The Unpredictable Certainty

The Unpredictable Certainty

Author: National Research Council

Publisher: National Academies Press

Published: 1998-02-05

Total Pages: 631

ISBN-13: 0309174147

DOWNLOAD EBOOK

This book contains a key component of the NII 2000 project of the Computer Science and Telecommunications Board, a set of white papers that contributed to and complements the project's final report, The Unpredictable Certainty: Information Infrastructure Through 2000, which was published in the spring of 1996. That report was disseminated widely and was well received by its sponsors and a variety of audiences in government, industry, and academia. Constraints on staff time and availability delayed the publication of these white papers, which offer details on a number of issues and positions relating to the deployment of information infrastructure.


Public Access to Government Information in the 21st Century

Public Access to Government Information in the 21st Century

Author: DIANE Publishing Company

Publisher: DIANE Publishing

Published: 1998-05

Total Pages: 533

ISBN-13: 0788149792

DOWNLOAD EBOOK

Presents proceedings of the hearings held in June & July 1996. Testimony from: U.S. Senators, U.S. District Court Judge Royce C. Lamberth, the U.S. Government Printing Office; Nat. Tech. Info. Service; Government Documents Librarian; Amer. Library Assoc.; Univ. of Pittsburgh; Prof. of Computer Science; Univ. of Virginia; Interactive Services Assoc.; U.S. Nat. Commission on Libraries & Info. Science; Info. Industry Assoc.; ABC Advisors Inc.; LEXIS-NEXIS; Nat. Archives & Records Admin.; Printing Industries of Amer.; Claitor's Law Books; Office of Mgmt. & Budget; Departments of Justice, Commerce, & Interior.


The Blockchain and the New Architecture of Trust

The Blockchain and the New Architecture of Trust

Author: Kevin Werbach

Publisher: MIT Press

Published: 2023-08-15

Total Pages: 339

ISBN-13: 0262547163

DOWNLOAD EBOOK

How the blockchain—a system built on foundations of mutual mistrust—can become trustworthy. The blockchain entered the world on January 3, 2009, introducing an innovative new trust architecture: an environment in which users trust a system—for example, a shared ledger of information—without necessarily trusting any of its components. The cryptocurrency Bitcoin is the most famous implementation of the blockchain, but hundreds of other companies have been founded and billions of dollars invested in similar applications since Bitcoin's launch. Some see the blockchain as offering more opportunities for criminal behavior than benefits to society. In this book, Kevin Werbach shows how a technology resting on foundations of mutual mistrust can become trustworthy. The blockchain, built on open software and decentralized foundations that allow anyone to participate, seems like a threat to any form of regulation. In fact, Werbach argues, law and the blockchain need each other. Blockchain systems that ignore law and governance are likely to fail, or to become outlaw technologies irrelevant to the mainstream economy. That, Werbach cautions, would be a tragic waste of potential. If, however, we recognize the blockchain as a kind of legal technology that shapes behavior in new ways, it can be harnessed to create tremendous business and social value.


Poetic Conventions as Cognitive Fossils

Poetic Conventions as Cognitive Fossils

Author: Reuven Tsur

Publisher: Oxford University Press

Published: 2017-08-01

Total Pages: 305

ISBN-13: 0190676353

DOWNLOAD EBOOK

Poetic Conventions as Cognitive Fossils offers a major theoretical statement of where poetic conventions come from. The work comprises Reuven Tsur's research in cognitive poetics to show how conventional poetic styles originate from cognitive rather than cultural principles. The book contrasts two approaches to cultural conventions in general, and poetic conventions in particular. They include what may be called the "culture-begets-culture" or "influence-hunting" approach, and the "constraints-seeking" or "cognitive-fossils" approach here expounded. The former assumes that one may account for cultural programs by pointing out their roots in earlier cultural phenomena and provide a map of their migrations. The latter assumes that cultural programs originate in cognitive solutions to adaptation problems that have acquired the status of established practice. Both conceptions assume "repeated social transmission," but with very different implications. The former frequently ends in infinite regress; the latter assumes that in the process of repeated social transmission, cultural programs come to take forms which have a good fit to the natural constraints and capacities of the human brain. Tsur extends the principles of this analysis of cognitive origins of poetic form to the writing systems, not only of the Western world, but also to Egyptian hieroglyphs through the evolution of alphabetic writing via old Semitic writing, and Chinese and Japanese writings; to aspects of figuration in medieval and Renaissance love poetry in English and French; to the metaphysical conceit; to theories of poetic translation; to the contemporary theory of metaphor; and to slips of the tongue and the tip-of-the-tongue phenomenon, showing the workings and disruption of psycholinguistic mechanisms. Analysis extends to such varying sources as the formulae of some Mediaeval Hebrew mystic poems, and the ballad 'Edward,' illustrative of extreme 'fossilization' and the constraints of the human brain.


