Peter Suber has been a leading advocate for open access since 2001 and has worked full time on issues of open access since 2003. As a professor of philosophy during the early days of the internet, he realized its power and potential as a medium for scholarship.
Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded relations among nations, and bred distrust between democratic governments and their citizens. Polls reflect this concern, and show majorities for more, broader, and stricter regulation—to put more laws “on the books.” But there was scant evidence of how well tighter regulation actually worked “on the ground” in changing corporate (or government) behavior—until now.
With Obfuscation, Finn Brunton and Helen Nissenbaum mean to start a revolution. They are calling us not to the barricades but to our computers, offering us ways to fight today’s pervasive digital surveillance—the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects.
The emergence of cloud computing marks the moment when computing has become, materially and symbolically, infrastructure—a sociotechnical system that is ubiquitous, essential, and foundational. Increasingly integral to the operation of other critical infrastructures, such as transportation, energy, and finance, it functions, in effect, as a meta-infrastructure. As such, the cloud raises a variety of policy and governance issues, among them market regulation, fairness, access, reliability, privacy, national security, and copyright.
Shared public access to computers and the Internet in developing countries is often hailed as an effective, low-cost way to share the benefits of digital technology. Yet research on the economic and social effects of public access to computers is lacking. This volume offers the first systematic assessment of the impact of shared public access in the developing world, with findings from ten countries in South America, Asia, and Africa. It provides evidence that the benefits of diversified participation in digital society go beyond providing access to technology.
Financial information is a both a public resource and a commodity that market participants produce and distribute in connection with other financial products and services. Legislators, regulators, and other policy makers must therefore balance the goal of making information transparent, accessible, and useful for the collective benefit of society against the need to maintain appropriate incentives for information originators and intermediaries.
The computer systems of government agencies are notoriously complex. New technologies are piled on older technologies, creating layers that call to mind an archaeological dig. Obsolete programming languages and closed mainframe designs offer barriers to integration with other agency systems. Worldwide, these unwieldy systems waste billions of dollars, keep citizens from receiving services, and even—as seen in interoperability failures on 9/11 and during Hurricane Katrina—cost lives.
The Internet has reached a critical point. The world is running out of Internet addresses. There is a finite supply of approximately 4.3 billion Internet Protocol (IP) addresses--the unique binary numbers required for every exchange of information over the Internet--within the Internet’s prevailing technical architecture (IPv4). In the 1990s the Internet standards community selected a new protocol (IPv6) that would expand the number of Internet addresses exponentially--to 340 undecillion addresses.
Through five editions since 1981, this book has offered the most comprehensive accessible guide available to all aspects of copyright law. Now, with the sixth edition, The Copyright Book has been thoroughly updated to cover copyright for the Internet age, discussing a range of developments in the law since 2000.
In Networking Peripheries, Anita Chan shows how digital cultures flourish beyond Silicon Valley and other celebrated centers of technological innovation and entrepreneurship. The evolving digital cultures in the Global South vividly demonstrate that there are more ways than one to imagine what digital practice and global connection could look like.