List of Editors and contributors Introduction: Noise, Spectacle, Politics - Carnival in Chinese C... more List of Editors and contributors Introduction: Noise, Spectacle, Politics - Carnival in Chinese Cyberspace - David Kurt Herold Part I - Creating the Carnival - Netizens and the State 1. Cultural Convulsions - Examining the Chineseness of Cyber China - Wai-chi, Rodney Chu and Chung-tai Cheng 2. The Internet Police in China: Regulation, Scope and Myths - Xiaoyan Chen and Peng Hwa Ang 3. Grassroots agency in a civil sphere? Re-thinking Internet Control in China - Peter Marolt Part II - Celebrating the Carnival - Fun, Freak-shows, and Masquerades 4. Parody and resistance on the Chinese Internet - Hongmei Li 5. China's many Internets: Participation and digital game play across a changing technology landscape - Silvia Lindtner and Marcella Szablewicz 6. Lost in virtual carnival and masquerade: In-game marriage on the Chinese Internet - Weihua Wu and Xiying Wang PART III - Instrumentalising the Carnival - Rioting as Activism 7. Human Flesh Search Engines: Carnivalesque Riots as components of a 'Chinese Democracy' - David Kurt Herold 8. In search for motivations: Exploring a Chinese Linux user group - Matteo Tarantino 9. Identity vs. anonymity: Chinese netizens and questions of identifiability - Kenneth Farrall and David Kurt Herold 10. Taking urban conservation online: Chinese civic action groups and the Internet - Nicolai Volland Conclusion: Netizens and Citizens, Cyberspace and Modern China - David Kurt Herold
The rapid growth of the Chinese Internet has brought about the emergence of many new channels of ... more The rapid growth of the Chinese Internet has brought about the emergence of many new channels of communication between businesses (B2B), between businesses and consumers (B2C and C2B) and between customers (C2C). Amidst this growth, Chinese Internet users have demonstrated a fondness for online rumours that has become dangerous for a variety of organisations and businesses. Within the Chinese market consumers have emerged as actors whose interactions are posing a new form of risk for companies wishing to enter the Chinese market. Since 2009, companies have repeatedly been harmed by fast-spreading online rumours that called the quality of products into question, or attacked their ethics in dealing with the general public. Starting in 2010, online rumour campaigns have also been on sale to harm rivals, or to promote one’s own product. Using a few example cases from food-related incidents, this article will argue that companies operating in this highly suspicious and fraught environment should shift their focus from pure marketing to a much deeper level of engagement with their customers, and also keep track of the online chatter about their brand, their products and their image so as to minimise risks to their enterprise and to successfully sell their products and services. 中国互联网快速增长带来了许多新通信渠道的出现,涵盖企业之间(B2B),企业和消费者之间(B2C和C2B),和客户之间(C2C)。增长过程显示中国互联网用户喜爱网上传言,并对各种组织和企业构成危险。中国消费者的相互作用对希望进入中国市场的公司构成新形式的风险。自2009年起,快速传播的网上谣言已令不同的企业多次受到伤害,包括质疑产品质量或攻击他们应对公众的道德水平。从2010年起,网上传言运动也开始商品化,以攻击竞争者,或促销己方的产品。透过几个有关食物事件的例子,本文指出企业在这个高度猜疑和令人忧虑的环境运作,其重点应从单纯的市场营销转移到与客户建立更深层次的关系。同时,也追踪自己的品牌、产品和形象的在线讨论,以尽量减少对企业的风险,并成功地推销产品和服务。
decided for the defense. Furthermore, virtually all of the cases decided in favor of the governme... more decided for the defense. Furthermore, virtually all of the cases decided in favor of the government deal with the relatively tangential issue of qualified immunity—whether an officer can be held liable for the use of excessive force or for some other violation of the Fourth Amendment. At the same time, consistent with the book’s first theme, the one state-oriented case of the seven that did not involve the qualified immunity issue, Utah v. Strieff, significantly increases police power and the potential for racialized investigative actions. That case allows law-enforcement officers to arrest individuals on the basis of outstanding warrants, even if the initial stop of the individual is clearly illegal, a ruling that incentivizes the police to conduct such stops. Furthermore, consistent with the book’s second theme, of the six cases decided between 2016 and 2018 that find for the defendant, most simply fine-tune rather than overturn precedent. For instance, the Court held that the state cannot force drivers suspected of drinking to submit to a warrantless blood test, but that it can require those drivers to take a breathalyzer. It also held that the automobile exception, which generally permits warrantless searches of cars, does not permit a warrantless search of a car that is parked in the defendant’s front yard. And it held that the driver of a rental car has Fourth Amendment protection against warrantless searches of the car even if his or her name is not on the rental agreement. None of