Philosophy of Law

Philosophy of Law

Author: Mark Tebbit

Publisher: Taylor & Francis

Published: 2017-01-20

Total Pages: 315

ISBN-13: 1315281007

DOWNLOAD EBOOK

"[This book] provides an ideal starting point for students of philosophy and law. Setting it clearly against the historical background, [the author] ... leads readers into the heart of the philosophical questions that dominate philosophy of law today ... and [provides an] overview of the contending theories that have sought to resolve these problems ... The book is structured in three parts around the key issues and themes in philosophy of law: what is the law? : the major legal theories addressing the question of what we mean by law, including natural law, legal positivism and legal realism; the reach of the law : the various legal theories on the nature and extent of the law's authority, with regard to obligation and civil disobedience, rights, liberty and privacy; and criminal law : responsibility and mens rea, intention, recklessness and murder, legal defences, insanity and philosophies of punishment ... Revisions include a more detailed analysis of natural law, new chapters on common law and the development of positivism, a reassessment of the Austin-Hart dispute in the light of recent criticism of Hart, a new chapter on the natural law-positivist controversy over Nazi law and legality, and new chapters on criminal law, extending the analysis of the dispute over the viability of the defences of necessity and duress."--


More Than Screen Deep

More Than Screen Deep

Author: National Research Council

Publisher: National Academies Press

Published: 1997-10-12

Total Pages: 452

ISBN-13: 9780309063579

DOWNLOAD EBOOK

The national information infrastructure (NII) holds the promise of connecting people of all ages and descriptionsâ€"bringing them opportunities to interact with businesses, government agencies, entertainment sources, and social networks. Whether the NII fulfills this promise for everyone depends largely on interfacesâ€"technologies by which people communicate with the computing systems of the NII. More Than Screen Deep addresses how to ensure NII access for every citizen, regardless of age, physical ability, race/ethnicity, education, ability, cognitive style, or economic level. This thoughtful document explores current issues and prioritizes research directions in creating interface technologies that accommodate every citizen's needs. The committee provides an overview of NII users, tasks, and environments and identifies the desired characteristics in every-citizen interfaces, from power and efficiency to an element of fun. The book explores: Technological advances that allow a person to communicate with a computer system. Methods for designing, evaluating, and improving interfaces to increase their ultimate utility to all people. Theories of communication and collaboration as they affect person-computer interactions and person-person interactions through the NII. Development of agents: intelligent computer systems that "understand" the user's needs and find the solutions. Offering data, examples, and expert commentary, More Than Screen Deep charts a path toward enabling the broadest-possible spectrum of citizens to interact easily and effectively with the NII. This volume will be important to policymakers, information system designers and engineers, human factors professionals, and advocates for special populations.


Cryptography's Role in Securing the Information Society

Cryptography's Role in Securing the Information Society

Author: Committee to Study National Cryptography Policy

Publisher: National Academies Press

Published: 1996-11-12

Total Pages: 721

ISBN-13: 0309522544

DOWNLOAD EBOOK

For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptography--the representation of messages in code--and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examples -- some alarming and all instructive -- from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.


Designing an Internet

Designing an Internet

Author: David D. Clark

Publisher: MIT Press

Published: 2018-10-30

Total Pages: 433

ISBN-13: 0262038609

DOWNLOAD EBOOK

Why the Internet was designed to be the way it is, and how it could be different, now and in the future. How do you design an internet? The architecture of the current Internet is the product of basic design decisions made early in its history. What would an internet look like if it were designed, today, from the ground up? In this book, MIT computer scientist David Clark explains how the Internet is actually put together, what requirements it was designed to meet, and why different design decisions would create different internets. He does not take today's Internet as a given but tries to learn from it, and from alternative proposals for what an internet might be, in order to draw some general conclusions about network architecture. Clark discusses the history of the Internet, and how a range of potentially conflicting requirements—including longevity, security, availability, economic viability, management, and meeting the needs of society—shaped its character. He addresses both the technical aspects of the Internet and its broader social and economic contexts. He describes basic design approaches and explains, in terms accessible to nonspecialists, how networks are designed to carry out their functions. (An appendix offers a more technical discussion of network functions for readers who want the details.) He considers a range of alternative proposals for how to design an internet, examines in detail the key requirements a successful design must meet, and then imagines how to design a future internet from scratch. It's not that we should expect anyone to do this; but, perhaps, by conceiving a better future, we can push toward it.