The information infrastructures of 1985 and 2018: The sociotechnical context of computer law & security

Abstract This article identifies key features of the sociotechnical contexts of computer law and security at the times of this journal's establishment in 1985, and of its 200th Issue in 2018. The infrastructural elements of devices, communications, data and actuator technologies are considered first. Social actors as individuals, and in groups, communities, societies and polities, together with organisations and economies, are then interleaved with those technical elements. This provides a basis for appreciation of the very different challenges that confront us now in comparison with the early years of post-industrialism.

[1]  Howard Rheingold,et al.  Virtual Community , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[2]  Roger Clarke,et al.  Big Data's Big Unintended Consequences , 2013, Computer.

[3]  Frederick Hayes-Roth,et al.  Building expert systems , 1983, Advanced book program.

[4]  E. Higgs The Information State in England: The Central Collection of Information on Citizens since 1500 , 2004 .

[5]  Roger Clarke,et al.  Big data, big risks , 2016, Inf. Syst. J..

[6]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[7]  András Kornai Digital language death , 2013 .

[8]  Esther H. Highland Insurance and the hacker: David Davies Computer Control Quarterly, Spring 1988, pp. 28–30 , 1988 .

[9]  Jay F. Nunamaker,et al.  Information Technology to Support Electronic Meetings , 1988, MIS Q..

[10]  Roger Clarke,et al.  Property rights in knowledge-based products and applications , 1989 .

[11]  Jay F. Nunamaker,et al.  Electronic Meeting System Experience at IBM , 1989, J. Manag. Inf. Syst..

[12]  Roger Clarke,et al.  Electronic interaction research 1988 – 2012 through the lens of the Bled eConference , 2013, Electron. Mark..

[13]  Roger Clarke,et al.  The Feasibility of Consumer Device Security , 2007 .

[14]  Frank A. Pasquale The Black Box Society: The Secret Algorithms That Control Money and Information , 2015 .

[15]  Wendell Bell,et al.  The Third Wave. , 1982 .

[16]  Richard E. Susskind,et al.  Latent Damage Law - the Expert System , 1988 .

[17]  Roger Clarke How reliable is cloudsourcing? A review of articles in the technical media 2005-11 , 2012, Comput. Law Secur. Rev..

[18]  Shoshana Zuboff,et al.  Big other: surveillance capitalism and the prospects of an information civilization , 2015, J. Inf. Technol..

[19]  Sarah Spiekermann,et al.  Networks of Control: A Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy , 2016 .

[20]  Graham Greenleaf,et al.  Subverting ID from Above and Below: The Uncertain Shaping of India's New Instrument of E-Governance , 2013 .

[21]  H. Dauncey A Cultural Battle , 1997 .

[22]  Richard S. Rosenberg Computers and the information society , 1986 .

[23]  Robert J. Kauffman,et al.  Strategies for Internet Middlemen in the Intermediation/Disintermediation/Reintermediation Cycle , 1999, Electron. Mark..

[24]  J. Schumpeter,et al.  Business Cycles: A Theoretical, Historical, and Statistical Analysis of the Capitalist Process , 1940 .

[25]  R. Kurzweil,et al.  The Singularity Is Near: When Humans Transcend Biology , 2006 .

[26]  Ronald L. Larsen,et al.  Computer and Information Technology in the Year 2000-Projection , 1985, Computer.

[27]  Roger Clarke Quality Assurance for Security Applications of Big Data , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[28]  Roger Clarke,et al.  Understanding the drone epidemic , 2014, Comput. Law Secur. Rev..

[29]  Mark Andrejevic,et al.  The big data divide , 2014 .

[30]  Cacm Staff Information wants to be free , 2013 .

[31]  Nitin Agarwal,et al.  Raising and Rising Voices in Social Media , 2012, Bus. Inf. Syst. Eng..

[32]  Roger A. Clarke Information Technology: Weapon of Authoritarianism or Tool of Democracy? , 1994, IFIP Congress.

[33]  Frank F. Land,et al.  Evaluation in a Socio-technical Context , 2000, Organizational and Social Perspectives on IT.

[34]  Colin Tapper Computer Law , 1978 .

[35]  Roger Clarke,et al.  You are where you’ve been: the privacy implications of location and tracking technologies , 2011, J. Locat. Based Serv..

[36]  Roger Clarke,et al.  Person location and person tracking - Technologies, risks and policy implications , 2001, Inf. Technol. People.

[37]  Roger Clarke,et al.  Risks inherent in the digital surveillance economy: A research agenda , 2019, Journal of Information Technology.

[38]  Simone Fischer Hübner,et al.  Teaching Privacy-Enhancing Technologies , 2001 .

[39]  Peter Buck,et al.  What is cyberspace? , 1992, Comput. Law Secur. Rev..

[40]  Roger Clarke,et al.  A Framework for the Evaluation of CloudSourcing Proposals , 2012 .

[41]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.

[43]  P. Parijs Basic Income : A Simple and Powerful Idea for the 21st century , 2003 .

[44]  Jakob Nielsen,et al.  Hypertext and hypermedia , 1990 .

[45]  Donald A. Norman,et al.  Affordance, conventions, and design , 1999, INTR.

[46]  Roger Clarke,et al.  Data Risks in the Cloud , 2013, J. Theor. Appl. Electron. Commer. Res..

[47]  Roger A. Clarke,et al.  A contingency approach to the application software generations , 1991, DATB.

