29 research outputs found
Internet Daemons: Digital Communications Possessed
Weâre used to talking about how tech giants like Google, Facebook, and Amazon rule the internet, but what about daemons? Ubiquitous programs that have colonized the Netâs infrastructureâas well as the devices we use to access itâdaemons are little known. Fenwick McKelvey weaves together history, theory, and policy to give a full account of where daemons come from and how they influence our livesâincluding their role in hot-button issues like network neutrality.
Going back to Victorian times and the popular thought experiment Maxwellâs Demon, McKelvey charts how daemons evolved from concept to reality, eventually blossoming into the pandaemonium of code-based creatures that today orchestrates our internet. Digging into real-life examples like sluggish connection speeds, Comcastâs efforts to control peer-to-peer networking, and Pirate Bayâs attempts to elude daemonic control (and skirt copyright), McKelvey shows how daemons have been central to the internet, greatly influencing everyday users.
Internet Daemons asks important questions about how much control is being handed over to these automated, autonomous programs, and the consequences for transparency and oversight.
Table of Contents
Abbreviations and Technical Terms
Introduction
1. The Devil We Know: Maxwellâs Demon, Cyborg Sciences, and Flow Control
2. Possessing Infrastructure: Nonsynchronous Communication, IMPs, and Optimization
3. IMPs, OLIVERs, and Gateways: Internetworking before the Internet
4. Pandaemonium: The Internet as Daemons
5. Suffering from Buffering? Affects of Flow Control
6. The Disoptimized: The Ambiguous Tactics of the Pirate Bay
7. A Crescendo of Online Interactive Debugging? Gamers, Publics and Daemons
Conclusion
Acknowledgments
Appendix: Internet Measurement and Mediators
Notes
Bibliography
Index
Reviews
Beneath social media, beneath search, Internet Daemons reveals another layer of algorithms: deeper, burrowed into information networks. Fenwick McKelvey is the best kind of intellectual spelunker, taking us deep into the infrastructure and shining his light on these obscure but vital mechanisms. What he has delivered is a precise and provocative rethinking of how to conceive of power in and among networks.
âTarleton Gillespie, author of Custodians of the Internet
Internet Daemons is an original and important contribution to the field of digital media studies. Fenwick McKelvey extensively maps and analyzes how daemons influence data exchanges across Internet infrastructures. This study insightfully demonstrates how daemons are transformative entities that enable particular ways of transferring information and connecting up communication, with significant social and political consequences.
âJennifer Gabrys, author of Program Eart
Recommended from our members
A proposed legislative framework to protect digital copyright from end user infringement on the internet in Thailand: a comparative approach
This thesis argues that Thailand does not have adequate specific legal remedies to protect copyright work on the internet, for example, the use of copyright content on public websites or file-sharing platforms. The aim of the study is to construct a legal framework to provide effective copyright protection remedies. In particular, more effective remedies are needed for copyright infringement by end-users using client-server and Peer-to-Peer (P2P) file sharing technology.
In terms of methodology, this thesis is documentary research. The thesis employs a comparative system legal approach. It compares Thailandâs Copyright Act (No.2) B.E.2558 (CA 2015) with digital copyright enforcement systems in two foreign jurisdictions: (1) the Notice and Takedown (N&T) system of the United States; and (2) the Graduated Response (GR) of France. It examines and compares functional aspects between the CA 2015 and N&T as applied to the client/server technology. The same comparative system method is also employed with respect to digital copyright infringement under the CA 2015 compared with the GR system as it applies to P2P technology. The thesis constructs a proposal for a more effective legislative framework to protect copyright on the internet for Thailand.
The thesis finds that the practical enforcement problems relating to both client/server and P2P end user infringers in the online environment is threefold. First, it involves fast widespread distribution of content. Second, there is a large number of potentially infringing internet end users. Third, there are significant difficulties in identifying an actual infringer. The author argues that Thailand's CA 2015 court procedure is not suitable because it is slow, costly and does little to solve any of the aforementioned problems. The thesis finds that generalised characteristics of a suitable enforcement remedy should include several elements, namely, end user educative and awareness-raising functions and gradually increasing legal sanctions such as warning, fines as well as internet access restriction. It is recommended that the N&T and GR remedies in use in the US and EU respectively be adopted in Thailand with certain adjustments to suit the Thai context and replace existing unwieldy criminal and civil litigation. To this end, it is recommended that in order to overcome the difficulty of infringer identification, a new internet subscriber's duty should be introduced in Thailand
Cyber Security and Critical Infrastructures 2nd Volume
The second volume of the book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles, including an editorial that explains the current challenges, innovative solutions and real-world experiences that include critical infrastructure and 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems
Data Hiding and Its Applications
Data hiding techniques have been widely used to provide copyright protection, data integrity, covert communication, non-repudiation, and authentication, among other applications. In the context of the increased dissemination and distribution of multimedia content over the internet, data hiding methods, such as digital watermarking and steganography, are becoming increasingly relevant in providing multimedia security. The goal of this book is to focus on the improvement of data hiding algorithms and their different applications (both traditional and emerging), bringing together researchers and practitioners from different research fields, including data hiding, signal processing, cryptography, and information theory, among others
Challenges and Open Questions of Machine Learning in Computer Security
This habilitation thesis presents advancements in machine learning for computer security,
arising from problems in network intrusion detection and steganography.
