Navigating the Indian Cyberspace Maze Guide for Policymakers

Total Page:16

File Type:pdf, Size:1020Kb

Navigating the Indian Cyberspace Maze Guide for Policymakers Brigadier Ashish Chhibbar is presently Cyberspace has turned out to be one Senior Fellow with the Strategic Navigating the Indian of the greatest discoveries of mankind. Technologies Centre at the Manohar Today, we have more than four-and- Navigating the Indian Navigating the Indian Parrikar Institute for Defence Studies a-half billion people connected to the and Analyses New Delhi, and his Cyberspace Maze Cyberspace Maze internet and this number is all set interests lie in cyberspace policy and to increase dramatically as the next disruptive technologies of Artificial Guide for Policymakers generational Internet of Things (IoT) Intelligence, block chain and big data devices and 5G technology gets fully analysis. operational. Brigadier Chhibbar is an alumnus India has been at the forefront of this amazing digital revolution and of the National Defence Academy, is a major stakeholder in the global Defence Services Staff College, and cyberspace ecosystem. As the world Military College of Telecommunication embarks on embracing internet 2.0 Engineering, and has varied experience characterised by 5G high-speed of over three decades in all types of wireless interconnect, generation of terrain and operational assignments. vast quantities of data and domination He completed his Masters in of transformational technologies Telecommunication Engineering of Artificial Intelligence (AI), block from the Indian Institute of Science, chain and big data, India has been Bangalore and holds a PhD in Strategic presented with a unique opportunity to Decision Making from Chaudhary leapfrog from a developing country to a Charan Singh University, Meerut. developed knowledge-based nation in a matter of years and not decades. Ashish Chhibbar This book presents an exciting and fascinating journey into the world of cyberspace with focus on the impactful technologies of AI, block chain and Big Data analysis, coupled with an appraisal of the Indian cyberspace ecosystem. It has been written especially for a policymaker in order to provide a lucid overview of the cyberspace domain in adequate detail. ` 1280.00 ISBN 978-93-89137-47-7 KNOWLEDGE WORLD KW PUBLISHERS PVT LTD Ashish Chhibbar www.kwpub.com Front jacket image courtesy Martin Dodge Navigating the Indian Cyberspace Maze Guide for Policymakers Navigating the Indian Cyberspace Maze Guide for Policymakers Ashish Chhibbar KNOWLEDGE WORLD KW Publishers Pvt Ltd New Delhi Copyright © 2020 Manohar Parrikar Institute for Defence Studies and Analyses, New Delhi All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without first obtaining written permission of the copyright owner. Disclaimer: The views expressed in this book are those of the author(s) and do not necessarily reflect those of the Manohar Parrikar Institute for Defence Studies and Analyses, or the Government of India. Manohar Parrikar Institute for Defence Studies and Analyses No. 1, Development Enclave, Delhi Cantt. New Delhi-110 010 Phone: +91-11-26717983 Website: www.idsa.in ISBN 978-93-89137-47-7 Hardback Published in India by Kalpana Shukla KW Publishers Pvt Ltd 4676/21, First Floor, Ansari Road Daryaganj, New Delhi 110 002 Phone: +91 11 23263498/43528107 Marketing: [email protected] Editorial: [email protected] Website: www.kwpub.com Printed and bound in India The content of this book is the sole expression and opinion of its author(s), and not of the publisher. The publisher in no manner is liable for any opinion or views expressed by the author(s). While best efforts have been made in preparing the book, the publisher makes no representations or warranties of any kind and assumes no liabilities of any kind with respect to the accuracy or completeness of the content and specifically disclaims any implied warranties of merchantability or fitness of use of a particular purpose. The publisher believes that the contents of this book do not violate any existing copyright/intellectual property of others in any manner whatsoever. However, in case any source has not been duly attributed, the publisher may be notified in writing for necessary action. Contents Abbreviations vii 1. Introduction 1 2. A Brief Introduction to Cyberspace 10 3. Artificial Intelligence as a Strategic Force Multiplier 87 4. Blockchain and Big Data: Enablers