The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from?
Internet use has become ubiquitous in the past two decades, but governments, legislators, and their regulatory agencies have struggled to keep up with the rapidly changing Internet technologies and uses. In this groundbreaking collaboration, regulatory lawyer Christopher Marsden and computer scientist Ian Brown analyze the regulatory shaping of “code”—the technological environment of the Internet—to achieve more economically efficient and socially just regulation.
Cyberspace is widely acknowledged as a fundamental fact of daily life in today’s world. Until recently, its political impact was thought to be a matter of low politics--background conditions and routine processes and decisions. Now, however, experts have begun to recognize its effect on high politics--national security, core institutions, and critical decision processes. In this book, Nazli Choucri investigates the implications of this new cyberpolitical reality for international relations theory, policy, and practice.
Tunisian and Egyptian protestors famously made use of social media to rally supporters and disseminate information as the “Arab Spring” began to unfold in 2010. Less well known, but with just as much potential to bring about social change, are ongoing local efforts to use social media and other forms of technology to prevent deadly outbreaks of violence. In The Technology of Nonviolence, Joseph Bock describes and documents technology-enhanced efforts to stop violence before it happens in Africa, Asia, and the United States.