Rationale and Design for the Peace Box an Electronic Device for Your Home Or Office

Total Page:16

File Type:pdf, Size:1020Kb

Rationale and Design for the Peace Box an Electronic Device for Your Home Or Office Rationale and Design for the Peace Box An Electronic Device for your Home or Office A thesis submitted by Markus Sabadello, Austria, [email protected] to the European Peace University (EPU) – Private University Stadtschlaining/Burg, Austria in partial fulfillment of the requirements for a Master of Arts Degree in Peace and Conflict Studies 1/23/2012 This thesis offers a summary of different lines of thought on how Information and Communication Technologies (ICTs) can be used for promoting the ideal of peace, for example by helping to manage a crisis, by supporting development and education, by overcoming authoritaran regimes, or by promoting a global civil society and global culture of peace. After introducing these ideas, the concept of a „Peace Box“ is presented, which is a small computer-like device that can be set up in any home or office to provide applications and services for actively supporting the various visions of using ICTs for peace. Contents 1. Introduction .............................................................................................................................................. 1 1.1. ICTs for Peace .................................................................................................................................. 2 1.2. ICTs against Peace ......................................................................................................................... 4 2. Technological Considerations ............................................................................................................ 5 2.1. Properties of the Medium ........................................................................................................... 5 2.2. Network Architectures ................................................................................................................ 6 2.3. Digital Divide ................................................................................................................................... 9 3. ICTs for International Organizations and NGOs ...................................................................... 11 3.1. Development and Education .................................................................................................. 11 3.2. Crisis Management ..................................................................................................................... 12 4. ICTs for Revolutionary Movements .............................................................................................. 14 4.1. Censorship, Propaganda, and Oppression ......................................................................... 17 5. ICTs for a Global Civil Society ......................................................................................................... 20 5.1. Global Crisis ................................................................................................................................... 22 5.2. Global Civil Society ..................................................................................................................... 24 5.3. Surveillance, Manipulation, and the Need for Balance ................................................. 27 5.4. Personal Identity Online........................................................................................................... 30 5.5. Information Overload and Online Collectivism ............................................................... 34 6. ICTs for a Global Culture of Peace ................................................................................................. 38 6.1. Culture, Identity and Peace ..................................................................................................... 38 6.2. Cultural Diversity and Intercultural Dialogue ................................................................. 39 6.3. Toward a Culture of Peace ....................................................................................................... 41 6.4. Global Culture of Peace ............................................................................................................. 43 6.5. Cultural Violence, Conflicts, Imperialism, and Homogenization .............................. 45 6.6. Social and Cultural Identity Online ...................................................................................... 46 7. ICTs and Human Rights ..................................................................................................................... 49 7.1. Right to Access to Information .............................................................................................. 49 7.2. Right to Freedom of Expression ............................................................................................ 51 7.3. Right to Privacy ............................................................................................................................ 52 7.4. Right to Communicate ............................................................................................................... 53 8. The Peace Box ....................................................................................................................................... 55 8.1. Objectives ....................................................................................................................................... 55 8.2. Design .............................................................................................................................................. 56 8.3. Peace Network ............................................................................................................................. 57 8.4. Peace Apps ..................................................................................................................................... 59 9. Conclusion .............................................................................................................................................. 64 10. Bibliography .......................................................................................................................................... 