It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:30887485:6604
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:30887485:6604?format=raw

LEADER: 06604cam 2200385 i 4500
001 9925263604901661
005 20170311044247.2
008 160321t20162016onca b 001 0 eng
019 $a958083652$a959424300
020 $a9781928096191
020 $a1928096190
035 $a99971012553
035 $a(OCoLC)945359016$z(OCoLC)958083652$z(OCoLC)959424300
035 $a(OCoLC)ocn945359016
040 $aBTCTA$beng$erda$cBTCTA$dYDXCP$dYDX$dOCLCO$dIQU$dOCLCO$dOCLCF$dOCLCO$dNRC$dXII$dBDX$dSAA
042 $apcc
050 4 $aTK5105.875.I57$bH36 2016
082 04 $a004.67/8$223
100 1 $aHampson, Fen Osler.$eauthor.
245 10 $aLook who's watching :$bsurveillance, treachery, and trust online /$cFen Osler Hampson and Eric Jardine.
264 1 $aWaterloo, ON, Canada :$bCIGI/Centre for International Governance Innovation,$c[2016]
264 4 $c℗♭2016
300 $axx, 341 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $aForeword: Trust as the currency of cyberspace -- Preface -- Acronyms and initialisms -- One: Sex, spies and the Internet -- A looming trust deficit and the erosion of the Internet's digital social capital -- Different birds of prey: the actors eroding user trust -- What makes the Internet work? -- What is to be done? -- What is to come? -- Two: An ecosystem based on trust -- A network of networks -- Squawking toucans and Web traffic -- Jungle homes and websites -- The jungle floor and the deep dark Web -- Nature, red in tooth and claw -- An ecosystem based on trust -- Correctness -- Reliability -- Security -- Privacy -- Safety -- Inclusive governance -- How public policies, trust and digital social capital interact -- Conclusion -- Three: A world online - economics, innovation and the Internet of things -- Taylor Wilson: child prodigy-turned-inventor -- Palmer Luckey: how an online forum turned his virtual reality prototype into a 2 billion dollar company -- TaskRabbit: online marketplace for odd jobs -- Captricity : using the Internet to help low-resource organizations and communities digitize their information -- From trickle to raging torrent -- The hidden wiring of globalization -- Measuring the Internet's economic impact -- Big data and the Internet of things -- A frictionless universe -- Both winners and losers -- Conclusion -- Four: Big brother in the Internet age -- Privacy and freedom of expression still matter -- State surveillance and a loss of trust -- Private companies - not so private users -- So what? Snooping, privacy and trust -- Governments and censorship -- The costs of online censorship -- Conclusion -- Five: One or many, Internet or fragnet? -- Stepping on the garden hose: the breakdown of "net neutrality" -- Boundaries vs. walls: considering free speech and the right to be forgotten -- Data localization -- Territorial routing and rerouting -- Proprietary protocols: sometimes even walled gardens get personal -- Conclusion -- Six: Crime, punishment and the deep dark Web -- The state of cyber security -- The moral hazard of data breaches and IT security -- Data breaches, trust and social capital -- DDoS attacks and network reliability -- The dark Web and real-world safety -- A new breed of vigilante justice -- The effect of a divided physical world and the single global Internet -- Conclusion -- Seven: Cyberwarfare in the twenty-first century -- Security through resiliency -- Malicious cyber activity -- A new war in cyberspace? -- Open but vulnerable -- The rise of new cyber mercenaries -- Will deterrence and arms control work in cyberspace? -- What is to be done? -- Implications for China -- Conclusion -- Eight: Internet haves and have-nots -- The Internet expansion S-curve: bringing the next billion online -- Network effects (Metcalfe's Law) -- The costs of the last 20 percent -- Internet expansion in lower-middle-income countries -- Breaking (or building) the trust of new users -- Vignette one: free Facebook? -- Vignette two: who rules? -- Vignette three: private gatekeepers -- Vignette four: "a million eyes" watching you -- Why bringing people online matters so much -- Nine: A Web of trust : toward a safe, secure, reliable and open Internet -- Technology and trust -- Toward a strategy of prevention: hygiene and cyber resilience -- Governance and trust -- Getting Internet governance right -- A layered approach to Internet governance -- Strengthening and developing new norms -- Harmonizing rules -- Strengthening institutions through multi-stakeholder engagement and better coordination -- Conclusion -- Notes - Appendix: The CIGI-Ipsos Surveys -- 2014 CIGI-Ipsos survey -- 2016 CIGI-Ipsos survey.
520 $a"The Internet ecosystem is held together by a surprisingly intangible glue -- trust. To meet its full potential, users need to trust that the Internet works reliably and efficiently when providing them with the information they are seeking, while also being secure, private and safe. When trust in the Internet wanes, the network's stock of "digital social capital" falls and users begin to alter their online behaviour. These often subtle changes in behaviour tend to be collectively highly maladaptive, hindering the economic, developmental and innovative potential of the globe-spanning network of networks. Look Who's Watching: Surveillance, Treachery and Trust Online confirms in vivid detail that the trust placed by users in the Internet is increasingly misplaced. Edward Snowden's revelations that the United States National Security Agency and other government agencies are spying on Internet users, the proliferation of cybercrime and the growing commodification of user data and regulatory changes -- which threaten to fragment the system -- are all rapidly eroding the confidence users have in the Internet ecosystem. Based on a combination of illustrative anecdotal evidence and analysis of new survey data, Look Who's Watching clearly demonstrates why trust matters, how it is being eroded and how, with care and deliberate policy action, the essential glue of the Internet can be restored."--Publisher's description.
650 0 $aInternet$xSecurity measures.
650 0 $aInternet governance.
700 1 $aJardine, Eric,$eauthor.
776 08 $iOnline version:$aHampson, Fen Osler.$tLook who's watching.$dWaterloo, Ontario : Centre for International Governance Innovation, 2016$z9781928096207$w(OCoLC)961185301
947 $hCIRCSTACKS$r31786103058068
980 $a99971012553