World without secrets: business, crime, and privacy in the age of ubiquitous computing
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York [u.a.]
Wiley [u.a.]
2002
|
Schlagworte: | |
Online-Zugang: | Publisher description Table of contents Inhaltsverzeichnis |
Beschreibung: | XXII, 282 S. |
ISBN: | 0471218162 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023525733 | ||
003 | DE-604 | ||
005 | 20071221000000.0 | ||
007 | t | ||
008 | 020527s2002 xxu |||| 00||| eng d | ||
020 | |a 0471218162 |9 0-471-21816-2 | ||
035 | |a (OCoLC)248924798 | ||
035 | |a (DE-599)BVBBV023525733 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-521 | ||
050 | 0 | |a HM851.H86 2002 | |
082 | 0 | |a 303.48/33 21 | |
084 | |a MS 1190 |0 (DE-625)123554: |2 rvk | ||
100 | 1 | |a Hunter, Richard |e Verfasser |4 aut | |
245 | 1 | 0 | |a World without secrets |b business, crime, and privacy in the age of ubiquitous computing |c Richard Hunter |
264 | 1 | |a New York [u.a.] |b Wiley [u.a.] |c 2002 | |
300 | |a XXII, 282 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Gesellschaft | |
650 | 4 | |a Information technology -- Social aspects | |
650 | 4 | |a Telematics -- Social aspects | |
650 | 4 | |a Electronic commerce -- Social aspects | |
650 | 4 | |a Electronic surveillance -- Social aspects | |
650 | 4 | |a Digital media -- Social aspects | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Computer crimes | |
856 | 4 | |u http://www.loc.gov/catdir/description/wiley036/2001008167.html |3 Publisher description | |
856 | 4 | |u http://www.loc.gov/catdir/toc/wiley021/2001008167.html |3 Table of contents | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016845973&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016845973 |
Datensatz im Suchindex
_version_ | 1804138168874696704 |
---|---|
adam_text | Contents
Preface xni
acknowledgments xvii
Everything You Need to Know
before we start xix
A Brief History of the next 1O Years xxi
Chapter 1: 1
Why Won t They Leave Me Alone?
The Power of Names and Numbers 2
What Does It Take to Create a Universe? 3
Crossing Over 5
More Data, More Power, Few Controls 6
Unstoppable Momentum 8
By the Numbers 9
Where Did the Secrets Go? 10
Chapter 2: 13
Streets Without Secrets
How the Future Worked in the Past 15
Authentication and the Exception Economy 17
How It Works in Tampa 19
What the Software Knows 21
Yes, Probably 22
Does It Work? 23
More Faces in View 25
VII
viii Contents
Walk with Me 25
Keep Walking 27 ]
Do the Math 28 !
Draw the Lines 31
So? 33
Eternally Vigilant? 34
Chapter 3: .37 ;
Homes Without Secrets i
I Want This Why? 39
KISS 40
About Those Cameras 42
Data at Rest 44
The Rules 45 1
We Are the Boundary 47 |
CHAPTER 4: 49
Cars Without Secrets
The Technical Stuff: Telematics 50
Who Hears What 51 . t
The More You Give, the More You Get 51
Who s Driving? 53 i
What the Owner Wants 54
Cars Without Secrets, Now 55 j
What the Car Knows 56 (
Suppose 58
Private by Intention 59
What Can Policy Do? 60
Call Me Any Time 62
Speaking of Enhancing Performance 63
Making the Drivers Smart 64
Smart Cars, Yes 65
It s Simple, Not 67
Hunter s First Law 68
CHAPTER 5: 69
The N Party System: The Era of the Network Army
How Scenarios Work 70
The Scenarios for Social Structures 70
The Quadrants 72
The Engineered Society 73
The Lost and Lonely 75
The Conscientious Objectors 80
The Network Army 81
I Repeat: The Network Is an Amplifier 84
Contents ix
Chapter 6: 85
Software Without Secrets
Disruptive, Quite 86
Business Without Secrets 87
Interviewing Raymond 87
Hackers and Crackers 89
From Communities to Network Army 90
Open Source Is More Than Open Source 96
Yeah, It s a High-Performance Team 97
Is This Message Clear? 99
The Medium and the Message 100
Why They Listen 101
