Seiichiro Yonekura
- Published in print:
- 2004
- Published Online:
- September 2007
- ISBN:
- 9780199241057
- eISBN:
- 9780191714290
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199241057.003.0005
- Subject:
- Business and Management, Information Technology
This chapter argues that Japan's Ministry of International Trade and Industry (MITI), whether fortuitously or otherwise, hit upon a strategy for the computer industry, which called for coordination ...
More
This chapter argues that Japan's Ministry of International Trade and Industry (MITI), whether fortuitously or otherwise, hit upon a strategy for the computer industry, which called for coordination between appropriate administrative guidance and intervention on the one hand, and allowed autonomy and self-determination for private companies on the other. By heeding the advice of industry and cooperating positively with private companies, MITI adopted either a ‘planned coordination’ approach or a ‘market coordination’ approach according to industry function. The intervention by function approach worked well for the computer industry.Less
This chapter argues that Japan's Ministry of International Trade and Industry (MITI), whether fortuitously or otherwise, hit upon a strategy for the computer industry, which called for coordination between appropriate administrative guidance and intervention on the one hand, and allowed autonomy and self-determination for private companies on the other. By heeding the advice of industry and cooperating positively with private companies, MITI adopted either a ‘planned coordination’ approach or a ‘market coordination’ approach according to industry function. The intervention by function approach worked well for the computer industry.
Benjamin H. Bratton
- Published in print:
- 2016
- Published Online:
- September 2016
- ISBN:
- 9780262029575
- eISBN:
- 9780262330183
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029575.001.0001
- Subject:
- Society and Culture, Cultural Studies
Planetary-scale computation presents a fundamental challenge to Modern geopolitical architectures. As calculative reason and as global infrastructure, it not only deforms and distorts Westphalian ...
More
Planetary-scale computation presents a fundamental challenge to Modern geopolitical architectures. As calculative reason and as global infrastructure, it not only deforms and distorts Westphalian political geography it creates new territories in its own image, ones that don’t necessarily replace the old but which are superimposed on them, each grinding against the other. These thickened and noisy jurisdictions are our new normal. They are the scaffolds through which our cultures evolve through them, and they represent our most difficult and important design challenge. Computation is changing not only how governments govern, but what government even is in the first place: less governance of computation than computation as governance. Global cloud platforms take on roles that have traditionally been the domain of States, cities become hardware/software platforms organized by physical and virtual interfaces, and strange new political subjects (some not even human) gain unforeseen sovereignties as the users of those interfaces. To understand (and to design) these transformations, we need to see them as part of a whole, an accidental megastructure called The Stack. This book examines each layer of The Stack–Earth, Cloud, City, Address, Interface, and User—as a dynamic technology that is re-structuring some part of our world at its particular scale and as part of the whole. The Stack is a platform, and so combines logics of both States and Markets, and produces forms of sovereignty that are unique to this technical and institutional form. Fortunately, stack platforms are made to be re-made. How the Stack-we-have becomes the Stack-to-come depends on how well we understand it as a totality, By seeing the whole we stand a better chance of designing a system we will want to inhabit. To formulate the “design brief” for that project, as this book does, requires a perspective that blends philosophical, geopolitical and technological understandings and methods.Less
Planetary-scale computation presents a fundamental challenge to Modern geopolitical architectures. As calculative reason and as global infrastructure, it not only deforms and distorts Westphalian political geography it creates new territories in its own image, ones that don’t necessarily replace the old but which are superimposed on them, each grinding against the other. These thickened and noisy jurisdictions are our new normal. They are the scaffolds through which our cultures evolve through them, and they represent our most difficult and important design challenge. Computation is changing not only how governments govern, but what government even is in the first place: less governance of computation than computation as governance. Global cloud platforms take on roles that have traditionally been the domain of States, cities become hardware/software platforms organized by physical and virtual interfaces, and strange new political subjects (some not even human) gain unforeseen sovereignties as the users of those interfaces. To understand (and to design) these transformations, we need to see them as part of a whole, an accidental megastructure called The Stack. This book examines each layer of The Stack–Earth, Cloud, City, Address, Interface, and User—as a dynamic technology that is re-structuring some part of our world at its particular scale and as part of the whole. The Stack is a platform, and so combines logics of both States and Markets, and produces forms of sovereignty that are unique to this technical and institutional form. Fortunately, stack platforms are made to be re-made. How the Stack-we-have becomes the Stack-to-come depends on how well we understand it as a totality, By seeing the whole we stand a better chance of designing a system we will want to inhabit. To formulate the “design brief” for that project, as this book does, requires a perspective that blends philosophical, geopolitical and technological understandings and methods.
