Designing the Public Sphere: Information Technologies and the Politics of Mediation

These groups should definitely be regulated differently due to the fact that  they possess different forms of technological uses. Markets require digital communication commands, businesses need algorithms, groups need participatory rule-making,  and individuals need enhanced agency like data ownership. As state power diminishes and technology becomes more intelligified (Verbeek), regulation must shift from many frameworks…

The “Short Arm” of Predictive Knowledge

Jonas would side the argument that cyberpolicies and development shouldn’t rely on traditional picture perfect rules and regulations but, should instead adopt a more precautionary approach that focuses  and hones in on more ethical responsibilities and worst case scenarios. Since computer systems are  often unpredictable policies should limit harmful systems before the harms can fully…

Exploring attacks on availability

Any intent to prevent users from accessing systems, networks, or data by either flooding aserver with traffic and or encrypting critical data, is considered an attack on availability. Forexample the evident rise in DDoS attacks seen in 2025 where there have been a total of 27.8million attacks reported, some exceeding 1 terabit per second in…