Power Grabs, Not 101
Ideological Conflict and Corruption 102
Nemesis and the Network Army 104
Can I Be Your Enemy? 104
Generals Are Always Fighting the Last War 105
The Message and the Medium, and the Audience
for Linux 106
If You re Losing the Battles, Change the Battlefield 107
Free Stuff Kills Competitors, Not Markets 108
I Why Not Just Let the Market Do Its Work? 109
I Maybe Someone Can Be Convinced 110
j How Did Things Get So Bad? 112
} A Few Pointers for Engineered Society Generals 112
I Hunter s Second Law 114
f Chapter 7: 115
The Rise of the Mentat
Mentat Defined 115
WhyMentats? 122
Mentats Have (Hidden) Power 123
Mentats Provide Less Information 124
The Network Mentat 124
The Mentat Reviewer 126
Choose Your Mentat 126
Trust Matters 128
Mentats and the Law of Inertia 129
Mentats and I-Filters 130
Hunter s Second Law—Personal and Institutional Conflict 130
Breaking the Bubble 131
Would Breaking the Bubble Have Saved Cisco? 132
Reality Always Wins (in the World Without Secrets
: and Everywhere Else) 133
On the Interactions of Laws 133
t,
X CONTENTS
Chapter 8: 35
Distracted Consumers, Mentats, and Timothy McVeigh
The Path of Least Resistance 136
It s Easier If You Don t Ask 137
So Why Look? 139
Did McVeigh Do It? 140
The Necessary Knowledge Is That of What to Observe 142
What Do You See? 142
CHAPTER 9: 145
In the Exception Economy, Be Exceptional
What Drives the Exception Economy? 147
A Portrait of the Artist as a Very Big (or Little) Number 156
Business Without Secrets 157
The Business Is a Network 158
Art Is Exceptional, Objects Are Not 165
Chapter to. 167
Art Without Secrets
Who Wins and Who Loses? 167
Relationships Matter: The Fate of the Music Industry 170
The Economics of Long-Playing Plastic 170
Yes, It Really Works Just Like That 174
Independents: They re Everywhere. Are
They Dangerous? 177
What about the Relationship? 179
Strategies for Record Industry Viability 180
Strategy 1: Kill Digital Distribution 181
Strategy 2: Monopolize Bandwidth 186
Strategy 3: Prohibit Alternative Business Models 188
Summary: The Fate of Digital Objects 192
Power and Knowledge 192
CHAPTER 11: 193
Crime Without Secrets
Buying In 194
Yeah, It s about Technology 195
The Lessons 196
Plan B 197
What We Fear 198
It s Not the Transaction, It s the Database 199
Mass Victimization 200
Why Worry? 202
Contents xi
Chapter 12: 2O3
War Without Secrets
Engineered Society Warfare and the Terrorist 205
Crime Is War, War Is Crime 208
Network-Centric Warfare 209
Crackers at War: Threat or Menace? 218
What s Potential and What s Real? 225
What to Do, Right Now 234
Chapter 13: 245
Digital Pearl Harbor
On the Morning . .. 247
: What Happened after Pearl Harbor 250
A Pearl Harbor for the New Century 251
A Dream of Electronic Handcuffs 252
Under Observation 255
Watching Everything Is Not Knowing Everything 256
If Automated Surveillance Works, Whom Does It Work On? 257
, The Issue Is Control 259
I The Return of the Engineered Society 260
¦ Who s Not on the Team? 261
: Pearl Harbor in the Borderless World 262
CHAPTER 14: 265
The Last Secrets
NOTES 267
INDEX 275
|
adam_txt |
Contents
Preface xni
acknowledgments xvii
Everything You Need to Know
before we start xix
A Brief History of the next 1O Years xxi
Chapter 1: 1
Why Won't They Leave Me Alone?
The Power of Names and Numbers 2
What Does It Take to Create a Universe? 3
Crossing Over 5
More Data, More Power, Few Controls 6
Unstoppable Momentum 8
By the Numbers 9
Where Did the Secrets Go? 10
Chapter 2: 13
Streets Without Secrets
How the Future Worked in the Past 15
Authentication and the Exception Economy 17
How It Works in Tampa 19
What the Software Knows 21
Yes, Probably 22
Does It Work? 23
More Faces in View 25
VII
viii Contents '
Walk with Me 25
Keep Walking 27 ]
Do the Math 28 !