Pasko Bilic, Toni Prug, and Mislav Žitko
- Published in print:
- 2021
- Published Online:
- January 2022
- ISBN:
- 9781529212372
- eISBN:
- 9781529212402
- Item type:
- book
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781529212372.001.0001
- Subject:
- Business and Management, Information Technology
Digital platforms have come under intense scrutiny from scholars, policy makers, regulators, and the general public for their immense and yet largely opaque influence on the social and economic ...
More
Digital platforms have come under intense scrutiny from scholars, policy makers, regulators, and the general public for their immense and yet largely opaque influence on the social and economic sphere. This book advances value-form and social-form directions in Marxian theory, moving beyond mainstream economic reasoning that informs much of the debate. Digital monopoly platforms such as Google and Facebook are analysed in light of their profit seeking behaviour and monetary flows generated primarily through advertising and data commodification. Considering the unity of production and circulation the book argues that outputs are better understood as a collection of different types of social forms shaped by capital (pre, intermediate and final commodities) and as forms of public wealth (Copyleft Free Software, publicly financed science and research). The authors critically engage with Marxian theories that conceptualise user activities as forms of digital labour, with zero-price markets and critical legal theories, as well as with ‘internet exceptionalism’ in various forms. The role of regulation of production, especially of financial markets and monopolies is critically discussed with an empirical analysis of the development of GAFAM companies, Google’s mandatory reporting to the Securities and Exchange Commission, and of digital advertising of Google and Facebook. The book discusses contradictions of the capitalist mode of production, limits of ongoing reform initiatives, and alternatives to the logic of capital and commodity production on digital platforms.Less
Digital platforms have come under intense scrutiny from scholars, policy makers, regulators, and the general public for their immense and yet largely opaque influence on the social and economic sphere. This book advances value-form and social-form directions in Marxian theory, moving beyond mainstream economic reasoning that informs much of the debate. Digital monopoly platforms such as Google and Facebook are analysed in light of their profit seeking behaviour and monetary flows generated primarily through advertising and data commodification. Considering the unity of production and circulation the book argues that outputs are better understood as a collection of different types of social forms shaped by capital (pre, intermediate and final commodities) and as forms of public wealth (Copyleft Free Software, publicly financed science and research). The authors critically engage with Marxian theories that conceptualise user activities as forms of digital labour, with zero-price markets and critical legal theories, as well as with ‘internet exceptionalism’ in various forms. The role of regulation of production, especially of financial markets and monopolies is critically discussed with an empirical analysis of the development of GAFAM companies, Google’s mandatory reporting to the Securities and Exchange Commission, and of digital advertising of Google and Facebook. The book discusses contradictions of the capitalist mode of production, limits of ongoing reform initiatives, and alternatives to the logic of capital and commodity production on digital platforms.
Lothar Determann and David Nimmer
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029407
- eISBN:
- 9780262331166
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029407.003.0008
- Subject:
- Computer Science, Programming Languages
Clouds are on the horizon for software copyrights. The open source movement has been active to turn copyright into “copyleft”. Courts around the world are reshaping the first sale doctrine. Software ...
