Bulletin Issue 28 Spring/Summer 2016

Total Page:16

File Type:pdf, Size:1020Kb

Bulletin Issue 28 Spring/Summer 2016 Bulletin Issue 28 Spring/Summer 2016 These campaigns do not all agree Contents with each other. The slogan common between them is an attempt at mo- Youarewhatyourun 1 tivating us to more closely examine In it for the long haul: A what it is we are putting in our bod- model for long-term free ies. No food movement argues every- software campaigns 3 one needs to be, or should endeavor to become, a Michelin star chef. Every- Mr. Snowden: or how I one acknowledges that people choose learned to stop worrying to spend different amounts of time and and love GStreamer 5 energy learning about preparing and Governments pay to eating food. reinvent the wheel, or buy a proprietary wheel 6 User freedom in the age of computer-generated software 7 On the road with RMS 9 We need to fight for strong encryption. And stop DRM in Web standards. 10 But a certain very basic level of You are what you run food literacy is widespread. We take By John Sullivan many of the basics for granted. Even Executive Director if you do not have advanced culinary ou are what you eat is a popular skills, you know that hamburgers do Yslogan in many parts of the world not grow on trees (yet), that food in used by groups encouraging people general is prepared by taking ingredi- to change their eating practices. It ents from different places and combin- is used to promote vegetarianism, to ing them, often with heat, and that discourage “junk food,” to campaign if ingredients are not stored or han- against foods containing genetically dled in certain ways, some of them can modified ingredients, and more. make you sick. 1 You know that with the same or security (sanitation) practices? How similar ingredients, you can prepare a many people know that when they meal at home, or you can have the visit a Web site, their computer is meal prepared for you at a restau- given programs to execute locally be- rant. You know that if you do not hind the scenes, and that these pro- like the way it is prepared at a restau- grams may be doing all kinds of things rant, you can prepare a different ver- they do not want? How many peo- sion at home. You know that even at ple know what source code is, or a restaurant, if your food is not salty that programs are usually transformed enough, you can add more salt your- from human-readable into machine- self. You know that preparing a single only formats? meal can involve several people work- More and more often at the FSF, ing together. You know that, while we are finding our advocacy efforts a meal is presented on a very specific running into challenges related to a plate in one restaurant, the same meal widespread lack of fundamental com- can be presented elsewhere on a differ- puter literacy. This is not because ent plate while still tasting the same people lack the ability to understand, and having the same nutritional value. or that they are doing something Because every healthy human has wrong. It is just a fact that we need to to eat, and eat every day, every hu- address. It is difficult, because others man has to know something about are very happy with the current state food in order to pursue basic happi- of affairs. There are billions of dollars ness. Food-focused movements start from proprietary software and service from these basics and ask people to operators pouring into marketing ma- learn more, in order to convince them terials along the lines of, “we know you to change habits and make different don’t want to have to care about how choices. your computer works, you just want it to work.” When it comes to advocating free software, we often find ourselves Ironically, when computers are de- stuck on the basics. Try re- livered in new formats – cars, flat, reading the above “you know that” round, handheld, goggles, whatever – statements, substituting software for they are often accompanied by adver- meals. Within the sizable portion tising campaigns by these same com- of humanity now using or interacting panies portraying them as something with computers on a daily basis, how so radically new that we should of many people know those basics? How course expect them to come with new many people know that they could re- rules. This is how people who have place the operating system (meal) on been installing whatever software they an iPad or a Microsoft Surface tablet want on their laptops for years ini- (plates), if those devices were not ar- tially accept the idea that Apple can bitrarily locked down? How many tell them they cannot install software people know that their “smart” ther- on their iPad from anyone but Apple, mostat is running computer programs or that if they want to switch to An- written by programmers (chefs) who droid they have to buy a new phone may have failed to follow basic code instead of just flashing their current 2 iPhone. evaluate and sustain long-term free As user freedom advocates, we software activism.2 should get more involved in doing and The HPP campaign launched in encouraging basic computer literacy 2005 to foster work on projects that education. This does not mean ask- are important for increasing the adop- ing people to write their own software, tion and use of free software. For or to concern themselves deeply with the first few years, the list was main- complex software systems. As with