World Without Secrets:Business, Crime, and in the Age of Ubiquitous Computing

Business, Crime, and Privacy in the Age of Ubiquitous Computing

Gebonden Engels 2002 9780471218166
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The future of computing–the future of business

Rapid technological innovation is moving us towards a world of ubiquitous computing–a world in which we are surrounded by smart machines that are always on, always aware, and always monitoring us. These developments will create a world virtually without secrets in which information is widely available and analyzable worldwide. This environment will certainly affect business, government, and the individual alike, dramatically affecting the way organizations and individuals interact. This book explores the implications of the coming world and suggests and explores policy options that can protect individuals and organizations from exploitation and safeguard the implicit contract between employees, businesses, and society itself. World Without Secrets casts an unflinching eye on a future we may not necessarily desire, but will experience.

Specificaties

ISBN13:9780471218166
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:304

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Preface xiii</p>
<p>Acknowledgments xvii</p>
<p>Everything You Need to Know before We Start xix</p>
<p>A Brief History of the Next 10 Years xxi</p>
<p>Chapter 1: 1</p>
<p>Why Won t They Leave Me Alone?</p>
<p>The Power of Names and Numbers 2</p>
<p>What Does It Take to Create a Universe? 3</p>
<p>Crossing Over 5</p>
<p>More Data, More Power, Few Controls 6</p>
<p>Unstoppable Momentum 8</p>
<p>By the Numbers 9</p>
<p>Where Did the Secrets Go? 10</p>
<p>Chapter 2:13</p>
<p>Streets Without Secrets</p>
<p>How the Future Worked in the Past 15</p>
<p>Authentication and the Exception Economy 17</p>
<p>How It Works in Tampa 19</p>
<p>What the Software Knows 21</p>
<p>Yes, Probably 22</p>
<p>Does It Work? 23</p>
<p>More Faces in View 25</p>
<p>Walk with Me 25</p>
<p>Keep Walking 27</p>
<p>Do the Math 28</p>
<p>Draw the Lines 31</p>
<p>So? 33</p>
<p>Eternally Vigilant? 34</p>
<p>Chapter 3: 37</p>
<p>Homes Without Secrets</p>
<p>I Want This Why? 39</p>
<p>KISS 40</p>
<p>About Those Cameras 42</p>
<p>Data at Rest 44</p>
<p>The Rules 45</p>
<p>We Are the Boundary 47</p>
<p>Chapter 4: 49</p>
<p>Cars Without Secrets The Technical Stuff: Telematics 50</p>
<p>Who Hears What 51</p>
<p>The More You Give, the More You Get 51</p>
<p>Who s Driving? 53</p>
<p>What the Owner Wants 54</p>
<p>Cars Without Secrets, Now 55</p>
<p>What the Car Knows 56</p>
<p>Suppose 58</p>
<p>Private by Intention 59</p>
<p>What Can Policy Do? 60</p>
<p>Call Me Any Time 62</p>
<p>Speaking of Enhancing Performance 63</p>
<p>Making the Drivers Smart 64</p>
<p>Smart Cars, Yes 65</p>
<p>It s Simple, Not 67</p>
<p>Hunter s First Law 68</p>
<p>Chapter 5: 69</p>
<p>The N Party System: The Era of the Network Army</p>
<p>How Scenarios Work 70</p>
<p>The Scenarios for Social Structures 70</p>
<p>The Quadrants 72</p>
<p>The Engineered Society 73</p>
<p>The Lost and Lonely 75</p>
<p>The Conscientious Objectors 80</p>
<p>The Network Army 81</p>
<p>I Repeat: The Network Is an Amplifier 84</p>
<p>Chapter 6: 85</p>
<p>Software Without Secrets</p>
<p>Disruptive, Quite 86</p>
<p>Business Without Secrets 87</p>
<p>Interviewing Raymond 87</p>
<p>Hackers and Crackers 89</p>
<p>From Communities to Network Army 90</p>
<p>Open Source Is More Than Open Source 96</p>
<p>Yeah, It s a High–Performance Team 97</p>
<p>Is This Message Clear? 99</p>
<p>The Medium and the Message 100</p>
<p>Why They Listen 101</p>
<p>Power Grabs, Not 101</p>
<p>Ideological Conflict and Corruption 102</p>
