causesocial change or does social change
drivetechnology? We are going to discuss that first in the case of the printing press - certainly an information revolution - and then in a situation where technology arguably drove policy.
Establishing Software Defaults: Perspectives from Law, CS, and Behavioral Econ.available at on-course.
Identity theftis a particularly interesting name for a type source of fraud that, ironically, takes advantage of social distance and the lack of identities in electronic contexts. Identity theft, and phishing, are considered online crimes while the most significant portion occurs through the mails and phone systems. Identity construction as social and organizational are discussed during these session. Two of the cases considered here, X.509 and PGP, have been well examined. Identity management systems make assumptions about a fundamental question: who are we? Role-based systems, federated identity systems, and centralized systems implement different views of identity, authentication and trust. Agency and contracts are discussed. Examples rich with rhetoric are stripped to the essential forces at play.
Biometrics: A Technical Primeradapted from John D. Woodward, Katherine W. Webb, Elaine M. Newton et al., Appendix A,
Biometrics: A Technical Primer"Army Biometric Applications: Identifying and Addressing Sociocultural Concerns," RAND/MR-1237-A, Santa Monica , CA : RAND 2001.
The War of Information': The Constitution, the Foreign Intelligence Surveillance Act, and the President's Warrantless Wiretapping ProgramDownload at http://ssrn.com/abstract=899820