Tilburg University Breaking and Remaking Law and Technology Dizon
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Impact of the Maker Movement
Impact of the maker movement Developed by Deloitte Center for the Edge and Maker Media from the Maker Impact Summit Dec. 2013 I AM A MAKER with my own two hands I forge the future from my imagining my work, my sweat with these tools i can build worlds here i put wire and foam transistor and plastic rubber metal and wood together to make something new what does it do where will this take us new places new worlds all from my workshop Malcolm S. Hoover, 2014 TABLE OF CONTENTS A Future of Potential 4 Overview 7 Letters from Conveners 10 How to Read This Document 14 How might the Maker Movement have an impact on… 15 • Manufacturing 16 • Education 19 • Government and Public Policy 22 • Citizen Science 25 • Retail 28 What Happens Next? 30 Participants 32 Other Images from the Summit 38 A FUTURE OF POTENTIAL We are on the cusp of an opportunity to more fully We are in a correction of sorts. Driven by the goal of scale tap into our creative potential, driven by significant efficiencies and low costs, the supply chain has been technological innovation that is democratizing the means stretched to the far extremes, like a bungee cord, and now of production and enabling connections between resources it’s starting to come back as the underlying economics and markets. Realizing this opportunity will require change. Where will we end up? We’ve learned in the last re-thinking and redesigning all of our major institutions, 15 years that experimentation is the key to innovation. -
A Study of Android Application Security
A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania State University enck, octeau, mcdaniel, swarat @cse.psu.edu { } Abstract ingly desire it, markets are not in a position to provide security in more than a superficial way [30]. The lack of The fluidity of application markets complicate smart- a common definition for security and the volume of ap- phone security. Although recent efforts have shed light plications ensures that some malicious, questionable, and on particular security issues, there remains little insight vulnerable applications will find their way to market. into broader security characteristics of smartphone ap- In this paper, we broadly characterize the security of plications. This paper seeks to better understand smart- applications in the Android Market. In contrast to past phone application security by studying 1,100 popular studies with narrower foci, e.g., [14, 12], we consider a free Android applications. We introduce the ded decom- breadth of concerns including both dangerous functional- piler, which recovers Android application source code ity and vulnerabilities, and apply a wide range of analysis directly from its installation image. We design and exe- techniques. In this, we make two primary contributions: cute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered code. We design and implement a Dalvik decompilier, • Our analysis uncovered pervasive use/misuse of person- ded. ded recovers an application’s Java source al/phone identifiers, and deep penetration of advertising solely from its installation image by inferring lost and analytics networks. -
The Fuzzy Software Patent Debate Rages On
OPINION The Fuzzy Software Patent Debate Rages On By Heather J. Meeker LinuxInsider 02/23/05 5:00 AM PT Once upon a time, we intellectual property lawyers got to live peacefully in our ivory towers. Now it seems that intellectual property policy issues have become fraught with partisan rhetoric. Most open-source promoters are against software patents. Most corporate spokesmen side with patents, period, whether they cover software or not. But it is worth looking beyond the rhetoric. The European Commission recently tolled the death knell for the EU Software Patent Directive, or more precisely, the "Directive on the Patentability of Computer- Implemented Inventions." Like most Americans, I am fairly clueless about the EU political process, and I wouldn't presume to write about exactly how it was killed. But the decision may have been swayed by an eleventh-hour public relations pitch against the directive by open-source spokesmen from the United States. On that aspect, I will add my two cents. A delegation of open-source leaders, led by Linus Torvalds, published an "Appeal" at softwarepatents.com, calling software patents "dangerous to the economy at large, and particularly