67 1. Introduction The widespread availability of Information and Communication Technologies (ICTs) has led to the globalization process and continues to have a large influence on social, economic, political and cultural structures around the world. Much work has been done in the academia to get to a good scientific understanding of the causes, nature and consequences of today’s interconnected world, and to analyze both opportunities and threats that ICTs pose to humankind 1. In exploring opportunities for working toward a better world, the academic field of Peace and Conflict Studies with its inherent character of being based on concrete values rather than striving to always be objective on all accounts is especially suited and challenged to explore how ICTs should be judged and used when it comes to promoting an ideal – the ideal of peace. Many prominent statements exist which inspire thoughts about the potential of ICTs for promoting the interrelated concepts of peace, democracy, freedom, justice, and human rights. Already in 1993, media entrepreneur Rupert Murdoch noted that “Advances in the technology of telecommunications have proved an unambiguous threat to totalitarian regimes everywhere.” In 1999, George W. Bush asked us to “Imagine if the Internet took hold in China. Imagine how freedom would spread.” During the opening ceremony of the World Summit on the Information Society in Tunis in 2005 2, where the United Nations as well as a large number of other stakeholders worked on evaluating the opportunities and risks of the now ubiquitous information society, the then Secretary General of the United Nations Kofi Annan articulated the desire to use ICTs for working toward the ideal of peace, by declaring that “While most other conferences focus on global threats, this one will tell us how to best use a new global asset.” 1 For example, see (Castells, 2000) 2 http://www.itu.int/wsis/tunis/index.html 1 During the LeWeb conference in Paris in 2009, Queen Rania Al Abdullah of the Hashemite kingdom of Jordan said that “Digitizing ourselves has heightened our instinct to be selfless.” And United States Secretary of State Hillary Clinton stated in her much-regarded speech “Remarks on Internet Freedom” in 2010 that “Once you’re on the Internet, you don’t need to be a tycoon or a rock star to have a huge impact on society.” 3 The importance of ICTs for promoting peace is also reflected in the fact that the United Nations have started a number of organizations to explore this potential, e.g. the United Nations ICT Task Force 4, the United Nations Group on the Information Society (UNGIS)5, the Internet Governance Forum (IGF) 6, or the sector on Communication and Information 7 within the United Nations Educational, Scientific and Cultural Organization (UNESCO) . Indeed, ICTs can be used in numerous ways to promote a more just, democratic and peaceful world, however, they can also pose threats to democracy, peace, and human rights. This thesis is an attempt to give an overview of different lines of thought on how ICTs can be used both for and against peace, and to describe the vision of a specific piece of technology with the designated name “Peace Box”, which can be used to work toward the ideal of peace in various ways. 1.1. ICTs for Peace An online initiative started by the Italian version of Wired Magazine has successfully campaigned to nominate the Internet
Recommended publications
  • Linux Sound Subsystem Documentation Release 4.13.0-Rc4+
    Linux Sound Subsystem Documentation Release 4.13.0-rc4+ The kernel development community Sep 05, 2017 CONTENTS 1 ALSA Kernel API Documentation 1 1.1 The ALSA Driver API ............................................ 1 1.2 Writing an ALSA Driver ........................................... 89 2 Designs and Implementations 145 2.1 Standard ALSA Control Names ...................................... 145 2.2 ALSA PCM channel-mapping API ..................................... 147 2.3 ALSA Compress-Offload API ........................................ 149 2.4 ALSA PCM Timestamping ......................................... 152 2.5 ALSA Jack Controls ............................................. 155 2.6 Tracepoints in ALSA ............................................ 156 2.7 Proc Files of ALSA Drivers ......................................... 158 2.8 Notes on Power-Saving Mode ....................................... 161 2.9 Notes on Kernel OSS-Emulation ..................................... 161 2.10 OSS Sequencer Emulation on ALSA ................................... 165 3 ALSA SoC Layer 171 3.1 ALSA SoC Layer Overview ......................................... 171 3.2 ASoC Codec Class Driver ......................................... 172 3.3 ASoC Digital Audio Interface (DAI) .................................... 174 3.4 Dynamic Audio Power Management for Portable Devices ...................... 175 3.5 ASoC Platform Driver ............................................ 180 3.6 ASoC Machine Driver ............................................ 181 3.7 Audio Pops
    [Show full text]
  • Investigating Choices of Appropriate Devices for One-To-One Computing Initiatives in Schools Worldwide
    International Journal of Information and Education Technology, Vol. 6, No. 10, October 2016 Investigating Choices of Appropriate Devices for One-to-One Computing Initiatives in Schools Worldwide M. Sirajul Islam and Annika Andersson schools should be governed by “creating an environment in Abstract—The use of technology in schools is rapidly which the child will become highly involved in experience of increasing – today most notably through the one-to-one (1:1) a kind to provide rich soil for the growth in intuitions and programs that are being implemented all around the world. concepts for dealing with thinking, learning, playing, and so Considering how new technologies are emerging fast and obsoleting others in schools, there is a need to continuously on” [5]. In this direction, one of the first practical initiatives monitor and understand the features of various devices in terms on implementing constructionist learning for children with of embedded technology and interaction with users. This paper computers was the development of programming language therefore presents the nature of computing devices used in 1:1 called „Logo‟ in 1967. Following such initiatives, Alan C. computing programs in schools around the world, including Kay, who was closely associated with Papert for promoting investigating the benefits and drawbacks, by means of a and implementing computer based educational constructivism, systematic literature review and a survey conducted in some schools in Sweden. The paper also presents findings based on developed a laptop computer for children in 1970 based on how the various uses of technology affect cooperation practices the sketches of the KiddiComp called „Daynabook‟ as well as personal exploration.