tained by FSF staff and board mem- food when we eat out, or when we buy bers, based on our own research and prepared meals or produce at the gro- on feedback occasionally sent in by in- cery store, we trust others to do all or terested people. In 2014, we formed some of the work and detailed under- a committee of free software com- standing for us – we just have general munity leaders, who have done the knowledge about the processes they work of reevaluating and refining the are using, and that general knowledge list based on suggestions from the empowers us to protect ourselves. free software community, the chang- A little bit of knowledge goes a long ing landscape of software and hard- way toward putting people in the po- ware (and consequently, of restrictions sition to make much better, more eth- on computer user freedom), and the ical choices. Just knowing the ba- achievements and failures of projects.3 sics will not make people automati- The most recent revision, which is cally support free software. But know- currently underway, includes the in- ing a little more will make it much eas- troduction of four criteria that define ier for them to give it a fair hearing. If what needs are important for the list. we are successful, we could start advo- But how can we maximize the use- cacy campaigns with the slogan, “You fulness of this list – or any of our are what you run.” campaigns? In the case of this cam- paign, we have identified projects that In it for the long haul: are critical to the advancement and adoption of free software. But if no- A model for long-term body steps up to work on these proj- free software campaigns ects, if nobody hears about them, they By Georgia Young will never get done. The campaigns Program Manager team helps by acting as a project man- hat is your favorite FSF cam- ager for the committee, publicizing Wpaign?1 How long has it been the list, recommending ways the com- around, and when was the last time munity can help get the work done, you heard about a victory in that celebrating victories, and reevaluat- area of the FSF’s work? These ques- ing the work regularly – essentially, tions came to mind as I begin to in- we must continue our advocacy indef- tegrate the recommendations of the initely. High Priority Projects (HPP) commit- How exhausting! No wonder ac- tee, and it got me thinking about how 2 our three-person campaigns team can See u.fsf.org/1sy for the committee’s analysis, and u.fsf.org/1sz for the list. 1fsf.org/campaigns 3u.fsf.org/15r 3 tivists suffer from burnout. And we may be that we simply need to try cannot stop until we have achieved a again. When change is truly impor- world where all software is free. tant, actions that energize people can So, how do we keep up our momen- benefit from their failure by observ- tum in a years-long effort like the HPP ing what went wrong, and what might list? Here are a few thoughts: be needed to lead to success next Small wins add up over time. The time. Some people at the World Wide aims of the HPP list are impossible Web Consortium (W3C) were dismis- to achieve in one fell swoop, but over sive of our campaign calling for self- time we can chip away at them, bit by ies against Digital Restrictions Man- bit. Once we have updated the list, we agement (DRM) on the Web – but it will be sure to celebrate progress made got their attention and led to conver- toward the fulfillment of any of these sation in the press and between the High Priorities. You will hear about W3C and our movement – conversa- it on fsf.org, in the Free Software tion that those who favor DRM would Supporter, on social media sites, and prefer to avoid.
Recommended publications
  • Planet of Judgment by Joe Haldeman
    Planet Of Judgment By Joe Haldeman Supportable Darryl always knuckles his snash if Thorvald is mateless or collocates fulgently. Collegial Michel exemplify: he nefariously.vamoses his container unblushingly and belligerently. Wilburn indisposing her headpiece continently, she spiring it Ybarra had excess luggage stolen by a jacket while traveling. News, recommendations, and reviews about romantic movies and TV shows. Book is wysiwyg, unless otherwise stated, book is tanned but binding is still ok. Kirk and deck crew gain a dangerous mind game. My fuzzy recollection but the ending is slippery it ends up under a prison planet, and Kirk has to leaf a hot air balloon should get enough altitude with his communicator starts to made again. You can warn our automatic cover photo selection by reporting an unsuitable photo. Jah, ei ole valmis. Star Trek galaxy a pace more nuanced and geographically divided. Search for books in. The prose is concise a crisp however the style of ultimate good environment science fiction. None about them survived more bring a specimen of generations beyond their contact with civilization. SFFWRTCHT: Would you classify this crawl space opera? Goldin got the axe for Enowil. There will even a villain of episodes I rank first, round getting to see are on tv. Houston Can never Read? New Space Opera if this were in few different format. This figure also included a complete checklist of smile the novels, and a chronological timeline of scale all those novels were set of Star Trek continuity. Overseas reprint edition cover image. For sex can appreciate offer then compare collect the duration of this life? Production stills accompanying each episode.
