Coverart for item
The Resource Diving into the bitstream : information technology meets society in a digital world, M. Barry Dumas

Diving into the bitstream : information technology meets society in a digital world, M. Barry Dumas

Label
Diving into the bitstream : information technology meets society in a digital world
Title
Diving into the bitstream
Title remainder
information technology meets society in a digital world
Statement of responsibility
M. Barry Dumas
Creator
Contributor
Subject
Genre
Language
eng
Cataloging source
NhCcYBP
Dewey number
303.48/33
Index
index present
LC call number
HM851
LC item number
.D856 2012
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Label
Diving into the bitstream : information technology meets society in a digital world, M. Barry Dumas
Link
http://site.ebrary.com/lib/byuprovo/docDetail.action?docID=10630782
Instantiates
Publication
Note
Description based on print version record
Bibliography note
Includes bibliographical references (p. [258]-260) and index
Carrier category
online resource
Carrier MARC source
rdacarrier
Content category
text
Content type MARC source
rdacontent
Contents
  • Can we suspend our beliefs? -- Understanding numbers -- reading between the lines -- An aura of accuracy -- Precision may not be relevant -- Extreme values render averages misleading -- Forecasts presume continuance -- Correlation is not causation -- Comparability counts -- Missing information -- Rounding does not mean loss of accuracy -- Context eliminates vagueness -- And so -- we are what we know -- Consequences -- The business difference -- when too much information isn't -- Personalization -- the answer or the question? -- Attention everyone -- now hear this -- Who's on it first? -- 3.Connections -- the Internet, the Web, and the others -- In the beginning -- a little shiny ball -- A modest start -- the ARPANET -- Slow progress, then boom -- the Internet -- So what actually is the Internet and how does it work? -- Finding the trees in the forest -- the domain name system -- Sorry, we're all out of addresses -- IP revisited -- Addresses galore and more -- IPv6
  • Connecting to the Internet -- Consumers and providers -- the network neutrality debate -- The regulation dilemma -- On the go -- bringing the Internet along -- The World Wide Web -- It began with a proposal -- So what actually is the Web? -- The Web 1-2-3 -- Behind the portal -- A Web site for any business -- or for you -- And the others -- And so -- wielding power -- The persistent digital divide -- 4.That is to say -- free expression and privacy -- The free expression mandate -- Limits to protection -- Many limits are contextual -- Audience and purpose can make a difference -- So can the type of IT and the role of the FCC -- Broadcast media -- Different treatment for cell phones, VoIP, and cable TV -- Venue ownership takes precedence -- Censorship -- the one-way street -- The Chinese experience -- Breaching the barriers -- A stealth approach -- Privacy complicates the picture -- A fuzzier mandate -- Disclosure -- Public lives, private lives -- IT affects outcomes
  • Identifying the unidentified -- With our knowledge and without -- Personalization revisited -- Personalization's analog, data profiling -- The whistleblower -- risk and reward -- Laws and protections, more or less -- WikiLeaks -- global whistleblower, global hero, global villain -- Security -- yet another complication -- And so -- where do we stand? -- IT on the job -- Which leaves us where? -- 5.What's mine is whose? -- intellectual property -- Intellectual property -- what and why -- Copyright -- a little history -- The IT effect -- Legislators try to cope -- WIPO to the rescue -- The DMCA -- DRM invigorated -- BitTorrent joins the fray -- Unlocking content -- Copyright holders fight infringement -- Rethinking business models -- Patent -- a little history -- WIPO steps in -- Types of patents -- Protection but not secrecy -- The IT effect -- Taking unfair advantage -- Legislative difficulty -- Patent cache -- the new battle armor and armament -- Trademark -- a little history
  • Types of trademarks -- Trademark dilution -- And so -- innovation stimulator or destroyer -- Copyright -- sensible and strange -- Patents follow a similar path -- Trademarks -- not quite as clear-cut as they seem -- It all comes down to this -- 6.You, me, and everyone else -- alone together and vice versa -- Relationships -- Some definitions -- A little history -- Bulletin boards -- a precursor -- Fidonet, expanding reach -- Next up, social networks -- Aspects of socializing -- The socialization debates -- Business on board -- Impacts rising -- A variety of purposes -- Upending the social order -- a spark and sometimes a flame -- And so -- the many directions of impact -- Implications for control -- From the bottom -- replacing formal organizations -- Spreading the news -- Too much of a good thing? -- balance, please -- 7.Attacks, bit by bit -- from nuisance to cyber warfare -- A brief history of hacking -- A broad range of activities -- Inside out -- leaky barriers
