Search results

You are looking at 1 - 10 of 211 items for :

  • "cyberspace" x
  • Refine by access: All content x
Clear All
Chris Abel

who coined the word ‘cyberspace,’ argue that it opens up entirely new possibilities in the human–machine interface, they frequently resort to antiquated notions of mind–body relations. What all these efforts demonstrate is that, as with the birth of any radically new idea, in order to visualize that idea and to make it meaningful to others, its creators are necessarily obliged to make at least some connections with existing ideas and ways of thinking – seeing the new in terms of the old, as it was described in Chapter 9. To a large extent, therefore, the Net, and

in The extended self
Analysing the example of data territorialisation
Andreas Baur-Ahrens

exchanged between domestic servers and computers should travel only over domestic infrastructure and therefore remain within territorial borders – borders that traditionally play a minor role in cyberspace. The mobility of data traffic should be limited and regulated for the sake of data security by keeping sensitive information out of the reach of Anglo-American intelligence agencies. The idea of data

in Security/ Mobility
Theorising the Cybergothic
Isabella van Elferen

This article theorizes the transgressive faculties of cyberspace‘s Gothic labyrinth, arguing that it is haunted by the ghost of material/information dualism. This ghost is embodied in cybergoth subculture: while cybergothic music creates a gateway to the borderland between biological and virtual realities, dancing enables cybergoths to transgress the boundaries between the two.

Gothic Studies
Abstract only
Environmental activism online
Author:

The politics of cyberspace is of importance both for the future use of computer-mediated communication (CMC) and within traditional political arenas, commerce and society itself. Within Britain there are many different political groups that have a presence online and utilise CMC, including for example members of the far right, human rights advocates, religious groups and environmental activists. This book examines the relationship between the strategies of environmental activist movements in Britain and their use of CMC. It explores how environmental activists negotiate the tensions and embrace the opportunities of CMC, and analyses the consequences of their actions for the forms and processes of environmental politics. It serves as a disjuncture from some broader critiques of the implications of CMC for society as a whole, concentrating on unpacking what CMC means for activists engaged in social change. Within this broad aim there are three specific objectives. It first evaluates how CMC provides opportunities for political expression and mobilization. Second, the book examines whether CMC use has different implications for established environmental lobbying organisations than it does for the non-hierarchical fluid networks of direct action groups. Third, it elucidates the influence of CMC on campaign strategies and consequently on business, government and regulatory responses to environmental activism.

Abstract only
Thibault Moulin

The word ‘cyber-space’ was coined by William Gibson, an American writer. In the novel Neuromancer , it was defined as follows: ‘[c]yberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation […] A graphic representation of data abstracted from banks of every computer in the human system.’ 24

in Cyber-espionage in international law
Abstract only
Chris Abel

appropriating cyberspace, creating whole new virtual worlds for our extended selves to inhabit and find new forms of expression. As with earlier patterns of human technics, the ‘who’ and the ‘what’ are as indistinguishable in these virtual worlds as they are in the ‘real’ world, while the interactions between the two realms increasingly blur conventional descriptions of human experience. That chapter opens with a discussion of the manner in which architectural theorists like William Mitchell, following the method of metaphorical extension outlined in Chapter 9, make free use

in The extended self
Thibault Moulin

possible transposition of these rules to a digital environment and activity. Even though the relevance of international law in cyber-space – which is often described as the ‘fifth domain’ – has long been acknowledged by States, 23 there is no consensus on the concrete implementation of existing rules. Against this background, this introduction is structured as follows. In the next

in Cyber-espionage in international law
Silence speaks
Author:

While espionage among nations is a long-standing practice, the emergence of the internet has challenged the traditional legal framework and has resulted in the intensification of intelligence activities. In fact, espionage was subject to indirect regulation, which applied where a spy was (often at their own risk) trespassing on foreign territory or sent behind enemy lines. With the emergence of cyber-espionage, however, agents may collect intelligence from within their own jurisdictions, with a great deal of secrecy and less risk. This monograph argues that – save for some exceptions – this activity has been subject to normative avoidance. It means that it is neither prohibited – as spying does not result in an internationally wrongful act – nor authorised, permitted or subject to a right – as States are free to prevent and fight foreign cyber-espionage activities. However, States are aware of such status of law, and are not interested in any further regulation. This situation did not emerge by happenstance but rather via the purposeful silence of States – leaving them free to pursue cyber-espionage themselves at the same time as they adopt measures to prevent falling victim to it. To proceed, this monograph resorts to a first-class sample of State practice and analyses several rules and treaties: territorial sovereignty, collective security and international humanitarian law (i.e. the rules applicable between belligerent and neutral Powers, as well as between belligerents themselves), the law of diplomatic relations, human rights law, international law and European economic law. It also demonstrates that no specific customary law has emerged in the field.

Thibault Moulin

the practice of espionage between belligerents only apply to the land ( 5.1 ), and States did not support an implementation of this regime in cyber-space ( 5.2 ). 5.1 The territorial rationale of the regulation of espionage between belligerents This section starts with an overview of the various categories of spies defined by Articles 29

in Cyber-espionage in international law
Jenny Pickerill

1 Politics, social movements and technology According to Resnick (1998), the politics of cyberspace can be conceptualised in three distinct ways: politics within cyberspace – involving the internal operation of cyberspace and those who are online; politics which impacts upon cyberspace – the policies and legislation which affect cyberspace; and political uses of cyberspace – how the technology is used to affect political life offline. All three aspects need to be taken into consideration for they are all intertwined and all of them impact upon environmentalists

in Cyberprotest