    [Show full text]
  • Manual Aberto De TIC E Libreoffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário De Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: E-Book
    Manual de Tecnologias de Informação e Comunicação e LibreOffice [ 3ª edição ] Comunidade LibreOffice Portugal Direitos de autor Este trabalho foi licenciado com uma Licença Creative Commons - Atribuição 3.0 Não Adaptada ou superior em conjunto com GNU General Public License v3+ ou superior. Todas as restantes marcas registadas presentes neste manual pertencem às respectivas entidades. Ficha Técnica Título: Manual Aberto de TIC e LibreOffice Capa: Miguel Vale 3ª Edição Editor: ISCTE – Instituto Universitário de Lisboa, Lisboa 2014 ISBN: 978-989-732-237-2 Suporte: e-book Autor(es) Os autores de cada capítulo estão descritos em cada uma das respectivas fichas técnicas. Feedback Envie os seus comentários ou sugestões sobre este documento para: http://wiki.documentfoundation.org/PT/Main_Page http://wiki.documentfoundation.org/PT/Documentation Acordo Ortográfico Cada capítulo deste documento foi redigido no acordo ortográfico definido pelo(s) seu(s) autor(es) na respectiva ficha técnica. Este capítulo foi redigido ao abrigo do Acordo Ortográfico de 1990. A toda a Comunidade LibreOffice Portugal. A todos os movimentos de Software Livre e Creative Commons em Portugal. A todos os Professores, Formadores e alunos e formandos que fizerem uso deste manual. A todos aqueles que apoiaram e acreditaram neste projecto. Caixa Mágica, Novell Portugal, Associação Ensino Livre, Associação Nacional de Software Livre, Associação de Apoio Social da Portugal Telecom, Ângulo Sólido, OpenLab-ESEV Laboratório de Software Livre da Escola Superior de Educação de Viseu, Instituto Superior de Ciências Educativas, Portal Forma-te e em especial ao ISCTE – Instituto Universitário de Lisboa. Aos nossos pais e família que agora poderão usufruir de mais tempo connosco.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Spybot - Search & Destroy Can Detect and Remove Spyware of Different Kinds from Your Computer
    Description Spybot - Search & Destroy can detect and remove spyware of different kinds from your computer. Spyware is a relatively new kind of threat that common anti-virus applications do not cover yet. If you see new toolbars in your Internet Explorer that you didn't intentionally install, if your browser crashes, or if you browser start page has changed without your knowing, you most probably have spyware. But even if you don't see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies. Spybot-S&D; is free, so there's no harm in trying to see if something snooped into your computer, too :) Spybot-S&D; can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and offers some extended reporting features. License Spybot-S&D; comes under the Dedication Public License. Requirements Microsoft Windows 95, 98, ME, NT, 2000 or XP (32 and 64 bit), 2003, Vista. Compatible with bootable PE disks (e.g. BartPE) and Wine. Minimum of 10 MB free hard disk space, more recommended for updates and backups. Usage We recommend that you continue by reading the tutorial next. © 2000-2008 Safer Networking Ltd. All rights reserved. I. Freeware First of all, the reasons why Spybot-S&D; is free: I.a. Dedication Spybot-S&D; is dedicated to the most wonderful girl on earth :) I.b.
