21,105 research outputs found

    Communications

    Get PDF
    The communications sector of an economy comprises a range of technologies, physical media, and institutions/rules that facilitate the storage of information through means other than a society\u27s oral tradition and the transmission of that information over distances beyond the normal reach of human conversation. This chapter provides data on the historical evolution of a disparate range of industries and institutions contributing to the movement and storage of information in the United States over the past two centuries. These include the U.S. Postal Service, the newspaper industry, book publishing, the telegraph, wired and cellular telephone service, radio and television, and the Internet

    Technology, Control, and Surveillance in Australia’s Immigration Detention Centres

    Get PDF
    Although mandatory immigration detention for “unauthorized” arrivals in Australia receives considerable attention, the use and abuse by government of technologies within sites of detention is less publicized. Control and surveillance are exercised in a number of ways. Immigration detainees have been denied adequate access to technologies that would enable them to fully communicate with family and friends and are deprived of the capacity to acquire information that can ensure their human rights are realized. At the same time that asylum seekers experience restrictions, devices are in place to control detainees through technological surveillance. Despite the prohibitions and impositions, detainees have adopted alternative means of communication in defiance of the limits foisted upon them.Bien que la dĂ©tention obligatoire des immigrants dans le cas d’arrivĂ©es « non autorisĂ©es » en Australie retienne beaucoup l’attention, l’utilisation et l’abus des technologies par le gouvernement au sein des sites de dĂ©tentions sont moins mĂ©diatisĂ©s. Le contrĂŽle et la surveillance sont mis en pratique de diff Ă©rentes maniĂšres. Les immigrants dĂ©tenus se sont vus refuser un accĂšs adĂ©quat aux technologies qui leur permettraient de communiquer pleinement avec leur famille et leurs amis, et d’avoir accĂšs Ă  l’information nĂ©cessaire pour s’assurer du respect de leurs droits humains. Tout en expĂ©rimentant ces restrictions, les demandeurs d’asile dĂ©tenus sont contrĂŽlĂ©s par les technologies de surveillances. MalgrĂ© les interdictions et les abus, les dĂ©tenus ont trouvĂ© d’autres façons de communiquer pour franchir les limites qui leur sont imposĂ©es

    ‘Cavemen in an era of speed-of-light technology’ : historical and contemporary perspectives on communication within prisons

    Get PDF
    Many prisoners believe that the restricted access they have to computer-mediated communcation (CMC) technologies and, in particular, the almost total absence of computers and Internet access in prisons is a form of censure that renders them second-class citizens in the Information Age. This article examines contemporary rationales and historial precedents for denying prisoners the means to communicate (both with each other and with those outside the prison) and argues that the prevention of communication, a pivotal feature of the Victorian and Edwardian prison regime, represents a significant continuity in the experience of prison life in the 21st Century

    The History of the iPad

    Get PDF
    The purpose of this paper is to review the history of the iPad and its influence over contemporary computing. Although the iPad is relatively new, the tablet computer is having a long and lasting affect on how we communicate. With this essay, I attempt to review the technologies that emerged and converged to create the tablet computer. Of course, Apple and its iPad are at the center of this new computing movement

    Resources for Studying Public Participation in the Arts: Inventory and Review of Available Survey Data on North Americans' Participation in and Attitudes Towards the Arts

    Get PDF
    This study contains summaries, critical reviews, and access information for 25 studies of public participation in the arts, as well as a chart enabling readers to indentify surveys that contain particular combinations of variables in which they are interested.

    Code wars: steganography, signals intelligence, and terrorism

    Get PDF
    This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead

    Forum Non Conveniens

    Get PDF
    • 

    corecore