Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data.
How the blockchain--a system built on foundations of mutual mistrust--can become trustworthy.
"The pandemic has raised awareness of the need for universal access to high speed internet service in the United States. This book shows us that the debate about internet access is but the latest chapter in a long history of debates about universal service in the United States. This book analyzes the history, costs, and benefits of providing universal access to technologies and services, including education, postal service, telephone service, electrification, public libraries, and Internet"--
"Argues that hacking provides a privileged vantage point for probing the logic of informational capitalism since hackers are at the forefront of structural transformations of late modernity"--
"The book explores the origin story of the Open Government Partnership and place the open government reform movement in the context of the long history of public sector reform"--
"Traces the cyberinsurance industry's history, challenges, and legal disputes to understand why insurance has not helped to strengthen cybersecurity and what governments could do to make it a more effective tool for cyber risk management"--
An analysis of the failure of U.S. broadband policy to solve the rural-urban digital divide, with a proposal for a new national rural broadband plan.As much of daily life migrates online, broadband-high-speed internet connectivity-has become a necessity. The widespread lack of broadband in rural America has created a stark urban-rural digital divide. In Farm Fresh Broadband, Christopher Ali analyzes the promise and the failure of national rural broadband policy in the United States and proposes a new national broadband plan. He examines how broadband policies are enacted and implemented, explores business models for broadband providers, surveys the technologies of rural broadband, and offers case studies of broadband use in the rural Midwest. Ali argues that rural broadband policy is both broken and incomplete: broken because it lacks coordinated federal leadership and incomplete because it fails to recognize the important roles of communities, cooperatives, and local providers in broadband access. For example, existing policies favor large telecommunication companies, crowding out smaller, nimbler providers. Lack of competition drives prices up-rural broadband can cost 37 percent more than urban broadband. The federal government subsidizes rural broadband by approximately $6 billion. Where does the money go? Ali proposes democratizing policy architecture for rural broadband, modeling it after the wiring of rural America for electricity and telephony. Subsidies should be equalized, not just going to big companies. The result would be a multistakeholder system, guided by thoughtful public policy and funded by public and private support.
A lively graphic narrative reports on censorship of political cartoons around the world, featuring interviews with censored cartoonists from Pittsburgh to Beijing.Why do the powerful feel so threatened by political cartoons? Cartoons don't tell secrets or move markets. Yet, as Cherian George and Sonny Liew show us in Red Lines, cartoonists have been harassed, trolled, sued, fired, jailed, attacked, and assassinated for their insolence. The robustness of political cartooning--one of the most elemental forms of political speech--says something about the health of democracy. In a lively graphic narrative--illustrated by Liew, himself a prize-winning cartoonist--Red Lines crisscrosses the globe to feel the pulse of a vocation under attack.A Syrian cartoonist insults the president and has his hands broken by goons. An Indian cartoonist stands up to misogyny and receives rape threats. An Israeli artist finds his antiracist works censored by social media algorithms. And the New York Times, caught in the crossfire of the culture wars, decides to stop publishing editorial cartoons completely. Red Lines studies thin-skinned tyrants, the invisible hand of market censorship, and demands in the name of social justice to rein in the right to offend. It includes interviews with more than sixty cartoonists and insights from art historians, legal scholars, and political scientists--all presented in graphic form. This engaging account makes it clear that cartoon censorship doesn't just matter to cartoonists and their fans. When the red lines are misapplied, all citizens are potential victims.
As video becomes an important tool to expose injustice, an examination of how human rights organizations are seeking to professionalize video activism.Visual imagery is at the heart of humanitarian and human rights activism, and video has become a key tool in these efforts. The Saffron Revolution in Myanmar, the Green Movement in Iran, and Black Lives Matter in the United States have all used video to expose injustice. In Seeing Human Rights, Sandra Ristovska examines how human rights organizations are seeking to professionalize video activism through video production, verification standards, and training. The result, she argues, is a proxy profession that uses human rights videos to tap into journalism, the law, and political advocacy.Ristovska explains that this proxy profession retains some tactical flexibility in its use of video while giving up on the more radical potential and imaginative scope of video activism as a cultural practice. Drawing on detailed analysis of legal cases and videos as well as extensive interviews with staff members of such organizations as Amnesty International, Human Rights Watch, WITNESS, the International Criminal Tribunal for the former Yugoslavia (ICTY), and the International Criminal Court (ICC), Ristovska considers the unique affordances of video and examines the unfolding relationships among journalists, human rights organizations, activists, and citizens in global crisis reporting. She offers a case study of the visual turn in the law; describes advocacy and marketing strategies; and argues that the transformation of video activism into a proxy profession privileges institutional and legal spaces over broader constituencies for public good.
