Advancement of telecommunications and information infrastructure occurs largely through private investment. The government affects the rate and direction of this progress through regulation and public investment. This book presents a range of positions and perspectives on those two classes of policy mechanism, providing a succinct analysis followed by papers prepared by experts in telecommunications policy and applications.
Advancement of telecommunications and information infrastructure occurs largely through private investment. The government affects the rate and direction of this progress through regulation and public investment. This book presents a range of positions and perspectives on those two classes of policy mechanism, providing a succinct analysis followed by papers prepared by experts in telecommunications policy and applications.
"This is the first book-length account of early efforts to computerize medical diagnosis. It explores how these efforts produced and interacted with certain professional tensions, disease constructions, personal identities, cultural ideals, economic interests, and material practices. The book offers a historical account that raises pressing questions, problems, and challenges that must be addressed as we work to harness artificial intelligence for the benefit of the medical profession and its patients"--
We have available an impressive array of information technology. We can transmit literature, movies, music, and talk. Government, businesses, and individuals are eager to go on-line to buy, sell, teach, learn, and more. How, then, should we go about developing an infrastructure for on- line communication among everyone everywhere? The Unpredictable Certainty explores the national information infrastructure (NII) as the collection of all public and private information services. But how and when will the NII become a reality? How will more and better services reach the home, small businesses, and remote locations? The Unpredictable Certainty examines who will finance the NII, exploring how technology companies decide to invest in deployment and the the vain search for "killer apps" (applications that drive markets). It discusses who will pay for ongoing services and how they will pay, looking at past cost/price models relevant to the future. The Unpredictable Certainty discusses the underlying technologies, appliances, and services needed before the NII becomes a reality; reviews key features of important technologies; and analyzes current levels of deployment in telephone, cable and broadcast television, and wireless systems, and the difficulties in interconnection. The volume explores the challenge of open interfaces that stimulate new applications but also facilitate competition, the trend toward the separation of infrastructure from specific services, the tension between mature services and new contenders, the growth of the Internet, and more. The roles governments at different levels might play in fostering NII deployment are outlined, including R&D and the use of information infrastructure for better delivery of government services and information.
The US healthcare system has many excellent components; strong scientific input, extraordinary technology for diagnosis and treatment, dedicated staff and top-class facilities among them. But the system has evolved haphazardly over time and although it has not failed entirely, the authors argue that like any system where attention, is paid to individual components at the expense of the system as a whole, it can never hope to succeed. Above all, they point out that the US system does not provide high value healthcare; it has the highest costs in the world and yet many other countries have lower infant mortality rates and better life expectancy. --
Veterans of the high-definition TV wars of the 1980s, the authors, social scientists as well as technologists, came to see themselves as "chroniclers and students of an intriguing and serious techno-economic conflict." Why, they asked, did so few understand the rules of the game? In a broad account accessible to generalist and specialist alike, they address the current national debate about the development of a national information infrastructure, locating the debate in a broad historical narrative that illuminates how we got here and where we may be going, and outlining a bold vision of an open communications infrastructure that will cut through the political gridlock that threatens this "information highway."Technical change the authors argue is creating a new paradigm that fits neither the free market nor regulatory control models currently in play. They detail what is wrong with the political process of the national information infrastructure policy-making and assess how different media systems (telecommunications, radio, television broadcasting,) were originally established, spelling out the technological assumptions and organizational interests on which they were based and showing why the old policy models are now breaking down. The new digital networks are not analogous to railways and highways or their electronic forebears in telephony and broadcasting; they are inherently unfriendly to centralized control of any sort, so the old traditions of common carriage and public trustee regulation and regulatory gamesmanship no longer apply. The authors' technological and historical analysis leads logically toward a policy proposal for a reformed regulatory structure that builds and protects meaningful competition, but that abandons its role as arbiter of tariffs and definer of public service and public interest.
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptography--the representation of messages in code--and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examples -- some alarming and all instructive -- from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.
When you visit the doctor, information about you may be recorded in an office computer. Your tests may be sent to a laboratory or consulting physician. Relevant information may be transmitted to your health insurer or pharmacy. Your data may be collected by the state government or by an organization that accredits health care or studies medical costs. By making information more readily available to those who need it, greater use of computerized health information can help improve the quality of health care and reduce its costs. Yet health care organizations must find ways to ensure that electronic health information is not improperly divulged. Patient privacy has been an issue since the oath of Hippocrates first called on physicians to "keep silence" on patient matters, and with highly sensitive data--genetic information, HIV test results, psychiatric records--entering patient records, concerns over privacy and security are growing. For the Record responds to the health care industry's need for greater guidance in protecting health information that increasingly flows through the national information infrastructure--from patient to provider, payer, analyst, employer, government agency, medical product manufacturer, and beyond. This book makes practical detailed recommendations for technical and organizational solutions and national-level initiatives. For the Record describes two major types of privacy and security concerns that stem from the availability of health information in electronic form: the increased potential for inappropriate release of information held by individual organizations (whether by those with access to computerized records or those who break into them) and systemic concerns derived from open and widespread sharing of data among various parties. The committee reports on the technological and organizational aspects of security management, including basic principles of security; the effectiveness of technologies for user authentication, access control, and encryption; obstacles and incentives in the adoption of new technologies; and mechanisms for training, monitoring, and enforcement. For the Record reviews the growing interest in electronic medical records; the increasing value of health information to providers, payers, researchers, and administrators; and the current legal and regulatory environment for protecting health data. This information is of immediate interest to policymakers, health policy researchers, patient advocates, professionals in health data management, and other stakeholders.
This publication follows up on the 1993 review of the Banks's experience in telecommunications. it assesses how their assistance from has influenced the development of information infrastructure in developing countries. It finds that the recommendations from 1993 have generally been heeded with the adoption of a new private sector led agenda and increasing the share of IFC in total Bank Group funding commitments. However the ability to play a global policy leadership role has been hampered by a benign neglect of the sector at both the strategic and country management level.