More
Clouds are on the horizon for software copyrights. The open source movement has been active to turn copyright into “copyleft”. Courts around the world are reshaping the first sale doctrine. Software manufacturers flee from distribution to service models, into the Cloud. A perfect storm for software copyrights is brewing. The Cloud promises to enable software publishers to place their code outside the framework of copyright exhaustion under the first sale doctrine and the “distribution trigger” in open source code license terms. Users' inability, in the Cloud context, to directly access the underlying software threatens to exert various side effects, notably affecting software interoperability. New kids on the block lose the ability to reverse-engineer hosted software. Established platform providers gain the ability to prevent interoperability, based on laws prohibiting interference with computers and technical protection measures. These developments risk upsetting the delicate balance between exclusive rights for copyright owners and access rights for the public, a balance that courts and legislatures have carefully established over the years, in order to foster creativity and innovation. With unprecedented pressure on traditional distribution models, how will copyright law cope? This Chapter illuminates the immediate path ahead, presents possible answers, and asks more questions.Less
Clouds are on the horizon for software copyrights. The open source movement has been active to turn copyright into “copyleft”. Courts around the world are reshaping the first sale doctrine. Software manufacturers flee from distribution to service models, into the Cloud. A perfect storm for software copyrights is brewing. The Cloud promises to enable software publishers to place their code outside the framework of copyright exhaustion under the first sale doctrine and the “distribution trigger” in open source code license terms. Users' inability, in the Cloud context, to directly access the underlying software threatens to exert various side effects, notably affecting software interoperability. New kids on the block lose the ability to reverse-engineer hosted software. Established platform providers gain the ability to prevent interoperability, based on laws prohibiting interference with computers and technical protection measures. These developments risk upsetting the delicate balance between exclusive rights for copyright owners and access rights for the public, a balance that courts and legislatures have carefully established over the years, in order to foster creativity and innovation. With unprecedented pressure on traditional distribution models, how will copyright law cope? This Chapter illuminates the immediate path ahead, presents possible answers, and asks more questions.
Seb Franklin
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029537
- eISBN:
- 9780262331135
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029537.003.0003
- Subject:
- Society and Culture, Technology and Society
This chapter considers exclusion as an unmarked but fundamental principle of control, and thus as a central concern for contemporary theories of representation. Beginning from Neferti X.M. Tadiar’s ...
More
This chapter considers exclusion as an unmarked but fundamental principle of control, and thus as a central concern for contemporary theories of representation. Beginning from Neferti X.M. Tadiar’s critique of the totalizing concept of life that grounds much recent critical work on post-Fordism, the chapter works through the history of the black box concept and its relation to recent socioeconomic imaginaries. The chapter then addresses the methodological limitations of privileging computational media such as network diagrams and video games when seeking to theorize the social, political, and cultural implications of control.Less
This chapter considers exclusion as an unmarked but fundamental principle of control, and thus as a central concern for contemporary theories of representation. Beginning from Neferti X.M. Tadiar’s critique of the totalizing concept of life that grounds much recent critical work on post-Fordism, the chapter works through the history of the black box concept and its relation to recent socioeconomic imaginaries. The chapter then addresses the methodological limitations of privileging computational media such as network diagrams and video games when seeking to theorize the social, political, and cultural implications of control.
Nathan Cortez
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780231171182
- eISBN:
- 9780231540070
- Item type:
- chapter
- Publisher:
- Columbia University Press
- DOI:
- 10.7312/columbia/9780231171182.003.0031
- Subject:
- Law, Medical Law
This chapter examines how the FDA has regulated computer hardware and software the last 40 years, finding several recurrent problems that neither the agency nor Congress has effectively addressed. ...
More
This chapter examines how the FDA has regulated computer hardware and software the last 40 years, finding several recurrent problems that neither the agency nor Congress has effectively addressed. The FDA needs updated statutory authority and increased in-house resources to modernize its approach to computerized devices, which now comprise over half of all medical devices on the market.Less
This chapter examines how the FDA has regulated computer hardware and software the last 40 years, finding several recurrent problems that neither the agency nor Congress has effectively addressed. The FDA needs updated statutory authority and increased in-house resources to modernize its approach to computerized devices, which now comprise over half of all medical devices on the market.
Harold Thimbleby
- Published in print:
- 2021
- Published Online:
- November 2021
- ISBN:
- 9780198861270
- eISBN:
- 9780191893339
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198861270.001.0001
- Subject:
- Public Health and Epidemiology, Public Health, Epidemiology
We can’t get healthcare without computers. This book shows that digital healthcare is riskier than you thought. Until digital healthcare improves, digital risk means that patients will be harmed ...
