Article ID: CBB627277329

Regulating Contested Reality: The Failure of US Encryption Regulations (March 2019)

unapi

Foley, Jillian (Author)


Technology's Stories
Volume: 7
Issue: 1


Publication Date: March 2019
Edition Details: Issue Theme: 2018 Best Early Career Paper Winners
Language: English

Associated with

Article Handmer, Annie (March 2019) Wilderness or Open Space? Contextualising Environmental Concern in the Second Space Age. Technology's Stories. unapi

Article Carpenter, Kathryn (March 2019) “Cesspools,” Springs, and Snaking Pipes. Technology's Stories. unapi

Article Reser, Anna (March 2019) “Where the Land that Any Sane Man Wants Runs Out” Displacement and Disruption on Florida’s Space Coast. Technology's Stories. unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB627277329/

Similar Citations

Article Thomas Haigh; Mark Priestley; (July 2020)
Contextualizing Colossus: Codebreaking Technology and Institutional Capabilities (/isis/citation/CBB455159316/)

Article Stephanie Dick; (2023)
The Marxist in the Machine (/isis/citation/CBB660904182/)

Book Sean Seyer; (2021)
Sovereign Skies: The Origins of American Civil Aviation Policy (/isis/citation/CBB651045978/)

Book Mark Aldrich; (2018)
Back on Track: American Railroad Accidents and Safety, 1965–2015 (/isis/citation/CBB660965999/)

Article Farley, Tom; (Winter 2007)
The Cell Phone Revolution (/isis/citation/CBB729065131/)

Article Moa Carlsson; (April 2022)
Computing views, remodeling environments (/isis/citation/CBB726932342/)

Article Peter M. Asaro; (June 2019)
AI Ethics in Predictive Policing: From Models of Threat to an Ethics of Care (/isis/citation/CBB655687648/)

Article Franco Zambonelli; Flora Salim; Seng W. Loke; Wolfgang De Meuter; Salil Kanhere; (June 2018)
Algorithmic Governance in Smart Cities: The Conundrum and the Potential of Pervasive Computing Solutions (/isis/citation/CBB451138216/)

Article Misa, Thomas J.; (2016)
Computer Security Discourse at RAND, SDC, and NSA (1958-1970) (/isis/citation/CBB851516279/)

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/isis/citation/CBB760734420/)

Book Charles Blanchard; (2021)
The Extraction State: A History of Natural Gas in America (/isis/citation/CBB393886172/)

Article Kirsch, David A.; (2005)
Notes from the Field: Patterns of Institutional Interaction (/isis/citation/CBB134705973/)

Article Sarah Myers West; (June 2022)
Cryptography as information control (/isis/citation/CBB869396949/)

Article Moon, Seong-gin; DeLeon, Peter; (2005)
The Patterns of Institutional Interaction and ISO 14001 Adoptions (/isis/citation/CBB450592424/)

Article Gregory L Thompson; Danika Bellamy-Sankar; (August 2018)
California’s Wildcat Sedans: 1917–42 Challenging Transportation Regulated Monopoly (/isis/citation/CBB874972362/)

Article Russell, Andrew Lawrence; James L. Pelkey; Loring Robbins; (Spring 2022)
The Business of Internetworking: Standards, Start-Ups, and Network Effects (/isis/citation/CBB136746708/)

Article Janet Toland; (April-June 2021)
Consortium Computing and Time Slicing in the Banking Sector: Databank Systems Ltd New Zealand (/isis/citation/CBB565212269/)

Article Abbate, Janet; (2010)
Privatizing the Internet: Competing Visions and Chaotic Events, 1987--1995 (/isis/citation/CBB001231740/)

Authors & Contributors
DeLeon, Peter
Danika Bellamy-Sankar
Loring Robbins
Franco Zambonelli
Charles Blanchard
Moa Carlsson
Concepts
Technology and government
Computers and computing
Regulation
Algorithms
History of Computing
Cryptography
Time Periods
20th century
21st century
20th century, late
Modern
20th century, early
19th century
Places
United States
Great Britain
Bletchley Park
Wales
New Zealand
California (U.S.)
Institutions
United States. National Security Agency
Federal Aviation Administration
National Science Foundation (U.S.)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment