Filed under book | Tags: · arpanet, botnet, captcha, history of technology, internet, malware, spam, technology, usenet
The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand.
This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam’s entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms—spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.
Publisher MIT Press, 2013
ISBN 026201887X, 9780262018876
Download (removed on 2013-5-20 upon request of the publisher)Comment (0)
Filed under book | Tags: · botnet, business, economy, information, knowledge, management, technology
“Drawing from recent research and practical examples across a range of organizations, The Social Life of Information dispels many of the futurists’ sweeping predictions that information technology will obliterate the need for everything from travel to supermarkets to business organizations to social life itself. The authors examine the potential and limitations of technology with regard to intelligent software agents, the automated home office, business reorganization for innovation, knowledge management and work practices, the paperless society, and the digital university. Arguing eloquently for the important role human sociability plays in the world of bits, Brown and Duguid present an optimistic look beyond the simplicities of information and individuals. They show how a better understanding of the contribution that communities, organizations, and institutions make to learning, knowledge, and judgment can lead to the richest possible use of technology in our work and everyday lives.”
Publisher Harvard Business Press, 2000
ISBN 0875847625, 9780875847627
Deibert, Palfrey, Rohozinski, Zittrain (eds.): Access Contested: Security, Identity, and Resistance in Asian Cyberspace (2011)
Filed under book | Tags: · asia, blogging, botnet, censorship, china, cyberwar, facebook, freedom of expression, internet, journalism, politics, surveillance
A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China–home to the world’s largest Internet population and what is perhaps the world’s most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China’s Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers.
The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.
Edited by Ronald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain
Publisher MIT Press, 2011
Information Revolution and Global Politics series
ISBN 0262516802, 9780262516808