these decisions is earth shattering (although, consistent with the authors’ third observation, all of them were either authored or joined by justices Sotomayor and Kagan.) Finally, relevant to Gizzi and Curtis’s fourth point about the role of technology in creating judicial flux, one of the six pro-defendant cases decided since 2016 resulted in the aforementioned decision in Carpenter, where the police used cell–site location data to pinpoint the location of the defendant near the scene of four robberies. The government argued that this seizure of data did not implicate the Fourth Amendment, pointing to longstanding precedent establishing the so-called third-party doctrine—the idea that information that is “surrendered” to a third party (here the cellphone carrier) is not entitled to Fourth Amendment protection because one assumes the risk that such information will be turned over to the government. But the Court decided otherwise in a 5–4 opinion written by Chief Justice Roberts (and joined by Sotomayor and Kagan; Scalia had passed away two years earlier). As he had done in Riley v. California, the cellphone search case highlighted by Gizzi and Curtis, Roberts emphasized the huge amount of information that technology can provide the police, which in this case entailed over 150 days of location data. Carpenter could spell the beginning of the end for a precedent that has been a mainstay of the Court’s Fourth Amendment jurisprudence since at least the 1970s. In short, recent case law confirms the validity of Gizzi and Curtis’s insights about the Roberts Court’s vacillating approach to the Fourth Amendment. Their book is clearly meant to focus on such generalities; it does not dissect the cases in the way that a law book might, nor does it attempt to advance an explanatory theory about the Fourth Amendment. Further, in a few places one can quibble with the accuracy of the authors’ case descriptions. But the important takeaway is that The Fourth Amendment in Flux is a highly readable and thoughtful account of Fourth Amendment law over the last half century.
Virtual worlds and 'the Internet' in general are highly popular in the People's Repub... more Virtual worlds and 'the Internet' in general are highly popular in the People's Republic of China. This article will argue, though, that in contrast to non-Chinese perceptions of virtual worlds and the Internet, Chinese users tend to see virtual worlds as wholly separate from their offline existence and identity.Based on the authors research experience with the Chinese Internet, and his years of teaching Chinese students in the 3D online world Second Life, the paper will demonstrate that Chinese usage frames virtual worlds (and the Internet in general) as spaces, in which it is permissible to rebel against authority, where users receive validation and approval from their peers, and where they can escape their often stressful and boring lives. The low costs involved, and the high entertainment value of virtual worlds, combined with a perception of virtual worlds as 'gaming', 'consequence-less' and 'not serious' spaces, contributes to the high attra...
In this essay we will present a Physics education project developed in virtual worlds. After prot... more In this essay we will present a Physics education project developed in virtual worlds. After prototyping in Second Life, it was decided to port it to its free-software alternative, OpenSim. Several challenges were encountered, namely the ability of sampling an object’s position and velocity more than twice per second. This performance was unacceptable for our project, which motivated a deeper study of timer effectiveness in virtual worlds, including also ScienceSim. Results indicate that only Second Life can support effective timers able to supply Physics simulations with more than two samples per second. Introduction The Physics education project at hand was initially developed in the Second Life virtual world, for its ability to simulate gravity and collision detection between complex objects, without any effort on our side. We intended to develop several physics simulations based on gravity, such as Newton tubes, projectiles, and parachutes. The term “virtual world” has been appl...
Despite differences in topics, style, and methodologies, all the papers in this assembled issue s... more Despite differences in topics, style, and methodologies, all the papers in this assembled issue share the desire to see virtual worlds researched in far greater depth. Virtual worlds research, it appears from the papers in this issue, is still in its infancy. As these five papers highlight that role of virtual worlds in student experience, identity in virtual worlds, and use of virtual worlds by people with disabilities are some of the areas that require further investigation, experimentation, analysis, and discussion.