  • The privacy sphere deflates -- A big bag of tricks -- Spam -- Denial of service attacks -- Spoofing -- Social engineering -- Malware -- Fighting back -- Firewalls -- Proxy servers -- Screening software -- Antivirus programs -- Spam avoidance -- Identification -- Human at the keyboard -- Two key user authentication adds security -- Code signing -- Securing transmissions -- Honeypots -- laying a trap to catch hackers -- Cyber terrorism and cyber warfare -- a rain of bit bombs to attack people, systems, and infrastructure -- Points of attack -- And so -- keeping the bad guys at bay -- Security adds other issues -- 8.Mind and machine -- artificial intelligence -- A little history -- A different view -- The imitated mind -- Sense and sensibility -- Progress on many fronts -- Becoming ordinary -- And so -- master or slave? -- Computing power -- the end of the line? -- Day to day -- Mind and matter -- 9.We are what we do -- ethics and responsibilities -- A little background
  • Some major concepts -- Conflict of interest -- IT enters the picture -- IT as a neutral actor -- IT as a preordained actor -- IT as an ethical actor -- Funding influences development -- Intersections -- Free expression -- Privacy -- Implications -- Intellectual property -- Artificial intelligence -- Professional ethics -- The green way -- And so -- reaping what we sow -- 10.The future lies ahead -- we're off to see... -- Some semi-persistent patterns -- Platform convergence -- Dedicated devices have a role -- Media convergence -- Cultural convergence -- The cloud -- More clouds in the forecast -- Revaluing privacy -- Identity, hidden or revealed -- Tracking and more -- Facial recognition software -- Legal safeguards fall short -- Network neutrality, up or down? -- The shifting digital divide -- Another look at AI -- The cyborg scenario -- Helping or snooping? -- Workforce shifts -- old trend, new twist -- And so -- the global imperative, keeping up with the chip
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9780203153277
Isbn Type
(electronic bk.)
Media category
computer
Media MARC source
rdamedia
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
  • UtOrBLW
  • (OCoLC)ocn889261907
Label
Diving into the bitstream : information technology meets society in a digital world, M. Barry Dumas
Link
http://site.ebrary.com/lib/byuprovo/docDetail.action?docID=10630782
Publication
Note
Description based on print version record
Bibliography note
Includes bibliographical references (p. [258]-260) and index
Carrier category
online resource
Carrier MARC source
rdacarrier
Content category
text
Content type MARC source
rdacontent
Contents
  • Can we suspend our beliefs? -- Understanding numbers -- reading between the lines -- An aura of accuracy -- Precision may not be relevant -- Extreme values render averages misleading -- Forecasts presume continuance -- Correlation is not causation -- Comparability counts -- Missing information -- Rounding does not mean loss of accuracy -- Context eliminates vagueness -- And so -- we are what we know -- Consequences -- The business difference -- when too much information isn't -- Personalization -- the answer or the question? -- Attention everyone -- now hear this -- Who's on it first? -- 3.Connections -- the Internet, the Web, and the others -- In the beginning -- a little shiny ball -- A modest start -- the ARPANET -- Slow progress, then boom -- the Internet -- So what actually is the Internet and how does it work? -- Finding the trees in the forest -- the domain name system -- Sorry, we're all out of addresses -- IP revisited -- Addresses galore and more -- IPv6
  • Connecting to the Internet -- Consumers and providers -- the network neutrality debate -- The regulation dilemma -- On the go -- bringing the Internet along -- The World Wide Web -- It began with a proposal -- So what actually is the Web? -- The Web 1-2-3 -- Behind the portal -- A Web site for any business -- or for you -- And the others -- And so -- wielding power -- The persistent digital divide -- 4.That is to say -- free expression and privacy -- The free expression mandate -- Limits to protection -- Many limits are contextual -- Audience and purpose can make a difference -- So can the type of IT and the role of the FCC -- Broadcast media -- Different treatment for cell phones, VoIP, and cable TV -- Venue ownership takes precedence -- Censorship -- the one-way street -- The Chinese experience -- Breaching the barriers -- A stealth approach -- Privacy complicates the picture -- A fuzzier mandate -- Disclosure -- Public lives, private lives -- IT affects outcomes