More
We can’t get healthcare without computers. This book shows that digital healthcare is riskier than you thought. Until digital healthcare improves, digital risk means that patients will be harmed unnecessarily, and healthcare staff will continue to be blamed for problems when it’s not their fault. This book tells stories of widespread problems with digital healthcare. The stories inspire and challenge anyone who wants to make hospitals and healthcare better. The stories and their resolutions will empower patients, clinical staff and digital developers to help transform digital healthcare to make it safer and more effective. This book is not just about the many problems that affect digital healthcare. More importantly, it’s about the solutions that can make digital healthcare much safer. It’s baffling that these solutions are not universally required, as our health and all our lives depend on them.Less
We can’t get healthcare without computers. This book shows that digital healthcare is riskier than you thought. Until digital healthcare improves, digital risk means that patients will be harmed unnecessarily, and healthcare staff will continue to be blamed for problems when it’s not their fault. This book tells stories of widespread problems with digital healthcare. The stories inspire and challenge anyone who wants to make hospitals and healthcare better. The stories and their resolutions will empower patients, clinical staff and digital developers to help transform digital healthcare to make it safer and more effective. This book is not just about the many problems that affect digital healthcare. More importantly, it’s about the solutions that can make digital healthcare much safer. It’s baffling that these solutions are not universally required, as our health and all our lives depend on them.
Richard Stallman and Adolfo Plasencia
- Published in print:
- 2017
- Published Online:
- January 2018
- ISBN:
- 9780262036016
- eISBN:
- 9780262339308
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262036016.003.0022
- Subject:
- Society and Culture, Technology and Society
This dialogue is preceded by an introduction about Richard Stallman and the power of “code”, by Lawrence Lessing, as well as a detailed biography of Richard revised by himself. In the conversation ...
More
This dialogue is preceded by an introduction about Richard Stallman and the power of “code”, by Lawrence Lessing, as well as a detailed biography of Richard revised by himself. In the conversation following this, Stallman analyzes the origin and validity of the ‘hacking’ and ‘hack’ concepts and the differences between ‘hackers’ and ‘crackers’. He then describes in detail the concept, dimension, forms of creation and the development of software code, especially free software and its implementation framework. He later reflects on and outlines his vision of the relationship between the use of technology and ethics, and about ethical hackers. He also talks about the good and bad behavior of companies and, in this context, his criticism of Corporatocracy. Afterward, he describes concepts about how the creation of software code works compared with other creative arts, such as literature. He goes on to analyze the mechanisms for how ideas are patented in the industrial world, in particular the case of software development. He finally talks about why his vision of free software remains valid and how it should be dealt with during education.Less
This dialogue is preceded by an introduction about Richard Stallman and the power of “code”, by Lawrence Lessing, as well as a detailed biography of Richard revised by himself. In the conversation following this, Stallman analyzes the origin and validity of the ‘hacking’ and ‘hack’ concepts and the differences between ‘hackers’ and ‘crackers’. He then describes in detail the concept, dimension, forms of creation and the development of software code, especially free software and its implementation framework. He later reflects on and outlines his vision of the relationship between the use of technology and ethics, and about ethical hackers. He also talks about the good and bad behavior of companies and, in this context, his criticism of Corporatocracy. Afterward, he describes concepts about how the creation of software code works compared with other creative arts, such as literature. He goes on to analyze the mechanisms for how ideas are patented in the industrial world, in particular the case of software development. He finally talks about why his vision of free software remains valid and how it should be dealt with during education.
Betsy Beaumon
- Published in print:
- 2021
- Published Online:
- December 2021
- ISBN:
- 9780198846413
- eISBN:
- 9780191881572
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198846413.003.0008
- Subject:
- Computer Science, Human-Computer Interaction, Systems Analysis and Design
How can the next generation of digital products and servces best serve individuals with disabilities in the Global South? Local advocates, content, and tool developers can leverage global digital ...
More
How can the next generation of digital products and servces best serve individuals with disabilities in the Global South? Local advocates, content, and tool developers can leverage global digital initiatives in education, employment, data, and standards to improve inclusion for people with disabilities in the connected digital age. To succeed, products and services must be inclusive, sustainable, and locally relevant. This chapter explores examples of programs that deeply engage people with disabilities in the Global South as developers, employees, and/or individual users; utilize open, global standards; increase collaboration to raise the voices of people with disabilities; and consider new challenges brought about by technology as it rapidly evolves.Less
How can the next generation of digital products and servces best serve individuals with disabilities in the Global South? Local advocates, content, and tool developers can leverage global digital initiatives in education, employment, data, and standards to improve inclusion for people with disabilities in the connected digital age. To succeed, products and services must be inclusive, sustainable, and locally relevant. This chapter explores examples of programs that deeply engage people with disabilities in the Global South as developers, employees, and/or individual users; utilize open, global standards; increase collaboration to raise the voices of people with disabilities; and consider new challenges brought about by technology as it rapidly evolves.
