Compatibility, competition, and control in trusted computing environments
β Scribed by Seth Schoen
- Publisher
- Elsevier Science
- Year
- 2005
- Tongue
- English
- Weight
- 350 KB
- Volume
- 10
- Category
- Article
- ISSN
- 1363-4127
No coin nor oath required. For personal study only.
β¦ Synopsis
Trusted computing (TC) technologies deployed in the PC platform could shift the balance of power in some on-line interactions away from computer endusers and consumers of information goods and services. This effect occurs when remote attestation features make previously indistinguishable software configurations distinguishable; service and information goods providers can then discriminate against disfavored client software. Network externalities mean that even those who don't opt-in to TC use may still be harmed by widespread TC deployment. These effects might be ''defanged'' by some technical changes to TC designs.
π SIMILAR VOLUMES
## Abstract An important area in ComputerβMediated Communication (CMC) is how gender affects trust building and performance in virtual settings. This paper empirically investigates gender differences in two media, video and Instant Messaging, while performing negotiation tasks. The primary results