of National Security 133 5. Appraisal of India’s Cyberspace Ecosystem 166 6. Recommendations and Conclusion 200 Appendix A Cyberspace Architecture And Building Blocks 220 Appendix B Essentials of Artificial Intelligence 242 Appendix C Recommended Structure of Ministry of Cyberspace 259 Index 261 Abbreviations ACO Ant Colony Optimiser AES Advanced Encryption Standard AGI Artificial General Intelligence AGR Adjusted Gross Revenue AH Authentication Header AI Artificial Intelligence AIM Analytics India Magazine AIS Artificial Immune System AISHE All India Survey on Higher Education ALIS Autonomic Logistics Infrastructure System ANN Artificial Neural networks APT Advance Persistent Threat APT Asia Pacific Telecommunication ARP Address Resolution Protocol AtoN Aids to Navigation BaaS Blockchain as a Service BBNL Bharat Broadband Network Limited BCH Bitcoin cash (Crypto currency) BCO Bee Colony Optimiser BFSI Banking, Financial Services and Insurance BI Business Intelligence BIMSTEC Bay of Bengal Initiative for Multi-Sectoral Technical and Economic Cooperation BPO Business Process Outsourcing BSNL Bharat Sanchar Nigam Limited BSV Bitcoin Satoshi Vision (Crypto currency) BTC Bitcoin (Crypto currency) viii • Navigating the Indian Cyberspace Maze BTS Base Transreceiver System C2W Command & Control Warfare CAN Campus Area Network CAS Chinese Academy of Science CCA Controller of Certifying Authority CCMF Cyber Combat Mission Force CDMA Code Division Multiplexing Access CDS Clinical Decision Support CDS Chief of Defence Staff CEO Chief Executive Officer CERT Computer Emergency Response Team CII Critical Information Infrastructure CIIO Critical Information Infrastructure Operators CISO Chief Information Security Officer CNMF Cyber National Mission Force CNO Computer Network Operations CO Cyberspace Operations COA Courses Of Actions CODE Collaborative Operations in Denial Environment COMEST Commission on the Ethics of Scientific Knowledge and Technology COP Common Operating Picture CPU Central Processing Unit CSAIL Computer Science and Artificial Intelligence laboratory CSC Common Service Centres CSIS Center for Strategic and International Studies CSOC Cyber Security Operation Centre CSSS Champion Services Sector Scheme CTO Chief Technological Officer CyPAD Cyber Prevention, Awareness and Detection DAE Department of Atomic Energy DAG Directed Acyclic Graphs DAO Distributed Autonomous Organisation DARPA Defense Advanced Research Projects Agency DART Dynamic Analysis and Replanning Tool DASH Dash (Crypto currency) Abbreviations • ix DBT Direct Benefit Transfer DCA Defence Cyber Agency DCN Defence Communication Network DCO Defensive Cyberspace Operations DDOS Distributed Denial of Service DeitY Department of Electronics and Information Technology DES Data Encryption Standard DG Deep Green DHCP Dynamic Host Configuration Protocol DIARA Defence Information Assurance & Research Agency DLA Defense Logistics Agency DMZ De-Militarised Zone DNC Democratic National Committee DNS Domain Name Service DOD Department of Defence DODIN Department of Defence Information Network DOF Degree of Freedom DOS Denial of Service DWDM Dense Wave Division Multiplexers EBL Explanation Based Learning ELMo Embedded for language Models EM Electro Magnetic EMI Electromagnetic Interference ERCIM European Research Consortium for Informatics and Mathematics ESP Encapsulation Security Payload ETH Ethereum (Crypto currency) EW Electronic Warfare FDMA Frequency Division Multiplexing Access FIR First Incident Report FIRST Forum of Incident Response and Security Teams FISMA Federal Information Security Management Act FLM Fuzzy logic Model FTP File Transfer Protocol GA Genetic Algorithms GAN Generative Adversarial Networks x • Navigating the Indian Cyberspace Maze GBPS Giga Bit Per Second GCI Global Complex for Innovation GDP Gross Domestic Product GDPR General Data Protection Regulation GFS Google File System GGE Group of Governmental Experts GIS Geo-Spatial information System GLADS Global Administration Data System GOI Government of India GP Gram Panchayats GPR Government Process Reengineering GPS General Positioning System GVA Gross Value Added HADR Humanitarian Assistance and Disaster Relief HDFS Hadoop Distributed File System HITS Hyper Link-Induced Topic Search HMM Hidden Markov Model HR Human Resource HSPD Homeland Security Presidential Directive HTTP Hyper Text Transfer Protocol I/O Input /Output I4C Indian Cyber