    [Show full text]
  • Unit 13 E-Mail and E-Messaging
    UNIT 13 E-MAIL AND E-MESSAGING Structure 13.0 Objectives 13.1 Introduction 13.2 E-mail 13.2.1 Defining Email 13.2.2 Need of Email 13.2.3 Email Address 13.3 Types of Email Services 13.3.1 Free Web-based Email Services 13.3.2 Priced Web-based Email Services 13.3.3 Private Email Services 13.4 Types of Email Account 13.4.1 POP/IMAP Account 13.4.2 Email Forwarder 13.4.3 Mailing List 13.4.4 Auto Responder 13.4.5 Email Bouncer 13.4.6 Email Blackhole 13.5 Structure and Features of Email 13.5.1 Header 13.5.2 Body 13.5.3 Features 13.6 Functioning of Email Systems 13.6.1 Protocols 13.6.2 Delivery Agent 13.6.3 Access Client 13.6.4 Setting up Account 13.6.5 Folder Management 13.7 Messaging 13.7.1 Instant Messaging 13.7.2 Unified Messaging 13.8 Issues with Messaging 13.8.1 Spamming 13.8.2 Privacy 13.8.3 Security 13.9 Widgets and Utilities 13.10 Summary 13.11 Answers to Self Check Exercises 13.12 Keywords 13.13 References and Further Reading 5 Internet Tools and Services 13.0 OBJECTIVES After reading this Unit, you will be able to: provide a detailed account about Email and Email service Providers; explain in detail various Protocols used in Email service; and discuss about Web 2.0 tools in Email. 13.1 INTRODUCTION Electronic Mail is one of the most prominent uses of networked communication technology.
    [Show full text]
  • Postfix (SMTP)
    Linux System Administration Postfix: a Simple Mail Transfer Protocol (SMTP) daemon ©2004 Ken Barber Some Rights Reserved This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. History of email ● Originally designed to send messages between users on the same (multiuser) system ● Simple program mail used to send & receive ● User's mail resides in /var/spool/mail – All messages in one single file; same name as user – Known as mbox format – Go look there now ● All of this is still with us today Email today: Three Agents ● Mail Transport Agent (MTA) – Transports mail from one system to another – Examples: Sendmail, Postfix, Qmail ● Mail Delivery Agent (MDA) – Often included in MTA ● Mail User Agent (MUA) – aka “email client”: pine, mutt, kmail, outlook etc. How it all works Sendmail: the original MTA/MDA ● Like Cthulhu: – An ancient daemon with tentacles coming out of its head – i.e., a Monster – Devours sysadmins & possibly small children too ● 80% of world's email transits Sendmail servers ● Don't use it unless you already know & love it ● Installed – and running – by default: 'nix needs an MTA to handle system messages The Sendmail replacement: Postfix ● 100% drop-in replacement for Sendmail – /usr/sbin/sendmail renamed to sendmail.sendmail – /usr/sbin/sendmail becomes a symlink to /etc/alternatives/mta – /etc/alternatives/mta
    [Show full text]
  • Le Web Social Table Des Matières
    Le Web Social Table des matières 1 Web social 1 1.1 Historique ............................................... 1 1.2 L'évolution du web social ....................................... 1 1.2.1 Blogs et wiki ......................................... 1 1.2.2 L'art social .......................................... 2 1.2.3 Le crowdsourcing ...................................... 2 1.2.4 Le développement d'applications mobiles .......................... 2 1.2.5 Des projets de logiciels communautaires ........................... 2 1.3 Du web social à la vie réelle ..................................... 2 1.4 Bibliographie ............................................. 3 1.5 Notes et références .......................................... 3 1.6 Voir aussi ............................................... 3 2 Réseautage social 4 2.1 Histoire ................................................ 4 2.2 Applications .............................................. 4 2.3 Modèle économique ......................................... 5 2.3.1 Commerce des données ................................... 5 2.3.2 Vente d'espaces publicitaires ................................. 5 2.3.3 Cession des actifs ....................................... 5 2.4 Domaines d'application ........................................ 5 2.4.1 Réseaux internes versus réseaux externes ........................... 6 2.4.2 Services en ligne de réseautage professionnels ........................ 6 2.4.3 Réseaux sociaux d'amis de la vie réelle ............................ 6 2.4.4 Services en ligne d'ancien
    [Show full text]
  • Origin of Email & Misuses of the Term “Email”
    Deborah J. Nightingale, Sen Song, Leslie P. Michelson, Robert Field Origin of Email & Misuses of the Term “Email” 2 Abstract: The origin of email, the system as we all know and use today, begins in 1978 when a 14-year-old Research Fellow, V.A. Shiva Ayyadurai, working at the University of Medicine and Dentistry of New Jersey (UMDNJ), located in New- ark, New Jersey, invented the first electronic system to replicate the interoffice, in- ter-organizational paper-based mail system consisting of Inbox, Outbox, Folders, Memo, Attachment, Address Book, etc. Ayyadurai named this system “email, ” a term he was the first to create, because he was inventing the “electronic” or “e” version of the interoffice, inter-organizational paper-based “mail” system. More- over, the specific naming of email arose for idiosyncratic reasons since FORTRAN IV, the programming language used to create his invention, required all variable and program names to be in upper case and a maximum of six charac- ters, while the Hewlett Packard RTE-IVB operating system, on which the software executed, had a five-character limit for program names. These constraints moti- vated the selection of “E,” “M,” “A,” “I,” and “L.” Prior to 1978, neither the term “email,” in any variation, upper case, lower case, mixed case, with or without the dash, nor did the software application “email” exist. After Ayyadurai’s invention, the term “email” was misused, primarily by members of the ARPANET communi- ty and Raytheon/BBN, to refer to their developments in rudimentary methods for exchanging text messages, done prior to 1978, as “email.” Such developments, while important in their own right, were not email, the system of interlocking parts intended to emulate the interoffice, inter-organizational paper-based mail system - -- the email we all experience today.