    [Show full text]
  • Marvell ARMADA™ 16X Plug Computer Development
    Cover Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Doc. No. MV-S400320-00, Rev. - December 2010 Marvell. Moving Forward Faster Marvell® ARMADA™ 16x Plug Computer Development Kit User Manual Document Conventions Note: Provides related information or information of special importance. Caution: Indicates potential damage to hardware or software, or loss of data. Warning: Indicates a risk of personal injury. Document Status Doc Status: Preliminary Technical Publication: x.xx For more information, visit our website at: www.marvell.com Disclaimer No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose, without the express written permission of Marvell. Marvell retains the right to make changes to this document at any time, without notice. Marvell makes no warranty of any kind, expressed or implied, with regard to any information contained in this document, including, but not limited to, the implied warranties of merchantability or fitness for any particular purpose. Further, Marvell does not warrant the accuracy or completeness of the information, text, graphics, or other items contained within this document. Marvell products are not designed for use in life-support equipment or applications that would cause a life-threatening situation if any such products failed. Do not use Marvell products in these types of equipment or applications. With respect to the products described herein, the user or recipient, in the absence of appropriate U.S. government authorization, agrees: 1) Not to re-export or release any such information consisting of technology, software or source code controlled for national security reasons by the U.S.
    [Show full text]
  • Meet the Eee PC
    Chapter 1 Meet the Eee PC In This Chapter ▶ Not your average laptop ▶ Popular Eee PC misconceptions ▶ Reviewing Eee PC models ▶ Selecting an Eee PC ▶ Purchasing an Eee PC his chapter introduces you to the ASUS Eee PC. (Eee PC is pronounced Twith a single E, not multiple EEEs, as in “Eeek, a mouse!”) If you’re won- dering where all those Es came from, it’s from a marketing campaign that states the computer is “Easy to learn, easy to work, and easy to play.” In this chapter, I tell you what the Eee PC is — and just as important, what it isn’t. I then list available models, describe their specifications, and conclude by giving you tips on selecting and purchasing an Eee PC. Eee PC: Not Your Average Laptop The Eee PC (see Figure 1-1) has been called a mini-laptop, a subnotebook, a Mobile Internet Device (MID), and a netbook (a catchy marketing buzzword for small, Internet-centric laptops). Whatever you call it, the Eee PC is a shrunk- down, lightweightCOPYRIGHTED laptop that has these keyMATERIAL features: ✓ Small — At just a bit over two pounds and roughly the size of this book, the 7-inch and 8.9-inch screen models are designed to be go-anywhere, do-anything personal computers. To fit in such a small package, keys on the Eee PC are smaller than those found on a typical laptop keyboard — right around 83 percent of normal. After you get used to the small size it’s possible to touch type with some practice.
    [Show full text]
  • ICT & Education Specialist the World Bank
    People and Technology in World Class Education Systems News, perspectives and challenges from developing countries Michael Trucano Sr. ICT & Education Specialist The World Bank EMINENT Rome, Italy 4 December 2008 drawing on Lessons from the World Bank and the International Donor Community What we know and what we don’t about using technology in education in developing countries What we know and what we don’t about using technology effectively in education in developing countries (and how might this be relevant for Europe) ? “I believe that the Internet is destined to revolutionize our educational system and that in a few years it will supplant largely, if not entirely, the use of textbooks. It is possible to touch every branch of human knowledge through the Internet . “ I believe that the motion picture is destined to revolutionize our educational system and that in a few years it will supplant largely, if not entirely, the use of textbooks. It is possible to touch every branch of human knowledge through the motion picture . -- Thomas Edison 1922 ICTs in Education ICTS radio computers = information TV & Internet communication phones technologies devices photo opportunities or strategic choices for education reform ? Michael Trucano Sr. ICT & Education Specialist The World Bank helping the World Bank education sector and international donor community and ‘client countries’ “Get smart” @ appropriate relevant effective and, just as importantly… in appropriate ir relevant in effective uses of technologies to aid a variety of developmental objectives in the education sector What is the World Bank ? a global development institution owned by > 180 member countries with: – significant financial resources – an experienced, knowledgeable, and dedicated staff – convening power – experts in more than 100 countries.