Eleonora Rosati
- Published in print:
- 2021
- Published Online:
- September 2021
- ISBN:
- 9780198858591
- eISBN:
- 9780191890772
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198858591.001.0001
- Subject:
- Law, EU Law, Intellectual Property, IT, and Media Law
This book provides an article-by-article commentary to the provisions of the 2019 EU Directive on copyright in the Digital Single Market. It investigates the history, objectives, and content of ...
More
This book provides an article-by-article commentary to the provisions of the 2019 EU Directive on copyright in the Digital Single Market. It investigates the history, objectives, and content of Directive 2019/790's complex provisions as well as the relationship between some of those provisions and between the Directive and the pre-existing acquis. It explains why the EU Directive on copyright in the Digital Single Market is a significant and foundational part of the broader EU copyright architecture. The book aims to navigate the legislative provisions that were adopted in 2019 to make EU copyright fit for the Digital Single Market. It marks two important anniversaries in the EU copyright harmonization history: the thirtieth anniversary of the first ever adopted copyright directive, Software Directive 91/250, and the twentieth anniversary of InfoSoc Directive 2001/29, an ambitious legislative instrument.Less
This book provides an article-by-article commentary to the provisions of the 2019 EU Directive on copyright in the Digital Single Market. It investigates the history, objectives, and content of Directive 2019/790's complex provisions as well as the relationship between some of those provisions and between the Directive and the pre-existing acquis. It explains why the EU Directive on copyright in the Digital Single Market is a significant and foundational part of the broader EU copyright architecture. The book aims to navigate the legislative provisions that were adopted in 2019 to make EU copyright fit for the Digital Single Market. It marks two important anniversaries in the EU copyright harmonization history: the thirtieth anniversary of the first ever adopted copyright directive, Software Directive 91/250, and the twentieth anniversary of InfoSoc Directive 2001/29, an ambitious legislative instrument.
Eaton E. Lattman, Thomas D. Grant, and Edward H. Snell
- Published in print:
- 2018
- Published Online:
- September 2018
- ISBN:
- 9780199670871
- eISBN:
- 9780191749575
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780199670871.003.0015
- Subject:
- Physics, Soft Matter / Biological Physics
This chapter summarizes the book, describes publications that provide complementary information, and sets the tone for the future.
This chapter summarizes the book, describes publications that provide complementary information, and sets the tone for the future.
Paško Bilić, Toni Prug, and Mislav Žitko
- Published in print:
- 2021
- Published Online:
- January 2022
- ISBN:
- 9781529212372
- eISBN:
- 9781529212402
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781529212372.003.0002
- Subject:
- Business and Management, Information Technology
In Chapter 2 the authors explain the pivotal role of value-form analysis, discuss the internal association of value and money and present various approaches to Marxian understanding of the unity of ...
More
In Chapter 2 the authors explain the pivotal role of value-form analysis, discuss the internal association of value and money and present various approaches to Marxian understanding of the unity of production and circulation. They argue that in the capitalist mode of production the production process is not a domain where value simply lingers. Instead, the exchange relation comes as the final moment of the production of value since it validates and socializes the production process. To understand the full complexity of this process they outline different levels of abstractions and social forms within the capitalist mode of production, moving beyond neoclassical and mainstream analyses that naturalise capitalist production and exchange, and ignore its transitory, historical existence.Less
In Chapter 2 the authors explain the pivotal role of value-form analysis, discuss the internal association of value and money and present various approaches to Marxian understanding of the unity of production and circulation. They argue that in the capitalist mode of production the production process is not a domain where value simply lingers. Instead, the exchange relation comes as the final moment of the production of value since it validates and socializes the production process. To understand the full complexity of this process they outline different levels of abstractions and social forms within the capitalist mode of production, moving beyond neoclassical and mainstream analyses that naturalise capitalist production and exchange, and ignore its transitory, historical existence.
Paško Bilić, Toni Prug, and Mislav Žitko
- Published in print:
- 2021
- Published Online:
- January 2022
- ISBN:
- 9781529212372
- eISBN:
- 9781529212402
- Item type:
- chapter
- Publisher:
- Policy Press
- DOI:
- 10.1332/policypress/9781529212372.003.0006
- Subject:
- Business and Management, Information Technology
Chapter 6 starts by discussing privatisation and commercialisation of knowledge on digital platforms in the form of Free Software inputs and publicly funded science and research. Corporate ...
