2G 33 3G 33, 477 4G 33, 477 5G 33, 126 ABC 460–61 ABI Research 483 Absorption Costs 331, 339 Abstract Models 57 Access Fees 30

Total Page:16

File Type:pdf, Size:1020Kb

2G 33 3G 33, 477 4G 33, 477 5G 33, 126 ABC 460–61 ABI Research 483 Absorption Costs 331, 339 Abstract Models 57 Access Fees 30 Index 2G 33 agent-based modeling (ABM) 83 3G 33, 477 Aggarwal, S. 17 4G 33, 477 Ahlborn, C. 206 5G 33, 126 Airbnb 185, 187 Akamai 7, 29, 34, 348, 350 ABC 460–61 Albert, R. 82 ABI Research 483 Alcatel Lucent 221 absorption costs 331, 339 Alcouffe, A. 65 abstract models 57 Alcouffe, C. 65 access fees 301–2, 304 Algan, Y. 106, 109 access markets 3, 23, 46, 199–200 algorithmic selection 15–16, 395–7, 418–19 access networks 5, 18, 29, 32–3, 36, 38, 40, 43, business models 407–9 301, 312, 348–58 innovation–co-evolution–complexity Acquisti, A. 252, 256 perspective 401–3 across-platform parity agreements (APPAs) market phases and structures 403–7 183, 195–8, 205 operation model and functional typology activism 166–7, 171–2, 176, 249, 357 397–401 addiction 148 risk reduction 413–18 Adobe 185, 555 selected implications for traditional media Advanced Network Services (ANS) 539 markets 410–11 Advanced Research Project Agency (ARPA) social risks 411–13 533–5, 547 see also ARPANET Alibaba Tmall 556 advertising 15–16, 96, 165, 276, 426, 440, 443 Almunia, J. 194 see also marketing Altavista 190 and algorithmic selection 396, 400–402, 404, Amazon 23, 152, 165, 187, 192–4, 196–8, 271, 406, 409–11, 416 374, 385, 388, 397, 403–4, 406, 411, 446, auctions 388–91, 394, 409, 427, 435–8 452, 460–61, 466–7, 480, 483, 486, 491, and big data 516, 519, 522 519, 562 brief history of online advertising 426–30 Amazon Prime 40, 556 see also LoveFilm and business strategies 351, 365, 372–3, 381 Cloud Player 562 and competition law 186–7, 189–90, 206 FireTV 555 and converged video services 476, 485, Instant Video 555–6 489–91 Marketplace 184–5, 205 and copyright 236, 241 Mechanical Turk (MTurk) 93 and cultural economics 149, 156–7 America Online 27 display 257, 385, 403, 427–8, 434–5, 440, 464 Anderson, C. 486 and the Internet of Entertainment 556–7 Anderson, P. 68–9 and online news 444, 446, 448–51 Anderson, R. 262, 266–8, 277–8, 281 and online video entertainment 461, 464, Android 61, 91, 191, 482 466–7, 469–71 angel investors 306, 310, 317 and privacy 248–50, 255, 257 anticompetitive market structures 193, 196, quality 392–3 198, 201, 219, 232, 250, 257 and search engines 385–6, 388–93, 406, antitrust policies 13, 24, 40, 45, 47–9, 97, 200, 427–8, 435–40, 452 204, 213, 471 see also competition policies targeted 16, 156, 187, 190, 249, 275–6, 427, cases against Google 183, 189–94 429–34, 464, 516 antivirus software 267, 270 Aereo 556 Antonelli, C. 15 Agence France-Presse (AFP) 454–5 AOL 39, 65, 447, 451–2, 544 571 Johannes M. Bauer and Michael Latzer - 9780857939852 Downloaded from Elgar Online at 09/29/2021 04:58:50AM via free access 572 Handbook on the economics of the Internet Apache 96–7, 111–12, 544 bandwagon effects 3, 39, 147–8, 153, 214, 225, Apple 13–14, 165, 183, 196–8, 257, 271, 373, 539, 547 385, 503, 519–20, 555, 562–3 Bangladesh 172 App Store 236, 268, 444 Barabási, A.