Steve Wright | University of California, Los Angeles (original) (raw)
Papers by Steve Wright
The SAS® Viewer has been a useful, free, but increasingly limited tool. It is free. It has bugs a... more The SAS® Viewer has been a useful, free, but increasingly limited tool. It is free. It has bugs and limitations. Starting with SAS9, this tool often will be unable to access the default data tables. The Universal Viewer is a fresh take on a tool to fit this niche. Everyone will find that a number of the things this tools does are just right. It does not lock datasets. When filtering data, it will not return the converse when using missing values in the logic clause. To make your first impression to be the best it can be, you will want to be aware of a surprise or two.
Cyberspace, 2017
There was a time within even this author’s memory, when there was no cyberspace, no cybercrime of... more There was a time within even this author’s memory, when there was no cyberspace, no cybercrime of note, no viruses and no anti-virus software, no hacking and no hackers. Cyber-delinquency was unknown, criminals had to do their criminality in the physical world and academic research was done in libraries not ‘on-line’. The speed of banking in that far off time was pedestrian. During the Fifties, letters took weeks to arrive overseas, with anything more urgent being sent by costly telegram, over phone wires. In the intelligence world, the success of decoding Enigma and the entire field of de-encryption remained a secret, Alan Turing continued to be an unsung hero, and machine intelligence had very little acknowledged role, it was mainly human centred. In the Sixties, protest was on the streets and no-one, apart from traffic engineers, knew what networking meant. In just one lifetime, all that has changed and the pace of that change has rapidly accelerated too. The evolution of cyberspace has brought many advantages to societies once separated by distances but now able to communicate, bank, educate and socialize online and in real time. It has also brought many unanticipated dangers. Some, including radicalization, grooming, phishing, banking fraud, stalking, identity theft and denial of service attacks, are the stuff of daily news. Others, including the security and defence revolutions in military affairs, are much less discussed, despite the fact that the cyber-world originated and is firmly rooted in a military architecture of space based satellites and associated communications infrastructure. This chapter critically assesses some of the mythology of just who are the cyber bad guys, the extent to which these constructions are open to wider processes of perceptions management and the need to identify the rather more hidden agendas facilitated by emerging new capability sets in cyberspace and the so called ‘internet of things.’ That world is still tremendously Anglo-centric, notions of just whose security is being protected remain contested, and we are only at the beginning of a more global debate on big data and the challenge of meaningful governance.
Effective management of pest arthropods' development of resistance to pesticides is important for... more Effective management of pest arthropods' development of resistance to pesticides is important for the future profitability of cotton. New registrations for pest control products are difficult to obtain and costly to develop. Pesticide applications that do not provide adequate control waste money, unnecessarily increase the overall pesticide load on the environment, and expose other insects to these products.
Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI, 2013
Daily we provide new information about ourselves, when shopping, travelling, communicating on the... more Daily we provide new information about ourselves, when shopping, travelling, communicating on the Internet or telephone, or even when we are simply eating out at a local restaurant. The collection of information is a constant in our lives, with the commercial sector profiling every aspect of our behaviour, from the insurance policies we purchase to the beer we drink. Much of this data is gathered without consumers being aware of the extent to which their privacy and anonymity are being compromised. Whilst the criminal fraternity may also wish to misuse our personal information for fraud or theft, the motives of the largest agencies collating this data are much less obvious or transparent. A recent series of reports to the European Parliament has identified the emergence of new technologies of political control. Such technology can watch and listen to our every move, this is not fiction, although the key player, the US National Security Agency is the same secretive organisation that ...
Nursing standard (Royal College of Nursing (Great Britain) : 1987), Jan 17, 1996
GOD. There, I mentioned Him! Within a generation, nursing in particular and society in general ha... more GOD. There, I mentioned Him! Within a generation, nursing in particular and society in general has steadily dismantled the barriers about taboo subjects. It is possible to watch TV programmes covering the most intimate aspects of dying or even how to wear a condom. And religion? Well, you might catch TTiought for the day' on Radio 4, or tune in to politically correct, multifaith documentaries, or join in with the happy- clappy Jesus set on satellite channels.
Nursing standard (Royal College of Nursing (Great Britain) : 1987), Jan 10, 1997
May I thank the many nurses who contributed to our building fund appeal which raised £120,000, an... more May I thank the many nurses who contributed to our building fund appeal which raised £120,000, and helped us to buy Highland Hall.
Nursing Standard, 1996
THE FUTURE can appear scary in times of change. Sometimes the rate of change seems so great as to... more THE FUTURE can appear scary in times of change. Sometimes the rate of change seems so great as to be almost overwhelming.