More
Chapter 6 starts by discussing privatisation and commercialisation of knowledge on digital platforms in the form of Free Software inputs and publicly funded science and research. Corporate technological forms set the rules of data engagement for all actors worldwide including internet users, advertisers, search engine optimizers, website owners, news industries, and others. Tech giants continuously collect, process, and monetize background usage data to create technological and economic enclosures that the existing legal forms, algorithmic operations and regulatory instruments make difficult to penetrate, unpack and grasp by outside actors such as civic organisation or democratic institutions.Less
Chapter 6 starts by discussing privatisation and commercialisation of knowledge on digital platforms in the form of Free Software inputs and publicly funded science and research. Corporate technological forms set the rules of data engagement for all actors worldwide including internet users, advertisers, search engine optimizers, website owners, news industries, and others. Tech giants continuously collect, process, and monetize background usage data to create technological and economic enclosures that the existing legal forms, algorithmic operations and regulatory instruments make difficult to penetrate, unpack and grasp by outside actors such as civic organisation or democratic institutions.
David Jhave Johnston
- Published in print:
- 2016
- Published Online:
- January 2017
- ISBN:
- 9780262034517
- eISBN:
- 9780262334396
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262034517.003.0004
- Subject:
- Philosophy, Aesthetics
Software defines what digital poetry is. This chapter explores the temporal implications of animation time lines on the literary imagination. Read it if you are concerned with software studies and/or ...
More
Software defines what digital poetry is. This chapter explores the temporal implications of animation time lines on the literary imagination. Read it if you are concerned with software studies and/or creative media. It argues that an authoring environment specific to the literary must emerge. Chapter includes a rapid overview of most of the authoring tools and code languages used by contemporary poets.
Software examined includes: After Effects, Mudbox, Mr Softie, Flash, VMRL, and Second Life; and the programming languages Processing, RitaJS, Python, and C++.Less
Software defines what digital poetry is. This chapter explores the temporal implications of animation time lines on the literary imagination. Read it if you are concerned with software studies and/or creative media. It argues that an authoring environment specific to the literary must emerge. Chapter includes a rapid overview of most of the authoring tools and code languages used by contemporary poets.
Software examined includes: After Effects, Mudbox, Mr Softie, Flash, VMRL, and Second Life; and the programming languages Processing, RitaJS, Python, and C++.
Aaron Perzanowski and Jason Schultz
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780262035019
- eISBN:
- 9780262335959
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262035019.003.0008
- Subject:
- Information Science, Library Science
The smart devices that make up the Internet of Things induce consumers to cede control over the products they buy. Devices like smartphones offer real benefits, but combined with embedded software, ...
More
The smart devices that make up the Internet of Things induce consumers to cede control over the products they buy. Devices like smartphones offer real benefits, but combined with embedded software, network connectivity, microscopic sensors and large-scale data analytics, they pose serious threats to ownership and consumer welfare. From coffee makers and toys to cars and medical devices, the products we buy are defined by software. That code gives device makers an increasing degree of control over how, when, and whether those products can be used even after consumers buy them. That shift of control has profound implications for ownership.Less
The smart devices that make up the Internet of Things induce consumers to cede control over the products they buy. Devices like smartphones offer real benefits, but combined with embedded software, network connectivity, microscopic sensors and large-scale data analytics, they pose serious threats to ownership and consumer welfare. From coffee makers and toys to cars and medical devices, the products we buy are defined by software. That code gives device makers an increasing degree of control over how, when, and whether those products can be used even after consumers buy them. That shift of control has profound implications for ownership.
Paul-Brian McInerney
- Published in print:
- 2014
- Published Online:
- May 2014
- ISBN:
- 9780804785129
- eISBN:
- 9780804789066
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804785129.003.0006
- Subject:
- Sociology, Politics, Social Movements and Social Change
This chapter shows how competition among groups shapes moral markets. It explains how the Circuit Riders engaged with the new dominant actor in nonprofit technology assistance, NPower. Through ...