-L. 78 Apple TV 466, 486, 555 bargaining power 235–6, 254, 307, 336, 353, iCloud 562 355, 358, 365, 374–6, 410–11, 471 iPads 198, 444, 452, 454 barriers to entry see entry barriers iPhones 290, 444, 452, 503 Bartelsman, E.J. 137 iTunes Store 152, 373, 459, 461–2, 465–7, Bauer, J.M. 12, 14, 204 486, 555, 562 Bauer, S. 15, 39 Newsstand 452 Baumol, W.J. 147 application blindness 292, 294, 297, 299, 302– Baumol’s cost disease 147 4, 306–7, 309–10 Bavelas, A. 77 application innovation 288, 297–311 BBC 444, 446, 487, 556 application programming interface (API) 30, BBVA banking corporation 510 267, 366, 371, 380 Beinhocker, E. 59, 61 application service providers 25, 40, 42–4, 349 Belenzon, S. 106 appropriability 15, 102–4, 115, 323 Belgium 8–10, 449, 454 apps 11, 27, 30, 61, 124, 127, 236, 267–8, 444, Bell System 531–3, 547 450, 452, 454, 486, 511, 515, 519, 557, Belleflamme, P. 519 560–61, 563 Benkler, Y. 12, 49, 104–6, 545 Argentesi, E. 189 Bergemann, D. 433–4 Argentina 192 Bermejo, F. 175 Argenton, C. 194 Berners-Lee, T. 27, 75–6 Aristotle 166 Besen, S.M. 14 Arnback, A. 275 Bessen, J.E. 102 Arora, A. 279 Bettig, R.V. 175 ARPANET 25, 28, 64, 66, 213, 426, 533–8, Bhuiyan, A.J.M. Shafiul Alam 172 544, 547 big data 16–17, 73, 381, 395–7, 416, 484–5 Arrested Development 481 definitions 510–13 Arrow, K. 56 economic value of data 516–18 Arthur, W.B. 38, 61, 222 ecosystem 513–16 artificial intelligence 401, 513–14, 561 innovation and competition in 518–20 Asghari, H. 14 opportunities and challenges 520–23 Asia-Pacific Cooperation (APEC) 250, 258 Bijourama 195 ASPNET 97 bilateral agreements 346–7 Associated Press 455 Bing 185, 189, 191, 373, 398, 408, 410 asymmetric information 247, 250–51, 253, 258, Bioderma 195 264–5, 271, 278–80, 336, 371–2, 375, 419 Bitcoin 496 AT&T 200, 216, 348, 350, 427, 480, 531–3, 537, BitTorrent 43, 46, 202, 459, 555 542, 547, 556 Black September 555 Athey, S. 433–4, 438–9 Blizzard-Activision 501 AtomFilm 555 blocking 201–3, 299–301 auction sites 3, 365–6 see also eBay Blogger 307, 309, 444 Australia 8–10, 255, 357, 451 blogs 326, 371, 379, 447, 450–52, 455 Austria 8–10 Bloomberg 445 avatars 497, 505 Bloomreach 515 Axelrod, R. 83 Bluetooth 33 Ayata 514 Blu-ray 460, 467, 483 see also DVDs Böhme, R. 269 Bachlechner, D. 269 Bolt, Beranek and Newman (BBN) 534 Baidu 190, 398, 404 Bonatti, A. 433–4 Bakos, Y. 464, 466 Bonneau, J. 254 Baldwin, C. 99, 104, 328 Booking.com 185–6, 194, 198 Ball, P. 57 Bork, R.H. 192, 206 Johannes M. Bauer and Michael Latzer - 9780857939852 Downloaded from Elgar Online at 09/29/2021 04:58:50AM via free access Index ­573 Bosch Siemens Home Appliances (BSH) 195–6 and online news 443, 447 Boston Consulting Group Hacker