logo for Pluto Press
Biohackers
The Politics of Open Science
Alessandro Delfanti
Pluto Press, 2013

Biohackers explores fundamental changes occuring in the circulation and ownership of scientific information. Alessandro Delfanti argues that the combination of the ethos of 20th century science, the hacker movement and the free software movement is producing an open science culture which redefines the relationship between researchers, scientific institutions and commercial companies.

Biohackers looks at the emergence of the citizen biology community ‘DIYbio’, the shift to open access by the American biologist Craig Venter and the rebellion of the Italian virologist Ilaria Capua against WHO data-sharing policies.

Delfanti argues that these biologists and many others are involved in a transformation of both life sciences and information systems, using open access tools and claiming independence from both academic and corporate institutions.

[more]

logo for The Institution of Engineering and Technology
Code of Practice for Cyber Security in the Built Environment
The Institution of Engineering and Technology
The Institution of Engineering and Technology, 2014
This Code of Practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing on building-related systems and all connections to the wider cyber environment.
[more]

logo for The Institution of Engineering and Technology
Data Communications and Networks
R.L. Brewster
The Institution of Engineering and Technology, 1994
There has been unprecedented development in data communications and services since the first edition of this book was published in 1986. In less than a decade the technology has advanced beyond all recognition and the first edition is now really no more than an interesting historical record. The second edition, published in 1989, reflected some of these developments and introduced the then emerging proposals for an integrated services digital network (ISDN). Since that date ISDN has become a fact and has already begun to be superseded by proposals and standards for a broadband ISDN (B-ISDN), offering greatly enhanced and flexible data rates over a public network based mainly on optical fibre transmission. Optical fibre technology is also being used in wide-area private digital networks and for high-capacity internetworking operations.
[more]

front cover of The Defender’s Dilemma
The Defender’s Dilemma
Charting a Course Toward Cybersecurity
Martin C. Libicki
RAND Corporation, 2015
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
[more]

front cover of Digital Technology and Democratic Theory
Digital Technology and Democratic Theory
Edited by Lucy Bernholz, Hélène Landemore, and Rob Reich
University of Chicago Press, 2021
One of the most far-reaching transformations in our era is the wave of digital technologies rolling over—and upending—nearly every aspect of life. Work and leisure, family and friendship, community and citizenship have all been modified by now-ubiquitous digital tools and platforms. Digital Technology and Democratic Theory looks closely at one significant facet of our rapidly evolving digital lives: how technology is radically changing our lives as citizens and participants in democratic governments.
To understand these transformations, this book brings together contributions by scholars from multiple disciplines to wrestle with the question of how digital technologies shape, reshape, and affect fundamental questions about democracy and democratic theory. As expectations have whiplashed—from Twitter optimism in the wake of the Arab Spring to Facebook pessimism in the wake of the 2016 US election—the time is ripe for a more sober and long-term assessment. How should we take stock of digital technologies and their promise and peril for reshaping democratic societies and institutions? To answer, this volume broaches the most pressing technological changes and issues facing democracy as a philosophy and an institution.
 
[more]

front cover of Electoral Campaigns, Media, and the New World of Digital Politics
Electoral Campaigns, Media, and the New World of Digital Politics
David Taras and Richard Davis, Editors
University of Michigan Press, 2022

Today, political leaders and candidates for office must campaign in a multimedia world through traditional forums—newspapers, radio, and television—as well as new digital media, particularly social media. Electoral Campaigns, Media, and the New World of Digital Politics chronicles how Twitter, Facebook, Reddit, email, and memes are used successfully and unsuccessfully to influence elections. Each of these platforms have different affordances and reach various audiences in different ways. Campaigns often have to wage different campaigns on each of these mediums. In some instances, they are crucial in altering coverage in the mainstream media. In others, digital media remains underutilized and undeveloped. As has always been the case in politics, outcomes that depend on economic and social conditions often dictate people’s readiness for certain messages. However, the method and content of those messages has changed with great consequences for the health and future of democracy. 

This book answers several questions: How do candidates/parties reach audiences that are preoccupied, inattentive, amorphous, and bombarded with so many other messages? How do they cope with the speed of media reporting in a continuous news cycle that demands instantaneous responses? How has media fragmentation altered the campaign styles and content of campaign communication, and general campaign discourse? Finally and most critically, what does this mean for how democracies function?

