Elon University

Computer-Based Communication

Network access to individual personal files makes it possible to reprocess and reedit collective memories which will guarantee the removal of all nonconforming or undesirable facts. In its most objectionable form, metatext could reduce personal privacy through unwarranted intrusions into personal files. The antidote against such abuse is to design collaborative systems using only distributed filing. Access privileges would require specific permission and possibly a one-time de-encryption key.

Security Pundits Weigh War Threat

If we have an Air Force, why not a Cyberforce, and for the same reason. We invented the Air Force when the nature of war changed to three dimensions.

Security Pundits Weigh War Threat

Terrorist organizations are especially worrisome. They are eager for the kind of notoriety that would attend their knocking out the telephone system or air traffic control system.

If This is the Information Superhighway, Where Are the Rest Stops?

When they aren’t busy watching TV, shopping at home and firing off e-mail, Americans will want to use the new technology to, say, debate the issues with their fellow “netizens,” download government information on myriad topics, let their voices be heard at the local school board and seek out information about those who are willing to leave the house long enough to run for office.

If This is the Information Superhighway, Where Are the Rest Stops?

The lonely crowd’s worst fears about the electronic frontier – where citizens will be able to hook themselves up to a life-support system consisting of television, telephone and computer, and never have to leave the house in order to work, shop or even vote – were about to become reality … As Information Superhighway hysteria spread down Pennsylvania Avenue, you could almost hear humming in the air: It’s the dawning of a new era in communications law! Don’t miss this opportunity to participate in the latest policy debate! Say “goodbye” to old-fashioned representative democracy – “hello” to Virtual Government!

Libraries on the Superhighway

Most faked research today comes from Ph.D. hopefuls and bush-league scientists angling for grants. Think what it will be like with hackers and pranksters get to work. Wait till the bush-league scientists start writing papers under new names, confirming their fictitious “discoveries.” … I’m afraid those of you who work in university libraries are going to find yourselves hip-deep in it.