Survey 106 and online video entertainment 470 botnets 273–4, 277 and search engines 388–9 bottlenecks 43, 46, 48, 193, 202, 277, 411 taxonomy of 372–4 Bouchaert, J. 254 and virtual economies 495 bounded rationality 57, 252, 258, 415 walled garden 26–7, 477, 555, 558 Bowen, W.G. 147 business strategies 365–9, 396 Bowman, W. 202 and business models 367–9 Boxee 555 for converged video services 476, 480–85, boyd, d. 512 491 Bracha, O. 192 core elements of 374–9 Bradley, C. 504 future of competition on the Internet 379–81 Brandenberger, A.M. 4 and the Internet of Entertainment 542 Brandes, U. 76–7 strategic properties of the Internet 370–72 brands 168, 196, 267, 271, 403, 446, 466, 480, Business.com 391 503, 563 see also individual brands business-to-administration (B2A) industries inter-brand competition 195–6 374 news 451–4, 456 business-to-business (B2B) industries 365–6, Braverman, H. 169 374, 416 Bravo, L.F. 200 business-to-consumer (B2C) industries 365–6, Bravo-Lillo, C. 270 374, 416 Brazil 120, 451 Buy 4 Less 205 Brecht, M. 269 Buzz 257 Bresnahan, T.F. 44, 68, 141, 339, 402 BuzzFeed 443 Brin, S. 388 Byrne, D.M. 126, 128, 141–2 British Telecom (BT) 487 broadband 5–6, 8, 11–12, 18, 24, 27–9, 32–3, cable TV 23, 28, 156, 206, 300, 349, 432–3, 446, 39–40, 42–3, 45–6, 137, 167, 202–3, 236, 461–2, 468–9, 475, 478, 481, 483, 485–6, 326, 347–50, 356, 450, 458–60, 463, 470, 488, 554, 556–7, 560 476, 480, 544, 547 Caillaud, B. 185–6 first-generation 27–9 Calo, M.R. 257 mobile 129, 326 see also mobile Internet Campbell, J. 257 ultra-broadband 27, 29 Canada 8–10, 172, 300–301, 450, 452 broadcasting 16, 23, 60, 127, 142, 147–8, 152, cannibalization 151, 380–81, 445 155, 170, 229, 231–2, 276, 349, 444–7, 450, capacity building 134, 265, 522 455, 465, 475, 477, 489, 556 capitalism 164, 166, 168, 173–6, 324 public service broadcasting 148, 446, 455 Cargill, C.F. 214–15 Broder, A. 81 Casadesus-Masanell, R. 339 Brown, I. 14, 47 Case, S. 544 Brynjolfsson, E. 124, 134, 336, 464, 466, 506 Cashin, J. 215–16 Buccirossi, P. 195, 205 Cashmore, P. 451 Buchholtz, S. 516 Cassandra 514 Buffet, W. 453, 543 Castronova, E. 16, 495, 504–5 Bureau of Economic Analysis (BEA) 129–31, Catchplay 482 133, 142 Cave, J. 256 Bureau of Labor Statistics (BLS) 129, 136 Cave, M. 46 Bush, R. 64 Caves, R.E. 149 business models 24–5, 34 CBS 165, 460–61, 465–9 of algorithmic selection 402, 407–9, 411, CCP 502 415, 418 cell phones 126, 129, 156, 232, 391, 503 see also and big data 511, 515–16, 519, 522 mobile Internet; smartphones and business strategies 366–70, 375, 377–9 Center for Applied Internet Data Analysis and converged video services 475–6 (CAIDA) 81 and copyright 232, 235–6 Center for Strategic and International Studies and cultural economics 155–7 (CSIS) 278 Johannes M. Bauer and Michael Latzer - 9780857939852 Downloaded from Elgar Online at 09/29/2021 04:58:50AM via free access 574 Handbook on the economics of the Internet Cerf, V.