[more]

logo for Georgetown University Press
Fixing American Cybersecurity
Creating a Strategic Public-Private Partnership
Larry Clinton
Georgetown University Press, 2023

Advocates a cybersecurity “social contract” between government and business in seven key economic sectors

Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.

A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.

Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.

[more]

front cover of From Counterculture to Cyberculture
From Counterculture to Cyberculture
Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism
Fred Turner
University of Chicago Press, 2006

In the early 1960s, computers haunted the American popular imagination. Bleak tools of the cold war, they embodied the rigid organization and mechanical conformity that made the military-industrial complex possible. But by the 1990s—and the dawn of the Internet—computers started to represent a very different kind of world: a collaborative and digital utopia modeled on the communal ideals of the hippies who so vehemently rebelled against the cold war establishment in the first place. 

From Counterculture to Cyberculture is the first book to explore this extraordinary and ironic transformation. Fred Turner here traces the previously untold story of a highly influential group of San Francisco Bay–area entrepreneurs: Stewart Brand and the Whole Earth network. Between 1968 and 1998, via such familiar venues as the National Book Award–winning Whole Earth Catalog, the computer conferencing system known as WELL, and, ultimately, the launch of the wildly successful Wired magazine, Brand and his colleagues brokered a long-running collaboration between San Francisco flower power and the emerging technological hub of Silicon Valley. Thanks to their vision, counterculturalists and technologists alike joined together to reimagine computers as tools for personal liberation, the building of virtual and decidedly alternative communities, and the exploration of bold new social frontiers. 

Shedding new light on how our networked culture came to be, this fascinating book reminds us that the distance between the Grateful Dead and Google, between Ken Kesey and the computer itself, is not as great as we might think.

[more]

front cover of Geographies of Digital Exclusion
Geographies of Digital Exclusion
Data and Inequality
Mark Graham
Pluto Press, 2021

Today's urban environments are layered with data and algorithms that fundamentally shape how we perceive and move through space. But are our digitally dense environments continuing to amplify inequalities rather than alleviate them? This book looks at the key contours of information inequality, and who, what and where gets left out.

Platforms like Google Maps and Wikipedia have become important gateways to understanding the world, and yet they are characterized by significant gaps and biases, often driven by processes of exclusion. As a result, their digital augmentations tend to be refractions rather than reflections: they highlight only some facets of the world at the expense of others.

This doesn't mean that more equitable futures aren't possible. By outlining the mechanisms through which our digital and material worlds intersect, the authors conclude with a roadmap for what alternative digital geographies might look like.

[more]

front cover of Internet and Wireless Security
Internet and Wireless Security
Robert Temple
The Institution of Engineering and Technology, 2002
Many organisations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses, and this book presents an overview of current and future infrastructures for e-business security.
[more]

front cover of Introduction to Broadband Communication Systems
Introduction to Broadband Communication Systems
Cajetan M. Akujuobi
The Institution of Engineering and Technology, 2008
Broadband networks, such as asynchronous transfer mode (ATM), frame relay, and leased lines, allow us to easily access multimedia services (data, voice, and video) in one package. Exploring why broadband networks are important in modern-day telecommunications, Introduction to Broadband Communication Systems covers the concepts and components of both standard and emerging broadband communication network systems.
[more]

front cover of Key Enablers for User-Centric Advertising Across Next Generation Networks
Key Enablers for User-Centric Advertising Across Next Generation Networks
Jose Simoes
The Institution of Engineering and Technology, 2012
Telecommunication and internet services are constantly subject to change, seeking the customer's full satisfaction. Enriching these services with innovative approaches such as contextaware, social, mobile, adaptable and interactive mechanisms, enables users to experience a variety of personalized services seamlessly across different platforms and technologies. In this sense, advertising is no exception, especially if we consider that it will become the business enabler for next generation services. Nevertheless, currently there is no cross-domain solution capable of delivering real-time advertising across heterogeneous environments or domains, and at the same time, address user needs, desires and intentions. This is because most of the products available today are only used within isolated environments / silos. Therefore, managing advertising campaigns across different verticals is still very complex. However, leveraging on the advances provided by Next Generation Networks, together with the design principles inherent to Service Oriented Architectures and capabilities offered by Service Delivery Platforms, this scenario is about to change. Based on key conceptual entities called enablers, this work aims to change the current scenario. More concretely, this book introduces three distinct but complementary enablers. The Human Enabler provides a real-time context brokerage system capable of securely managing different types of user-related data in a standardized way. The Reasoning Enabler is the result of a welldefined methodology that enables new knowledge to be reasoned, based on previously stored data, by aggregating, correlating and inferring new information about people and their contexts. Lastly, the Session Management Enabler is responsible for abstracting the communication layers. It provides a context-aware multimedia delivery system capable of personalizing and adapting multimedia content according to a set of user and system pre-defined context data or rules, respectively. Altogether, they form the Converged User-Centric Advertising System and introduce new features that address the needs of both users and advertisers.
[more]