The thesis put an emphasis on explanation of traits shared by steganalysis, network intrusion
detection, and other security domains, which makes these domains different from
computer vision, speech recognition, and other fields where machine learning is typically
studied. Then, the thesis presents methods developed to at least partially solve the identified
problems with an overall goal to make machine learning based intrusion detection
system viable. Most of them are general in the sense that they can be used outside intrusion
detection and steganalysis on problems with similar constraints.
A common feature of all methods is that they are generally simple, yet surprisingly
effective. According to large-scale experiments they almost always improve the prior art,
which is likely caused by being tailored to security problems and designed for large volumes
of data.
Specifically, the thesis addresses following problems:
anomaly detection with low computational and memory complexity such that efficient
processing of large data is possible;
multiple-instance anomaly detection improving signal-to-noise ration by classifying
larger group of samples;
supervised classification of tree-structured data simplifying their encoding in neural
networks;
clustering of structured data;
supervised training with the emphasis on the precision in top p% of returned data;
and finally explanation of anomalies to help humans understand the nature of anomaly
and speed-up their decision.
Many algorithms and method presented in this thesis are deployed in the real intrusion
detection system protecting millions of computers around the globe
Air Force Institute of Technology Research Report 2010
This report summarizes the research activities of the Air Force Institute of Technologyâs Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, Mathematics, Statistics and Engineering Physic
Making European cult cinema: fan production in an alternative economy
This study gives attention to the fan production surrounding European cult cinema, low budget exploitation films often in the horror genre, that engage a high level of cultural commitment and investment from its fans. It addresses wider issues of debate relating to why people are fans and whether they are anything more than obsessive in their consumption of media. The academic study of fandom is relatively a new area, the formative year being 1992 when studies such as Henry Jenkinsâ Textual Poachers, Lisa Lewisâ The Adoring Audience and Camille Bacon-Smithâs Enterprising Women approached fandom as a cultural activity. Studies such as these celebrate fandom and focus on fan production as a symbolic activity rather than an economic activity. Academics have only recently have academics recognised the commitment, time and effort that fans invest when producing artefacts.
I explore the ways European cult cinema fandom might be understood as an alternative economy of fan production by looking at how fans produce artefacts and commodities. It uses a method of data collection, which includes ethnographic observation and interviews, focused on public offline and online fan activities, and my own personal experiences as autoethnography. The collected data is interrogated using a theoretical framework that incorporates ideas from cultural studies and political economy: using the concept of an âalternative economyâ of European cult cinema fan production. The purpose being to interpret an object of fandom as a production of meaning, physical artefacts and commodities, therefore understanding fandom as both cultural and economic production.
I argue that, in this alternative economy, fans are âcreativeâ workers, using digital technologies to produce artefacts that are exchanged as gifts or commodities; this practice relating to repertoires of professionalism. I find that fans are not just producing artefacts and commodities relating to European cult cinema, but that through these processes they are culturally and economically making what has become known as European cult cinema
The 45th Australasian Universities Building Education Association Conference: Global Challenges in a Disrupted World: Smart, Sustainable and Resilient Approaches in the Built Environment, Conference Proceedings, 23 - 25 November 2022, Western Sydney University, Kingswood Campus, Sydney, Australia
This is the proceedings of the 45th Australasian Universities Building Education Association (AUBEA) conference which will be hosted by Western Sydney University in November 2022. The conference is organised by the School of Engineering, Design, and Built Environment in collaboration with the Centre for Smart Modern Construction, Western Sydney University. This yearâs conference theme is âGlobal Challenges in a Disrupted World: Smart, Sustainable and Resilient Approaches in the Built Environmentâ, and expects to publish over a hundred double-blind peer review papers under the proceedings