Skip navigation

Technology/Policy

  • Page 2 of 3
The Risks Posed by New Wiretapping Technologies

Digital communications are the lifeblood of modern society. We “meet up” online, tweet our reactions millions of times a day, connect through social networking rather than in person. Large portions of business and commerce have moved to the Web, and much of our critical infrastructure, including the electric power grid, is controlled online. This reliance on information systems leaves us highly exposed and vulnerable to cyberattack. Despite this, U.S. law enforcement and national security policy remain firmly focused on wiretapping and surveillance.

Open Source and Economic Development

Discussions of the economic impact of open source software often generate more heat than light. Advocates passionately assert the benefits of open source while critics decry its effects. Missing from the debate is rigorous economic analysis and systematic economic evidence of the impact of open source on consumers, firms, and economic development in general. This book fills that gap.

The Global Politics of Internet Governance

When the prevailing system of governing divides the planet into mutually exclusive territorial monopolies of force, what institutions can govern the Internet, with its transnational scope, boundless scale, and distributed control? Given filtering/censorship by states and concerns over national cybersecurity, it is often assumed that the Internet will inevitably be subordinated to the traditional system of nation-states.

The Role of Technology in Subverting Digital Copyright

The movement against restrictive digital copyright protection arose largely in response to the excesses of the Digital Millennium Copyright Act (DMCA) of 1998. In The Digital Rights Movement, Hector Postigo shows that what began as an assertion of consumer rights to digital content has become something broader: a movement concerned not just with consumers and gadgets but with cultural ownership. Increasingly stringent laws and technological measures are more than incoveniences; they lock up access to our “cultural commons.”

Social Media and Violence Prevention

Tunisian and Egyptian protestors famously made use of social media to rally supporters and disseminate information as the “Arab Spring” began to unfold in 2010. Less well known, but with just as much potential to bring about social change, are ongoing local efforts to use social media and other forms of technology to prevent deadly outbreaks of violence. In The Technology of Nonviolence, Joseph Bock describes and documents technology-enhanced efforts to stop violence before it happens in Africa, Asia, and the United States.

The Political Economy of Innovation

Innovation in information and communication technology (ICT) fuels the growth of the global economy. How ICT markets evolve depends on politics and policy, and since the 1950s periodic overhauls of ICT policy have transformed competition and innovation. For example, in the 1980s and the 1990s a revolution in communication policy (the introduction of sweeping competition) also transformed the information market.

A Practical Guide

Government agencies and public organizations often consider adopting open source software (OSS) for reasons of transparency, cost, citizen access, and greater efficiency in communication and delivering services. Adopting Open Source Software offers five richly detailed real-world case studies of OSS adoption by public organizations. The authors analyze the cases and develop an overarching, conceptual framework to clarify the various enablers and inhibitors of OSS adoption in the public sector. The book provides a useful resource for policymakers, practitioners, and academics.

Most managers leave intellectual property issues to the legal department, unaware that an organization’s intellectual property can help accomplish a range of management goals, from accessing new markets to improving existing products to generating new revenue streams. In this book, intellectual property expert and Harvard Law School professor John Palfrey offers a short briefing on intellectual property strategy for corporate managers and nonprofit administrators.

Security, Identity, and Resistance in Asian Cyberspace

A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China--home to the world’s largest Internet population and what is perhaps the world’s most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China’s Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique.

The Global Politics of Interoperability
Edited by Laura DeNardis

Openness is not a given on the Internet. Technical standards--the underlying architecture that enables interoperability among hardware and software from different manufacturers--increasingly control individual freedom and the pace of innovation in technology markets. Heated battles rage over the very definition of “openness” and what constitutes an open standard in information and communication technologies.

  • Page 2 of 3