front cover of Local Access Network Technologies
Local Access Network Technologies
Paul France
The Institution of Engineering and Technology, 2004
The business of telecommunications is undergoing a period of change driven by changes in regulation, increasing demands for services and the development of new access technologies. The market structure of telecommunications is evolving rapidly as new and existing players strive to compete in an increasingly volatile market, while the advent of new data services is placing greater demands on the network as operators strive to offer new broadband services. Underpinning much of this change is the access technology itself, not only in the transitional form of copper twisted pairs, but also increasingly through the use of new fibre, radio and copper systems. The dominant cost of most telecommunication networks is the access network itself, which typically can demand up to 80% of the total investment required.
[more]

front cover of Mobile Cultures
Mobile Cultures
New Media in Queer Asia
Chris Berry, Fran Martin, and Audrey Yue, eds.
Duke University Press, 2003
Mobile Cultures provides much-needed, empirically grounded studies of the connections between new media technologies, the globalization of sexual cultures, and the rise of queer Asia. The availability and use of new media—fax machines, mobile phones, the Internet, electronic message boards, pagers, and global television—have grown exponentially in Asia over the past decade. This explosion of information technology has sparked a revolution, transforming lives and lifestyles, enabling the creation of communities and the expression of sexual identities in a region notorious for the regulation of both information and sexual conduct. Whether looking at the hanging of toy cartoon characters like “Hello Kitty” from mobile phones to signify queer identity in Japan or at the development of queer identities in Indonesia or Singapore, the essays collected here emphasize the enormous variance in the appeal and uses of new media from one locale to another.

Scholars, artists, and activists from a range of countries, the contributors chronicle the different ways new media galvanize Asian queer communities in Taiwan, South Korea, Japan, Indonesia, Thailand, Malaysia, India, and around the world. They consider phenomena such as the uses of the Internet among gay, lesbian, or queer individuals in Taiwan and South Korea; the international popularization of Japanese queer pop culture products such as Yaoi manga; and a Thai website’s reading of a scientific tract on gay genetics in light of Buddhist beliefs. Essays also explore the politically subversive possibilities opened up by the proliferation of media technologies, examining, for instance, the use of Cyberjaya—Malaysia’s government-backed online portal—to form online communities in the face of strict antigay laws.

Contributors. Chris Berry, Tom Boellstorff, Larissa Hjorth, Katrien Jacobs, Olivia Khoo, Fran Martin, Mark McLelland, David Mullaly, Baden Offord, Sandip Roy, Veruska Sabucco, Audrey Yue

[more]

front cover of Network as a Service for Next Generation Internet
Network as a Service for Next Generation Internet
Qiang Duan
The Institution of Engineering and Technology, 2017
With the rapid progress in networking and computing technologies, a wide variety of network-based computing applications have been developed and deployed on the internet. Flexible and effective service provisioning for supporting the diverse applications is a key requirement for the next generation internet. However, the current internet lacks sufficient capability for meeting this requirement, mainly due to the ossification caused by tight coupling between network architecture and infrastructure. Service-Oriented Architecture (SOA), which has been widely adopted in cloud computing via the Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) paradigms, may be applied in networking to decouple network architecture and infrastructure; thus offering a promising approach to addressing some fundamental challenges to the next generation Internet. In general, such a service-oriented networking paradigm is referred to as Network-as-a-Service (NaaS). This book presents the state of the art of the NaaS paradigm, including its concepts, architecture, key technologies, applications, and development directions for future network service provisioning. It provides readers with a comprehensive reference that reflects the most current technical developments related to NaaS.
[more]

front cover of Olympic-Caliber Cybersecurity
Olympic-Caliber Cybersecurity
Lessons for Safeguarding the 2020 Games and Other Major Events
Cynthia Dion-Schwarz
RAND Corporation, 2018
Understanding the cybersecurity threat landscape is critical to mitigating threats, apportioning limited resources, and hosting a resilient, safe, and secure Olympic Games. To support the security goals of Tokyo 2020, this report characterizes the cybersecurity threats that are likely to pose a risk to the games, visualizes a threat actor typology, and presents a series of policy options to guide cybersecurity planning.
[more]