Recommended publications
  • Wikipedia and Intermediary Immunity: Supporting Sturdy Crowd Systems for Producing Reliable Information Jacob Rogers Abstract
    THE YALE LAW JOURNAL FORUM O CTOBER 9 , 2017 Wikipedia and Intermediary Immunity: Supporting Sturdy Crowd Systems for Producing Reliable Information Jacob Rogers abstract. The problem of fake news impacts a massive online ecosystem of individuals and organizations creating, sharing, and disseminating content around the world. One effective ap- proach to addressing false information lies in monitoring such information through an active, engaged volunteer community. Wikipedia, as one of the largest online volunteer contributor communities, presents one example of this approach. This Essay argues that the existing legal framework protecting intermediary companies in the United States empowers the Wikipedia community to ensure that information is accurate and well-sourced. The Essay further argues that current legal efforts to weaken these protections, in response to the “fake news” problem, are likely to create perverse incentives that will harm volunteer engagement and confuse the public. Finally, the Essay offers suggestions for other intermediaries beyond Wikipedia to help monitor their content through user community engagement. introduction Wikipedia is well-known as a free online encyclopedia that covers nearly any topic, including both the popular and the incredibly obscure. It is also an encyclopedia that anyone can edit, an example of one of the largest crowd- sourced, user-generated content websites in the world. This user-generated model is supported by the Wikimedia Foundation, which relies on the robust intermediary liability immunity framework of U.S. law to allow the volunteer editor community to work independently. Volunteer engagement on Wikipedia provides an effective framework for combating fake news and false infor- mation. 358 wikipedia and intermediary immunity: supporting sturdy crowd systems for producing reliable information It is perhaps surprising that a project open to public editing could be highly reliable.
    [Show full text]
  • La Sécurité Informatique Edition Livres Pour Tous (
    La sécurité informatique Edition Livres pour tous (www.livrespourtous.com) PDF générés en utilisant l’atelier en source ouvert « mwlib ». Voir http://code.pediapress.com/ pour plus d’informations. PDF generated at: Sat, 13 Jul 2013 18:26:11 UTC Contenus Articles 1-Principes généraux 1 Sécurité de l'information 1 Sécurité des systèmes d'information 2 Insécurité du système d'information 12 Politique de sécurité du système d'information 17 Vulnérabilité (informatique) 21 Identité numérique (Internet) 24 2-Attaque, fraude, analyse et cryptanalyse 31 2.1-Application 32 Exploit (informatique) 32 Dépassement de tampon 34 Rétroingénierie 40 Shellcode 44 2.2-Réseau 47 Attaque de l'homme du milieu 47 Attaque de Mitnick 50 Attaque par rebond 54 Balayage de port 55 Attaque par déni de service 57 Empoisonnement du cache DNS 66 Pharming 69 Prise d'empreinte de la pile TCP/IP 70 Usurpation d'adresse IP 71 Wardriving 73 2.3-Système 74 Écran bleu de la mort 74 Fork bomb 82 2.4-Mot de passe 85 Attaque par dictionnaire 85 Attaque par force brute 87 2.5-Site web 90 Cross-site scripting 90 Défacement 93 2.6-Spam/Fishing 95 Bombardement Google 95 Fraude 4-1-9 99 Hameçonnage 102 2.7-Cloud Computing 106 Sécurité du cloud 106 3-Logiciel malveillant 114 Logiciel malveillant 114 Virus informatique 120 Ver informatique 125 Cheval de Troie (informatique) 129 Hacktool 131 Logiciel espion 132 Rootkit 134 Porte dérobée 145 Composeur (logiciel) 149 Charge utile 150 Fichier de test Eicar 151 Virus de boot 152 4-Concepts et mécanismes de sécurité 153 Authentification forte
    [Show full text]
  • Towards Active SEO 2
    JISTEM - Journal of Information Systems and Technology Management Revista de Gestão da Tecnologia e Sistemas de Informação Vol. 9, No. 3, Sept/Dec., 2012, pp. 443-458 ISSN online: 1807-1775 DOI: 10.4301/S1807-17752012000300001 TOWARDS ACTIVE SEO (SEARCH ENGINE OPTIMIZATION) 2.0 Charles-Victor Boutet (im memoriam) Luc Quoniam William Samuel Ravatua Smith South University Toulon-Var - Ingémédia, France ____________________________________________________________________________ ABSTRACT In the age of writable web, new skills and new practices are appearing. In an environment that allows everyone to communicate information globally, internet referencing (or SEO) is a strategic discipline that aims to generate visibility, internet traffic and a maximum exploitation of sites publications. Often misperceived as a fraud, SEO has evolved to be a facilitating tool for anyone who wishes to reference their website with search engines. In this article we show that it is possible to achieve the first rank in search results of keywords that are very competitive. We show methods that are quick, sustainable and legal; while applying the principles of active SEO 2.0. This article also clarifies some working functions of search engines, some advanced referencing techniques (that are completely ethical and legal) and we lay the foundations for an in depth reflection on the qualities and advantages of these techniques. Keywords: Active SEO, Search Engine Optimization, SEO 2.0, search engines 1. INTRODUCTION With the Web 2.0 era and writable internet, opportunities related to internet referencing have increased; everyone can easily create their virtual territory consisting of one to thousands of sites, and practically all 2.0 territories are designed to be participatory so anyone can write and promote their sites.
