Listing 1 - 10 of 759 | << page >> |
Sort by
|
Choose an application
Ob beim Aufrufen einer Webseite, beim Versenden einer E-Mail oder beim Hochfrequenz-Börsenhandel: Auf ihrem Weg durch die Weiten digitaler Netze durchqueren Bits zahlreiche Knoten, an denen eine Reihe von Mikroentscheidungen getroffen werden. Diese Entscheidungen betreffen den besten Pfad zum Ziel, die Verarbeitungsgeschwindigkeit oder die Priorität zwischen den ankommenden Paketen. In ihrer vielschichtigen Gestalt bilden solche Mikroentscheidungen eine bislang nur marginal beachtete Dimension von Kontrolle und Überwachung im 21. Jahrhundert. Sie sind sowohl die kleinste Einheit als auch die technische Voraussetzung einer gegenwärtigen Politik digitaler Netzwerke - und des Widerstands gegen sie. Die aktuellen Debatten um Netzneutralität und Edward Snowdens Enthüllung der NSA-Überwachung bilden dabei lediglich die Spitze des Eisbergs. Auf dem Spiel steht nicht weniger als die Zukunft des Internets, wie wir es kennen.
Choose an application
"Networks powered by algorithms are pervasive. Major contemporary technology trends-Internet of Things, Big Data, Digital Platform Power, Blockchain, and the Algorithmic Society-are manifestations of this phenomenon. The internet, which once seemed an unambiguous benefit to society, is now the basis for invasions of privacy, massive concentrations of power, and wide-scale manipulation. The algorithmic networked world poses deep questions about power, freedom, fairness, and human agency. The influential 1997 Federal Communications Commission whitepaper "Digital Tornado" hailed the "endless spiral of connectivity" that would transform society, and today, little remains untouched by digital connectivity. Yet fundamental questions remain unresolved, and even more serious challenges have emerged. This important collection, which offers a reckoning and a foretelling, features leading technology scholars who explain the legal, business, ethical, technical, and public policy challenges of building pervasive networks and algorithms for the benefit of humanity. This title is also available as Open Access on Cambridge Core"--
Choose an application
Die Arbeit untersucht in ihrem ersten Teil die Auswirkungen der UWG-Novelle und der jüngeren Rechtsprechung auf die Problemkreise der unverlangten E-Mail-Werbung, des Einsatzes von Hyperlinks und der Beeinflussung von Suchmaschinen. In ihrem zweiten Teil wendet sie sich der Bedeutung technischer Schutzmaßnahmen für die lauterkeitsrechtliche Bewertung zu.
Internet. --- Internet --- Security measures.
Choose an application
In order to 'be online', an individual has to create an online presence. This online self is presented in different ways, with diverse goals and aims in order to engage in different social media activities and to achieve desired outcomes. The authors propose a wide overview of the psychology of social networking and its implications in our lives.
Choose an application
Pratique et concis, ce guide explique comment effectuer une recherche documentaire efficace et fructueuse. Comment définir et préciser votre sujet de recherche? Quels sont vos besoins documentaires? Quels ouvrages de référence devez-vous consulter? Comment pouvez-vous tirer parti des outils et services offerts en bibliothèque? Où pouvez-vous trouver, dans Internet, des documents pertinents et fiables? Accompagné de divers tableaux permettant de rappeler l'essentiel des informations, le texte se lit et se consulte facilement grâce à une présentation claire et attrayante. Enfin, un guide de la recherche véritablement adapté aux étudiants!
Choose an application
PULP Guide: Finding legal information in South Africa - Fourth edition Edited by Shirley Ann Gilmore 2017 ISBN: 978-1-920538-68-2 Pages: 162 Print version: Available Electronic version: Free PDF available
Choose an application
In this open-ended report commissioned by the Bundestag parliamentary group Bündnis 90 / Die Grünen, Prof. Spindler examines the legal and economic feasibility and design of an approach to the so-called “culture flat rate”. The question was whether a flat-rate remuneration approach for broadband connections can be a building block for fairer, modern copyright law, for appropriate remuneration for authors and a balance of social interests. The comprehensive and detailed report makes a significant contribution to the discussion about the future of copyright law, which is being carried out in practically every country in the age of the global Internet. It will be made fully accessible to the public so that the results can be used and further developed by all interested parties. Prof. In his report, Spindler shows that a flat-rate remuneration approach is constitutionally permissible and can be an attractive model for appropriate remuneration for creative people. For the users' situation, it offers a suitable alternative to repressive and socially highly conflict-prone forms of law enforcement. At the same time, however, important difficulties and hurdles in the implementation of such a model are pointed out.
Choose an application
A complete history and theory of internet daemons brings these little-known—but very consequential—programs into the spotlightIn Internet Daemons, Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives—including their role in hot-button issues like network neutrality. He asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight. We’re used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Net’s infrastructure—as well as the devices we use to access it—daemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our lives—including their role in hot-button issues like network neutrality.Going back to Victorian times and the popular thought experiment Maxwell’s Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcast’s efforts to control peer-to-peer networking, and Pirate Bay’s attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users. Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight. (Provided by publisher)
Internet programming. --- Computer programming --- Internet programming
Choose an application
PULP Guide: Finding legal information in South Africa - Third edition Edited by Shirley Ann Gilmore 2014 ISBN: 978-1-920538-28-6 Pages: 115 Print version: Available Electronic version: Free PDF available
Legal research. --- Internet research. --- Internet searching.
Choose an application
This book reviews Internet research and political theory seeking theoretically "cool-headed" perspectives on the current public political spaces in advanced societies. Aspects of the political theories of Rawls and Habermas are discussed and contrasted with contestation-oriented theories. In light of how the Internet takes part in structurally transforming the public sphere, the book draws on sociological and realist insights in order to encircle a more realist view. It briefly reconsiders such strange bedfellows as sociological systems theory (Niklas Luhmann) and political realism (eg. Bernard Williams). The purpose is not to construct a realist theory of the internet-based public sphere, but to point out central insights on which such a theory can be built.
Listing 1 - 10 of 759 | << page >> |
Sort by
|