to the European economy." Look Beyond the Rhetoric Leaders of the open-source software movement have long been harsh critics of software patents. The GPL [license] itself says, "any free program is threatened constantly by software patents." The appeal contends that copyright provides adequate protection for the creations of software authors. The Appeal advocated reliance on copyright law, rather than patent law, for the protection of software. Not long afterward, in late January, the European Parliament's Legal Affairs Committee recommended scrapping the pending directive, extending the debate until at least the end From www.linuxinsider.com/story/40676.html 1 April 2011 of the year. -
Greek Society in Crisis and in Motion: Building the Material Bases for an Alternative Society from the Bottom up Georgia Bekridaki and Antonios Broumas
Interface: a journal for and about social movements Article Volume 9 (1): 230 – 255 (2017) Bekridaki and Broumas, Greek society in crisis Greek society in crisis and in motion: building the material bases for an alternative society from the bottom up Georgia Bekridaki and Antonios Broumas Abstract In the last six years, Greece has been hit by a vicious circle of relentless neoliberal restructuring programs. During the years of the crisis, throughout the country urban and rural communities of struggle have been formed, which tend to employ instituent practices and to acquire constitutive characteristics, in order to collectively address unmet social needs / desires and ensure their collective survival. In this context, socially reproductive commons in germ form have emerged with social and solidarity economy initiatives in their peripheries, alternative forms of life in common have been shaped and societies have been set in motion with the potential to establish the material foundations of their collective autonomy. Within this huge gap of social (re)production, the constituent power of social movements emerges in germ form as a resurgent force with the potential to address these needs and desires and, correspondingly, shape life in common. In the neoliberal era, it is this potential of a constituent counter - power that has the capacity to constitute the contending power to the dominant force of the capital - state complex. Keywords: Greece, social movements, mutual aid, commons, social and solidarity economy, constituent power. Introduction Greece is at the forefront of a social war raging throughout the south and, gradually spreading towards the north of Europe. On the one side, capital loots wealth and accumulates social power from vulnerable populations directly by dispossession of small property, public wealth and the commons and less by the traditional means of extracting value through exploitation (Harvey 2014: 65). -
Review/Of/The/Research/ Literature
Working/Paper/Series// SWPS/2014)08/ May,%2014% Community)based/digital/fabrica5on/ workshops:/A/review/of/the/research/ literature// Sabine/Hielscher// and/Adrian/Smith/ SPRU.Working.Paper.Series/ The/SPRU/Working/Paper/Series/aims/to/accelerate/the/public/availability/of/the/research/undertaken/ by/ SPRU)associated/ people/ of/ all/ categories,/ and/ excep5onally,/ other/ research/ that/ is/ of/ considerable/interest/within/SPRU./It/presents/research/results/that/in/whole/or/part/are/suitable/for/ submission/to/a/refereed/journal,/to/a/sponsor,/to/a/major/conference/or/to/the/editor/of/a/book./Our/ inten5on/is/to/provide/access/to/early/copies/of/SPRU/research./ Editors( Contact( Tommaso&Ciarli& [email protected]/ Daniele&Rotolo& [email protected]/ Associate(Editors& Area& Florian&Kern& Energy& [email protected]/ Paul&Nightingale&& Science,&&&Technology&Policy& [email protected]/ Matias&Ramirez& Development& [email protected]/ Joe&Tidd&&& Technology&Innovation&Management& [email protected]/ Carlos&Sato& [email protected]/ Maria&Savona&&& Economics&of&Technological&Change& [email protected]/ Mariana&Mazzucato& [email protected]/ Andrew&Stirling& Transitions& [email protected]/ Caitriona&McLeish& Civil&military&interface&& [email protected]/ Administrator( Jenny&Lieu& [email protected]/ Disclaimer/ The/works/available/here/are/the/responsibility/of/the/individual/author(s)/and/do/not/necessarily/ represent/the/views/of/other/SPRU/researchers./As/maLers/of/policy/and/prac5ce,/SPRU/does/not/ -
JULIAN ASSANGE: When Google Met Wikileaks
