Can WebLogs enable legitimate peripheral participation and boundary encounters?