  • Identifying the unidentified -- With our knowledge and without -- Personalization revisited -- Personalization's analog, data profiling -- The whistleblower -- risk and reward -- Laws and protections, more or less -- WikiLeaks -- global whistleblower, global hero, global villain -- Security -- yet another complication -- And so -- where do we stand? -- IT on the job -- Which leaves us where? -- 5.What's mine is whose? -- intellectual property -- Intellectual property -- what and why -- Copyright -- a little history -- The IT effect -- Legislators try to cope -- WIPO to the rescue -- The DMCA -- DRM invigorated -- BitTorrent joins the fray -- Unlocking content -- Copyright holders fight infringement -- Rethinking business models -- Patent -- a little history -- WIPO steps in -- Types of patents -- Protection but not secrecy -- The IT effect -- Taking unfair advantage -- Legislative difficulty -- Patent cache -- the new battle armor and armament -- Trademark -- a little history
  • Types of trademarks -- Trademark dilution -- And so -- innovation stimulator or destroyer -- Copyright -- sensible and strange -- Patents follow a similar path -- Trademarks -- not quite as clear-cut as they seem -- It all comes down to this -- 6.You, me, and everyone else -- alone together and vice versa -- Relationships -- Some definitions -- A little history -- Bulletin boards -- a precursor -- Fidonet, expanding reach -- Next up, social networks -- Aspects of socializing -- The socialization debates -- Business on board -- Impacts rising -- A variety of purposes -- Upending the social order -- a spark and sometimes a flame -- And so -- the many directions of impact -- Implications for control -- From the bottom -- replacing formal organizations -- Spreading the news -- Too much of a good thing? -- balance, please -- 7.Attacks, bit by bit -- from nuisance to cyber warfare -- A brief history of hacking -- A broad range of activities -- Inside out -- leaky barriers
  • The privacy sphere deflates -- A big bag of tricks -- Spam -- Denial of service attacks -- Spoofing -- Social engineering -- Malware -- Fighting back -- Firewalls -- Proxy servers -- Screening software -- Antivirus programs -- Spam avoidance -- Identification -- Human at the keyboard -- Two key user authentication adds security -- Code signing -- Securing transmissions -- Honeypots -- laying a trap to catch hackers -- Cyber terrorism and cyber warfare -- a rain of bit bombs to attack people, systems, and infrastructure -- Points of attack -- And so -- keeping the bad guys at bay -- Security adds other issues -- 8.Mind and machine -- artificial intelligence -- A little history -- A different view -- The imitated mind -- Sense and sensibility -- Progress on many fronts -- Becoming ordinary -- And so -- master or slave? -- Computing power -- the end of the line? -- Day to day -- Mind and matter -- 9.We are what we do -- ethics and responsibilities -- A little background
  • Some major concepts -- Conflict of interest -- IT enters the picture -- IT as a neutral actor -- IT as a preordained actor -- IT as an ethical actor -- Funding influences development -- Intersections -- Free expression -- Privacy -- Implications -- Intellectual property -- Artificial intelligence -- Professional ethics -- The green way -- And so -- reaping what we sow -- 10.The future lies ahead -- we're off to see... -- Some semi-persistent patterns -- Platform convergence -- Dedicated devices have a role -- Media convergence -- Cultural convergence -- The cloud -- More clouds in the forecast -- Revaluing privacy -- Identity, hidden or revealed -- Tracking and more -- Facial recognition software -- Legal safeguards fall short -- Network neutrality, up or down? -- The shifting digital divide -- Another look at AI -- The cyborg scenario -- Helping or snooping? -- Workforce shifts -- old trend, new twist -- And so -- the global imperative, keeping up with the chip
Dimensions
unknown
Extent
1 online resource.
Form of item
online
Isbn
9780203153277
Isbn Type
(electronic bk.)
Media category
computer
Media MARC source
rdamedia
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
  • UtOrBLW
  • (OCoLC)ocn889261907

Library Locations

Processing Feedback ...