Who Controls the Internet?: Illusions of a Borderless World

Rating: 
Amazon Price: N/A (as of April 20, 2018 07:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Whos really in control of whats happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internets challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. Its a book about the fate of one idea–that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Googles struggles with the French government and Yahoos capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBays struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

Rating: 
Amazon Price: N/A (as of April 20, 2018 17:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians.
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber — attacks — predominantly from the United States.
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors — Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West — address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

Understanding Social Networks: Theories, Concepts, and Findings

Rating: 
Amazon Price: N/A (as of April 20, 2018 20:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Despite the swift spread of social network concepts and their applications and the rising use of network analysis in social science, there is no book that provides a thorough general introduction for the serious reader. Understanding Social Networks fills that gap by explaining the big ideas that underlie the social network phenomenon. Written for those interested in this fast moving area but who are not mathematically inclined, it covers fundamental concepts, then discusses networks and their core themes in increasing order of complexity. Kadushin demystifies the concepts, theories, and findings developed by network experts. He selects material that serves as basic building blocks and examples of best practices that will allow the reader to understand and evaluate new developments as they emerge. Understanding Social Networks will be useful to social scientists who encounter social network research in their reading, students new to the network field, as well as managers, marketers, and others who constantly encounter social networks in their work.

Inside the Enemy’s Computer: Identifying Cyber Attackers

Amazon Price: $34.95 $25.83 You save: $9.12 (26%). (as of April 21, 2018 00:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Attribution – tracing those responsible for a cyber attack – is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and powers; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.

Tomorrow’s Lawyers: An Introduction to Your Future

Rating: 
Amazon Price: $16.95 $15.91 You save: $1.04 (6%). (as of April 20, 2018 04:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Tomorrow's Lawyers predicts that we are at the beginning of a period of fundamental transformation in law: a time in which we will see greater change than we have seen in the past two centuries. Where the future of the legal service will be a world of internet-based global businesses, online document production, commoditized service, legal process outsourcing, and web based simulation practice. Legal markets will be liberalized, with new jobs for lawyers and new employers too. This book is a definitive guide to this future – for young and aspiring lawyers, and for all who want to modernize our legal and justice systems. It introduces the new legal landscape and offers practical guidance for those who intend to build careers and businesses in law.

Tomorrow's Lawyers is divided into three parts. The first is an updated restatement of Richard Susskind's views on the future of legal services, as laid out in his previous bestselling works, The Future of Law , Transforming the Law, and The End of Lawyers? . He identifies key drivers of change, such as the economic downturn, and considers how these will impact on the legal marketplace. In the second part, Susskind sketches out the new legal landscape as he predicts it, including the changing role of law firms, and in-house lawyers, with virtual hearings and online dispute resolution. The third part focuses on the prospects for aspiring lawyers, predicting what new jobs and new employers there will be, and equipping prospective lawyers with penetrating questions to put to their current and future employers.
Continue reading “Tomorrow's Lawyers: An Introduction to Your Future”