MIT OpenCourseWare


» 進階搜尋
 課程首頁
 教學大綱
 教學時程
 相關閱讀資料
 課堂講稿
 專題
 研習資料

相關閱讀資料


本頁翻譯進度

燈號說明

審定:無
翻譯:張潔(簡介並寄信)
編輯:馬景文(簡介並寄信)
(編註:輔助教室
編輯所設置自學書院網站設有本課程的輔助教室,內容包括部份閱讀文章的翻譯本,中文文獻連結,和自學者論壇。)


本課程包含許多閱讀資料,大部份都是簡短的,主要在網上。此外,要閱讀
  • Larry Lessig著《觀念的未來》,Random House, 2001。
  • 課程包(資料待增加)。

個別課題閱讀資料

以下是一些個別課題的背景。具體內容將在每周作業中說明。

一般課程內容的其他資訊來源

  • 《連綫》雜誌 展示Gucci的網絡空間形象(Hal是在Condé –Nast收購前撰寫的),每期的字體幾乎和麻省理工學院招生辦公室的宣傳小册子數目相當。你還得爲這課程發掘更多嚴肅的材料,但就一般閱讀而言,《連綫》是可以的,而且偶有精彩文章。


  • 電子前沿基金會保留廣泛的在綫檔案文件。這對本學期的學習很有用,特別是關於立法法律事項的彙集,還有關於隱私、安全、密碼和監督的檔案。你還應該查看當期和過時的《EFFector》通訊。


  • 民主與科技中心是一個關注計算機和通訊技術中公民自由的組織。他們的主頁是查詢當前立法行爲的好地點。


  • 電子隱私信息中心 是一個處理有關「國家信息基礎設施」公民自由事宜的公益組織,也是「國際隱私」的華盛頓辦公室。該中心有關乎計算機安全隱私密碼系統政策、和言論自由的在綫彙集。


  • Lexis/Nexis:Lexis-Nexis全球(資料庫)有法律評論文章,法院判詞以及很多其他資料。訂閱Lexis/Nexis是以機構發牌,而且受約束。只能在麻省理工學院鏈接Lexis/Nexis的檔案。其他人如要取這該檔案提到的Lexis/Nexis材料需自行安排。


  • 美國國會Thomas (Jefferson)公共信息系統提供《國會記錄》的關鍵詞搜索。


  • 以下是兩部經典的科幻作品,與課程無直接關係——又或和課程密切相關,因爲它們描繪今天的網絡技術為未來而建設。精神食糧:


    • William Gibson的《神經漫游者Neuromancer》,作者發明“網絡空間”這個詞。如果你已經讀了這本書幷喜歡,一定會想看續集《計零Count Zero》《蒙娜麗莎超速檔Mona Lisa Overdrive》

    • Vernor Vinge的〈真名實姓True Names〉,選自合集《真名實姓和其他的危險True Names and other Dangers》。這短篇小說寫於80年代初,令人不安地預言了當今有關網絡匿名、隱私、安全等問題。



The class will have many readings, mostly short. Most of these are on the web. In addition
  • Read the book The Future of Ideas, by Larry Lessig (Random House, 2001).
  • Course pack (info to be added).

Readings for Individual Topics

Here is background for some of the individual course topics. Specific items will be indicated in the weekly assignments.

Other Sources of General Course Material

  • Wired Magazine displays the Gucci look for cyberspace (and Hal wrote this before they were purchased by Condé -Nast), with almost as many fonts per issue as the MIT Admissions Office's publicity booklet. You'll have to dig up more serious material for the course, but Wired is OK for general reading and there are occasional excellent articles.


  • The Electronic Frontier Foundation maintains extensive on-line archives. These will be useful throughout the semester, especially the collections on Legislation and Legal issues, and the Privacy, Security, Crypto, and Surveillance Archive. You should also check out current and past issues of their newsletter, the EFFector.


  • The Center for Democracy and Technology is an organization concerned with civil liberties in computer and communcations technologies. Their home page is a good place to look for information on current legislative action.


  • The Electronic Privacy Information Center Is a public-interest group that deals with civil liberty issues relating the National Information Infrastructure. It is also the Washington Office of Privacy International. There are good on-line collection on computer security, privacy, cryptography policy, and free speech.


  • Lexis/Nexis: Law review articles, court rulings, and many other resources can be found in Lexis-Nexis Universe. Subscriptions to Lexis/Nexis are licensed by institutions and are restricted. The links to Lexis/Nexis resources in this archive work at MIT only -- they can be accessed only from within the MIT network. Other people who wish to get hold of the Lexis/Nexis material cited in this archive will need to arrange for their own access.


  • The US Congress Thomas (Jefferson) public information system provides keyword searches of the Congressional Record.


  • Here are two classic science-fiction works that don't have anything to do with the course directly -- or maybe they have everything to do with the course directly, since they describe the futures we may be laying the groundwork for with today's network technology. Food for thought:


    • William Gibson, Neuromancer. From the man who invented the word "cyberspace." If you've read the book and liked it, you may want to look at the sequels, Count Zero and Mona Lisa Overdrive.

    • Vernor Vinge, "True Names," in the collection True Names and other Dangers. Written in the early 80s, this short story is frighteningly prophetic of current issues having to do with anonymity, privacy, and security on the network.



 
MIT Home
Massachusetts Institute of Technology Terms of Use Privacy