Pandemic as War: A Dangerous Frame

News coverage, twitter comments, and interviews have featured people from all walks of life describing the current pandemic through language we typically with armed conflicts. Covid-19 is our enemy, we must forgo peace time luxuries to support those fighting on the front lines. It’s a compelling and easily understood narrative which has been reinforced by decades of participation in various conflicts around the world. We’ve internalized these scripts, sets, and the roles we’re expected to ...continue


A Case for Privacy

Recognizing privacy as essential for both the well-being of individuals and our communities has only become more urgent as technological innovation continues to erode the distinction between our private and public lives. Unfortunately, the bond between privacy and the individual is often glossed over, framed as an opaque black box which undermines our ability to recognize its importance. It is essential that we understand how privacy enables meaningful human expression granting both individuals and groups the opportunity embrace and cultivate our shared human nature.

...continue


Statelessness, Technology, and the Growing Gap Between Individuals and Reality (Working Excerpt)

  Article 1(1) of the 1954 Convention relating to the Status of Stateless Persons defines statelessness as a person “who is not considered a national by any State under the operation of its law” (United Nations 1954:3). Hannah Arendt describes two significant harms stateless individuals must contend with. The first relates to the legal or political nature of the deprivation where individuals become rightless as a consequence of not belonging to an internationally recognized political ...continue


Bypassing the Lenovo Thinkpad E550 BIOS Password

  I am not responsible for any damages or issues you may encounter while attempting the following, do it at your own risk and on hardware you own or for which you have permission.   There’s a lot of information out there already on how to bypass BIOS passwords which includes shorting but what I didn’t find were which EEPROM pins I needed to short on the particular motherboard found within my Thinkpad Model. Many ...continue


The Significance of Privacy in Constructing the Person

Photo: HLS Historical and Special Collections The recognition of privacy as essential for both the well-being of individuals and the multiplicity of networks we constitute has only become more urgent as technological innovation continues to erode the distinction between our private and public lives. Unfortunately, the bond between privacy and the individual is often glossed over, framed a black box which undermines the ability and will necessary for its defense. Understanding how the expectation of ...continue


Completed the Summary of Taddeo’s Just Information Warfare Article (2016)

I completed the second part of the summary and edited the original article which you can check out here.

I’ve also stated working on and adding graphics/illustrations to existing work like this one. I’ll be working on some more detailed infographics in the future, should be a good way to quickly convey information in a compelling manner.

...continue


Instantiating Complexity with Simplicity and Heterogeneity as Descriptors

Photo: Cover of Law, John and Annemarie Mol, eds. 2006. Complexities: social studies of knowledge practices. Durham, NC: Duke University Press. How we engage with complexity is shaped by our understanding of its structure which in turn frames our ability to communicate those challenges simply and effectively. Complexity is quick to reveal itself when moving between the simple and the complex, an observation not lost on application security professionals who create policy documents establishing an organization’s ...continue


Just Information Warfare, Mariarosaria Taddeo, 2016.

Just Information Warfare, Mariarosaria Taddeo (2016) 35: 213. https://doi.org/10.1007/s11245-014-9245-8

 
In her article “Just Information Warfare”, Mariarosaria Taddeo uses an ethical analysis of information warfare to bridge an ontological gap emerging from the information revolution and the unique capabilities Information Warfare enables which theories like Just War Theory are not equipped handle adequately (JWT). The article is organized in two parts, the first describes information warfare emphasizing its unique characteristics which provoke equally unique problems when JWT is applied to information warfare. The second part introduces Information Ethics and the four principles on which provide its foundation which is then applied to Just War Theory whose product is used to establish three principles of Just Information Warfare which overcomes the ethical issues posed when JWT is applied to information warfare without consideration for its unique attributes. ...continue


The Internet and Democratic Discourse, Lincoln Dahlberg, 2001.

In his article, The Internet and Democratic Discourse: Exploring The Prospects of Online Deliberative Forums Extending the Public Sphere, Lincoln Dahlberg explores through a case study how a deliberative model of democracy can overcome economic, structural, and social challenges in order to extend the public sphere using a criteria established by Jurgen Habermas....continue


* Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.