    [Show full text]
  • United States Court of Appeals for the SECOND CIRCUIT
    Case 18-396, Document 116, 08/30/2018, 2379414, Page1 of 28 18-396 IN THE United States Court of Appeals FOR THE SECOND CIRCUIT dMATTHEW HERRICK, Plaintiff-Appellant, —against— GRINDR LLC, KL GRINDR HOLDINGS INC., GRINDR HOLDING COMPANY, Defendants-Appellees. ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK BRIEF FOR AMICI CURIAE COMPUTER & COMMUNICATIONS INDUSTRY ASSOCIATION, MATCH GROUP, INC., GLASSDOOR, INC., AND INDEED, INC. IN SUPPORT OF DEFENDANTS-APPELLEES AMBIKA K. DORAN JAMES ROSENFELD ROBERT E. MILLER DAVIS WRIGHT TREMAINE LLP (attorney admission forthcoming) 1251 Avenue of the Americas, DAVIS WRIGHT TREMAINE LLP 21st Floor 1201 Third Avenue New York, New York 10020 Seattle, Washington 98101 (212) 489-8230 (206) 622-3150 Attorneys for Amici Curiae Computer & Communications Industry Association, Match Group, Inc., Glassdoor, Inc., and Indeed, Inc. Case 18-396, Document 116, 08/30/2018, 2379414, Page2 of 28 TABLE OF CONTENTS Page CORPORATE DISCLOSURE ............................................................................... 1 STATEMENT OF INTEREST ............................................................................... 1 INTRODUCTION .................................................................................................... 2 ARGUMENT ............................................................................................................ 3 A. Courts Have Interpreted Section 230 Broadly to Fulfill Its Twin Goals of Encouraging Free Speech and Self-Policing Objectionable
    [Show full text]
  • Lecture 18: CS 5306 / INFO 5306: Crowdsourcing and Human Computation Web Link Analysis (Wisdom of the Crowds) (Not Discussing)
    Lecture 18: CS 5306 / INFO 5306: Crowdsourcing and Human Computation Web Link Analysis (Wisdom of the Crowds) (Not Discussing) • Information retrieval (term weighting, vector space representation, inverted indexing, etc.) • Efficient web crawling • Efficient real-time retrieval Web Search: Prehistory • Crawl the Web, generate an index of all pages – Which pages? – What content of each page? – (Not discussing this) • Rank documents: – Based on the text content of a page • How many times does query appear? • How high up in page? – Based on display characteristics of the query • For example, is it in a heading, italicized, etc. Link Analysis: Prehistory • L. Katz. "A new status index derived from sociometric analysis“, Psychometrika 18(1), 39-43, March 1953. • Charles H. Hubbell. "An Input-Output Approach to Clique Identification“, Sociolmetry, 28, 377-399, 1965. • Eugene Garfield. Citation analysis as a tool in journal evaluation. Science 178, 1972. • G. Pinski and Francis Narin. "Citation influence for journal aggregates of scientific publications: Theory, with application to the literature of physics“, Information Processing and Management. 12, 1976. • Mark, D. M., "Network models in geomorphology," Modeling in Geomorphologic Systems, 1988 • T. Bray, “Measuring the Web”. Proceedings of the 5th Intl. WWW Conference, 1996. • Massimo Marchiori, “The quest for correct information on the Web: hyper search engines”, Computer Networks and ISDN Systems, 29: 8-13, September 1997, Pages 1225-1235. Hubs and Authorities • J. Kleinberg. “Authoritative
    [Show full text]
  • June 20Th Kirsch Also Proposed the Kirsch 1950, and a Full Scale Version Operator for Edge Detection Belatedly Appeared in 1958
