• warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'oauth_commmon_is_provider' not found or invalid function name in /home/ictdev/ictdev.org/includes/menu.inc on line 454.
  • warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'oauth_commmon_is_provider' not found or invalid function name in /home/ictdev/ictdev.org/includes/menu.inc on line 454.
  • warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'oauth_commmon_is_provider' not found or invalid function name in /home/ictdev/ictdev.org/includes/menu.inc on line 454.
  • warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'oauth_commmon_is_provider' not found or invalid function name in /home/ictdev/ictdev.org/includes/menu.inc on line 454.
  • warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'oauth_commmon_is_provider' not found or invalid function name in /home/ictdev/ictdev.org/includes/menu.inc on line 454.

berkman

Kate Darling on Robot Ethics

Kate Darling (@grok_) offers a talk to the Berkman Center that’s so popular, the talk needs to be moved from Berkman to Wasserstein Hall, where almost a hundred people come for lunch and her ideas on robot ethics.

Schneier and Zittrain on digital security and the power of metaphors

Bruce Schneier is one of the world’s leading cryptographers and theorists of security. Jonathan Zittrain is a celebrated law professor, theorist of digital technology and wonderfully performative lecturer. The two share a stage at Harvard Law School’s Langdell Hall.

Who let all those Ghanaians on the Internet? Jenna Burrell on internet exclusion

Jenna Burrell, assistant professor at the School of Information at UC Berkeley, is speaking today at the Berkman Center on her research on internet usage in Ghana, the subject of her (excellent) book Invisible Users: Youth in the Internet Cafes of Urban Ghana.

Understanding our Knowledge Gaps: Or, Do we have an ICT4D field? And do we want one?

Recent discussions, either at already concluded ICT4D conferences and workshops, or here at the Harvard Forum, or in the planning discussions for future conferences, have reminded us of the sometimes strong and often unhelpful disciplinary walls that can be constructed across ICT4D’s cross-disciplinary areas and the common tendency for this field to intellectually jog-in-place.

Policies for the Natives Designed by the Immigrants?: Night Thoughts After a Workshop Day at the Berkman Centre

Three terms appearing in an agenda, "Reputation", "Privacy" and "Quality of Information", and a somewhat vague invitation to think about "Youth Policy" made me recall a moment in my life, a long time ago, when my mother - while I was at school - invaded the privacy o

Bring in the Human Rights

For a more elaborate account of the arguments presented in this essay, see Drake and Jørgensen, Introduction, in Human Rights in the Global Information Society, Rikke Frank Jørgensen (ed.), MIT Press: Cambridge, MA 2006.
read more

Syndicate content