scholarly journals Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network

2021 ◽  
pp. 016224392110390
Author(s):  
Ben Collier ◽  
James Stewart

This paper explores, through empirical research, how values, engineering practices, and technological design decisions shape one another in the development of privacy technologies. We propose the concept of “privacy worlds” to explore the values and design practices of the engineers of one of the world’s most notable (and contentious) privacy technologies: the Tor network. By following Tor’s design and development we show a privacy world emerging—one centered on a construction of privacy understood through the topology of structural power in the Internet backbone. This central “cipher” discourse renders privacy as a problem that can be “solved” through engineering, allowing the translation and representation of different groups of imagined users, adversaries, and technical aspects of the Internet in the language of the system. It also stabilizes a “flattened,” neutralized conception of privacy, risking stripping it of its political and cultural depth. We argue for an enriched empirical focus on design practices in privacy technologies, both as sites where values and material power are shaped, and as a place where the various worlds that will go on to cluster around them—of users, maintainers, and others—are imagined and reconciled.

2018 ◽  
Vol 4 (3) ◽  
pp. 298-322 ◽  
Author(s):  
MARK ALFANO ◽  
J. ADAM CARTER ◽  
MARC CHEONG

AbstractMany scholars agree that the Internet plays a pivotal role in self-radicalization, which can lead to behaviors ranging from lone-wolf terrorism to participation in white nationalist rallies to mundane bigotry and voting for extremist candidates. However, the mechanisms by which the Internet facilitates self-radicalization are disputed; some fault the individuals who end up self-radicalized, while others lay the blame on the technology itself. In this paper, we explore the role played by technological design decisions in online self-radicalization in its myriad guises, encompassing extreme as well as more mundane forms. We begin by characterizing the phenomenon of technological seduction. Next, we distinguish between top-down seduction and bottom-up seduction. We then situate both forms of technological seduction within the theoretical model of dynamical systems theory. We conclude by articulating strategies for combating online self-radicalization.


LOGOS ◽  
2019 ◽  
Vol 30 (2) ◽  
pp. 26-34
Author(s):  
Alenka Kepic Mohar

This article discusses changes in the materiality of textbooks by examining several examples of primarily Slovene textbooks from various periods. By focusing on their spread design rather than technical aspects (e.g., length, weight, and format), one may infer that their materiality changed with the development of printing technologies and publishing skills. Based on the assumption that textbook visuality is a field of meaning that requires different bodily movements, postures, and engagement with the physical environment to produce cognitive processing, this article sheds light on how the body adapts to the changed materiality of digital textbooks. Numerous micro-movements in a long string of procedures are required in a digital textbook ecosystem. All the participants should be aware of the different demands and properties of the digital textbook ecosystem. Therefore, further empirical research is needed.


Author(s):  
Kevin Wallsten ◽  
Dilyana Toteva

The expansion of the Internet and the sudden popularity of Web 2.0 applications, such as blogs, YouTube, Twitter, and Facebook, raise important questions about the extent and consequences of homophilous sorting in online political discussions. In particular, there is growing concern that Internet users' ability to filter out alternative points of view will lead political discourse to become more polarized and fragmented along ideological lines. The decline of deliberative democracy and the breakdown of America's system of representative government, the story goes, will be the inevitable causalities of political discussions moving from in-person to online. Unfortunately, the empirical research in fields such as mass communication, political science, and sociology provides no hard and fast conclusions about the amount of online homophily in political discussions. This article details this conflicted body of research and points to some areas where future research may provide more insight into the intersection of online politics and homophilous sorting.


2019 ◽  
pp. 60-77
Author(s):  
Samantha Bordoff ◽  
Quan Chen ◽  
Zheng Yan

This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategi to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.


Author(s):  
Sampoornam K. P.

This book chapter presents the role of telecommunications network in voice and data transmission. Switching, signaling and transmission are the technologies used to carry out this process. In landline call establishment, calls are routed from subscriber handset to a remote switching unit (RSU), a main switching unit (MSU), and to the internet protocol trunk automated exchange (IPTAX). Then, it is directed to the National Internet Backbone (NIB). On the receiver side, the IPTAX receives this signal from the NIB and directs to it to the MSU and RSU, respectively. The receiver side RSU delivers the information to the destination subscriber. In order to transmit the information from one place to other, it undergoes various process like modulation, demodulation, line coding, equalization, error control, bit synchronization and multiplexing, digitizing an analog message signal, and compression. This chapter also discusses the various services provided by BSNL and agencies governing the internet. Finally, it focuses on the National Internet Backbone facility of BSNL, India.


Author(s):  
Anna C. McFadden

The simple nature of podcasting and Really Simple Syndication (RSS) belies the power for change embodied in them, either singly or in tandem. On the surface, podcasting is merely the recording of an audio file in MP3 format for sharing on the Internet, an MP3 player or some other device; this chapter covers the history and technical aspects of that process. Podcasting and the RSS feeds that keep consumers of podcasting connected to the source are examined as part of a larger movement in computer mediated collaboration that centers on mobility, immediacy, and interactivity. Podcasting, as a personal tool or an organizationally managed one is examined in terms of types of podcasts, their current applications and future trends that can be anticipated in their use..


Author(s):  
S. Kavitha ◽  
J. V. Anchitaalagammai ◽  
S. Nirmala ◽  
S. Murali

The chapter summarizes the concepts and challenges of DevOps in IoT, DevSecOps in IoT, integrating security into IoT, machine learning and AI in IoT of software engineering practices. DevOps is a software engineering culture and practice that aims at unifying software development (Dev) and software operation (Ops). The main characteristic of DevOps is the automation and monitoring at all steps of software construction, from integration, testing, releasing to deployment and infrastructure management. DevSecOps is a practice of integrating security into every aspect of an application lifecycle from design to development.


2019 ◽  
pp. 58-79 ◽  
Author(s):  
Mark Graham ◽  
Sanna Ojanperä ◽  
Martin Dittus

From the earliest stages of computer-mediated communication, technical change was predicted to undermine the significance of geography and lead to the “death of distance.” This seemed a logical consequence of electronic media enabling people to communicate from anywhere, to anyone, and anytime. However, empirical research, such as that illustrated in this chapter, has challenged this view. The authors argue that the Internet augments everyday places. As such, much like material geographies, the Internet can be spatially mapped. In doing so, the authors uncover significant geographic inequalities that shape how we use, move through, and interact with the world.


Author(s):  
Ramakrishnan Raman ◽  
Benson Edwin Raj

Tokenizing assets through the use of blockchain is the next big thing in digital currency markets. Securing the assets in the world of the internet is challenging as most of them can easily be copied and sold in the secondary market. Protecting the rights of the asset owner is one of the challenging research areas. NFTs (non-fungible tokens) are very useful in representing the ownership of unique items for any assets. NFTs ensure that an asset can have only one official owner at any point in time with the help of Ethereum-based blockchain network. Ethereum NFTs can ensure that no one can modify the ownership rights or copy and paste the digital assets. NFTs are a boon to the artists, musicians, and others who want to create impressive digital assets. The objective of this chapter is to take you to the world of NFTs and to explain how the NFTs are going to impact digital transactions in a bigger way in the future. This chapter covers the introduction, technical aspects, security impacts, use cases, and successful implementations of NFTs in various realms.


2004 ◽  
pp. 63-77
Author(s):  
Joan E. Ricart-Costa ◽  
Brian Subirana ◽  
Josep Valor-Sabatier

Sign in / Sign up

Export Citation Format

Share Document