JULIAN ASSANGE JULIAN +OR Books Email Images Behind Google’s image as the over-friendly giant of global tech when.google.met.wikileaks.org Nobody wants to acknowledge that Google has grown big and bad. But it has. Schmidt’s tenure as CEO saw Google integrate with the shadiest of US power structures as it expanded into a geographically invasive megacorporation... Google is watching you when.google.met.wikileaks.org As Google enlarges its industrial surveillance cone to cover the majority of the world’s / WikiLeaks population... Google was accepting NSA money to the tune of... WHEN GOOGLE MET WIKILEAKS GOOGLE WHEN When Google Met WikiLeaks Google spends more on Washington lobbying than leading military contractors when.google.met.wikileaks.org WikiLeaks Search I’m Feeling Evil Google entered the lobbying rankings above military aerospace giant Lockheed Martin, with a total of $18.2 million spent in 2012. Boeing and Northrop Grumman also came below the tech… Transcript of secret meeting between Julian Assange and Google’s Eric Schmidt... wikileaks.org/Transcript-Meeting-Assange-Schmidt.html Assange: We wouldn’t mind a leak from Google, which would be, I think, probably all the Patriot Act requests... Schmidt: Which would be [whispers] illegal... Assange: Tell your general counsel to argue... Eric Schmidt and the State Department-Google nexus when.google.met.wikileaks.org It was at this point that I realized that Eric Schmidt might not have been an emissary of Google alone... the delegation was one part Google, three parts US foreign-policy establishment... We called the State Department front desk and told them that Julian Assange wanted to have a conversation with Hillary Clinton... -
Hackerspaces
d WP4 | CASE STUDY Report: Hackerspaces Theme [ssh.2013.3.2-1][Social Innovation- Empowering People, changing societies] Project Full Title: “Transformative Social Innovation Theory project” Grant Agreement n. 613169 This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 613169 Suggested citation: Sabine Hielscher, Adrian Smith, Mariano Fressoli (2015) WP4 Case Study Report: Hackerspaces, Report For the TRANSIT FP7 Project, SPRU, University oF Sussex, Brighton. Acknowledgements: We wish to thank everyone in the Hackerspace scene who helped us with our research, whether through interviews, welcoming us to Hackerspaces and events, or putting us in touch with others. We also thank our colleagues in the TRANSIT project, at SPRU, at UNQ and Fundación Cenit For their help and encouragement with the research. Finally, we thank the European Commission and their FP7 research programme For Funding the TRANSIT project. Date: 14 January 2015 Authors: Sabine Hielscher, Adrian Smith, Mariano Fressoli Contact person: Adrian Smith Table of contents 1 Introduction to Hackerspaces 2 Methodology 2.1 Researcher relations to the case 2.2 Methods 3 Analysis of transnational network(ing) 3.1 Transnational networking: Hackerspaces 3.2 Aspects of ‘innovation’ and ‘change’ of the transnational network(ing) 3.3 Aspects of empowerment and disempowerment of the transnational network(ing) 3.4 Other issues about the transnational networking 4 Local initiative -
Wikileaks Advisory Council
1 WikiLeaks Advisory Council 2 Hi everyone, My name is Tom Dalo and I am currently a senior at Fairfield. I am very excited to Be chairing the WikiLeaks Advisory Council committee this year. I would like to first introduce myself and tell you a little Bit about myself. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. First off, I have been involved with the Fairfield University Model United Nations Team since my freshman year when I was a co-chair on the Disarmament and International Security committee. My sophomore year, I had the privilege of Being Co- Secretary General for FUMUN and although it was a very time consuming event, it was truly one of the most rewarding experiences I have had at Fairfield. Last year I was the Co-Chair for the Fukushima National Disaster Committee along with Alli Scheetz, who filled in as chair for the committee as I was unaBle to attend the conference. Aside from my chairing this committee, I am currently FUMUN’s Vice- President. In addition to my involvement in the Model UN, I am a Tour Ambassador Manager, and a Beta Alpha Psi member. I love the outdoors and enjoy skiing, running, and golfing. I am from Allendale, NJ and I am currently majoring in Accounting and Finance. Some of you may wonder how I got involved with the Model United Nations considering that I am a business student majoring in Accounting and Finance. Model UN offers any student, regardless of their major, a chance to improve their puBlic speaking, enhance their critical thinking skills, communicate Better to others as well as gain exposure to current events. -