    [Show full text]
  • Leo2012f2linux.Pdf
    1 2 Table of contents Title Page Chapter I - History of Linux…...............................................................5 GNU/Linux naming controversy...........................................9 Open Source and Linux Foundation....................................10 BSD License.......................................................................16 Costs.................................................................................18 Chapter II - Linux a multiuser system..................................................21 TTYs.................................................................................23. Group management..........................................................26 Virtual Machines...............................................................30 Chapter III - Installation and applications.............................................35 Linux Installation.............................................................36 Linux Distributions..........................................................37 Installation of applications...............................................42 Window managers and desktop environments..................47 Program equivalents........................................................51 3 Chapter IV – Connecting to Linux....................................................57 About Hardware..........................................................58 Connecting a device to the PC......................................60 Hardware compatibility and recognition.......................61 The kernel...................................................................64
    [Show full text]
  • The Charisma of One Laptop Per Child's XO Laptop in Paraguay
    Preprint copy - to appear in: Eden Medina, Ivan da Costa Marques, and Christina Holmes (eds.), Beyond Imported Magic: Essays on Science, Technology, and Society in Latin America. MIT Press, 2014. 10 Translating Magic: The Charisma of One Laptop per Child’s XO Laptop in Paraguay Morgan G. Ames In April 2008 liberal candidate Fernando Lugo won the Paraguayan presidency with 41 percent of the vote. It was the first time Paraguay’s conservative Colorado party had relinquished power in sixty-one years and one of the few peaceful transfers of power between parties in the country’s nearly two-hundred-year history (Nickson 2009). Known by his supporters as the “Bishop of the Poor” for his humanitarian service as a Catholic priest in one of Paraguay’s poorest districts, Lugo centered his campaign on reducing the nation’s bleak social inequalities and widespread corruption (Economist 2008; Nickson 2009). Lugo’s messages of hope and reform lasted beyond his election. During my fieldwork in 2010, many told me about their newfound hopes for Paraguay’s future on the 369 Preprint copy - to appear in: Eden Medina, Ivan da Costa Marques, and Christina Holmes (eds.), Beyond Imported Magic: Essays on Science, Technology, and Society in Latin America. MIT Press, 2014. world stage, even as Lugo became embroiled in scandal and faltered in implementing the dramatic changes he had promised (Economist 2009; Prensa Internacional 2009). Also in 2008, two elite, well-connected Paraguayans, both fresh out of college (one from Tufts University in Massachusetts, one from the Catholic University in Asunción), took up the banner of hope and steered it toward education.
    [Show full text]
  • The Impact on Formal Learning in Primary School Education Authors
    One Year of One-to-one Computing in Sri Lanka – The Impact on Formal Learning in Primary School Education Authors: 1) Peter Mozelius1 2) Kalelur Rahuman2 3) G. N. Wikramanayake2 Affiliation: 1) Stockholm University, Sweden 2) University of Colombo, School of Computing, Sri Lanka Abstract: One-to-one computing has lately become a frequently used buzzword in the discussions on e-learning in primary education. The main idea in one-to-one computing is to provide every student with a personal computer. This has often been combined with Internet access and the idea to share content but not to share the computers. Some examples of low-cost laptop brands produced for one-to-one computing are Intel Classmate, Asus Eee PC and the One Laptop Per Child (OLPC) XO computer. Different versions of one-to-one computing concept have recently been implemented in the developing world as well as in several developing countries. This study will focus on the Sri Lankan OLPC initiative and data has been gathered from three selected primary schools. In the Sri Lankan OLPC model there is no focus on Internet connectivity and the emphasis is on content development in local languages. Schools chosen in this first one year pilot project are to be classified as to be “the poorest of the poor” and located in rural areas. The research question in this paper is, if and why the introduction of one-to-one computing has had an impact on the formal learning outcomes. Our measurements of the impact on the formal education results are based on data from the selected schools’ grading registries, but the general analysis and conclusions are also based on observations and interviews with teachers and school principals.