Crime Coordination Centre IaaS Infrastructure as a Service IAB Internet Architecture Board IANA Internet Assigned Numbers Authority IARPA Intelligence Advanced Research Projects Activity IBW Intelligence Based Warfare IC Integrated Circuit ICANN The Internet Cooperation for Assigned Names and Numbers ICERT Indian Computer Emergency Response Team ICMP Internet Control Message Protocol ICT Information Communication Technology IDS Integrated Defence Staff IDSA Institute for Defence Studies and Analyses IDSS Intelligent Decision Support Systems Abbreviations • xi IE Information Environment IEEE Institute of Electrical and Electronics Engineers IESG Internet Engineering Steering Group IETF Internet Engineering
Recommended publications
  • New Alt.Cyberpunk FAQ
    New alt.cyberpunk FAQ Frank April 1998 This is version 4 of the alt.cyberpunk FAQ. Although previous FAQs have not been allocated version numbers, due the number of people now involved, I've taken the liberty to do so. Previous maintainers / editors and version numbers are given below : - Version 3: Erich Schneider - Version 2: Tim Oerting - Version 1: Andy Hawks I would also like to recognise and express my thanks to Jer and Stack for all their help and assistance in compiling this version of the FAQ. The vast number of the "answers" here should be prefixed with an "in my opinion". It would be ridiculous for me to claim to be an ultimate Cyberpunk authority. Contents 1. What is Cyberpunk, the Literary Movement ? 2. What is Cyberpunk, the Subculture ? 3. What is Cyberspace ? 4. Cyberpunk Literature 5. Magazines About Cyberpunk and Related Topics 6. Cyberpunk in Visual Media (Movies and TV) 7. Blade Runner 8. Cyberpunk Music / Dress / Aftershave 9. What is "PGP" ? 10. Agrippa : What and Where, is it ? 1. What is Cyberpunk, the Literary Movement ? Gardner Dozois, one of the editors of Isaac Asimov's Science Fiction Magazine during the early '80s, is generally acknowledged as the first person to popularize the term "Cyberpunk", when describing a body of literature. Dozois doesn't claim to have coined the term; he says he picked it up "on the street somewhere". It is probably no coincidence that Bruce Bethke wrote a short story titled "Cyberpunk" in 1980 and submitted it Asimov's mag, when Dozois may have been doing first readings, and got it published in Amazing in 1983, when Dozois was editor of1983 Year's Best SF and would be expected to be reading the major SF magazines.
    [Show full text]
  • The Disappearing Human: Gnostic Dreams in a Transhumanist World
    religions Article The Disappearing Human: Gnostic Dreams in a Transhumanist World Jeffrey C. Pugh Department of Religious Studies, Elon University, Elon, NC 27244-2020, USA; [email protected] Academic Editor: Noreen Herzfeld Received: 25 January 2017; Accepted: 18 April 2017; Published: 3 May 2017 Abstract: Transhumanism is dedicated to freeing humankind from the limitations of biological life, creating new bodies that will carry us into the future. In seeking freedom from the constraints of nature, it resembles ancient Gnosticism, but complicates the question of what the human being is. In contrast to the perspective that we are our brains, I argue that human consciousness and subjectivity originate from complex interactions between the body and the surrounding environment. These qualities emerge from a distinct set of structural couplings embodied within multiple organ systems and the multiplicity of connections within the brain. These connections take on different forms, including structural, chemical, and electrical manifestations within the totality of the human body. This embodiment suggests that human consciousness, and the intricate levels of experience that accompany it, cannot be replicated in non-organic forms such as computers or synaptic implants without a significant loss to human identity. The Gnostic desire to escape our embodiment found in transhumanism carries the danger of dissolving the human being. Keywords: Singularity; transhumanism; Merleau-Ponty; Kurzweil; Gnosticism; AI; emergence; technology 1. Introduction In 1993, the mathematician and science fiction writer Vernor Vinge gave a talk at the Vision 21 symposium sponsored by NASA introducing the idea of the Singularity, an evolutionary moment when we would create the capacity for superhuman intelligence that would transcend the human and take us into the posthuman world (Vinge 1993).