List of Editors and contributors Introduction: Noise, Spectacle, Politics - Carnival in Chinese C... more List of Editors and contributors Introduction: Noise, Spectacle, Politics - Carnival in Chinese Cyberspace - David Kurt Herold Part I - Creating the Carnival - Netizens and the State 1. Cultural Convulsions - Examining the Chineseness of Cyber China - Wai-chi, Rodney Chu and Chung-tai Cheng 2. The Internet Police in China: Regulation, Scope and Myths - Xiaoyan Chen and Peng Hwa Ang 3. Grassroots agency in a civil sphere? Re-thinking Internet Control in China - Peter Marolt Part II - Celebrating the Carnival - Fun, Freak-shows, and Masquerades 4. Parody and resistance on the Chinese Internet - Hongmei Li 5. China's many Internets: Participation and digital game play across a changing technology landscape - Silvia Lindtner and Marcella Szablewicz 6. Lost in virtual carnival and masquerade: In-game marriage on the Chinese Internet - Weihua Wu and Xiying Wang PART III - Instrumentalising the Carnival - Rioting as Activism 7. Human Flesh Search Engines: Carnivalesque Riots as components of a 'Chinese Democracy' - David Kurt Herold 8. In search for motivations: Exploring a Chinese Linux user group - Matteo Tarantino 9. Identity vs. anonymity: Chinese netizens and questions of identifiability - Kenneth Farrall and David Kurt Herold 10. Taking urban conservation online: Chinese civic action groups and the Internet - Nicolai Volland Conclusion: Netizens and Citizens, Cyberspace and Modern China - David Kurt Herold
The rapid growth of the Chinese Internet has brought about the emergence of many new channels of ... more The rapid growth of the Chinese Internet has brought about the emergence of many new channels of communication between businesses (B2B), between businesses and consumers (B2C and C2B) and between customers (C2C). Amidst this growth, Chinese Internet users have demonstrated a fondness for online rumours that has become dangerous for a variety of organisations and businesses. Within the Chinese market consumers have emerged as actors whose interactions are posing a new form of risk for companies wishing to enter the Chinese market. Since 2009, companies have repeatedly been harmed by fast-spreading online rumours that called the quality of products into question, or attacked their ethics in dealing with the general public. Starting in 2010, online rumour campaigns have also been on sale to harm rivals, or to promote one’s own product. Using a few example cases from food-related incidents, this article will argue that companies operating in this highly suspicious and fraught environment should shift their focus from pure marketing to a much deeper level of engagement with their customers, and also keep track of the online chatter about their brand, their products and their image so as to minimise risks to their enterprise and to successfully sell their products and services. 中国互联网快速增长带来了许多新通信渠道的出现,涵盖企业之间(B2B),企业和消费者之间(B2C和C2B),和客户之间(C2C)。增长过程显示中国互联网用户喜爱网上传言,并对各种组织和企业构成危险。中国消费者的相互作用对希望进入中国市场的公司构成新形式的风险。自2009年起,快速传播的网上谣言已令不同的企业多次受到伤害,包括质疑产品质量或攻击他们应对公众的道德水平。从2010年起,网上传言运动也开始商品化,以攻击竞争者,或促销己方的产品。透过几个有关食物事件的例子,本文指出企业在这个高度猜疑和令人忧虑的环境运作,其重点应从单纯的市场营销转移到与客户建立更深层次的关系。同时,也追踪自己的品牌、产品和形象的在线讨论,以尽量减少对企业的风险,并成功地推销产品和服务。
decided for the defense. Furthermore, virtually all of the cases decided in favor of the governme... more decided for the defense. Furthermore, virtually all of the cases decided in favor of the government deal with the relatively tangential issue of qualified immunity—whether an officer can be held liable for the use of excessive force or for some other violation of the Fourth Amendment. At the same time, consistent with the book’s first theme, the one state-oriented case of the seven that did not involve the qualified immunity issue, Utah v. Strieff, significantly increases police power and the potential for racialized investigative actions. That case allows law-enforcement officers to arrest individuals on the basis of outstanding warrants, even if the initial stop of the individual is clearly illegal, a ruling that incentivizes the police to conduct such stops. Furthermore, consistent with the book’s second theme, of the six cases decided between 2016 and 2018 that find for the defendant, most simply fine-tune rather than overturn precedent. For instance, the Court held that the state cannot force drivers suspected of drinking to submit to a warrantless blood test, but that it can require those drivers to take a breathalyzer. It also held that the automobile exception, which generally permits warrantless searches of cars, does not permit a warrantless search of a car that is parked in the defendant’s front yard. And it held that the driver of a rental car has Fourth Amendment protection against warrantless searches of the car even if his or her name is not on the rental agreement. None of these decisions