    [Show full text]
  • The OLPC XO, Intel Classmate PC and Asus Eee PC User Study
    The OLPC XO, Intel Classmate PC and Asus Eee PC user study Submitted in partial fulfilment Of the requirements of the degree of Bachelor of Science (Honours) Of Rhodes University Constance Sibanda Grahamstown, South Africa November 2009 i Abstract Information communication technologies (ICTs) are increasingly considered valuable tools in education, promoting higher cognitive processes and allowing teachers and learners access to a wealth of information. However, these technologies are not easily accessible in developing countries such as South Africa, where a large percentage of the population are poor and are said to live below the breadline. The recent creation of small, low cost and low powered laptops called netbooks, are seen as possible solutions to allow or promote the use and integration of ICTs in education in these disadvantaged communities. This project evaluates the intuitiveness of the OLPC XO, the Intel Classmate and the Asus Eee PC in the context of secondary school education through the use of a user study. The user study involved three teachers and three learners from local secondary schools in Grahamstown. The results of the user study revealed that the teachers and learners (on the whole) felt that the Intel Classmate is the most intuitive netbook for secondary school learners involved in the user study. The presence of the VGA port and the portable nature of the Asus Eee were noted by participants as advantageous. The Asus Eee was also found to be appropriate for secondary school education although it was criticised for its small screen, small keyboard and absence of a webcam. Participants felt that the OLPC XO is less intuitive for secondary school educational purposes and is better suited for small children.
    [Show full text]
  • Pen Testing with Pwn Plug
    toolsmith ISSA Journal | March 2012 Pen Testing with Pwn Plug By Russ McRee – ISSA Senior Member, Puget Sound (Seattle), USA Chapter Prerequisites one who owns a Sheevaplug: “Pwn Plug Community Edition does not include the web-based Plug UI, 3G/GSM support, Sheevaplug1 NAC/802.1x bypass.” 4GB SD card (needed for installation) For those of you interested in a review of the remaining fea- tures exclusive to commercial versions, I’ll post it to my blog Dedicated to the memory of Tareq Saade 1983-2012: on the heels of this column’s publishing. Dave provided me with a few insights including the Pwn This flesh and bone Plug’s most common use cases: Is just the way that we are tied in But there’s no one home • Remote, low-cost pen testing: penetration test cus- I grieve for you –Peter Gabriel tomers save on travel expenses; service providers save on travel time. • Penetration tests with a focus on physical security and s you likely know by now given toolsmith’s position social engineering. at the back of the ISSA Journal, March’s theme is • Data leakage/exfiltration testing: using a variety of co- A Advanced Threat Concepts and Cyberwarfare. Well, vert channels, the Pwn Plug is able to tunnel through dear reader, for your pwntastic reading pleasure I have just many IDS/IPS solutions and application-aware fire- the topic for you. The Pwn Plug can be considered an ad- walls undetected. vanced threat and useful in tactics that certainly resemble Information security training: the Pwn Plug touches cyberwarfare methodology.