front cover of The Other Quiet Professionals
The Other Quiet Professionals
Lessons for Future Cyber Forces from the Evolution of Special Forces
Christopher Paul
RAND Corporation, 2014
With the establishment of U.S. Cyber Command, the cyber force is gaining visibility and authority, but challenges remain, particularly in the areas of acquisition and personnel recruitment and career progression. A review of commonalities, similarities, and differences between the still-nascent U.S. cyber force and early U.S. special operations forces, conducted in 2010, offers salient lessons for the future direction of U.S. cyber forces.
[more]

front cover of A People’s History of Computing in the United States
A People’s History of Computing in the United States
Joy Lisi Rankin
Harvard University Press, 2018

Silicon Valley gets all the credit for digital creativity, but this account of the pre-PC world, when computing meant more than using mature consumer technology, challenges that triumphalism.

The invention of the personal computer liberated users from corporate mainframes and brought computing into homes. But throughout the 1960s and 1970s a diverse group of teachers and students working together on academic computing systems conducted many of the activities we now recognize as personal and social computing. Their networks were centered in New Hampshire, Minnesota, and Illinois, but they connected far-flung users. Joy Rankin draws on detailed records to explore how users exchanged messages, programmed music and poems, fostered communities, and developed computer games like The Oregon Trail. These unsung pioneers helped shape our digital world, just as much as the inventors, garage hobbyists, and eccentric billionaires of Palo Alto.

By imagining computing as an interactive commons, the early denizens of the digital realm seeded today’s debate about whether the internet should be a public utility and laid the groundwork for the concept of net neutrality. Rankin offers a radical precedent for a more democratic digital culture, and new models for the next generation of activists, educators, coders, and makers.

[more]

front cover of Signal Traffic
Signal Traffic
Critical Studies of Media Infrastructures
Edited by Lisa Parks and Nicole Starosielski
University of Illinois Press, 2015
The contributors to Signal Traffic investigate how the material artifacts of media infrastructure--transoceanic cables, mobile telephone towers, Internet data centers, and the like--intersect with everyday life. Essayists confront the multiple and hybrid forms networks take, the different ways networks are imagined and engaged with by publics around the world, their local effects, and what human beings experience when a network fails.

Some contributors explore the physical objects and industrial relations that make up an infrastructure. Others venture into the marginalized communities orphaned from the knowledge economies, technological literacies, and epistemological questions linked to infrastructural formation and use. The wide-ranging insights delineate the oft-ignored contrasts between industrialized and developing regions, rich and poor areas, and urban and rural settings, bringing technological differences into focus.

Contributors include Charles R. Acland, Paul Dourish, Sarah Harris, Jennifer Holt and Patrick Vonderau, Shannon Mattern, Toby Miller, Lisa Parks, Christian Sandvig, Nicole Starosielski, Jonathan Sterne, and Helga Tawil-Souri.

[more]

front cover of Trusted Computing
Trusted Computing
Chris Mitchell
The Institution of Engineering and Technology, 2005
As computers are increasingly embedded, ubiquitous and wirelessly connected, security becomes imperative. This has led to the development of the notion of a 'trusted platform', the chief characteristic of which is the possession of a trusted hardware element which is able to check all or part of the software running on this platform. This enables parties to verify the software environment running on a remote trusted platform, and hence to have some trust that the data sent to that machine will be processed in accordance with agreed rules.
[more]

front cover of Trusted Platform Modules
Trusted Platform Modules
Why, when and how to use them
Ariel Segall
The Institution of Engineering and Technology, 2017
Trusted Platform Modules (TPMs) are small, inexpensive chips which provide a limited set of security functions. They are most commonly found as a motherboard component on laptops and desktops aimed at the corporate or government markets, but can also be found on many consumer-grade machines and servers, or purchased as independent components. Their role is to serve as a Root of Trust - a highly trusted component from which we can bootstrap trust in other parts of a system. TPMs are most useful for three kinds of tasks: remotely identifying a machine, or machine authentication; providing hardware protection of secrets, or data protection; and providing verifiable evidence about a machine's state, or attestation.
[more]

front cover of Zero Days, Thousands of Nights
Zero Days, Thousands of Nights
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
Lillian Ablon
RAND Corporation, 2017
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
[more]


Send via email Share on Facebook Share on Twitter