    [Show full text]
  • The Virtual Worlds of Japanese Cyberpunk
    arts Article New Spaces for Old Motifs? The Virtual Worlds of Japanese Cyberpunk Denis Taillandier College of International Relations, Ritsumeikan University, Kyoto 603-8577, Japan; aelfi[email protected] Received: 3 July 2018; Accepted: 2 October 2018; Published: 5 October 2018 Abstract: North-American cyberpunk’s recurrent use of high-tech Japan as “the default setting for the future,” has generated a Japonism reframed in technological terms. While the renewed representations of techno-Orientalism have received scholarly attention, little has been said about literary Japanese science fiction. This paper attempts to discuss the transnational construction of Japanese cyberpunk through Masaki Goro’s¯ Venus City (V¯ınasu Shiti, 1992) and Tobi Hirotaka’s Angels of the Forsaken Garden series (Haien no tenshi, 2002–). Elaborating on Tatsumi’s concept of synchronicity, it focuses on the intertextual dynamics that underlie the shaping of those texts to shed light on Japanese cyberpunk’s (dis)connections to techno-Orientalism as well as on the relationships between literary works, virtual worlds and reality. Keywords: Japanese science fiction; cyberpunk; techno-Orientalism; Masaki Goro;¯ Tobi Hirotaka; virtual worlds; intertextuality 1. Introduction: Cyberpunk and Techno-Orientalism While the inversion is not a very original one, looking into Japanese cyberpunk in a transnational context first calls for a brief dive into cyberpunk Japan. Anglo-American pioneers of the genre, quite evidently William Gibson, but also Pat Cadigan or Bruce Sterling, have extensively used high-tech, hyper-consumerist Japan as a motif or a setting for their works, so that Japan became in the mid 1980s the very exemplification of the future, or to borrow Gibson’s (2001, p.
    [Show full text]
  • The Machineries of Uncivilization: Technology and the Gendered Body
    The Machineries of Uncivilization: Technology and the Gendered Body in the Fiction of Margaret Atwood and William Gibson by Annette Lapointe A thesis submitted to the Faculty of Graduate Studies of The University of Manitoba in partial fulfillment of the requirements of the degree of DOCTOR OF PHILOSOPHY Department of English, Film, and Theatre University of Manitoba Winnipeg Copyright © 2010 by Annette Lapointe For Patricia Lapointe reader, teacher, literary guide my mom Table of Contents Acknowledgements iv Abstract v Introduction Factory Girl @ the Crossroads 1 Chapter 1 Cyborg Pathology: Infection, Pollution, and Material Femininity in Tesseracts 2 15 Chapter 2 Girls on Film: Photography, Pornography, and the Politics of Reproduction 56 Chapter 3 Meat Puppets: Cyber Sex Work, Artificial Intelligence, and Feminine Existence 96 Chapter 4 Manic Pixie Dream Girls: Viral Femininity, Virtual Clones, and the Process of Embodiment 138 Chapter 5 Woman Gave Names to All the Animals: Food, Fauna, and Anorexia 178 Chapter 6 The Machineries of Uncivilization: Gender, Disability, and Cyborg Identity 219 Conclusion New Maps for These Territories 257 Works Cited 265 iii Acknowledgements Many thanks to Dr. Mark Libin, my dissertation adviser, for all of his guidance in both my research and my writing. Dr Arlene Young guided me to a number of important nineteenth century texts on gender and technology. My foray into disability studies was assisted by Dr. Nancy Hansen and by Nadine Legier. melanie brannagan-frederiksen gave me insight into the writings of Walter Benjamin. Patricia Lapointe read every draft, provided a sounding board and offered a range of alternate perspectives. The Histories of the Body Research Group guided me through to literary and non-literary approaches to body studies.
