Aynne Kokas (Author)
In Apple CEO Tim Cook's keynote speech at the Chinese government's 2017 World Internet Conference, he extolled the values of “Privacy. Security. Decency” (Apple Newsroom 2017). The last two terms, “security” and “decency,” have long been closely associated with Chinese government efforts to control the Internet. Indeed, in 2017 Apple agreed to turn over user data to Chinese government servers and start a Chinese provincial government-run data storage center. Yet in 2015, Apple refused to turn over the passcode for one user in the United States during the FBI investigation following the San Bernardino terrorist attacks. The company's different policies in the United States and China relate directly back to Apple's concern for market share and access.
...More
Book
Mary F. E. Ebeling;
(2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance
(/p/isis/citation/CBB663965321/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/p/isis/citation/CBB201310866/)
Article
Kjetil Rommetveit;
Niels van Dijk;
(2022)
Privacy engineering and the techno-regulatory imaginary
(/p/isis/citation/CBB677677741/)
Article
Meg Lata Jones;
(April 2017)
The right to a human in the loop: Political constructions of computer automation and personhood
(/p/isis/citation/CBB116228495/)
Article
Wouter M. P. Steijn;
Anton Vedder;
(July 2015)
Privacy under Construction: A Developmental Perspective on Privacy Perception
(/p/isis/citation/CBB590761705/)
Article
Ben Falchuk;
Shoshana Loeb;
Ralph Neff;
(June 2018)
The Social Metaverse: Battle for Privacy
(/p/isis/citation/CBB447859564/)
Article
Vijay Sivaraman;
Hassan Habibi Gharakheili;
Clinton Fernandes;
Narelle Clark;
Tanya Karliychuk;
(June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications
(/p/isis/citation/CBB353680957/)
Book
Francesca Musiani;
Derrick L. Cogburn;
Laura DeNardis;
Nannette S. Levinson;
(2016)
The Turn to Infrastructure in Internet Governance
(/p/isis/citation/CBB771724730/)
Book
John Cheney-Lippold;
(2017)
We are data : Algorithms and the making of our digital selves
(/p/isis/citation/CBB593815757/)
Article
Carsten Ochs;
Barbara Büttner;
Jörn Lamla;
(May 2021)
Trading Social Visibility for Economic Amenability: Data-based Value Translation on a “Health and Fitness Platform”
(/p/isis/citation/CBB474517087/)
Thesis
Kim, Young Chun;
(2006)
Privacy and Communications Technologies in United States History: A Comparison of Concepts of Privacy in Relation to Changing Communications Technologies
(/p/isis/citation/CBB001560954/)
Book
Josh Lauer;
Kenneth Lipartito;
(2021)
Surveillance Capitalism in America
(/p/isis/citation/CBB401959068/)
Book
Ken Kocienda;
(2018)
Creative Selection: Inside Apple's Design Process during the Golden Age of Steve Jobs
(/p/isis/citation/CBB272389468/)
Book
Rick Tetzeli;
Brent Schlender;
(2015)
Becoming Steve Jobs: The evolution of a reckless upstart into a visionary leader
(/p/isis/citation/CBB958873533/)
Article
John Tresch;
(2023)
Afterword: Mashed between Code and Craft: So Many Pictures of Food
(/p/isis/citation/CBB368378431/)
Article
Alexander Trauth-Goik;
(December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System
(/p/isis/citation/CBB323886145/)
Chapter
Coopersmith, Jonathan C.;
(1999)
The role of the pornography industry in the development of videotape and the Internet
(/p/isis/citation/CBB118649229/)
Thesis
Simon, Craig Lyle;
(2006)
Launching the DNS War: Dot-Com Privatization and the Rise of Global Internet Governance
(/p/isis/citation/CBB001560608/)
Article
Marja Alastalo;
Ilpo Helén;
(2022)
A code for care and control: The PIN as an operator of interoperability in the Nordic welfare state
(/p/isis/citation/CBB680872303/)
Article
Stefan Reichmann;
(2023)
Mobile researchers, immobile data: Managing data (producers)
(/p/isis/citation/CBB274619537/)
Be the first to comment!