    Turing left the project in 1948, Photographs That Changed the and Davies took over; the pilot World”. ACE, was completed in [May 10] June 20th Kirsch also proposed the Kirsch 1950, and a full scale version operator for edge detection belatedly appeared in 1958. which applies a mask rotated in John Ronald Womersely departed NPL in 45 degree increments to detect Womersley 1950 to join the British edge magnitudes. Tabulating Machine Company Born: 20 June 1907; (BTM), a forerunner of Morley, West Yorkshire, UK International Computers Limited (ICL) [Feb 18]. He Peter Thomas Died: March 7, 1958 recruited Andrew Booth [Feb 1] Womersley was appointed the who had developed the All Kirstein first superintendent of the Purpose Electronic Computer Born: June 20, 1933; Mathematics Division of the (APEXC) , and BTM's Hollerith Berlin, Germany National Physical Lab (NPL) at Electronic Computer (HEC 1; Teddington in 1944. One of his [June 16]) built by Raymond Kirstein is often called the father first tasks was to organize the ‘Dickie’ Bird based on Booth’s of the European Internet. He set building of a computer, which design became Britain’s first up the first ARPANET [Dec 5] Womersley named the mass-produced business network node at University Automatic Computing Engine computer. College London (UCL) in 1973 – (ACE), a callback to Babbage’s a link that travelled from the US Analytical Engine [Dec 23]. to Norway and then to Britain via trans-Atlantic telephone He travelled to US in 1945 on a Russell A. Kirsch lines. He also helped hook the fact-finding mission, where he ARPANET into SATNET, a learned about the ENIAC [Feb Born: June 20, 1929; satellite network that connected 15], Howard Aitken’s Harvard New York a number of European countries.
    [Show full text]
  • Corynne Mcsherry, Ph.D
    The Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce of the Committee on Energy and Commerce Joint Hearing: “Fostering a Healthier Internet to Protect Consumers” Statement of Corynne McSherry, Ph.D. Legal Director Electronic Frontier Foundation October 16, 2019 As Legal Director for the Electronic Frontier Foundation, I thank Chairman Pallone, Ranking Member Walden and Members of the Subcommittee on Communications and Technology and the Subcommittee on Consumer Protection and Commerce for the opportunity to share EFF’s views on how to create a healthier Internet and protect all of its users. EFF is a donor-funded nonprofit, with contributions from more than 30,000 dues-paying members from around the world forming the backbone of our financial support. The majority of EFF’s funding comes from ordinary individuals, and over 80% of that funding consists of donations under $10,000. We receive less than six and a half percent of our funding from corporate sponsors.1 For nearly 30 years, EFF has represented the interests of technology users both in court cases and in broader policy debates to help ensure that law and technology support our civil liberties. From that vantage point, we are well aware that online speech is not always pretty—sometimes it’s extremely ugly and causes real-world harm. The effects of this kind of speech are often disproportionately felt by communities for whom the Internet has also provided invaluable tools to organize, educate, and connect. Systemic discrimination does not disappear and can even be amplified online. Given the paucity and inadequacy of tools for users themselves to push back, it’s no surprise that many would look to Internet intermediaries to do more to limit such speech.
