8 research outputs found

    When logic meets engineering: introduction to logical issues in the history and philosophy of computer science

    Get PDF
    Introduction to a Journal Special issue on Logical Issues in the History and Philosophy of Computer Scienc

    The Paradox of Source Code Secrecy

    Get PDF
    In Lear v. Adkins, the Supreme Court precipitously wrote, federal law requires that all ideas in general circulation be dedicated to the common good unless they are protected by a valid patent. Today, it is clear that trade secrecy\u27s dominance over source code has been a significant cause for concern in cases involving the public interest. To protect civil rights in the age of automated decision making, I argue, we must limit opportunities for seclusion in areas of intellectual property, criminal justice, and governance more generally. The solution, therefore, does not require a complete overhaul of the existing system, but rather a more nuanced, granular approach that seeks to balance the interest of disclosure and public access with the substantial values of protection, privacy, and property

    Multidisciplinary aspects of cyber warfare

    Get PDF
    Sajber ratovanje je ratovanje u sajber prostoru, zasnovano na primeni informacionokomunikacionih tehnologija. Ono predstavlja specifičan oblik međunarodnih sukoba, koji se od tradicionalnih formi ratovanja razlikuje po sredstvima, metodama i učesnicima. Sajber ratovanje se primenjuje nezavisno od perioda rata i mira. Po tehnikama, metodi i procesu napada, ono se tehnološki značajno ne razlikuje od kriminalnih, špijunskih ili terorističkih aktivnosti. Potencijal ovog, tehnološki zasnovanog oblika sukoba, raste sa zastupljenošću i uticajem informacionih tehnologija na nacionalnom i globalnom nivou. Međunarodna praksa sukoba u sajber prostoru je stvarna i dinamična. Države izdvajaju rastuća budžetska sredstva za vođenje sukoba u sajber prostoru, razvijaju kapacitete i organizacione strukture za preduzimanje operacija u sajber prostoru i usvajaju doktrine i strategije njihove primene i razvoja. Pojedine države su proglasile sajber prostor petim područjem izvođenja vojnih dejstava, ravnopravan sa kopnom, morem, vazduhom i svemirom. Međutim, međunarodna zajednica ima prirodnu potrebu da međunarodnopravno reguliše sve sukobe, uključujući i sajber ratovanje. Prirodan put da se to učini je primenom postojećeg prava oružanih sukoba i analogije sa odgovarajućim situacijama oružanih sukoba u fizičkom prostoru. Uprkos kratkom periodu razvoja doktrina, metoda i sredstava za vođenje operacija u sajber prostoru, savremena naučna i stručna literatura je bogata radovima koji se bave mogućim načinima primene pomenute analogije u svrhu regulisanja sajber ratovanja. Posebno mesto u toj literaturi ima primena prava na osnovu efekata sajber napada. Taj pristup je prihvatila većina međunarodnih pravnih stručnjaka, uključujući i autore Talinskog priručnika za sajber ratovanje. Uprkos ovakvom teorijskom pristupu, situacije i posledice izvođenja sajber napada na međunarodnom nivou ostaju nerešene i neregulisane u praktičnom pogledu. U praksi države izvode operacije u sajber prostoru, koristeći okolnost da je napade teško otkriti dok se ne manifestuju njihove očigledne posledice; da je najčešće nemoguće izvršiti identifikaciju i atribuciju napadača, odnosno praktično utvrditi odgovornost neke države za preduzeti napad i njegove posledice u skladu sa pravilima, normama i principima Međunarodnog prava oružanih sukoba.Cyber warfare is warfare in cyberspace, based on application of information communication technologies. It represents a specific form of international conflict, differing from the traditional warfare forms in means, methods and participants. Cyber warfare is applied independently from war and peace periods. It is not significantly technologically different in its techniques, methods and attack processes from criminal, espionage or terrorist activities. The potential of this, technologically based conflict form, grows with prevalence and influence of information technologies at the national and global level. International practice of cyber space conflict is real and dynamic. States allocate growing budget funds for conducting cyberspace conflict, they develop capacities and organizational structures for operations in cyberspace and adopt doctrines and strategies for their application and development. Some states declared cyberspace the fifth domain of military activities, equal with land, sea, air, and space. However, international community has got a natural tendency to regulate all conflicts, including cyber warfare. The natural way to do this is through application of the existing law of armed conflict and analogy with appropriate armed conflict situations in physical space. Despite brief period for development of doctrines, methods and means for cyberspace operations, modern scientific and professional literature is rich in papers dealing with possible ways of application of the said analogy for the purpose of regulation of cyber warfare. Special place in this literature belongs to application of law based on cyber attack effects. This approach was accepted by most international legal experts, including authors of Tallinn Manual for cyber warfare. Despite such a theoretical approach, situations and consequences of conducting cyber attacks at international level remain unresolved and unregulated in practice. States execute operations in cyberspace, using the circumstance that attacks are difficult to discover until their obvious consequences are manifested; that most often it is impossible to perform identification and attribution of attackers, i.e. to practically determine responsibility of a state for an attack and its consequences in accordance with the rules, norms and principles of International law of armed conflict

