Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material Index AAAS (American Association for adolescence Mali; Mauritania; the Advancement of Science), identity development among, Mozambique; Namibia; 91 306 Nigeria; Rwanda; Senegal; Aakhus, M., 178 identity practices of boys, 353 South Africa; Tanzania; Aarseth, Espen, 292n revelation of personal Uganda; Zambia abbreviations, 118, 120, 121, 126, information by, 463 African-Americans, 387 127, 133, 134 psychological framework of, 462 identity practices of adolescent ABC (American Broadcasting advertising, 156, 329, 354, 400, boys, 353 Company), 413, 416 415, 416, 420–1 political discussion, 174 ABC (Australian Broadcasting banner, 425 African Global Information Commission), 420 elaborate and sophisticated, 409 Infrastructure Gateway Aboriginal people, 251, 253, porn, 428 Project, see Leland 257–8, 262, 263 revenues, 417, 418, 419, 435 age, 280, 431, 432 abusive imageries, 431 Advertising Age, 417 porn images, 433 accessibility, 13, 50–1, 53, 424 aesthetics, 391, 425, 428, 430, agency, 44, 53, 55, 62, 312 balancing security and, 278 434 conditioned and dominated by control of, 388 alternative, 427 profit, 428 increasing, 223 digital, 407 technologically enhanced, 195 limited, 26 familiar, 435 AHA (American Historical private, 94 games designer, 75 Association), 86 public, 94, 95 play and, 373 Ahmed, Sara, 286–7, 288 see also Internet access promotional, 409 AILLA (Archive of the Indigenous accountability, 151, 191, 199, Afghanistan, 205 Languages of Latin America), 207, 273, 276, 277 AFHCAN (Alaska Federal 263 balancing privacy and, 278 Healthcare Access Network), Ajax, 457 does not negate the idea of play, 224 al-Abedallah, Zenab, 203, 204 279 COPYRIGHTEDAfrica, 85, 145, 181, 195 MATERIALAlbrecht, S., 173, 175, 179 acculturation, 46 digital divide, 189 Alexa Internet, 30 ACOR (Association of Internet-led development, 194 Alexander, J., 283, 284, 292n Cancer Online Resources), languages, 255, 263 Alice’s Adventures in Wonderland 216–17 minorities, 251, 262 (Lewis Carroll), 126–7 Acquisti, A., 389, 390, 462 opportunity to leapfrog into the alienation, 63, 64, 76 acronyms, 118, 120, 121, 134 future, 199 Allan, G., 385 Active Worlds, 330, 341 Unicode system not widely Allen, G., 98 activism, 77, 261–2, 359 understood by ICT Allen, S., 407 political, 192, 262 professionals, 263 alliances, 409, 417–18 ad hominem attacks, 181 see also Benin; Côte d’Ivoire; building, 194 Adams, S., 215 Egypt; Eritrea; Ethiopia; alphabet, 126 addiction, 159 Gambia; Ghana; Guinea; alt sites, 316, 427–30 porn, 426, 427, 434 Guinea-Bissau; Kenya; AltaVista, 19 administrative law, 139, 156 Lesotho; Madagascar; Malawi; alternative medicines, 216 Index 471 amateurs archives, 11, 12, 24–42 newly mediated, 421 archivings, 29 interpretations of, 13 niche, 434 pornographies, 427, 429–31 massive, 53, 420 potential, 411 Amazon, 128 new methods for, 13 timeshifting, 413 ambiguity, 396–7 public, 94 audio, 256, 413 gender, 272 virtual worlds or social network Australia, 21, 31, 203, 271, American Cancer Society, 341 sites, 52 411–12, 414 American democracy, 169 ARDnet (Africa Regional Dialogue great interest in using ICT, 263 American Medical Association, 215 in Decentralization Network), indigenous peoples, 251, 253, American Psychologist, 66 202 254, 257–8 Amhaz, Khaled, 203 Aristotle, 103, 126 minority languages, 262 Amman, 189, 193, 202 Arnold, E. L., 260 most powerful commercial ancestral lands, 260 Arnold, M., 303 network in, 417–18 Andersen, B., 40n arousal, 429 penetration of computers into Anderson, B., 46, 67, 68–9, 74, ARPANET, 1 households, 71 283, 318 artistic erotica, 428 research ethics programs, 85 Anderson, C. G., 253, 254 artistic traditions, 259 see also ABC Anderson, J., 239, 258 Arto, 387, 394 authenticity, 163, 164, 274, 275, Andrejevic, M., 407 Arusha, 194 278, 279, 285, 310, 