How early twentieth-century American policymakers sought to gain control over radiotelegraphy networks in an effort to advance the global position of the United States.In Reluctant Power, Rita Zajácz examines how early twentieth century American policymakers sought to gain control over radiotelegraphy networks in an effort to advance the global position of the United States. Doing so, she develops an analytical framework for understanding the struggle for network control that can be applied not only to American attempts to establish a global radio network in the early twentieth century but also to current US efforts to retain control of the internet.In the late nineteenth century, Britain was seen to control both the high seas and the global cable communication network under the sea. By the turn of the twentieth century, Britain's geopolitical rivals, including the United States, looked to radiotelegraphy that could circumvent Britain's dominance. Zajácz traces policymakers' attempts to grapple with both a new technology—radiotelegraphy—and a new corporate form: the multinational corporation, which managed the network and acted as a crucial intermediary. She argues that both foreign policy and domestic radio legislation were shaped by the desire to harness radiotelegraphy for geopolitical purposes and reveals how communication policy and aspects of the American legal system adjusted to the demands of a rising power. The United States was a reluctant power during the early twentieth century, because policymakers were unsure that companies headquartered in the United States were sufficiently American and doubted that their strategies served the national interest.
Interdisciplinary perspectives on the role of new information technologies, including mobile phones, wireless networks, and biometric identification, in the global refugee crisis.
How right-wing political entrepreneurs around the world use religious offense-both given and taken-to mobilize supporters and marginalize opponents.
Why the Internet was designed to be the way it is, and how it could be different, now and in the future.How do you design an internet? The architecture of the current Internet is the product of basic design decisions made early in its history. What would an internet look like if it were designed, today, from the ground up? In this book, MIT computer scientist David Clark explains how the Internet is actually put together, what requirements it was designed to meet, and why different design decisions would create different internets. He does not take today's Internet as a given but tries to learn from it, and from alternative proposals for what an internet might be, in order to draw some general conclusions about network architecture. Clark discusses the history of the Internet, and how a range of potentially conflicting requirements—including longevity, security, availability, economic viability, management, and meeting the needs of society—shaped its character. He addresses both the technical aspects of the Internet and its broader social and economic contexts. He describes basic design approaches and explains, in terms accessible to nonspecialists, how networks are designed to carry out their functions. (An appendix offers a more technical discussion of network functions for readers who want the details.) He considers a range of alternative proposals for how to design an internet, examines in detail the key requirements a successful design must meet, and then imagines how to design a future internet from scratch. It's not that we should expect anyone to do this; but, perhaps, by conceiving a better future, we can push toward it.
A groundbreaking approach to information sharing among government agencies: using selective incentives to "nudge" them to exchange information assets.
An examination of regulation and use of information in capital markets, offering comparisons across different jurisdictions, regulated entities, and financial instruments.
Scholars from across law and internet and media studies examine the human rights implications of today's platform society.Today such companies as Apple, Facebook, Google, Microsoft, and Twitter play an increasingly important role in how users form and express opinions, encounter information, debate, disagree, mobilize, and maintain their privacy. What are the human rights implications of an online domain managed by privately owned platforms? According to the Guiding Principles on Business and Human Rights, adopted by the UN Human Right Council in 2011, businesses have a responsibility to respect human rights and to carry out human rights due diligence. But this goal is dependent on the willingness of states to encode such norms into business regulations and of companies to comply. In this volume, contributors from across law and internet and media studies examine the state of human rights in today's platform society.The contributors consider the "datafication” of society, including the economic model of data extraction and the conceptualization of privacy. They examine online advertising, content moderation, corporate storytelling around human rights, and other platform practices. Finally, they discuss the relationship between human rights law and private actors, addressing such issues as private companies' human rights responsibilities and content regulation.ContributorsAnja Bechmann, Fernando Bermejo, Agnès Callamard, Mikkel Flyverbom, Rikke Frank Jørgensen, Molly K. Land, Tarlach McGonagle, Jens-Erik Mai, Joris van Hoboken, Glen Whelan, Jillian C. York, Shoshana Zuboff, Ethan ZuckermanOpen access edition published with generous support from Knowledge Unlatched and the Danish Council for Independent Research.
Perspectives on the varied challenges posed by big data for health, science, law, commerce, and politics.
How the blockchain—a system built on foundations of mutual mistrust—can become trustworthy.The blockchain entered the world on January 3, 2009, introducing an innovative new trust architecture: an environment in which users trust a system—for example, a shared ledger of information—without necessarily trusting any of its components. The cryptocurrency Bitcoin is the most famous implementation of the blockchain, but hundreds of other companies have been founded and billions of dollars invested in similar applications since Bitcoin's launch. Some see the blockchain as offering more opportunities for criminal behavior than benefits to society. In this book, Kevin Werbach shows how a technology resting on foundations of mutual mistrust can become trustworthy. The blockchain, built on open software and decentralized foundations that allow anyone to participate, seems like a threat to any form of regulation. In fact, Werbach argues, law and the blockchain need each other. Blockchain systems that ignore law and governance are likely to fail, or to become outlaw technologies irrelevant to the mainstream economy. That, Werbach cautions, would be a tragic waste of potential. If, however, we recognize the blockchain as a kind of legal technology that shapes behavior in new ways, it can be harnessed to create tremendous business and social value.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.