    On Making in the Digital Humanities

    Get PDF
    On Making in the Digital Humanities fills a gap in our understanding of digital humanities projects and craft by exploring the processes of making as much as the products that arise from it. The volume draws focus to the interwoven layers of human and technological textures that constitute digital humanities scholarship. To do this, it assembles a group of well-known, experienced and emerging scholars in the digital humanities to reflect on various forms of making (we privilege here the creative and applied side of the digital humanities). The volume honours the work of John Bradley, as it is totemic of a practice of making that is deeply informed by critical perspectives. A special chapter also honours the profound contributions that this volume’s co-editor, Stéfan Sinclair, made to the creative, applied and intellectual praxis of making and the digital humanities. Stéfan Sinclair passed away on 6 August 2020. The chapters gathered here are individually important, but together provide a very human view on what it is to do the digital humanities, in the past, present and future. This book will accordingly be of interest to researchers, teachers and students of the digital humanities; creative humanities, including maker spaces and culture; information studies; the history of computing and technology; and the history of science and the humanities

    Troubling binary codes. Studying information technology at the intersection of science and technology studies and feminist technoscience studies

    Get PDF
    This dissertation provides a study of Information Technology (IT) as professional and technical culture by drawing together the theoretical lenses of Feminist Technoscience Studies (FTS) and Science and Technology Studies (STS). This central topic has been investigated through an empirical research that focuses on two distinct issues: the gender gap and underrepresentation of women in IT educational and professional paths (computer science, computer engineering, computing); the role of digital artifacts and materiality in the process of organizing within an Italian telecommunication company. With regard to the first field, I have carried out a historical analysis of the experience of the first female coders in early digital computing era and I have conducted a set of interviews with contemporary Italian female IT professionals and practitioners who form and participate to networks and campaigns that promote women’s presence and gender awareness in computing. Drawing on contributions from STS and feminist socio-constructivist approaches in science and technology, I shall argue that the analysis of gender divide in IT should go beyond the issues of female discrimination in order to call into question the gendered nature of computer artifacts and technical knowledge (Faulkner, 2001; Misa, 2010). In the second field site, I have gone beyond the visible issues of gender asymmetries in organization in order to challenge the alleged neutral character of technical artifacts and materiality (Latour, 1992) by drawing on contributions from STS and Workplace Studies. Starting from this body of knowledge which calls into question the very boundaries between the social and the technical (Heath & Button, 2002), I have employed analytic sensibilities from FTS and the recent debate on new materialism in feminist theory (Barad, 2007; Alaimo & Hekman, 2008; Hekman, 2010; Dolphijn & van der Tuin, 2012) to trace out the agential role of materiality and technical objects in producing marginal and invisible positions (Haraway, 1988; Star, 1991; Star & Bowker, 2007). In this respect, I shall argue that technical knowledge and non-human actors take part in politics and practices of boundary-making, sustaining divisions and hierarchies (Hughes & Lury, 2013)
    corecore