354, Animal Crossing, 375 Arvidson, A., 31 387, 430 animation, 416 Arwarbukarl, 263 attempt to verify, 338 Anjuman, Rawnak, 206 ASCAP (American Society of crucial to creating trust, 389 anonymity, 100, 101, 102, 162, Composers and Publishers), flawed system for recognizing, 163–4, 218, 223, 225, 254, 442 389–90 277, 424, 435 ASCII (American Standard Code guarantees of, 353 convenience and, 222 for Information Interchange), moral panic surrounding, 388 dark side of discussion online, 263, 371 problematic, 391 172 ASEAN (Association of South East authoritarian states, 191 imposters protected from Asian Nations), 152 ending rule, 195 exposure by, 254 Asia 244, 265, 335 political activism stunted by potential for, 170 economic growth possible coercive capacities of, 192 promised, 453 without democratization, 195 revolutions against governments, self-presentation, 276 political development potential 180–1 anonymization, 96, 164, 393–4 of Internet in, 194 strengthening the hand of, 194 anorexia, 88, 95, 360 tribal peoples, 251, 262 authority anthropomorphic animals, 315, see also FERCAP; UNESCAP adult, 360 328 Asian and Asian-American guarantees of, 353 anti-social behavior, 170 students, 395–6 newspaper’s claim to, 410 anti-terrorism laws, 146, 163 AsianAvenue, 386 auto assembly lines, 127 antitrust law, 138, 146 assimilation, 254, 261 auto-fill-ins, 99 anxiety, 359, 397 Internet as a tool of, 258 autonomy, 87, 178 cultural, 426 Association of Tennis Professionals, cultural anxiety concerning, 426 risk, 360 410 diminished, 84 AoIR (Association of Internet asynchronous sites, 326 requirement to acknowledge, 84 Researchers), 12, 21, 92, 93, AT&T, 142 rights to and expectations of, 94, 119, 134n ATNS (Agreements Treaties and 91 Ethical Decision Making (2002), Negotiated Settlements) avatars, 274, 275, 289, 326–7, 87 database, 262 329, 334, 371, 386, 389 Ethics Working Group, 91 Attac (extreme-right NGO), 39 affixing of “real” identity to, guidelines, 14, 83, 103 attorneys, 141 339 AOL (AmericaOnline), 88, 101, attractiveness, 392, 455 alternate, 336 384–5, 418 perceived, 391 attractive, 337 Aotearoa, 254, 262 Attwood, F., 428, 429, 433 choices of, 335 APA (American Psychological audiences, 388–9, 406, 409, 414, expertly simulated, 331 Association), 91–2 415, 454, 460 female, 281 apostrophes, 123 core, 411, 417 humans interact with, 90 Apple, 441, 443 integral role in circuits of desire identity focused on, 336 appropriation, 70, 73, 74 and pleasure, 430 male and female equally anxieties and struggles that massive, 419, 420 powerful, 288 accompany, 71 music, 441–50 relationships between players Arab world, 188, 193 national, 418 and, 292n impact of Internet in, 198 new, 425 rights of, 339, 340 Archipol (Dutch project), 32, 40n new relationships to, 407 stereotypical, 335 472 Index “babe,” 288 BearShare, 441 archived, 30 baby boomers, 387 Beatles, The, 447 authored by women, 98 backgammon, 370 Beauchamp, Tom, 86 citizen-written, 180 Bailenson, J., 337 Beaverbrook, Lord, 415 competing, 409 Bakardjieva, Maria, 11, 13, 14, 64, Bebo, 384–5, 387 female political bloggers, 174 73, 74, 76, 77, 103, 310, 351 Beck, U., 362 hyper-blogging, 93, 103 Baker, A., 88, 92 Becker, M., 254, 258 journalists’, 410, 415 Baker, A. B., 171 Beer, D., 421 meta-tagging an entry, 51 Bakhtin, M., 63, 64, 76 behavioral research, 86 mobile phone, 118 balance of power, 339 Beierle, T. C., 178, 183n numbers of, 96 gendered, 322 Beijing, 286, 287 on-air personalities, 413 balancing (legal practice), 147 Beirut, 203 personal diary-style, 312 bandwidth, 331, 425, 434 Belgium, 72 political, 77, 174, 176 Bangladesh 203, 206, 207 Bell, Gordon, 50 queer, 274 banner advertisements, 425 Bellah, R. N., 314 religious, 245 Barab, S., 341 Bellman, K., 326, 327, 331–2, users allowed to blend favorite Barber, Benjamin, 169 338 sites, 418 Barbie Girls, 342 Belmont Report, The (US 1979), virtual worlds, 340 Barboza, D., 207 83, 84–5 blood ties, 396 Bargh, J. A., 454 belonging, 67 Blue Snake’s Lodge, 254 Barlow, John Perry, 18, 20 sense of, 455 BlueSky, 315, 317, 319, 320, 335 Barnes, J., 385 Bender, M., 100 BMI (Broadcast Music, Inc.), 442 Barnes, S. B., 462 beneficence, 85, 87, 91 board games, 370–1 Baron, Naomi S., 112–13, 118, Benin, 201, 202 Boas, Taylor C., 195 120, 121, 123, 125, 126, Benjamin, Walter, 45 Bober, M., 75, 88, 349, 362 131, 390, 394, 397, 399 Benkler, Y., 455 Bødker, M., 277 barriers to entry, 373 Bennett, D., 425, 428, 430, 435 body politics, 273 bars, 286 Bennett, James, 420 body-to-body encounters, 275 Barthes, Roland, 461 Berg, M., 215 Boler, M., 77 Bartle, Richard, 328, 340, 370, Berger, P. L., 54 Bolivia, 257 374, 380n Berker, T., 70, 71, 72, 73 Bolter, J. D., 259, 407 Barzilai, G., 242 Berland, J., 331, 343–4 bonding, 375, 396 Barzilai-Nahon, K., 242 Berners-Lee, Tim, 29, 53, 457 Boneva, B., 67, 120 Basu, K., 197 Bernhardtz, V., 292n Bont, A. de, 215 Bateson, Gregory, 51 Berry, C., 289, 293n bootlegs, 378 Batt, E., 385 Berry, D., 103 borderless territory, 261 Battlefield, 1942 375 Bers, M. U., 175 boredom, 131 Bauman, Z., 65 beta-testing, 378 Borgmann, A., 310, 313, 319, 321 Baym, Nancy, 12, 14, 132, 233, Bible-reading, 125 Bornstein, Kate, 274 237, 305, 314, 318, 319, bilateral treaties, 151 Boston Globe, 168, 416 323, 385, 388, 393, 394, Bimber, B., 195 boundaries, 278, 283, 322 395, 397, 398, 454 biomedical research, 84, 86 legitimate, 378 BBC (British Broadcasting Biraban, 263 national, 379 Corporation) bisexuals, 292n teenagers challenging, 360 children’s website, 360 hostility towards, 285 unified, 408 seven-day archive of programs, mailing-list community for, 276, Bourdieu, P., 75, 312, 391 413 291n Bower, R. T., 47 streamable program content, BitTorrent, 372 Bowker, G., 355 420 Black Death, 133 boyd, d., 349, 358, 385–6, 388, World Service, 409 black feminism, 291n 389, 391, 393, 394, 395, BBS (bulletin-board systems), 90, BlackBerries, 216 397, 398, 421, 453, 454, 264, 252, 304 blacklists, 339 456, 460, 462 early days, 372, 380n BlackPlanet, 174, 386, 387, 390 boys and toys, 270 fan communities, 4, 237 Blacksburg Electronic Village, 67, Brace, I., 99–100 networked gaming brought to 321 Brady, H.
Recommended publications
  • DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
    DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love.
    [Show full text]
  • The Play's the Thing: a Theory of Taxing Virtual Worlds, 59 Hastings L.J
    Hastings Law Journal Volume 59 | Issue 1 Article 1 1-2007 The lP ay's the Thing: A Theory of Taxing Virtual Worlds Bryan T. Camp Follow this and additional works at: https://repository.uchastings.edu/hastings_law_journal Part of the Law Commons Recommended Citation Bryan T. Camp, The Play's the Thing: A Theory of Taxing Virtual Worlds, 59 Hastings L.J. 1 (2007). Available at: https://repository.uchastings.edu/hastings_law_journal/vol59/iss1/1 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Articles The Play's the Thing: A Theory of Taxing Virtual Worlds BRYAN T. CAMP* INTRODU CTION .............................................................................................. 2 I. THE VIRTUAL WORLDS OF MASSIVELY MULTIPLAYER ONLINE ROLE- PLAYING GAMES (MMORPGs) ...................................................... 3 A. STRUCTURED AND UNSTRUCTURED MMORPGs .......................... 4 i. Structured Gam es ....................................................................... 4 2. UnstructuredGam es .................................................................. 7 B. INCOME-GENERATING ACTIVITIES ................................................... 8 i. In- World Transactions (IWT)................................................... 9 2. Real Money Trades (RMT).....................................................