    [Show full text]
  • Google and the Digital Divide CHANDOS INTERNET SERIES
    Google and the Digital Divide CHANDOS INTERNET SERIES Chandos’ new series of books are aimed at all those individuals interested in the internet. They have been specially commissioned to provide the reader with an authoritative view of current thinking. If you would like a full listing of current and forthcoming titles, please visit our website www.chandospublishing.com or email [email protected] or telephone +44 (0) 1223 891358. New authors: we are always pleased to receive ideas for new titles; if you would like to write a book for Chandos, please contact Dr Glyn Jones on email [email protected] or telephone number +44 (0) 1993 848726. Bulk orders: some organisations buy a number of copies of our books. If you are interested in doing this, we would be pleased to discuss a discount. Please email [email protected] or telephone +44 (0) 1223 891358. Google and the Digital Divide The bias of online knowledge ELAD SEGEV Chandos Publishing Oxford • Cambridge • New Delhi Chandos Publishing TBAC Business Centre Avenue 4 Station Lane Witney Oxford OX28 4BN UK Tel: +44 (0) 1993 848726 Email: [email protected] www.chandospublishing.com Chandos Publishing is an imprint of Woodhead Publishing Limited Woodhead Publishing Limited Abington Hall Granta Park Great Abington Cambridge CB21 6AH UK www.woodheadpublishing.com First published in 2010 ISBN: 978 1 84334 565 7 © Elad Segev, 2010 British Library Cataloguing-in-Publication Data. A catalogue record for this book is available from the British Library. All rights reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the Publishers.
    [Show full text]
  • Building Secure and Reliable Systems
    Building Secure & Reliable Systems Best Practices for Designing, Implementing and Maintaining Systems Compliments of Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea & Adam Stubblefi eld Praise for Building Secure and Reliable Systems It is very hard to get practical advice on how to build and operate trustworthy infrastructure at the scale of billions of users. This book is the first to really capture the knowledge of some of the best security and reliability teams in the world, and while very few companies will need to operate at Google’s scale many engineers and operators can benefit from some of the hard-earned lessons on securing wide-flung distributed systems. This book is full of useful insights from cover to cover, and each example and anecdote is heavy with authenticity and the wisdom that comes from experimenting, failing and measuring real outcomes at scale. It is a must for anybody looking to build their systems the correct way from day one. —Alex Stamos, Director of the Stanford Internet Observatory and former CISO of Facebook and Yahoo This book is a rare treat for industry veterans and novices alike: instead of teaching information security as a discipline of its own, the authors offer hard-wrought and richly illustrated advice for building software and operations that actually stood the test of time. In doing so, they make a compelling case for reliability, usability, and security going hand-in-hand as the entirely inseparable underpinnings of good system design. —Michał Zalewski, VP of Security Engineering at Snap, Inc. and author of The Tangled Web and Silence on the Wire This is the “real world” that researchers talk about in their papers.
    [Show full text]
  • Nowe Oblicza Przewodnika W Kontekście Rozwoju Kultury Uczestnictwa1 Prace Kulturoznawcze XVII Wrocław 2015
    Acta Blanka Brzozowska Universitatis Uniwersytet Łódzki Wratislaviensis No 3649 Nowe oblicza przewodnika w kontekście rozwoju kultury uczestnictwa1 Prace Kulturoznawcze XVII Wrocław 2015 T radycyjny przewodnik opiera się na autorytecie kogoś, kto odbył wcześniej opi- sywaną trasę i tym samym stworzył pewien model doświadczenia dla przyszłych podróżników. Forma przewodnika jest zatem swoistym dowodem autentyczno- ści, a tym samym stwarza obietnicę możliwości powtórzenia tego doświadczenia w takim samym kształcie, jaki obiecuje konkretna narracja. Celem niniejszego artykułu jest rozpatrzenie sytuacji, w której wspomniany autorytet podróżnika za- stąpiony zostaje autorytetem „tłumu”, sama zaś podróżnicza narracja kreowana jest w toku współpracy na zasadach uczestnictwa.1 Podejmując ten temat, pragnę odnieść się do najnowszych badań na temat kul- tury w kontekście rozwoju mediów. Przede wszystkim chodzi tu o kwestie nowych form działania wspólnotowego, które umożliwiają współtworzenie tekstów kultu- ry, a co za tym idzie — kreowanie nowych form praktyk kulturowych w ramach działania tak zwanych tłumów, rojów czy plemion2. Badacze opisują wspomniane zjawisko przez pryzmat uczestnictwa i dzielenia się (wiedzą, doświadczeniem, informacją), a nowe nowe typy aktywności kolektywnej w kategoriach ekonomii daru, wspólnot wiedzy czy kapitału emocjonalnego. Warto zatem przyjrzeć się nowo powstającym formom przewodnika i podróży, jakie tworzą się w kontek- ście społecznościowej kultury medialnej, na przykład w ramach takich zjawisk, jak crowdsourcing czy model „wiki”, które nie tylko otwierają nowe możliwości tworzenia przewodników, lecz także zmieniają oblicze samej podróży. Staje się 1 Projekt został sfi nansowany ze środków Narodowego Centrum Nauki przyznanych na podsta- wie decyzji numer DEC 2011/03/D/HS4/03408. 2 Przede wszystkim nawiązuję tu do koncepcji Michela Maffesoli. Więcej na ten temat zob.