Draw the Lines 31
So? 33
Eternally Vigilant? 34
Chapter 3: .37 ;"
Homes Without Secrets i
I Want This Why? 39
KISS 40
About Those Cameras 42
Data at Rest 44
The Rules 45 1
We Are the Boundary 47 |
CHAPTER 4: 49 \
Cars Without Secrets
The Technical Stuff: Telematics 50
Who Hears What 51 . t
The More You Give, the More You Get 51 '
Who's Driving? 53 i
What the Owner Wants 54
Cars Without Secrets, Now 55 j
What the Car Knows 56 (
Suppose 58
Private by Intention 59
What Can Policy Do? 60
Call Me Any Time 62
Speaking of Enhancing Performance 63
Making the Drivers Smart 64
Smart Cars, Yes 65
It's Simple, Not 67
Hunter's First Law 68
CHAPTER 5: 69
The N Party System: The Era of the Network Army
How Scenarios Work 70
The Scenarios for Social Structures 70
The Quadrants 72
The Engineered Society 73
The Lost and Lonely 75
The Conscientious Objectors 80
The Network Army 81
I Repeat: The Network Is an Amplifier 84
Contents ix
Chapter 6: 85
Software Without Secrets
Disruptive, Quite 86
Business Without Secrets 87
Interviewing Raymond 87
Hackers and Crackers 89
From Communities to Network Army 90
Open Source Is More Than Open Source 96
Yeah, It's a High-Performance Team 97
Is This Message Clear? 99
The Medium and the Message 100
Why They Listen 101
Power Grabs, Not 101
Ideological Conflict and Corruption 102
Nemesis and the Network Army 104
Can I Be Your Enemy? 104
Generals Are Always Fighting the Last War 105
The Message and the Medium, and the Audience
for Linux 106
If You're Losing the Battles, Change the Battlefield 107
Free Stuff Kills Competitors, Not Markets 108
I Why Not Just Let the Market Do Its Work? 109
I Maybe Someone Can Be Convinced 110
j How Did Things Get So Bad? 112
} A Few Pointers for Engineered Society Generals 112
I Hunter's Second Law 114
f Chapter 7: 115
The Rise of the Mentat
Mentat Defined 115
WhyMentats? 122
Mentats Have (Hidden) Power 123
Mentats Provide Less Information 124
The Network Mentat 124
The Mentat Reviewer 126
Choose Your Mentat 126
Trust Matters 128
Mentats and the Law of Inertia 129
Mentats and I-Filters 130
Hunter's Second Law—Personal and Institutional Conflict 130
Breaking the Bubble 131
Would Breaking the Bubble Have Saved Cisco? 132
Reality Always Wins (in the World Without Secrets
: and Everywhere Else) 133
On the Interactions of Laws 133
t,
X CONTENTS
Chapter 8: \ 35
Distracted Consumers, Mentats, and Timothy McVeigh
The Path of Least Resistance 136
It's Easier If You Don't Ask 137
So Why Look? 139
Did McVeigh Do It? 140
The Necessary Knowledge Is That of What to Observe 142
What Do You See? 142
CHAPTER 9: 145
In the Exception Economy, Be Exceptional
What Drives the Exception Economy? 147
A Portrait of the Artist as a Very Big (or Little) Number 156
Business Without Secrets 157
The Business Is a Network 158
Art Is Exceptional, Objects Are Not 165
Chapter to. 167
Art Without Secrets
Who Wins and Who Loses? 167
Relationships Matter: The Fate of the Music Industry 170
The Economics of Long-Playing Plastic 170
Yes, It Really Works Just Like That 174
Independents: They're Everywhere. Are
They Dangerous? 177
What about the Relationship? 179
Strategies for Record Industry Viability 180
Strategy 1: Kill Digital Distribution 181
Strategy 2: Monopolize Bandwidth 186
Strategy 3: Prohibit Alternative Business Models 188
Summary: The Fate of Digital Objects 192
Power and Knowledge 192
CHAPTER 11: 193
Crime Without Secrets
Buying In 194
Yeah, It's about Technology 195
The Lessons 196
Plan B 197
What We Fear 198
It's Not the Transaction, It's the Database 199
Mass Victimization 200
Why Worry? 202
Contents xi
Chapter 12: 2O3
War Without Secrets
Engineered Society Warfare and the Terrorist 205
Crime Is War, War Is Crime 208
Network-Centric Warfare 209
Crackers at War: Threat or Menace? 218
What's Potential and What's Real? 225
What to Do, Right Now 234
Chapter 13: 245
Digital Pearl Harbor
On the Morning . . 247
: What Happened after Pearl Harbor 250
A Pearl Harbor for the New Century 251
A Dream of Electronic Handcuffs 252
Under Observation 255
Watching Everything Is Not Knowing Everything 256
If Automated Surveillance Works, Whom Does It Work On? 257
', The Issue Is Control 259
I The Return of the Engineered Society 260
¦ Who's Not on the Team? 261
: Pearl Harbor in the Borderless World 262
CHAPTER 14: 265
The Last Secrets
NOTES 267
INDEX 275 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Hunter, Richard |
author_facet | Hunter, Richard |
author_role | aut |
author_sort | Hunter, Richard |
author_variant | r h rh |
building | Verbundindex |
bvnumber | BV023525733 |
callnumber-first | H - Social Science |
callnumber-label | HM851 |
callnumber-raw | HM851.H86 2002 |
callnumber-search | HM851.H86 2002 |
callnumber-sort | HM 3851 H86 42002 |
callnumber-subject | HM - Sociology |
classification_rvk | MS 1190 |
ctrlnum | (OCoLC)248924798 (DE-599)BVBBV023525733 |
dewey-full | 303.48/3321 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 303 - Social processes |
dewey-raw | 303.48/33 21 |
dewey-search | 303.48/33 21 |
dewey-sort | 3303.48 233 221 |
dewey-tens | 300 - Social sciences |
discipline | Soziologie |
discipline_str_mv | Soziologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01669nam a2200433zc 4500</leader><controlfield tag="001">BV023525733</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20071221000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020527s2002 xxu |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471218162</subfield><subfield code="9">0-471-21816-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248924798</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023525733</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-521</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HM851.H86 2002</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">303.48/33 21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MS 1190</subfield><subfield code="0">(DE-625)123554:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hunter, Richard</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">World without secrets</subfield><subfield code="b">business, crime, and privacy in the age of ubiquitous computing</subfield><subfield code="c">Richard Hunter</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York [u.a.]</subfield><subfield code="b">Wiley [u.a.]</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 282 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Gesellschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology -- Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telematics -- Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce -- Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic surveillance -- Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital media -- Social aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/description/wiley036/2001008167.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/wiley021/2001008167.html</subfield><subfield code="3">Table of contents</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016845973&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016845973</subfield></datafield></record></collection> |
id | DE-604.BV023525733 |
illustrated | Not Illustrated |
index_date | 2024-07-02T22:33:55Z |
indexdate | 2024-07-09T21:23:54Z |
institution | BVB |
isbn | 0471218162 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016845973 |
oclc_num | 248924798 |
open_access_boolean | |
owner | DE-521 |
owner_facet | DE-521 |
physical | XXII, 282 S. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Wiley [u.a.] |
record_format | marc |
spelling | Hunter, Richard Verfasser aut World without secrets business, crime, and privacy in the age of ubiquitous computing Richard Hunter New York [u.a.] Wiley [u.a.] 2002 XXII, 282 S. txt rdacontent n rdamedia nc rdacarrier Gesellschaft Information technology -- Social aspects Telematics -- Social aspects Electronic commerce -- Social aspects Electronic surveillance -- Social aspects Digital media -- Social aspects Privacy, Right of Computer crimes http://www.loc.gov/catdir/description/wiley036/2001008167.html Publisher description http://www.loc.gov/catdir/toc/wiley021/2001008167.html Table of contents HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016845973&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hunter, Richard World without secrets business, crime, and privacy in the age of ubiquitous computing Gesellschaft Information technology -- Social aspects Telematics -- Social aspects Electronic commerce -- Social aspects Electronic surveillance -- Social aspects Digital media -- Social aspects Privacy, Right of Computer crimes |
title | World without secrets business, crime, and privacy in the age of ubiquitous computing |
title_auth | World without secrets business, crime, and privacy in the age of ubiquitous computing |
title_exact_search | World without secrets business, crime, and privacy in the age of ubiquitous computing |
title_exact_search_txtP | World without secrets business, crime, and privacy in the age of ubiquitous computing |
title_full | World without secrets business, crime, and privacy in the age of ubiquitous computing Richard Hunter |
title_fullStr | World without secrets business, crime, and privacy in the age of ubiquitous computing Richard Hunter |
title_full_unstemmed | World without secrets business, crime, and privacy in the age of ubiquitous computing Richard Hunter |
title_short | World without secrets |
title_sort | world without secrets business crime and privacy in the age of ubiquitous computing |
title_sub | business, crime, and privacy in the age of ubiquitous computing |
topic | Gesellschaft Information technology -- Social aspects Telematics -- Social aspects Electronic commerce -- Social aspects Electronic surveillance -- Social aspects Digital media -- Social aspects Privacy, Right of Computer crimes |
topic_facet | Gesellschaft Information technology -- Social aspects Telematics -- Social aspects Electronic commerce -- Social aspects Electronic surveillance -- Social aspects Digital media -- Social aspects Privacy, Right of Computer crimes |
url | http://www.loc.gov/catdir/description/wiley036/2001008167.html http://www.loc.gov/catdir/toc/wiley021/2001008167.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016845973&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hunterrichard worldwithoutsecretsbusinesscrimeandprivacyintheageofubiquitouscomputing |