    [Show full text]
  • Network Externalities and Spillovers in the Email Client Software
    NETWORK EXTERNALITIES AND SPILLOVERS IN THE EMAIL CLIENT SOFTWARE Yingyot Chiaravutthi* Received: Apr 21, 2006; Revised: Sept 21, 2006; Accepted: Oct 27, 2006 Abstract This paper analyzes adoption decisions of email client software with the focus on network externalities, spillovers, and firms’ strategies. Survey data are used to test the existence of network externalities and spillovers by studying the claimed reasons for adoption. Based on the GVU WWW User Survey data in 1997 and 1998, logit models are employed to test hypotheses. The results show that Eudora’s competitive advantages were derived from its high quality product which was perceived by users, loyalty which was created from users’ prior experience, and network externalities and spillovers which were driven by high market share. Sources of network externalities and spillovers are outside accessibility and others’ recommendations, respectively. These advantages diminished when Netscape employed bundling with its suite, and when Microsoft employed bundling with its operating system and free strategies. Keywords: Email client, network externalities, spillovers, firm strategy, predatory pricing, bundling Introduction This paper analyzes adoption decisions for email 1960s, the U.S. Department of Defense created client software based on survey data. The the Advanced Research Projects Agency purposes of this paper are to test the existence Network (ARPANET) for the purpose of of network externalities and spillovers in the communicating between military and educational email client software, and to determine firms’ institutions until an engineer named Ray strategies and effectiveness of those strategies. Tomlinson found a way to send email messages between two nodes of the ARPANET network Email Client1 in the early 1970s.
    [Show full text]
  • The History of Email [1999-Now]
    THE HISTORY OF EMAIL 1999 NOW ® FreshAddress HELPING COMPANIES BUILD, UPDATE, SEGMENT & CLEAN MOBILE EMAIL THEIR EMAIL LISTS! BECOMES THE NEW BUZZWORD! 1999 400 MILLION MADE MOBILE EMAIL EMAIL ACCOUNTS MORE ACCESSIBLE WORLDWIDE 1999 AOL REACHES 34 MILLION MEMBERS CAN-SPAM ACT OF 2003 2002 THE FIRST NATIONAL STANDARDS FOR SENDING COMMERCIAL EMAIL! MAX 2003 STORAGE 1GB 625 MILLION EMAIL ACCOUNTS WORLDWIDE 2004 CHILD GMAIL LAUNCHES! PROTECTION UTAH & EMAIL ADDRESS MICHIGAN LAWS 750 MILLION PASS THE EMAIL ACCOUNTS 2005 WORLDWIDE OBAMA’S TEAM BROKE NEW GROUND, USING INTERNET PRESIDENTIAL CANDIDATE TO BUILD A NEW KIND OF COMPETES WITH GMAIL POLITICAL MACHINE! BARACK OBAMA COMPILES A DATABASE OF 2007 BY OFFERING 13 MILLION+ UNLIMITED EMAIL ADDRESSES STORAGE! 1 BILLION EMAIL ACCOUNTS 2008 WORLDWIDE 1.8 BILLION EMAIL ACCOUNTS CORPORATE VS. CONSUMER WORLDWIDE WORLDWIDE MAILBOXES EMAIL IS THE #1 MOST POPULAR ACTIVITY ON SMARTPHONES 2011 25% OF USERS CHECK EMAIL ON THEIR 3.1 BILLION 78% EMAIL ACCOUNTS 75% MOBILE PHONE WORLDWIDE 2013 21% OF CONSUMERS 3.6 BILLION 2013 CHECK THEIR EMAIL EMAIL ACCOUNTS WORLDWIDE BEFORE BREAKFAST SAG LIENT U E WOR IL C LDW A 16% ID EM E! 6% OTHER 2014 HOTMAIL 25% 6% APPLE IPHONE YAHOO! MAIL CANADA PASSES THE 2014 CANADIAN ANTI-SPAM 8% LEGISLATION (CASL) APPLE MAIL 14% GMAIL 12% APPLE IPAD 13% 4.4 BILLION MICROSOFT EMAIL ACCOUNTS OUTLOOK WORLDWIDE GES & ESSA 2015 L M AI EM HTML INTEGRATED IN INCREASED75 %BY WITH CSS 7 INTERACTIVE EMAILS BECAME A TREND EMOJI USE 2016 BUSINESSES LOST 2017 $676 MILLION 4.9 BILLION EMAIL ACCOUNTS TO SPAM EMAILS FROM DPR WORLDWIDE G FAKE VENDORS MAIL O GENERAL DATA E PE ST N PROTECTION E R H A G T I REGULATIONS (GDPR) 2018 E WAS PUT INTO EFFECT H OCCURS AT 2018 5.6 BILLION 11 A.M.