    [Show full text]
  • Plugcomputer
    Fakultat¨ Informatik Institut f ¨urTechnische Informatik, Professur f ¨urVLSI-Entwurfssysteme, Diagnostik und Architektur PLUGCOMPUTER Alte Idee, Neuer Ansatz Thomas Gartner¨ Dresden, 14.7.2010 Ubersicht¨ Motivation Alte Idee: NSLU2 Neuer Ansatz: PlugComputer Quellen TU Dresden, 14.7.2010 PlugComputer Folie 2 von 24 Motivation Problemstellung Wie kann ich meine personlichen¨ Daten und Dateien moglichst¨ effizient, f ¨urmich und ausgewahlte¨ Personen, ¨uberallund immer verf ¨ugbarmachen? • Soziale Netzwerke • Hostingdienste wie z.B. Flickr, Google Suite, YouTube . • Server anmieten Probleme: • Daten ¨ubergabean Dritte • Dienste wegen ihrer Große¨ f ¨urAngreifer attraktiv TU Dresden, 14.7.2010 PlugComputer Folie 3 von 24 Motivation Losungsansatz¨ Idee: Eigener Server im eigenen, sicheren Netz das inzwischen meistens ohnehin standig¨ mit dem Internet verbunden ist. Vorteile: • Beschrankter¨ physikalischer Zugang f ¨urDritte • Voll anpassbar Nachteile: • Konfigurationsaufwand • Energieverbrauch • Larm¨ • Verantwortung f ¨urdie eigenen Daten TU Dresden, 14.7.2010 PlugComputer Folie 4 von 24 Motivation Losungsansatz¨ TU Dresden, 14.7.2010 PlugComputer Folie 5 von 24 Alte Idee: NSLU2 Allgemein Mit dem Network Storage Link von Linksys konnen¨ Sie die Speicherkapazitat¨ Ihres Netzwerks schnell und einfach um viele Gigabyte erweitern. Dieses kleine Netzwerkgerat¨ verbindet USB2.0-Festplatten direkt mit Ihrem Ethernet- Netzwerk. [Lina] TU Dresden, 14.7.2010 PlugComputer Folie 6 von 24 Alte Idee: NSLU2 Außen • 130 mm x 21 mm x 91 mm • 1x 10/100-RJ-45-Ethernet-Port • 2x USB 2.0-Port • 1x Stromanschluss TU Dresden, 14.7.2010 PlugComputer Folie 7 von 24 Alte Idee: NSLU2 Innen • Intel IXP420 (ARMv5TE) • 133 MHz, spater¨ 266 MHz • 8 MB Flash • 32 MB SDRAM TU Dresden, 14.7.2010 PlugComputer Folie 8 von 24 Alte Idee: NSLU2 Modifikationen • NSLU2 Firmware basiert auf Linux! • Ersetzbar durch Debian, OpenWrt, SlugOS .
    [Show full text]
  • Sharp MM10 (Mini) Laptop OLPC XO-1 Sylvania G Netbook ASUS
    Sharp MM10 (mini) OLPC XO-1 Sylvania g NetBook ASUS eeePC XBurst Alpha 400 laptop (1005HAB) Architecture x86 (i686) x86 (i586) x86 (i686) x86 (i686) MIPS CPU 1 GHz TransMeta 433 MHz AMD 1.2 GHz VIA C7 1.66 GHz Intel Atom 400 MHz Ingenic Crusoe TM5800 Geode N270 JZ4730 RISC (SoC) Memory 256 MB 256 MB 1 GB 1 GB 128 MB Chipset ALi AMD VIA Intel JZ4730 BIOS / Bootloader Phoenix BIOS 1024KiB SPI- Phoenix BIOS AMI BIOS U-Boot 1.1.6 interface flash ROM (OpenFirmWare) Installed OS Win2K Fedora-based Sugar gOS WinXP Ingenic (Skytone) Desktop embedded Linux (2.4.20 kernel) Recommended OS Gentoo / UNR 9.1.0 DebXO, Ubuntu Gentoo on a VIA C7 Gentoo / UNR 9.1.0 Retro-OS, 3MX 4.0, or Intrepid for the XO, Netbook / UNR 9.1.0 vendor OS GentooXO Storage 30 GB, 3600 rpm, 1 GB NAND Flash 30 GB, 3600 rpm, 160 GB, 2.5" SATA 1 GB NAND Flash 1.8" Hard Drive (with 1 GB ro 1.8" Hard Drive Hard Drive backup) WLAN Prism 2.5 802.11b Marvell Libertas RealTek RTL8187 Atheros AR9285 Atheros ZD1211B (miniPCI) 88W8388 802.11b/g (USB) 802.11 b/g/n (PCI- 802.11b/g (USB) WLAN, 802.11s Express) Mesh Ethernet RealTek 8139 None RealTek 8139 Atheros AR8132 JZ4730 10/01/00 10/100 10/100 10/100/1000 (Gigabit) USB Two Type-A USB 2.0 Three Type-A USB Three Type-A USB Three Type-A USB Three Type-A USB 2.0 2.0, up to 1Amp 2.0 2.0 power supplied (total) Graphics Silicon Motion, Inc.
    [Show full text]