    [Show full text]
  • "The Infinite Plasticity of the Digital"
    "The Infinite Plasticity of the Digital" http://reconstruction.eserver.org/043/leaver.htm Ever since William Gibson coined the term "cyberspace" in his debut novel Neuromancer , his work has been seen by many as a yardstick for postmodern and, more recently, posthuman possibilities. This article critically examines Gibson's second trilogy ( Virtual Light , Idoru and All Tomorrow's Parties ), focusing on the way digital technologies and identity intersect and interact, with particular emphasis on the role of embodiment. Using the work of Donna Haraway, Judith Butler and N. Katherine Hayles, it is argued that while William Gibson's second trilogy is infused with posthuman possibilities, the role of embodiment is not relegated to one choice among many. Rather the specific materiality of individual existence is presented as both desirable and ultimately necessary to a complete existence, even in a posthuman present or future. "The Infinite Plasticity of the Digital": Posthuman Possibilities, Embodiment and Technology in William Gibson's Interstitial Trilogy Tama Leaver Communications technologies and biotechnologies are the crucial tools recrafting our bodies. --- Donna Haraway, "A Cyborg Manifesto" She is a voice, a face, familiar to millions. She is a sea of code ... Her audience knows that she does not walk among them; that she is media, purely. And that is a large part of her appeal. --- William Gibson, All Tomorrow's Parties <1> In the many, varied academic responses to William Gibson's archetypal cyberpunk novel Neuromancer , the most contested site of meaning has been Gibson's re-deployment of the human body. Feminist critic Veronica Hollinger, for example, argued that Gibson's use of cyborg characters championed the "interface of the human and the machine, radically decentring the human body, the sacred icon of the essential self," thereby disrupting the modernist and humanist dichotomy of human and technology, and associated dualisms of nature/culture, mind/body, and thus the gendered binarism of male/female (33).
    [Show full text]
  • Cyberspace Operations
    Updated December 15, 2020 Defense Primer: Cyberspace Operations Overview force; (2) compete and deter in cyberspace; (3) strengthen The Department of Defense (DOD) defines cyberspace as a alliances and attract new partnerships; (4) reform the global domain within the information environment department; and (5) cultivate talent. consisting of the interdependent network of information technology infrastructures and resident data, including the Three operational concepts identified in the DOD Cyber internet, telecommunications networks, computer systems, Strategy are to conduct cyberspace operations to collect and embedded processors and controllers. The DOD intelligence and prepare military cyber capabilities to be Information Network (DODIN) is a global infrastructure used in the event of crisis or conflict, and to defend forward carrying DOD, national security, and related intelligence to disrupt or halt malicious cyber activity at its source, community information and intelligence. including activity that falls below the level of armed conflict. Defending forward may involve a more aggressive Cyberspace operations are composed of the military, active defense, meaning activities designed to disrupt an intelligence, and ordinary business operations of the DOD adversary’s network when hostile activity is suspected. in and through cyberspace. Military cyberspace operations use cyberspace capabilities to create effects that support Cyber Mission Force operations across the physical domains and cyberspace. DOD began to build a Cyber Mission Force (CMF) in 2012 Cyberspace operations differ from information operations to carry out DOD’s cyber missions. The CMF consists of (IO), which are specifically concerned with the use of 133 teams that are organized to meet DOD’s three cyber information-related capabilities during military operations missions.
