Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.
Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.
Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.
Silicon Valley gets all the credit for digital creativity, but this account of the pre-PC world, when computing meant more than using mature consumer technology, challenges that triumphalism.
The invention of the personal computer liberated users from corporate mainframes and brought computing into homes. But throughout the 1960s and 1970s a diverse group of teachers and students working together on academic computing systems conducted many of the activities we now recognize as personal and social computing. Their networks were centered in New Hampshire, Minnesota, and Illinois, but they connected far-flung users. Joy Rankin draws on detailed records to explore how users exchanged messages, programmed music and poems, fostered communities, and developed computer games like The Oregon Trail. These unsung pioneers helped shape our digital world, just as much as the inventors, garage hobbyists, and eccentric billionaires of Palo Alto.
By imagining computing as an interactive commons, the early denizens of the digital realm seeded today’s debate about whether the internet should be a public utility and laid the groundwork for the concept of net neutrality. Rankin offers a radical precedent for a more democratic digital culture, and new models for the next generation of activists, educators, coders, and makers.
Most human thinking is thoroughly informed by context but, until recently, theories of reasoning have concentrated on abstract rules and generalities that make no reference to this crucial factor. Perspectives on Contexts brings together essays from leading cognitive scientists to forge a vigorous interdisciplinary understanding of the contextual phenomenon. Applicable to human and machine cognition in philosophy, artificial intelligence, and psychology, this volume is essential to the current renaissance in thinking about context.
Since its introduction in 2009, Bitcoin has been widely promoted as a digital currency that will revolutionize everything from online commerce to the nation-state. Yet supporters of Bitcoin and its blockchain technology subscribe to a form of cyberlibertarianism that depends to a surprising extent on far-right political thought. The Politics of Bitcoin exposes how much of the economic and political thought on which this cryptocurrency is based emerges from ideas that travel the gamut, from Milton Friedman, F.A. Hayek, and Ludwig von Mises to Federal Reserve conspiracy theorists.
Forerunners: Ideas First is a thought-in-process series of breakthrough digital publications. Written between fresh ideas and finished books, Forerunners draws on scholarly work initiated in notable blogs, social media, conference plenaries, journal articles, and the synergy of academic exchange. This is gray literature publishing: where intense thinking, change, and speculation take place in scholarship.
Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them.
In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information.
Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.
A deep dive into the political roots of advertising on the internet
The contemporary internet’s de facto business model is one of surveillance. Browser cookies follow us around the web, Amazon targets us with eerily prescient ads, Facebook and Google read our messages and analyze our patterns, and apps record our every move. In Profit over Privacy, Matthew Crain gives internet surveillance a much-needed origin story by chronicling the development of its most important historical catalyst: web advertising.
The first institutional and political history of internet advertising, Profit over Privacy uses the 1990s as its backdrop to show how the massive data-collection infrastructure that undergirds the internet today is the result of twenty-five years of technical and political economic engineering. Crain considers the social causes and consequences of the internet’s rapid embrace of consumer monitoring, detailing how advertisers and marketers adapted to the existential threat of the internet and marshaled venture capital to develop the now-ubiquitous business model called “surveillance advertising.” He draws on a range of primary resources from government, industry, and the press and highlights the political roots of internet advertising to underscore the necessity of political solutions to reign in unaccountable commercial surveillance.
The dominant business model on the internet, surveillance advertising is the result of political choices—not the inevitable march of technology. Unlike many other countries, the United States has no internet privacy law. A fascinating prehistory of internet advertising giants like Google and Facebook, Profit over Privacy argues that the internet did not have to turn out this way and that it can be remade into something better.
READERS
Browse our collection.
PUBLISHERS
See BiblioVault's publisher services.
STUDENT SERVICES
Files for college accessibility offices.
UChicago Accessibility Resources
home | accessibility | search | about | contact us
BiblioVault ® 2001 - 2024
The University of Chicago Press