David D. Clark, Sandra Braman , Paul T. Jaeger
(1)
Josephine Wolff, Sandra Braman , Paul T. Jaeger
(1)
Kenneth A. (Professor of Law Bamberger University of California At Berkeley),Deirdre K. (Associate Professor Mulligan University of California Berkeley)
(1)
In Decoding the Social World, Sandra González-Bailón shows how algorithms, crowdsourcing, and digital traces offer methods and data that can help us solve the puzzle of unintended consequences -- a s
Between 1959 and 1989, Soviet scientists and officials made numerous attempts to network their nation -- to construct a nationwide computer network. None of these attempts succeeded, and the enterpris
In the United States, elements of the religious right fuel fears of an existential Islamic threat, spreading anti-Muslim rhetoric into mainstream politics. In Indonesia, Muslim absolutists urge suppre
Interdisciplinary perspectives on the role of new information technologies, including mobile phones, wireless networks, and biometric identification, in the global refugee crisis.Today's global refuge
How early twentieth-century American policymakers sought to gain control over radiotelegraphy networks in an effort to advance the global position of the United States.In Reluctant Power, Rita Zajácz
An argument that the movement for network neutrality was of a piece with its neoliberal environment, solidifying the continued existence of a commercially driven internet. Media reform activists rej
In the twenty-first-century digital world, virtual goods are sold for real money.Digital game players happily pay for avatars, power-ups, and other game items. But behind everyvirtual sale, there is a
Between 1959 and 1989, Soviet scientists and officials made numerous attempts to network their nation -- to construct a nationwide computer network. None of these attempts succeeded, and the enterpris
The computer systems of government agencies are notoriously complex. New technologiesare piled on older technologies, creating layers that call to mind an archaeological dig. Obsoleteprogramming langu
The emergence of cloud computing marks the moment when computing has become, materially and symbolically, infrastructure -- a sociotechnical system that is ubiquitous, essential, and foundational. Inc
Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken entire industries, corroded
The emergence of cloud computing marks the moment when computing has become, materially and symbolically, infrastructure -- a sociotechnical system that is ubiquitous, essential, and foundational. Inc
Financial information is a both a public resource and a commodity that market participants produce and distribute in connection with other financial products and services. Legislators, regulators, and
Key to understanding and addressing climate change is continuous and precise monitoring of environmental conditions. Satellites play an important role in collecting climate data, offering comprehensiv
Big data is ubiquitous but heterogeneous. Big data can be used to tally clicks and traffic on web pages, find patterns in stock trades, track consumer preferences, identi
In the United States, elements of the religious right fuel fears of an existential Islamic threat, spreading anti-Muslim rhetoric into mainstream politics. In Indonesia,
Big data is ubiquitous but heterogeneous. Big data can be used to tally clicks and traffic on web pages, find patterns in stock trades, track consumer preferences, identi