    [Show full text]
  • The Cyberspace Concept Cyberpunk: the Idea William Gibson Computer
    Cyberpunk: The Idea Term coined in by Bruce Bethke The Cyberspace Concept punk part reflects streetwise attitude Tone tends to be dark, cynical Immersion in computer generated, shared worlds is a key theme Social Informatics Other themes Alteration of human bodies, genes Thomas Haigh Popular culture, music, media power Week 10 Critical of corporate power Often romantic, rebellious Social Informatics - Cyberspace 1 Social Informatics - Cyberspace 2 William Gibson Computer Technology in SF Creates idea of cyberspace Common by mid-1950s Best known in novel Necromancer, 1984 Futuristic technology lags history Early appearance in short story “Burning Chrome” Big, expensive, central computers Science fiction writer then living in Used mostly for mathematics Canada Nobody much predicts No particular knowledge of computers Personal computer Writes Neuromancer & earlier stories on manual typewriter Microchips, miniaturization Imagines technology in very visual, Interactive graphics impressionistic kind of way Main extrapolation is artificial intelligence Vivid, spatial, seedy (film noir influence) Often arrives spontaneously Social Informatics - Cyberspace 3 Social Informatics - Cyberspace 4 Networking: Science Fiction Gibson’s Cyberspace Famously defined as “consensual hallucination” for Little realistic treatment pre-1980 exchange of data Very much like real space John Brunner, Shockwave Rider, 1975 invents idea of computer “worm” Big mainframes are like skyscrapers Valuable data is protected Vernor Vinge, “True
    [Show full text]
  • Defining Cyberspace (Finding Real Virtue in the Place of Virtual Reality)
    Defining Cyberspace (Finding Real Virtue in the Place of Virtual Reality) Thomas C. Folsom* The law has neither defined cyberspace nor its values. As a result, the attempt to apply legal rules of “ordinary” space to cyberspace fails to address either the ordinary or the extraordinary features of the new space. This Article proposes that cyberspace be defined as an embodied switched network for moving information traffic, further characterized by degrees of access, navigation, information-activity, augmentation (and trust). Legal conflicts, whether sounding in contract, trademark, copyright, personal jurisdiction, choice of law, or some other basis, occasionally occur in an objective cyberspace whose values can be sufficiently operationalized for legal analysis. If cyberspace were so defined, the law could better respond to new technological uses. I. INTRODUCTION ................................................................................... 77 A. Preliminary Note on Law and Technology .............................. 78 B. Preliminary Note on Modern Moral Realism.......................... 79 II. CYBERSPACE AND THE INTERNET ....................................................... 80 A. The Internet as a Gateway to Cyberspace................................ 81 B. Cyberspace as an Activity Set .................................................. 84 1. Access ............................................................................... 87 2. Navigation......................................................................... 88 3. Information-Activity
    [Show full text]
  • Mapping Notions of Cyberspace
    MAPPING NOTIONS OF CYBERSPACE: OPTIMISM, SKEPTICISM, AND THE ISSUES OF IDENTITY AND SPIRITUALITY A thesis presented to the faculty of the College of Communication of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Putut Widjanarko June 2005 This thesis entitled MAPPING NOTIONS OF CYBERSPACE: OPTIMISM, SKEPTICISM, AND THE ISSUES OF IDENTITY AND SPIRITUALITY BY PUTUT WIDJANARKO has been approved for the School of Telecommunications and the College of Communication by Drew McDaniel Professor of Telecommunications Greg Shepherd Interim Dean, College of Communication WIDJANARKO, PUTUT. M.A. June 2005. Telecommunications Mapping Notions of Cyberspace: Optimism, Skepticism, and the Issues of Identities and Spirituality (151 pp.) Director of Thesis: Drew McDaniel This is a literature survey on concepts of the Internet and cyberspace and their influence, both on society at large and at the individual level. On society, it discusses the optimistic and skeptic views on the impact of the Internet. At the personal level, it discusses issues of self and identity, and spirituality and religiosity. Except for spirituality and religiosity issues of the Internet, this work chose one author to represent each category: Howard Rheingold for the optimistic view, Clifford Stoll for the skeptic view, and Sherry Turkle for the issues of self and identity. The author’s critiques on those notions are offered in the last chapter. The author argues that the diversity of notions on the Internet can be put in a broader historical and social context. These notions reflect the ever-present questions about the relationship between human and its technologies. Approved: Drew McDaniel Professor of Telecommunications To Elin, Faikar, Hanum and Ranti ACKNOWLEDGEMENTS Praise be to Allah, the Cherisher and Sustainer of the Worlds.