[48]  Roger Clarke,et al.  Technological Protections for Digital Copyright Objects , 2000, ECIS.

[49]  Roger Clarke Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm , 1992, IFIP Congress.

[50]  Roger Clarke The Cloudy Future of Consumer Computing , 2011, Bled eConference.

[51]  Donald J. McCubbrey,et al.  Disintermediation and Reintermediation in the U.S. Air Travel Distribution Industry: A Delphi Study , 1999, Commun. Assoc. Inf. Syst..

[52]  T. H. Nelson,et al.  Complex information processing: a file structure for the complex, the changing and the indeterminate , 1965, ACM '65.

[53]  C. Fuchs Digital Demagogue: Authoritarian Capitalism in the Age of Trump and Twitter , 2018 .

[54]  Starr Roxanne Hiltz,et al.  Network Nation: Human Communication Via Computer , 1979 .

[55]  J. J. Gibson The theory of affordances , 1977 .

[56]  Roger Clarke,et al.  Guidelines for the responsible application of data analytics , 2017, Comput. Law Secur. Rev..

[57]  Ian Sommerville,et al.  Socio-technical systems: From design methods to systems engineering , 2011, Interact. Comput..

[58]  Katina Michael,et al.  National Security: The Social Implications of the Politics of Transparency , 2006 .

[59]  Stephen B. Wicker,et al.  The future of three-dimensional printing: Intellectual property or intellectual confinement? , 2016, New Media Soc..

[60]  M. G. Michael,et al.  From Dataveillance to Überveillance (Uberveillance) and the Realpolitik of the Transparent Society , 2007 .

[61]  Roger Clarke,et al.  Web 2.0 as Syndication , 2008, J. Theor. Appl. Electron. Commer. Res..

[62]  Gerardine DeSanctis,et al.  Group decision support systems: a new frontier , 1984, DATB.

[63]  Marcus R. Wigan Data Ownership , 1991, Managing Information Technology's Organisational Impact.

[64]  Roger Clarke A major impediment to B2C success is...the concept 'B2C' , 2006, ICEC '06.

[65]  Kate Williams,et al.  Research note: Measuring the globalization of knowledge: The case of community informatics , 2013, First Monday.

[66]  Roger Clarke Who is liable for software errors? Proposed new product liability law in Australia , 1989, Comput. Law Secur. Rev..

[67]  Starr Roxanne Hiltz,et al.  The evolution of user behavior in a computerized conferencing system , 1981, CACM.

[68]  Alan Tyree Expert Systems in Law , 1989 .

[69]  Jon Bing,et al.  A Decade of Computers and Law , 1981 .

[70]  Benjamin Kuipers,et al.  Computer power and human reason , 1976, SGAR.

[71]  Roger Clarke,et al.  Surfing the third wave of computing: A framework for research into eObjects , 2015, Comput. Law Secur. Rev..

[72]  Roger Clarke What 'Uberveillance' Is, and What To Do About It , 2007 .

[73]  Barrie Gunter,et al.  Consumer Profiles: An Introduction to Psychographics , 1992 .

[74]  Roger Clarke,et al.  The Digital Persona and Its Application to Data Surveillance , 1994, Inf. Soc..

[75]  Deborah Lupton The Quantified Self: A Sociology of Self-Tracking , 2016 .

[76]  Hubert L. Dreyfus,et al.  What computers still can't do - a critique of artificial reason , 1992 .

[77]  Hans P. Moravec Robot: Mere Machine to Transcendent Mind , 1998 .

[78]  A. Westin,et al.  The assault on privacy , 1971 .

[79]  Roger Clarke,et al.  Ethics and the Internet: The Cyberspace Behaviour of People, Communities and Organisations , 1999 .

[80]  Fabian Hungerland,et al.  The Digital Economy , 2021, Introduction to Digital Economics.

[81]  Rob Kling,et al.  What Is Social Informatics and Why Does It Matter? , 2007, D Lib Mag..

[82]  Roger Clarke A framework for analysing technology’s negative and positive impacts on freedom and privacy , 2016, Datenschutz und Datensicherheit - DuD.

[83]  A. Tellegen,et al.  An alternative "description of personality": the big-five factor structure. , 1990, Journal of personality and social psychology.

[84]  Shane Harris,et al.  The Watchers: The Rise of America's Surveillance State , 2010 .

[85]  Richard Kemp,et al.  Legal rights in data , 2011, Comput. Law Secur. Rev..

[86]  Roger Clarke,et al.  Computing Clouds on the Horizon? Benefits and Risks from the User's Perspective , 2010, Bled eConference.

[87]  M. Porat The Information Economy: Definition and Measurement. , 1977 .

[88]  Yoneji Masuda The information society as post-industrial society , 1980 .

[89]  Eric Schmidt,et al.  The New Digital Age: Reshaping the Future of People, Nations and Business , 2001 .

[90]  Roger Clarke,et al.  Can small users recover from the cloud? , 2017, Comput. Law Secur. Rev..

[91]  Roger Clarke,et al.  User Requirements for Cloud Computing Architecture , 2010, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.

[92]  Gillian Dempsey Revisiting Intellectual Property Policy: Information Economics for the Information Age , 1999 .

[93]  M R Wigan,et al.  COMPUTER COOPERATIVE WORK: COMMUNICATIONS, COMPUTERS AND THEIR CONTRIBUTION TO WORKING IN GROUPS , 1989 .

[94]  James R. Beniger The Control Revolution: Technological and Economic Origins of the Information Society , 1986 .