Workers as Cyborgs: Labor and Networked Computers

Author(s):  
Mark Poster
Keyword(s):  
Author(s):  
J. Bagby

Public policy constraints impact deployment of most technology underlying the convergence of digital technologies in telecommunications, e-commerce, and e-government. Networked computers increase the vulnerability of confidential data, transaction processing infrastructure and national security. Compliance regulation imposes complex constrains on data management by government, the private-sector and their personnel. Privacy and security are a balance between individual interests in secrecy/solitude and society’s interests in security, order, and efficiency. This chapter explores the key political, legal, and regulatory methods for resolving conflicts between privacy rights and security methods to encourage convergence success. The “Privacy-Security Conundrum” is framed, then set against the more cross-dependant relationships of a “Privacy-Security Complement.” Security law illustrates that the conundrum-complement dilemma serves to define convergence as constrained and induced by the legal and policy perspectives or privacy, intellectual property, technology transfer, electronic records management, torts, criminal law, fiduciary and contractual duties and professional ethics regulating privacy and security.


Author(s):  
Sebastian Ries

Ubiquitous computing implies that literally any activity in everyday life can be assisted or accompanied by networked computers. Therefore, the concepts of everyday social life must be carefully reflected on when developing applications for ubiquitous computing. The present chapter focuses on the concepts of trust and accountability. First, both concepts are introduced with their everyday semantics. Second, we explain why trust is relevant for ubiquitous computing, and introduce the main issues for dealing with trust in computer science. Third, we show how accountability can be achieved in distributed systems using reputation and micropayment mechanisms. In both sections, we provide a short overview of the state-ofthe- art and give detailed examples for a deeper understanding. Finally, we provide a research outlook, again arguing for the integration of these concepts into future ubiquitous computing applications.


2017 ◽  
Vol 20 (7) ◽  
pp. 2534-2549
Author(s):  
Robert Hassan

The essay argues that a proper ethical foundation for the political processes underlying liberal democracy is unattainable in a globalized society made possible through networked computers – and the transformed relationship with temporality that is generated by them. The essay brings together the computer ethics of Norbert Wiener and the temporal ethics of Hans Jonas to show that both original visions for a better world are unrealizable in the unanticipated context of what is termed ‘network time’. The essay argues further that to develop an ethical basis for liberal democracy, digital logic and its effects must be contrasted with that which they ceaselessly colonize and marginalize today: an irreducibly analogue world, with analogue politics, analogue technologies and analogue humans who conceived and developed liberal democracy as a cornerstone of the project of Enlightenment. Through contrast and critique, the essay reveals the difficulty for any ethico-political project within the digital and argues that the present post-modern relationship with computing, in which ‘market forces’ determine technological forms and applications, is socially destructive and must be brought under a new aegis of democratic and common responsibility.


First Monday ◽  
1996 ◽  
Author(s):  
Lloyd Morrisett

The open and free flow of information is crucial to the success of democracies. Equally important is the need for members of a democracy to communicate with other easily and frequently. Recent developments in this century in technology have not enhanced these needs of democracy on an individualistic basis, such as radio and television. With the development of networked computers and electronic mail, however, it has become possible for individuals to easily send and receive information and to communicate with colleagues anywhere and at any time. Electronic mail is a catalyst for the fundamental requirements of democracy, of information access and communication. With lowering costs for computers and networked connections, universal electronic mail will provide the means for many to enjoy the benefits of democracy envisioned centuries ago.


HortScience ◽  
1995 ◽  
Vol 30 (4) ◽  
pp. 757C-757
Author(s):  
R. Daniel Lineberger

The World Wide Web is the most rapidly growing communication tool in use today. The Web links networked computers of all sizes and types through use of a hypermedia application known as a “browser.” Hypermedia technology allows research-based information related to plant tissue culture to be disseminated world-wide rapidly and cheaply, and to audiences that previously had difficulty accessing the information through scholarly journals (practitioners, secondary school students, consumers). The Plant Tissue Culture Information Exchange resides on the Aggie Horticulture homepage (http://aggie-horticulture.tamu.edu). Present contents include information on suppliers of tissue culture equipment and media, research reports on micropropagation of several ornamental species, and links to tissue culture related material at other universities. Hardware, software, and network requirements to access the Information Exchange and the construction of hypertext documents for inclusion in the Information Exchange will be presented.


Author(s):  
Antonio Díaz-Calderón ◽  
Christiaan J. J. Paredis

Abstract This paper presents a software architecture for composing complete system-level simulations of mechatronic systems. The proposed architecture will provide the designer with the infrastructure to rapidly create simulations of alternative designs. The architecture promotes modularity and composability through the use of the design entity. Moreover, the architecture supports hierarchical modeling and provides the infrastructure to seamlessly integrate mechanics models with electronics and information technology models. Finally, the architecture facilitates distributed computing to take full advantage of the power of networked computers. This paper introduces the individual concepts of our architecture, and illustrates them in the design of a missile seeker.


Sign in / Sign up

Export Citation Format

Share Document