    [Show full text]
  • Staša Sever Prostheses, Cyborgs and Cyberspace – the Cyberpunk Trinity 2
    DOI: 10.4312/elope.10.2.83-93 Staša Sever University of Ljubljana Faculty of Arts, Slovenia Prostheses, Cyborgs and Cyberspace – the Cyberpunk Trinity Summary This article will explore three elements that have collectively become the sine qua non of our lives: prostheses, cyborgs and cyberspace. The main concern of the article is to show the close connection between the technology-saturated reality of today and the literature of cyberpunk as the prototypical representative of merging the human and the technological. This will enable us to explore the interaction between literature and reality in the formation of the cyborg of today. Key words: prostheses, cyberspace, cyborg, cyberpunk, literature Proteze, kiborgi in kiberprostor – kiberpankovska trojica Povzetek V članku bom raziskovala tri elemente, ki zaznamujejo naše današnje življenje: proteze, kiborgi in kiberprostor. Osrednja tema je pokazati povezavo med s tehnologijo prežeto realnostjo današnjega časa in literaturo kiberpanka, ki predstavlja prototip stapljanja človeka s tehnologijo. To nam bo omogočilo raziskavo interakcije med književnostjo in resničnostjo pri oblikovanju kiborga sedanjosti. Ključne besede: proteze, kiberprostor, kiborg, kiberpank, literatura UDK 82 – 312.9.09:004:316.728 LITERATURE 83 Prostheses, Cyborgs and Cyberspace – the Cyberpunk Trinity 1. Introduction Today we are surrounded by numerous technologies that span all levels of our lives. The hardware, the software and the growing speed of data transfer, all packed into the perpetually shrinking form of screens and keyboards, which create our daily reality, have gradually evolved into extensions of our bodies – they are our prostheses that define our lives as cyborgs in the world of cyberspace data streams surrounding us.1 As N.
    [Show full text]
  • Practices of Place-Making Through Locative Media Artworks1
    AUTHOR’S COPY | AUTORENEXEMPLAR Practices of place-making through locative media artworks1 GEMMA SAN CORNELIO and ELISENDA ARDE´ VOL E-Mails: [email protected]; [email protected] Abstract In recent years, the vast increase in information flows has made it possible to instantly connect location-dependent information with physical spaces. These technologies have provided new forms of the representation of space as much as new forms of perception through tools and techniques used in land surveying, remote sensing, etc. From a critical point of view, pervasive computing, location-based applications, or, in other words, “locative me- dia” provide an interesting framework to understand how these technol- ogies relate to our understanding of space and place. Concretely, we want to examine how the uses of locative media in social-oriented artworks in- teract with people’s sense of place. This article therefore discusses contem- porary theories on space related to media and technology with a specific focus on the conceptualization of the notion of place. It also relates these theories to the study of different locative media artworks: Canal Accessible (2006), Bio Mapping (2004), Disappearing Places (2007), and Coffee Deposits (2010). We contend that locative media artworks act upon dis- tinctive ways to understand the mediation of technology in current place- making practices. Keywords: locative media, digital art, place, space, cartography, place- making, new media, visual ethnography Locative media and art practices The term “locative media” usually refers to media technologies that in- volve location; thus providing a link or some information related to a specific place via devices such as GPS, mobile phones, PDAs, laptops and applications of augmented reality.
    [Show full text]
  • Method for Effectiveness Assessment of Electronic Warfare Systems In
    S S symmetry Article Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace Seungcheol Choi 1, Oh-Jin Kwon 1,* , Haengrok Oh 2 and Dongkyoo Shin 3 1 Department of Electrical Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea; [email protected] 2 Agency for Defense Development (ADD), Seoul 05771, Korea; [email protected] 3 Department of Computer Engineering, Sejong University, 209 Neungdong-ro, Gwangjin-gu, Seoul 05006, Korea; [email protected] * Correspondence: [email protected] Received: 27 November 2020; Accepted: 16 December 2020; Published: 18 December 2020 Abstract: Current electronic warfare (EW) systems, along with the rapid development of information and communication technology, are essential elements in the modern battlefield associated with cyberspace. In this study, an efficient evaluation framework is proposed to assess the effectiveness of various types of EW systems that operate in cyberspace, which is recognized as an indispensable factor affecting modern military operations. The proposed method classifies EW systems into primary and sub-categories according to EWs’ types and identifies items for the measurement of the effectiveness of each EW system by considering the characteristics of cyberspace for evaluating the damage caused by cyberattacks. A scenario with an integrated EW system incorporating two or more different types of EW equipment is appropriately provided to confirm the effectiveness of the proposed framework in cyber electromagnetic warfare. The scenario explicates an example of assessing the effectiveness of EW systems under cyberattacks. Finally, the proposed method is demonstrated sufficiently by assessing the effectiveness of the EW systems using the scenario.
    [Show full text]