    [Show full text]
  • Search Engines and Power: a Politics of Online (Mis-) Information
    5/2/2020 Search Engines and Power: A Politics of Online (Mis-) Information Webology, Volume 5, Number 2, June, 2008 Table of Titles & Subject Authors Home Contents Index Index Search Engines and Power: A Politics of Online (Mis-) Information Elad Segev Research Institute for Law, Politics and Justice, Keele University, UK Email: e.segev (at) keele.ac.uk Received March 18, 2008; Accepted June 25, 2008 Abstract Media and communications have always been employed by dominant actors and played a crucial role in framing our knowledge and constructing certain orders. This paper examines the politics of search engines, suggesting that they increasingly become "authoritative" and popular information agents used by individuals, groups and governments to attain their position and shape the information order. Following the short evolution of search engines from small companies to global media corporations that commodify online information and control advertising spaces, this study brings attention to some of their important political, social, cultural and economic implications. This is indicated through their expanding operation and control over private and public informational spaces as well as through the structural bias of the information they attempt to organize. In particular, it is indicated that search engines are highly biased toward commercial and popular US- based content, supporting US-centric priorities and agendas. Consequently, it is suggested that together with their important role in "organizing the world's information" search engines
    [Show full text]
  • Detection of Anomalies in User Behaviour
    Czech Technical University in Prague Faculty of Electrical Engineering Department of Control Engineering Bachelor Thesis Detection of Anomalies in User Behaviour Tom´aˇsVyskoˇcil Supervisor: Ing. Jan Sediv´yCSc.ˇ Study Programme: Cybernetics and Robotics Specialisation: Systems and Control May 21, 2015 Czech Technical University in Prague Faculty of Electrical Engineering Department of Control Engineering BACHELOR PROJECT ASSIGNMENT Student: Tomáš Vyskočil Study programme: Cybernetics and Robotics Specialisation: Systems and Control Title of Bachelor Project: Detection of Anomalies in User Behaviour Guidelines: 1. Design and implement a statistical model for detecting atypical users of a search engine. 2. Use the provided query logs. Measure the quality of the model using metrics (accuracy, precision, recall) on a provided dataset. 3. Review current state of the art. 4. Analyse the provided dataset 5. Design and implement an anomaly user detection model. 6. Analyse the discriminativeness of the features describing users (behaviour). 7. Measure the detection accuracy of the solution. Bibliography/Sources: [1] Fang Yu, Yinglian Xie, and Qifa Ke. 2010. SBotMiner: large scale search bot detection. In Proceedings of the third ACM international conference on Web search and data mining (WSDM '10). ACM, New York, NY, USA, 421­430. [2] Athena Stassopoulou and Marios D. Dikaiakos. 2006. Crawler Detection: A Bayesian Approach. In Proceedings of the International Conference on Internet Surveillance and Protection (ICISP '06). IEEE Computer Society, Washington, DC, USA, 16­. [3] Pang­Ning Tan and Vipin Kumar. 2002. Discovery of Web Robot Sessions Based on their Navigational Patterns. Data Min. Knowl. Discov. 6, 1 (January 2002), 9­35. [4] Junsup Lee, Sungdeok Cha, Dongkun Lee, and Hyungkyu Lee.
    [Show full text]