    [Show full text]
  • Expectation of Privacy in Internet Communications
    Fourth Amendment Aspects of Internet Communications and Technology Dennis Nicewander Assistant State Attorney 17th Judicial Circuit Ft. Lauderdale, Florida The emergence of Internet technology has revolutionized the world of communication and information sharing. Unfortunately, criminals have seized this opportunity to enhance the efficiency and productivity of their criminal pursuits. The task ahead of law enforcement is daunting, to say the least. New forms of technology emerge before we are able to master the old ones. The most significant legal issue to arise in this struggle to make order out of chaos is the application of the Fourth Amendment to these emerging technologies. If our economy is going to continue to grow at the rapid pace promised by Internet technology, we must find a way to balance our citizens‟ right to privacy with the necessity of establishing law and order in this new frontier. As our culture and legal system suffer the growing pains of radical change, it is responsibility of prosecutors to work together with law enforcement to strike a balance between effective police work and privacy rights afforded by the Fourth Amendment. Understanding the role of “reasonable expectation of privacy” is critical to this role. Since most information placed on the Internet is designed for mass distribution, a reasonable expectation of privacy will not apply in the majority of cases. The purpose of this paper is to provide basic guidance and case law concerning this issue as it relates to some of the most common forms Internet technology. The topics will be divided into the following categories: General Privacy Cases Email Chatrooms Peer-to-Peer Internet Service Provider Records Websites Bulletin Boards University Usage Logs Text Messages General Privacy Cases Katz v.
    [Show full text]
  • Helpful Definitions
    HELPFUL DEFINITIONS Internet – an immense, global network that connects computers via telephone lines and/or fiber networks to storehouses of electronic information. With only a computer, a modem, a telephone line and a service provider, people from all over the world can communicate and share information with little more than a few keystrokes. Bulletin Board Systems (BBSs) – electronic networks of computers that are connected by a central computer setup and operated by a system administrator or operator and are distinguishable from the internet by their “dial up” accessibility. BBS users link their individual computers to the central BBS computer by a modem which allows them to post messages, read messages left by others, trade information, or hold direct conversations. Access to a BBS can, and often is, privileged and limited to those users who have access privileges granted by the systems operator. Commercial Online Service (COS) – examples of COSs are America Online, Prodigy, CompuServe and Microsoft Network, which provide access to their service for a fee. COSs generally offer limited access to the internet as part of their total service package. Internet Service Provider (ISP) – These services offer direct, full access to the internet at a flat, monthly rate and often provide electronic mail service for their customers. ISPs often provide space on their servers for their customers to maintain World Wide Web (WWW) sites. Not all ISPs are commercial enterprises. Educational, governmental and nonprofit organizations also provide internet access to their members. Public Chat Rooms – created, maintained, listed and monitored by the COS and other public domain systems such as Internet Relay Chat.
    [Show full text]
  • Digital Television Systems
    This page intentionally left blank Digital Television Systems Digital television is a multibillion-dollar industry with commercial systems now being deployed worldwide. In this concise yet detailed guide, you will learn about the standards that apply to fixed-line and mobile digital television, as well as the underlying principles involved, such as signal analysis, modulation techniques, and source and channel coding. The digital television standards, including the MPEG family, ATSC, DVB, ISDTV, DTMB, and ISDB, are presented toaid understanding ofnew systems in the market and reveal the variations between different systems used throughout the world. Discussions of source and channel coding then provide the essential knowledge needed for designing reliable new systems.Throughout the book the theory is supported by over 200 figures and tables, whilst an extensive glossary defines practical terminology.Additional background features, including Fourier analysis, probability and stochastic processes, tables of Fourier and Hilbert transforms, and radiofrequency tables, are presented in the book’s useful appendices. This is an ideal reference for practitioners in the field of digital television. It will alsoappeal tograduate students and researchers in electrical engineering and computer science, and can be used as a textbook for graduate courses on digital television systems. Marcelo S. Alencar is Chair Professor in the Department of Electrical Engineering, Federal University of Campina Grande, Brazil. With over 29 years of teaching and research experience, he has published eight technical books and more than 200 scientific papers. He is Founder and President of the Institute for Advanced Studies in Communications (Iecom) and has consulted for several companies and R&D agencies.