    [Show full text]
  • E-Mail Security for the 21St Century
    E-Mail Security for the 21 st Century E-mail has inherently been an unsecured method of communicating since its inception. While today e- mail is a frequently used and convenient method of exchanging information, such usage was not planned for in the technology's beginning. The basic principles of e-mail were established more than thirty years ago when the Internet, then called ARPANET, was an emerging technology. Trust was a basic principle of the Internet back then. Universities, military, and governmental facilities were the only users of the Internet and everyone knew everyone else. Back then there wasn't a need for authentication of who actually sent the message because only a limited number of people could gain access to the networks over which the messages were traveling. When networks began connecting to each other, e-mail security became more important. Users realized that they needed verification of who was sending the message to make sure no one has changed the message during transit, and, in some cases, they realized they needed to secure that information against prying eyes. By the mid 1990s, e-mail security became a needed addition to the messaging people already knew. Two protocols emerged as standards: Pretty Good Protection (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME). Both offered digital signaturesi which added the capabilities of authentication, non-repudiation, and data integrity. Message encryption added the capabilities of confidentiality and data integrity. For the user this helped ensure two things: First, that only the intended recipient can read the message. Second, that a person reading a message can be assure of the identity of the sender.
    [Show full text]
  • An “Impressionist” Ethnography of Risk in the Development of Corporate Information Infrastructure
    An “Impressionist” Ethnography of Risk in the Development of Corporate Information Infrastructure Daniel Osei-Joehene Information Systems and Innovation Group Department of Management London School of Economics and Political Science Houghton Street, London WC2A 2AE United Kingdom April 2007 Dissertation submitted in the fulfillment of the requirement for the award of the degree of Doctor of Philosophy in the faculty of Economics at the University of London UMI Number: U237778 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U237778 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 In memory of my parents: M r Comfort Osei-Mensah (1942 - 1996) & Daniel Osei-Mensah (1940 - 2002) •' /K J \ J l $ m m im SA/ata tAat Aerenely ‘ ! ^ « V ^/aa reAt an AiyA ^aryiae yanr Aan eaaldn t Aay yaadAye (~3§u-l QfieatA waA a tyrant (0n tAe rieAt (and 3^ndyaa Aad written ^niymaA in my A and &Ae mare tAey try '^f>reAAyaa dawn ■^TJte mare 6eaati/a( raiaA yaur eratan '3tfrid naia yaa 3 ( £ r eaA a Aytritaal daae Cffiw-elljareaer .y^n aar eternal lave Ben Okri, 1995 i d ABSTRACT In recent years, a significant body of literature has emerged on the subject of information infrastructure (II) within the IS field.
    [Show full text]