Coleman-Coding-Freedom.Pdf
Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it. -
Barefoot Into Cyberspace Adventures in Search of Techno-Utopia
Barefoot into Cyberspace Adventures in search of techno-Utopia By Becky Hogge July 2011 http://www,barefootintocyberspace.com Barefoot into Cyberspace Becky Hogge Read This First This text is distributed by Barefoot Publishing Limited under a Creative Commons Attribution-ShareAlike 2.0 UK: England & Wales Licence. That means: You are free to copy, distribute, display, and perform the work to make derivative works to make commercial use of the work Under the following conditions Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one. For any reuse or distribution, you must make clear to others the licence terms of this work. The best way to do this is with a link to http://barefootintocyberspace.com/book/hypertext Any of these conditions may be waived by seeking permission from Barefoot Publishing Limited. To contact Barefoot Publishing Limited, email barefootpublishing [AT] gmail [DOT] com. More information available at http://creativecommons.org/licenses/by- sa/2.0/uk/. See the end of this file for complete legalese 2 Barefoot into Cyberspace Becky Hogge Contents Prologue: Fierce Dancing ...................................................................................................................................... 5 Chapter 1: Digging the command line ............................................................................................................ -
WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A
WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A dissertation submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy with a Major in Criminal Justice August 2014 Committee Members: Brian L. Withrow, Chair Bob Edward Vásquez Jay D. Jamieson Matthew Draper Jose R. Agustina COPYRIGHT by Kevin W. Jennings 2014 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Kevin Jennings, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. DEDICATION To Hal Jennings, Judy Jennings, and Matthew Draper, for showing me the path. To Sara Jennings, for joining me on the journey. ACKNOWLEDGEMENTS This dissertation never would have been possible without the support of many people who have guided me and cheered me on throughout this process. Dr. Brian Withrow was an excellent chair, and Doctors Vasquez, Jamieson, Draper, and Agustina all did their part in making this paper possible. Thank you for helping me, but even more important, thank you for putting up with me. I also need to give a big thank you to my mentor Dr. Tomas Mijares, who could not be on my committee but helped and guided me throughout the process of learning, teaching, and growing at Texas State University. -
Patenting Software Is Wrong
Case Western Reserve Law Review Volume 58 Issue 2 Article 7 2007 Manuscript: You Can't Patent Software: Patenting Software is Wrong Peter D. Junger Follow this and additional works at: https://scholarlycommons.law.case.edu/caselrev Part of the Law Commons Recommended Citation Peter D. Junger, Manuscript: You Can't Patent Software: Patenting Software is Wrong, 58 Case W. Rsrv. L. Rev. 333 (2007) Available at: https://scholarlycommons.law.case.edu/caselrev/vol58/iss2/7 This Tribute is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Law Review by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. MANUSCRIPT* YOU CAN'T PATENT SOFTWARE: PATENTING SOFTWARE IS WRONG PeterD. Jungert INTRODUCTION Until the invention of programmable' digital computers around the time of World War II, no one had imagined-and probably no one could have imagined-that methods of solving mathematical . Editor'sNote: This article is the final known manuscript of Professor PeterJunger. We present this piece to you as a tribute to Professor Junger and for your own enjoyment. This piece was not, at the time of ProfessorJunger 's passing, submitted to any Law Review or legal journal.Accordingly, Case Western Reserve University Law Review is publishing this piece as it was last edited by Professor Junger, with the following exceptions: we have formatted the document for printing, and corrected obvious typographical errors. Footnotes have been updated to the best of our ability, but without Professor Junger's input, you may find some errors.