<p>Nemesis and the Network Army 104</p>
<p>Can I Be Your Enemy? 104</p>
<p>Generals Are Always Fighting the Last War 105</p>
<p>The Message and the Medium, and the Audience for Linux 106</p>
<p>If You re Losing the Battles, Change the Battlefield 107</p>
<p>Free Stuff Kills Competitors, Not Markets 108</p>
<p>Why Not Just Let the Market Do Its Work? 109</p>
<p>Maybe Someone Can Be Convinced 110</p>
<p>How Did Things Get So Bad? 112</p>
<p>A Few Pointers for Engineered Society Generals 112</p>
<p>Hunter s Second Law 114</p>
<p>Chapter 7: 115</p>
<p>The Rise of the Mentat</p>
<p>Mentat Defined 115</p>
<p>Why Mentats? 122</p>
<p>Mentats Have (Hidden) Power 123</p>
<p>Mentats Provide Less Information 124</p>
<p>The Network Mentat 124</p>
<p>The Mentat Reviewer 126</p>
<p>Choose Your Mentat 126</p>
<p>Trust Matters 128</p>
<p>Mentats and the Law of Inertia 129</p>
<p>Mentats and I–Filters 130</p>
<p>Hunter s Second Law Personal and Institutional Conflict 130</p>
<p>Breaking the Bubble 131</p>
<p>Would Breaking the Bubble Have Saved Cisco? 132</p>
<p>Reality Always Wins (in the World Without Secrets and Everywhere Else) 133</p>
<p>On the Interactions of Laws 133</p>
<p>Chapter 8:135</p>
<p>Distracted Consumers, Mentats, and Timothy McVeigh</p>
<p>The Path of Least Resistance 136</p>
<p>It s Easier If You Don t Ask 137</p>
<p>So Why Look? 139</p>
<p>Did McVeigh Do It? 140</p>
<p>The Necessary Knowledge Is That of What to Observe 142</p>
<p>What Do You See? 142</p>
<p>Chapter 9: 145</p>
<p>In the Exception Economy, Be Exceptional</p>
<p>What Drives the Exception Economy? 147</p>
<p>A Portrait of the Artist as a Very Big (or Little) Number 156</p>
<p>Business Without Secrets 157</p>
<p>The Business Is a Network 158</p>
<p>Art Is Exceptional, Objects Are Not 165</p>
<p>Chapter 10: 167</p>
<p>Art Without Secrets</p>
<p>Who Wins and Who Loses? 167</p>
<p>Relationships Matter: The Fate of the Music Industry 170</p>
<p>The Economics of Long–Playing Plastic 170</p>
<p>Yes, It Really Works Just Like That 174</p>
<p>Independents: They re Everywhere. Are They Dangerous? 177</p>
<p>What about the Relationship? 179</p>
<p>Strategies for Record Industry Viability 180</p>
<p>Strategy 1: Kill Digital Distribution 181</p>
<p>Strategy 2: Monopolize Bandwidth 186</p>
<p>Strategy 3: Prohibit Alternative Business Models 188</p>
<p>Summary: The Fate of Digital Objects 192</p>
<p>Power and Knowledge 192</p>
<p>Chapter 11: 193</p>
<p>Crime Without Secrets</p>
<p>Buying In 194</p>
<p>Yeah, It s about Technology 195</p>
<p>The Lessons 196</p>
<p>Plan B 197</p>
<p>What We Fear 198</p>
<p>It s Not the Transaction, It s the Database 199</p>
<p>Mass Victimization 200</p>
<p>Why Worry? 202</p>
<p>Chapter 12: 203</p>
<p>War Without Secrets</p>
<p>Engineered Society Warfare and the Terrorist 205</p>
<p>Crime Is War, War Is Crime 208</p>
<p>Network–Centric Warfare 209</p>
<p>Crackers at War: Threat or Menace? 218</p>
<p>What s Potential and What s Real? 225</p>
<p>What to Do, Right Now 234</p>
<p>Chapter 13: 245</p>
<p>Digital Pearl Harbor</p>
<p>On the Morning&nbsp; . 247</p>
<p>What Happened after Pearl Harbor 250</p>
<p>A Pearl Harbor for the New Century 251</p>
<p>A Dream of Electronic Handcuffs 252</p>
<p>Under Observation 255</p>
<p>Watching Everything Is Not Knowing Everything 256</p>
<p>If Automated Surveillance Works, Whom Does It Work On? 257</p>
<p>The Issue Is Control 259</p>
<p>The Return of the Engineered Society 260</p>
<p>Who s Not on the Team? 261</p>
<p>Pearl Harbor in the Borderless World 262</p>
<p>Chapter 14: 265</p>
<p>The Last Secrets</p>
<p>Notes 267</p>
<p>Index 275</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        World Without Secrets:Business, Crime, and in the Age of Ubiquitous Computing