More
This chapter shows how competition among groups shapes moral markets. It explains how the Circuit Riders engaged with the new dominant actor in nonprofit technology assistance, NPower. Through successive interactions, new conventions of coordination reduced the uncertainty of interacting in the nonprofit technology assistance market. In response to NPower’s growing dominance, some in the Circuit Rider movement mobilized around an alternative platform, free/open source software. The strategy was an attempt to reassert the founding values of the Circuit Rider movement as articulated in technology. Ultimately, the Circuit Riders had limited success in splitting the technology services market. This chapter illustrates how, once institutionalized, organizational forms and practices like social enterprise are difficult to challenge, but also how social movements can create alternative niches for consumers who share their social values. Because markets are not organized strictly on principles of economic rationality, such pressure can nudge them in socially desirable directions.Less
This chapter shows how competition among groups shapes moral markets. It explains how the Circuit Riders engaged with the new dominant actor in nonprofit technology assistance, NPower. Through successive interactions, new conventions of coordination reduced the uncertainty of interacting in the nonprofit technology assistance market. In response to NPower’s growing dominance, some in the Circuit Rider movement mobilized around an alternative platform, free/open source software. The strategy was an attempt to reassert the founding values of the Circuit Rider movement as articulated in technology. Ultimately, the Circuit Riders had limited success in splitting the technology services market. This chapter illustrates how, once institutionalized, organizational forms and practices like social enterprise are difficult to challenge, but also how social movements can create alternative niches for consumers who share their social values. Because markets are not organized strictly on principles of economic rationality, such pressure can nudge them in socially desirable directions.
Jerome Lewis
- Published in print:
- 2014
- Published Online:
- September 2014
- ISBN:
- 9780262027168
- eISBN:
- 9780262322492
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262027168.003.0007
- Subject:
- Business and Management, Information Technology
Hunter-gatherer land-use in the Congo Basin leaves few traces. One consequence is that their presence is invisible on maps and ignored in land-use planning decisions over the areas they inhabit. ...
More
Hunter-gatherer land-use in the Congo Basin leaves few traces. One consequence is that their presence is invisible on maps and ignored in land-use planning decisions over the areas they inhabit. Governments do not recognise their rights to land, conservationists exclude them from rich forest areas, logging roads open up remaining areas to extractive outsiders, and global warming changes rainfall patterns and the seasonal events that normally guide people to wild foods. A forestry company in Congo-Brazzaville seeking a ‘green’ label for its timber sought anthropological advice on how to respect the rights of forest people. This chapter describes the challenges and participatory design process that developed in creating icon-driven software on converted military palmpilots. Maps produced using this technology have become a new way for non-literate communities to be heard by powerful outsiders. A community radio station broadcasting uniquely in local languages will facilitate forest people to develop their own understanding of the situations facing them, share insights, observations and analyses in order to better secure their long-term interests. The creative interaction of non-literate users and ICT is spawning new developments, from new software builds to monitor illegal logging or wildlife, to geographic information systems for non-literate users.Less
Hunter-gatherer land-use in the Congo Basin leaves few traces. One consequence is that their presence is invisible on maps and ignored in land-use planning decisions over the areas they inhabit. Governments do not recognise their rights to land, conservationists exclude them from rich forest areas, logging roads open up remaining areas to extractive outsiders, and global warming changes rainfall patterns and the seasonal events that normally guide people to wild foods. A forestry company in Congo-Brazzaville seeking a ‘green’ label for its timber sought anthropological advice on how to respect the rights of forest people. This chapter describes the challenges and participatory design process that developed in creating icon-driven software on converted military palmpilots. Maps produced using this technology have become a new way for non-literate communities to be heard by powerful outsiders. A community radio station broadcasting uniquely in local languages will facilitate forest people to develop their own understanding of the situations facing them, share insights, observations and analyses in order to better secure their long-term interests. The creative interaction of non-literate users and ICT is spawning new developments, from new software builds to monitor illegal logging or wildlife, to geographic information systems for non-literate users.
Alan F. Blackwell
- Published in print:
- 2014
- Published Online:
- September 2014
- ISBN:
- 9780262027168
- eISBN:
- 9780262322492
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262027168.003.0009
- Subject:
- Business and Management, Information Technology
This chapter describes the role of ethnography within a technical design process, as understood from an engineering perspective. It pays particular attention to the distinction between research ...