is earth shattering (although, consistent with the authors’ third observation, all of them were either authored or joined by justices Sotomayor and Kagan.) Finally, relevant to Gizzi and Curtis’s fourth point about the role of technology in creating judicial flux, one of the six pro-defendant cases decided since 2016 resulted in the aforementioned decision in Carpenter, where the police used cell–site location data to pinpoint the location of the defendant near the scene of four robberies. The government argued that this seizure of data did not implicate the Fourth Amendment, pointing to longstanding precedent establishing the so-called third-party doctrine—the idea that information that is “surrendered” to a third party (here the cellphone carrier) is not entitled to Fourth Amendment protection because one assumes the risk that such information will be turned over to the government. But the Court decided otherwise in a 5–4 opinion written by Chief Justice Roberts (and joined by Sotomayor and Kagan; Scalia had passed away two years earlier). As he had done in Riley v. California, the cellphone search case highlighted by Gizzi and Curtis, Roberts emphasized the huge amount of information that technology can provide the police, which in this case entailed over 150 days of location data. Carpenter could spell the beginning of the end for a precedent that has been a mainstay of the Court’s Fourth Amendment jurisprudence since at least the 1970s. In short, recent case law confirms the validity of Gizzi and Curtis’s insights about the Roberts Court’s vacillating approach to the Fourth Amendment. Their book is clearly meant to focus on such generalities; it does not dissect the cases in the way that a law book might, nor does it attempt to advance an explanatory theory about the Fourth Amendment. Further, in a few places one can quibble with the accuracy of the authors’ case descriptions. But the important takeaway is that The Fourth Amendment in Flux is a highly readable and thoughtful account of Fourth Amendment law over the last half century.
Virtual worlds and 'the Internet' in general are highly popular in the People's Repub... more Virtual worlds and 'the Internet' in general are highly popular in the People's Republic of China. This article will argue, though, that in contrast to non-Chinese perceptions of virtual worlds and the Internet, Chinese users tend to see virtual worlds as wholly separate from their offline existence and identity.Based on the authors research experience with the Chinese Internet, and his years of teaching Chinese students in the 3D online world Second Life, the paper will demonstrate that Chinese usage frames virtual worlds (and the Internet in general) as spaces, in which it is permissible to rebel against authority, where users receive validation and approval from their peers, and where they can escape their often stressful and boring lives. The low costs involved, and the high entertainment value of virtual worlds, combined with a perception of virtual worlds as 'gaming', 'consequence-less' and 'not serious' spaces, contributes to the high attra...
In this essay we will present a Physics education project developed in virtual worlds. After prot... more In this essay we will present a Physics education project developed in virtual worlds. After prototyping in Second Life, it was decided to port it to its free-software alternative, OpenSim. Several challenges were encountered, namely the ability of sampling an object’s position and velocity more than twice per second. This performance was unacceptable for our project, which motivated a deeper study of timer effectiveness in virtual worlds, including also ScienceSim. Results indicate that only Second Life can support effective timers able to supply Physics simulations with more than two samples per second. Introduction The Physics education project at hand was initially developed in the Second Life virtual world, for its ability to simulate gravity and collision detection between complex objects, without any effort on our side. We intended to develop several physics simulations based on gravity, such as Newton tubes, projectiles, and parachutes. The term “virtual world” has been appl...
Despite differences in topics, style, and methodologies, all the papers in this assembled issue s... more Despite differences in topics, style, and methodologies, all the papers in this assembled issue share the desire to see virtual worlds researched in far greater depth. Virtual worlds research, it appears from the papers in this issue, is still in its infancy. As these five papers highlight that role of virtual worlds in student experience, identity in virtual worlds, and use of virtual worlds by people with disabilities are some of the areas that require further investigation, experimentation, analysis, and discussion.
Uploads
Papers by David Herold