    [Show full text]
  • Technical Challenges of DVB-T2 Implementation in Indonesia
    Technical Challenges of DVB-T2 Implementation in Indonesia Tantangan Teknis Implementasi DVB-T2 di Indonesia Tri Anggraeni Sekolah Tinggi Multi Media MMTC Yogyakarta Jalan Magelang Km. 6 Yogyakarta 55284 [email protected] Received: 2 October 2014; Received in revised form: 4 November 2014; Accepted: 14 November 2014 Abstrak Transisi dari penyiaran analog ke digital yang — menjanjikan banyak kesempatan baru telah memotivasi I. INTRODUCTION Organisasi Telekomunikasi Internasional (International Telecommunication Union atau ITU) untuk memberikan The broadcasting technology has emerged since 1900 and dorongan yang besar kepada Negara-negara di dunia untuk segera mewujudkannya. Sebagian besar Negara-negara di dunia before the invention of television, it was primarily used for juga sudah menyadari begitu pentingnya transisi tersebut. Akan radio and wireless telegraph (Luo, 2011). Television used tetapi, banyak tantangan yang membuat proses transisi high-frequency radio wave to send the television signal and at berlangsung relatif lambat, termasuk di Indonesia. Penelitian ini the beginning, the information was transformed and sent as memilih Swedia dan Inggris yang sudah terlebih dulu melakukan transisi total ke penyiaran digital untuk menggali analog signals. Analog transmission utilizes a prolonged tantangan-tantangan teknis dan usaha yang dilakukan untuk carrier signal which the amplitude, frequency, or phase varies menghadapi tantangan tersebut. Penelitian ini menganalisa in the proportion to the analog message (voice and image). It status transisi Indonesia saat ini dan menghasilkan rekomendasi- uses frequency modulation (FM) and amplitude modulation rekomendasi. (AM). Kata kunci— transisi digital, DVB-T2, tantangan teknis The development of digital broadcasting was started since 1990s. It gives better quality, bigger transmission rates, better resistance to the interference, and tackles the problems caused Abstract— Transition from analogue to digital broadcasting which promises many new opportunities has motivated by channel noise.
    [Show full text]
  • QUESTION 20-1/2 Examination of Access Technologies for Broadband Communications
    International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies eport on broadband access technologies QUESTION 20-1/2 R International Telecommunication Union ITU-D THE STUDY GROUPS OF ITU-D The ITU-D Study Groups were set up in accordance with Resolutions 2 of the World Tele- communication Development Conference (WTDC) held in Buenos Aires, Argentina, in 1994. For the period 2002-2006, Study Group 1 is entrusted with the study of seven Questions in the field of telecommunication development strategies and policies. Study Group 2 is entrusted with the study of eleven Questions in the field of development and management of telecommunication services and networks. For this period, in order to respond as quickly as possible to the concerns of developing countries, instead of being approved during the WTDC, the output of each Question is published as and when it is ready. For further information: Please contact Ms Alessandra PILERI Telecommunication Development Bureau (BDT) ITU Place des Nations CH-1211 GENEVA 20 Switzerland Telephone: +41 22 730 6698 Fax: +41 22 730 5484 E-mail: [email protected] Free download: www.itu.int/ITU-D/study_groups/index.html Electronic Bookshop of ITU: www.itu.int/publications © ITU 2006 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. International Telecommunication Union QUESTION 20-1/2 Examination of access technologies for broadband communications ITU-D STUDY GROUP 2 3rd STUDY PERIOD (2002-2006) Report on broadband access technologies DISCLAIMER This report has been prepared by many volunteers from different Administrations and companies.