More
This chapter describes the role of ethnography within a technical design process, as understood from an engineering perspective. It pays particular attention to the distinction between research prototypes and manufactured products, arguing that there is often little resemblance between the academic study of technology users and the pragmatics of design for global markets. Software design depends on structured accounts of social affairs, and constructs these using methods appropriated from the social sciences. However, the designed artefact itself should also be read as a craft achievement that emerges into a socio-economic context.Less
This chapter describes the role of ethnography within a technical design process, as understood from an engineering perspective. It pays particular attention to the distinction between research prototypes and manufactured products, arguing that there is often little resemblance between the academic study of technology users and the pragmatics of design for global markets. Software design depends on structured accounts of social affairs, and constructs these using methods appropriated from the social sciences. However, the designed artefact itself should also be read as a craft achievement that emerges into a socio-economic context.
Hira Agrawal, Thomas F. Bowen, and Sanjai Narain
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0003
- Subject:
- Information Science, Information Science
Malware enters a software system along three avenues: it is hidden surreptitiously within applications by a malicious developer; it is inserted into the system due to an accidental or a deliberate ...
More
Malware enters a software system along three avenues: it is hidden surreptitiously within applications by a malicious developer; it is inserted into the system due to an accidental or a deliberate misconfiguration of the deployment environment; and it is injected into a running application by a malicious user by exploiting a programming flaw in the application logic. This chapter describes three tools developed at Telcordia for blocking all these avenues: Software Visualization and Analysis Toolsuite (TSVAT) system, ConfigAssure system, and Runtime Monitoring. TSVAT helps application testers conserve testing resources by guiding them to hidden code. ConfigAssure helps system administrators in creating vulnerability-free distributed application configuration. Runtime Monitoring protects against the exploitation of vulnerabilities not caught by any other technique. These tools have been trialed or are being deployed in real enterprises. Together, they offer a comprehensive defense against attacks on software systems throughout their lifecycle.Less
Malware enters a software system along three avenues: it is hidden surreptitiously within applications by a malicious developer; it is inserted into the system due to an accidental or a deliberate misconfiguration of the deployment environment; and it is injected into a running application by a malicious user by exploiting a programming flaw in the application logic. This chapter describes three tools developed at Telcordia for blocking all these avenues: Software Visualization and Analysis Toolsuite (TSVAT) system, ConfigAssure system, and Runtime Monitoring. TSVAT helps application testers conserve testing resources by guiding them to hidden code. ConfigAssure helps system administrators in creating vulnerability-free distributed application configuration. Runtime Monitoring protects against the exploitation of vulnerabilities not caught by any other technique. These tools have been trialed or are being deployed in real enterprises. Together, they offer a comprehensive defense against attacks on software systems throughout their lifecycle.
Jonathan Band and Masanobu Katoh
- Published in print:
- 2011
- Published Online:
- August 2013
- ISBN:
- 9780262015004
- eISBN:
- 9780262295543
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262015004.003.0005
- Subject:
- Information Science, Information Science
This chapter reviews the interoperability debate in the Pacific Rim, with stops in Australia, Singapore, Hong Kong, South Korea, and the Philippines. It discusses the Copyright Amendment Act of 1984 ...
More
This chapter reviews the interoperability debate in the Pacific Rim, with stops in Australia, Singapore, Hong Kong, South Korea, and the Philippines. It discusses the Copyright Amendment Act of 1984 in Australia which puts computer programs under the protection of the Australian copyright law, the amendment of the copyright law in Singapore to permit software reverse engineering, and the Philippines’ crafting of a hybrid of the fair-use provision of the U.S. Copyright Act and article 6 of the European Union (EU) Software Directive. It also suggests that these countries had to deal with political pressure from dominant U.S. software companies and from the Office of the U.S. Trade Representative (USTR) in confronting the issue of reverse engineering.Less
This chapter reviews the interoperability debate in the Pacific Rim, with stops in Australia, Singapore, Hong Kong, South Korea, and the Philippines. It discusses the Copyright Amendment Act of 1984 in Australia which puts computer programs under the protection of the Australian copyright law, the amendment of the copyright law in Singapore to permit software reverse engineering, and the Philippines’ crafting of a hybrid of the fair-use provision of the U.S. Copyright Act and article 6 of the European Union (EU) Software Directive. It also suggests that these countries had to deal with political pressure from dominant U.S. software companies and from the Office of the U.S. Trade Representative (USTR) in confronting the issue of reverse engineering.