctly in my view, that “this matrix of [privacy/security] laws is complex, incomplete and sometimes contradictory.” She went on to say: “On an Internet beset with spyware, malware, phishing, identity-theft, and other privacy threats, enforcement of privacy protections has become an industry-wide challenge.” The WSJ story on MySpace and its advertiser relationships — in the wake of a $30 million lawsuit against the company related to online safety of a user — made the same point, implicitly. A nice Web2.0 story on Boston-based Tabblo didn’t have to make the point that anyone can post online photos about anyone, mash them up into a collage, and publish — to anyone else, and everyone else.

The creative opportunities of the web have never been more wonderful and should be embraced. But the privacy and security stakes are rising as we bring our digital identities come online, more and more, and as our digital native children start to experience the good and the bad of this brave new world. What’s the role of schools, and universities, and parents, and kids, and companies, and governments? As the wisdom of the crowd is relied upon to make more and more decisions, what’s the due process when your privacy and security is at stake, if things go wrong? JZ has some good ideas, and so do others. We need to get on with the planning and the building of this foundation, and fast.

(If you’re having trouble grasping the digital ID part of this equation, zip over to ZDNet, where David Berlind does his usual amazingly lucid job of putting it all in context in his review of the Higgins Trust Framework — and n.b. the “spectrum” that he describes, which is right on. Berlind writes: “By the end of the panel, I was visualizing a spectrum of attitudes about technological expression of identity that range from the very negative to the very positive. On one end are the warning signs about what could happen if the right checks, balances, and governance aren’t in place. On the other end is hope. Hope that idenitity could be tapped in a fashion that serves the greater social good.”)

"Our reach exceeds your grasp — deal with it"

Doc Searls quoted Chris Locke in the last panel of today’s day 1 of the digital ID mash-up conference. We haven’t gotten to the point where customers/end-users/seats are yet treated like people, Doc claims. The issue is the creation of relationships, not just market-clearing prices. He’s focused now on the Intention Economy — which, he says, will “save us all a lot of grief.”

John Sviokla says that no market has changed more in the supply/demand equation in the world than information. The industries are de-maturing, he says — from overbuilding, over-mature industries to immature industries (that sounds like us).

Louise Guay of My Virtual Model begins with a collage of her own identity, in the form of a visual grammar — self-expression through images, a true mash-up, about women and technology. Success is based on the user, Louise says, in a paraphrase of Meg Whitman. Louise has demo-ed a Virtual Search Engine — pretty wild — which perfectly demonstrates Doc’s Intention Economy point, as John Sviokla points out. MVM is “doing for fashion what mortgage-backed securities did for the mortgage business.” Louise credits Frank Pillar and Eric von Hippel with inspiring their design.

ID Mash-up is on

I think the key aspects of this conference are figuring out how to make this digital identity business 1) real and understandable to non-technical people (use case-driven, etc.) and 2) a genuine improvement over what we have today, or have had in the past (privacy-enhancing? a better online experience? better grease for commercial transactions?).

Tid-bits:

Doc says that Mash is Up and he has a pic of Esther and her PC.

Esther Dyson, in the opening session, tells us she hinks we should call the conference “Presentation of Self.”

Kim Taipale, says that the identity we’re talking about is about little more than “allocation of risk.”

Christine Varney (former Clinton administration senior official, now of Hogan and Hartson) says that privacy is really about trust, with four elements that went by really fast.

Here’s Charlie Nesson doing the welcome with me.  In case you were wondering, his T-Shirt says “Gay? Fine by me.”

Here’s my profile (identity?) on the IDMashup conference CMS. I am eager to see what happens with/to it, if anything. (Have I just filled in another form? I suppose it’s the job of all of us to ensure that this is not the case, that it’s more than just that.)

On the topic of Harvard’s own identity, a wonderful post on “Harvard through Canadian Eyes” from Kaliya, Identity Woman.

Identity Mash-up!

Tomorrow morning, we begin the digital identity mash-up conference. I have reason to expect a particularly cool demo from Louise Guay, CEO of My Virtual Model.
Whether you’re in Cambridge, MA, or not, come visit and participate in the community hub.

And follow along with Beth Noveck and all manner of other wonderful people coming to join us, and no doubt blogging it.

Mapping Internet censorship in Iran, Finding New Blocked Sites

In partnership with the OpenNet Initiative (particularly Ron Deibert, Nart Villeneuve, and the fabulous Citizen Lab crew), Richard Rogers and Govcom have developed a cool visual of how online censorship works in Iran. The net result of a link analysis the team performed was the identification of 30 sites found to be blocked that we had not known to be blocked previously.
Expect more in the way of visualizations — like the global map of filtering online — out of ONI, the CL, and partners over the next year-plus.