The premise behind Internet frameworks: open access or suffocating structure?

19 03 2010

When you search for material on the Internet, do you know how you come across the results that you view? Are there influences actively dictating what you view and what you do not have a chance to comprehend? In essence, these are some of the primary points focused on in Jonathan Zittrain’s book, The Future of the Internet.

Within this weighty yet interesting book Zittrain attempts to dissect the nature of the Internet’s DNA. Often times the Internet is though of being the ultimate example of pure openness, where anyone, anywhere can contribute anything for others to view, enjoy or revolt against. Specifically, Zittrain isolates the method for this occurrence into two distinct camps: generative nature and proprietary means.

The wider ranging of these two concepts is that of generative nature. Just as the name describes, “generativity considers how a system might grow or change over time as the uses of a technology by one group are shared with other individuals, thereby extending the generative platform (78).” The basic premise being that there is an active fostering of the possibility to produce unanticipated change through unfiltered contributions from broad and varied audiences.

Contrasting this approach is the proprietary model comprised of the tethered appliance. In its most basic form, the appliance being either an Internet service provider or a physical product that locks users into using the said product as the exclusive means of accessing what is desired. Freedom to roam, explore, contribute or change the basic dynamics is largely lacking. Innovation is the curse instead of the buzz within this framework.

Zittrain pairs both of these approaches to online existence as we know it currently and explores associated issues with each one. A common, yet incredibly fundamental component of both approaches are security. It does not take much effort to realize the potential security problems arising from vast, open electronic networks where anyone can contribute content regardless what the intent may be. This is exactly how computer viruses gained prominence during the fledgling days of the Internet, as there was an unprotected network of interconnected computers completely willing to accept malicious code of it were introduced. This lack of care for purpose was exactly the motivation of early Internet programmers, who could have cared less about how the Internet was used. Instead, they only cared that the Internet was functional (28). Zittrain reflected upon these risks associated with this approach, “The most salient feature of a PC is its openness to new functionality with minimal gate keeping. This is also its greatest danger (57).”

Response to such vulnerabilities inherent from complete openness has been proprietary measures to provide great control to allow measured functionality. The upside to this approach is that greater security can result. However, the downside is limited accessibility to content and perspective. In an online environment of the twenty-first century, this is an extremely serious constraint to content with. Even if malicious actions can be reduced via the increase in tethered appliances among consumer markets to help ensure more stable performance, an entirely new risk emerges. Not just is content access controlled by a centralized authority but Those who control the tethered appliances can control the behavior undertaken with the advice in a number of ways: preemption, specific injunction, and surveillance (107).”

One thing is pretty clear; the Internet is here to stay. It is not going to disappear anytime soon. In turn, the continued functionality of Internetusability requires a balancing act when it comes to security by way of open platforms and securely controlled access. Over extending in either direction will only lead to revolt and possible disruption. A balanced approach is needed where security plays a distinct motivating role but open accessibility, determined by individual users, is weighted just as heavily. Zittrain suggests that a keen balance is necessary where regulation from within, among users, can actively assuage security fears if given the chance to work (102-103). Furthering this approach, he references the online encyclopedia Wikipedia as one example where users act as collective bastions in protecting the platform while still maintaining open access to almost anyone to view or contribute. Although I personally believe it is too early to know with certainty if a mainstream ethos of established boundaries is sweeping the Internet, I do think that lessons can be learned and applied to some degree from Wikipedia. The question remains, when will we know and will you be able to tell?





Meshing marketing with social media = tips

28 10 2009

As you read this, people are logging online. Many people in fact. Many of whom you will never meet. You will never get to shake their hands or share a hug with any of them.

Imagine that scenario from a marketer’s perspective. Your goal, hence your livelihood, depends on connecting with those online strangers. Questions is, how in the world can that be done and done effectively? Increasingly, one answer is social media.

Just as the name implies, social media revolves around the idea that people can build a relationship of sorts with others, who they have not physically met and probably never will, by bridging their solidarity with shared interests. If you are a marketer, it is imperative you harness these opportunities to some degree. In order to do this, it would be wise to begin your marketing endeavor by reading Jessica Want’s post at iMedia Connection. As an information architect at the New York City interactive marketing agency Flightpath, she provides some insightful perspectives on how to go about making social media work for your intended purposes.

It may seem simply silly to state this but I bet some folks out there fail to relate this pretty important component of social media, relate to the audience! There is no way any marketing venture will result in satisfactory results if no attempts are made first to understand the audience, what they are like, how to they see things, how do they feel about particular issues. Basically, this is the equivalent of electronically walking in the audience’s shows. Taking the time to do this sort of activity will likely provide solid dividends down the line.

Unless full faith can be had in independently owned online spaces, it would be helpful to own your own parcel of online real estate to use as the launching pad for any interactive social marketing campaign. The form of this space can take on a plethora of forms, depending on many factors such as your target audience or financial considerations. Whatever form the space takes on, it’s success will be restricted if it isn’t easy! Remember the old adage, “Keep it simple, stupid!” Well, it is very apt in this type of situation. Don’t build a marketing effort through social media where users have to go through cumbersome registrations, perform security checks, sell their favorite pair of jeans or go download a hefty file that will take occupy a nice chunk of their hard disk. These are not easy. They are not generally fun; at least I am making a guess the majority of people would not be smiling after all of these tasks.

To be clear, this is not an exhaustive list of tips on creating social media that is actually useable. Rather, it is meant to bring attention to the topic and highlight a couple of what I think are the most important points presented by Ms. Want. I encourage you to read more at her post. What do you know; I am being social and utilizing media doing it! It is funny how things work out that way.