Look who's watching : surveillance, treachery, and trust online / Fen Osler Hampson and Eric Jardine.

Author
Hampson, Fen Osler [Browse]
Format
Book
Language
English
Published/​Created
  • Waterloo, ON, Canada : CIGI/Centre for International Governance Innovation, [2016]
  • ©2016
Description
xx, 341 pages : illustrations ; 24 cm

Availability

Copies in the Library

Location Call Number Status Location Service Notes
Engineering Library - Stacks TK5105.875.I57 H36 2016 Browse related items Request

    Details

    Subject(s)
    Author
    Summary note
    "The Internet ecosystem is held together by a surprisingly intangible glue -- trust. To meet its full potential, users need to trust that the Internet works reliably and efficiently when providing them with the information they are seeking, while also being secure, private and safe. When trust in the Internet wanes, the network's stock of "digital social capital" falls and users begin to alter their online behaviour. These often subtle changes in behaviour tend to be collectively highly maladaptive, hindering the economic, developmental and innovative potential of the globe-spanning network of networks. Look Who's Watching: Surveillance, Treachery and Trust Online confirms in vivid detail that the trust placed by users in the Internet is increasingly misplaced. Edward Snowden's revelations that the United States National Security Agency and other government agencies are spying on Internet users, the proliferation of cybercrime and the growing commodification of user data and regulatory changes -- which threaten to fragment the system -- are all rapidly eroding the confidence users have in the Internet ecosystem. Based on a combination of illustrative anecdotal evidence and analysis of new survey data, Look Who's Watching clearly demonstrates why trust matters, how it is being eroded and how, with care and deliberate policy action, the essential glue of the Internet can be restored."--Publisher's description.
    Bibliographic references
    Includes bibliographical references and index.
    Contents
    • Foreword: Trust as the currency of cyberspace
    • Preface
    • Acronyms and initialisms
    • One: Sex, spies and the Internet
    • A looming trust deficit and the erosion of the Internet's digital social capital
    • Different birds of prey: the actors eroding user trust
    • What makes the Internet work?
    • What is to be done?
    • What is to come?
    • Two: An ecosystem based on trust
    • A network of networks
    • Squawking toucans and Web traffic
    • Jungle homes and websites
    • The jungle floor and the deep dark Web
    • Nature, red in tooth and claw
    • An ecosystem based on trust
    • Correctness
    • Reliability
    • Security
    • Privacy
    • Safety
    • Inclusive governance
    • How public policies, trust and digital social capital interact
    • Conclusion
    • Three: A world online - economics, innovation and the Internet of things
    • Taylor Wilson: child prodigy-turned-inventor
    • Palmer Luckey: how an online forum turned his virtual reality prototype into a 2 billion dollar company
    • TaskRabbit: online marketplace for odd jobs
    • Captricity : using the Internet to help low-resource organizations and communities digitize their information
    • From trickle to raging torrent
    • The hidden wiring of globalization
    • Measuring the Internet's economic impact
    • Big data and the Internet of things
    • A frictionless universe
    • Both winners and losers
    • Four: Big brother in the Internet age
    • Privacy and freedom of expression still matter
    • State surveillance and a loss of trust
    • Private companies - not so private users
    • So what? Snooping, privacy and trust
    • Governments and censorship
    • The costs of online censorship
    • Five: One or many, Internet or fragnet?
    • Stepping on the garden hose: the breakdown of "net neutrality"
    • Boundaries vs. walls: considering free speech and the right to be forgotten
    • Data localization
    • Territorial routing and rerouting
    • Proprietary protocols: sometimes even walled gardens get personal
    • Six: Crime, punishment and the deep dark Web
    • The state of cyber security
    • The moral hazard of data breaches and IT security
    • Data breaches, trust and social capital
    • DDoS attacks and network reliability
    • The dark Web and real-world safety
    • A new breed of vigilante justice
    • The effect of a divided physical world and the single global Internet
    • Seven: Cyberwarfare in the twenty-first century
    • Security through resiliency
    • Malicious cyber activity
    • A new war in cyberspace?
    • Open but vulnerable
    • The rise of new cyber mercenaries
    • Will deterrence and arms control work in cyberspace?
    • Implications for China
    • Eight: Internet haves and have-nots
    • The Internet expansion S-curve: bringing the next billion online
    • Network effects (Metcalfe's Law)
    • The costs of the last 20 percent
    • Internet expansion in lower-middle-income countries
    • Breaking (or building) the trust of new users
    • Vignette one: free Facebook?
    • Vignette two: who rules?
    • Vignette three: private gatekeepers
    • Vignette four: "a million eyes" watching you
    • Why bringing people online matters so much
    • Nine: A Web of trust : toward a safe, secure, reliable and open Internet
    • Technology and trust
    • Toward a strategy of prevention: hygiene and cyber resilience
    • Governance and trust
    • Getting Internet governance right
    • A layered approach to Internet governance
    • Strengthening and developing new norms
    • Harmonizing rules
    • Strengthening institutions through multi-stakeholder engagement and better coordination
    • Notes - Appendix: The CIGI-Ipsos Surveys
    • 2014 CIGI-Ipsos survey
    • 2016 CIGI-Ipsos survey.
    Other title(s)
    Look who is watching
    ISBN
    • 9781928096191 ((softcover))
    • 1928096190
    OCLC
    945359016
    Statement on language in description
    Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
    Other views
    Staff view

    Supplementary Information