    [Show full text]
  • History of the Internet-English
    Sirin Palasri Steven Huter ZitaWenzel, Ph.D. THE HISTOR Y OF THE INTERNET IN THAILAND Sirin Palasri Steven G. Huter Zita Wenzel (Ph.D.) The Network Startup Resource Center (NSRC) University of Oregon The History of the Internet in Thailand by Sirin Palasri, Steven Huter, and Zita Wenzel Cover Design: Boonsak Tangkamcharoen Published by University of Oregon Libraries, 2013 1299 University of Oregon Eugene, OR 97403-1299 United States of America Telephone: (541) 346-3053 / Fax: (541) 346-3485 Second printing, 2013. ISBN: 978-0-9858204-2-8 (pbk) ISBN: 978-0-9858204-6-6 (English PDF), doi:10.7264/N3B56GNC ISBN: 978-0-9858204-7-3 (Thai PDF), doi:10.7264/N36D5QXN Originally published in 1999. Copyright © 1999 State of Oregon, by and for the State Board of Higher Education, on behalf of the Network Startup Resource Center at the University of Oregon. This work is licensed under a Creative Commons Attribution- NonCommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/deed.en_US Requests for permission, beyond the Creative Commons authorized uses, should be addressed to: The Network Startup Resource Center (NSRC) 1299 University of Oregon Eugene, Oregon 97403-1299 USA Telephone: +1 541 346-3547 Email: [email protected] Fax: +1 541-346-4397 http://www.nsrc.org/ This material is based upon work supported by the National Science Foundation under Grant No. NCR-961657. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • Terra Nova: Enacting Videogame Development Through Indigenous-Led Creation and Submitted in Partial Fulfillment of the Requirements for the Degree Of
    Terra Nova: Enacting Videogame Development ​ through Indigenous-Led Creation Maize Longboat A Research Creation Thesis in The Department of Communication Studies Presented in Partial fulfilment of the Requirements for the Degree of Master of Arts (Media Studies) at Concordia University Tiohtiá:ke/Montréal, Quebec, Canada August 2019 © Maize Longboat, 2019 CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Maize Longboat Entitled: Terra Nova: Enacting Videogame Development through Indigenous-Led Creation and submitted in partial fulfillment of the requirements for the degree of Master of Arts (Media Studies) complies with the regulations of the University and meets the accepted standards with respect to originality and quality. Signed by the final examining committee: ______________________________________ Chair Dr. Monika Gagnon ______________________________________ Examiner Dr. Elizabeth Miller ______________________________________ Examiner Dr. Elizabeth LaPensée ______________________________________ Supervisor Dr. Mia Consalvo _______________________________________ Professor Jason Edward Lewis Approved by ____________________________________________________ Dr. Charles Acland Chair of Department or Graduate Program Director Faculty of Arts and Science Dr. André G. Roy Dean Date ________________________________________________August 21, 2019 Abstract Terra Nova: Enacting Videogame Development ​ through Indigenous-Led Creation Maize Longboat Indigenous peoples have had a rich tradition
    [Show full text]
  • The Future of the Internet and How to Stop It the Harvard Community Has
    The Future of the Internet and How to Stop It The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Jonathan L. Zittrain, The Future of the Internet -- And How to Citation Stop It (Yale University Press & Penguin UK 2008). Published Version http://futureoftheinternet.org/ Accessed July 1, 2016 4:22:42 AM EDT Citable Link http://nrs.harvard.edu/urn-3:HUL.InstRepos:4455262 This article was downloaded from Harvard University's DASH Terms of Use repository, and is made available under the terms and conditions applicable to Other Posted Material, as set forth at http://nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms- of-use#LAA (Article begins on next page) YD8852.i-x 1/20/09 1:59 PM Page i The Future of the Internet— And How to Stop It YD8852.i-x 1/20/09 1:59 PM Page ii YD8852.i-x 1/20/09 1:59 PM Page iii The Future of the Internet And How to Stop It Jonathan Zittrain With a New Foreword by Lawrence Lessig and a New Preface by the Author Yale University Press New Haven & London YD8852.i-x 1/20/09 1:59 PM Page iv A Caravan book. For more information, visit www.caravanbooks.org. The cover was designed by Ivo van der Ent, based on his winning entry of an open competition at www.worth1000.com. Copyright © 2008 by Jonathan Zittrain. All rights reserved. Preface to the Paperback Edition copyright © Jonathan Zittrain 2008. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S.
    [Show full text]
  • Trojans and Malware on the Internet an Update
    Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within.
    [Show full text]