Computing Regime

From P2P Foundation
Jump to navigation Jump to search

= how Protocollary Power is embedded in the very structure of computing, and the social effects it has

More Information

  • Computing and the Current Crisis: The Significant Role of New Information Technologies in Our Socio-Economic Meltdown David Hakken, tripleC, Vol. 8. No. 2, pp 205-220 [1]: how the current computing regime is responsible for the financial meltdown of 2008
  • Citron, Danielle Keats, Technological Due Process. U of Maryland Legal Studies Research Paper No. 2007-26; Washington University Law Review, Vol. 85, pp. 1249-1313, 2007. [2]


  1. Protocollary Power
  2. Architecture of Control
  3. Socially Robust and Enduring Computing