Surveillance & Society
Edward Snowden is exemplary of this strange and contradictory age of surveillance and transparenc... more Edward Snowden is exemplary of this strange and contradictory age of surveillance and transparency: far from being a senior internal figure like Drake or Binney, an actual working spy like Madsen or Tice, or even a developer for a technology provider and contractor like Margaret Newsham or Klein, he was simply a systems administrator, one of many recruited on rolling contracts with different private sector contractors for the NSA, in his last assignment for Booz Allen Hamilton – Mike McConnell’s outfit. But his position gave him unprecedented accessed inside an agency that was revealed as being networked and insecure to a reasonably well-trained hacker as any other organization in the wider society it monitors. We do not intend to tell his story here. It has been well-documented by Glenn Greenwald in No Place to Hide (2014), by Laura Poitras (2014) in Citizenfour – the two investigative journalists whom Snowden originally approached – and the team from The Guardian newspaper, for wh...
Written in a unique format, Shades of Deviance is a turbo-driven guide to crime and deviance, off... more Written in a unique format, Shades of Deviance is a turbo-driven guide to crime and deviance, offering 56 politically engaged, thought-provoking and accessibly written accounts of a wide range of socially and legally prohibited acts. This book will be essential reading for undergraduate students in the fields of criminology and sociology and those preparing to embark on degree courses in these fields, as well as general readers. Written by field-leading experts from across the globe and designed for those who want a clear and exciting introduction to the complex areas of crime and deviance, this book provides a large number of short overviews of a wide range of social problems, harms and criminal acts. Offering a series of cutting-edge and critical treatments of issues such as war and murder, paedophilia, ecocide, human experimentation, stalking and sexting, this book also gives a guide to further readings and suggestions for other media to develop the reader’s understanding of thes...
The end of the Cold War ushered in a new phase of global security in which new threats and challe... more The end of the Cold War ushered in a new phase of global security in which new threats and challenges emanate from non-conventional sources, and in which the weapons and means to prosecute war harness new technology. By the mid-1990's terms such as cyberwar and netwar were being used to explain a new way of thinking about war. The intervening years have seen the development of new defence policies, such as the US 2020 Vision and the Revolution in Military Affairs, whilst the threat of terrorism has become a painful and sad reality. The period has also seen the development and deployment of a range of new technologies for military operations ranging from new smart mechanisms to deliver weapons, to surveillance and communications technologies that can change the very nature of warfare and security. This book attempts to consider this balance between the technologies and policies deployed to respond to terror and the need for human and civil rights.
EC Efforts to restrict exports of torture and execution equipment from member states
Digital Compositing for Film and Video, 2010
ABSTRACT A novel medialess dynamic particle filtration technique extending patented Boundary Laye... more ABSTRACT A novel medialess dynamic particle filtration technique extending patented Boundary Layer Momentum Transfer (BLMT) technology, removes sticky aerosols without contaminating mechanical collection media. In this filter, incoming air passes through boundary layers generated on parallel stacks of rotating disks, excluding particles larger than a critical size, and allowing their agglomeration and collection. Because no paint solids accumulate on the rotating surfaces, flow, back pressure and filtration efficiency remain constant. It thus met the two project goals of decreasing HazWaste generation and removing paint as well as a conventional arrestor. An 800-ACFM prototype BLMT, spinning 180 eight-inch-diameter disks at 4,000 RPM, excluded > 98% (by mass) of a directly sprayed aerospace paint without fouling. In combination with a downstream volatile organic compound (VOC) control unit, this BLMT device will abate hazardous paint overspray emissions at or below Clean Air Act standards. Paint solids may be recovered for recycling. unlimited scale-up is feasible using multiple modular devices, which can also tailor air movement. Projected annual operating and initial acquisition costs for a 25,000-ACFM BLMT system are - 35% less than for an equivalent, conventional three-stage filter system.
Proceedings of the American Society for Information Science and Technology, 2008
In this panel we investigate the relation between social capital and methods of populist, post-co... more In this panel we investigate the relation between social capital and methods of populist, post-coordinate knowledge management which has popularly been termed "Web 2.0" or "Library 2.0." We include in this examination the management of
The SAS® Viewer has been a useful, free, but increasingly limited tool. It is free. It has bugs a... more The SAS® Viewer has been a useful, free, but increasingly limited tool. It is free. It has bugs and limitations. Starting with SAS9, this tool often will be unable to access the default data tables. The Universal Viewer is a fresh take on a tool to fit this niche. Everyone will find that a number of the things this tools does are just right. It does not lock datasets. When filtering data, it will not return the converse when using missing values in the logic clause. To make your first impression to be the best it can be, you will want to be aware of a surprise or two.
Cyberspace, 2017
There was a time within even this author’s memory, when there was no cyberspace, no cybercrime of... more There was a time within even this author’s memory, when there was no cyberspace, no cybercrime of note, no viruses and no anti-virus software, no hacking and no hackers. Cyber-delinquency was unknown, criminals had to do their criminality in the physical world and academic research was done in libraries not ‘on-line’. The speed of banking in that far off time was pedestrian. During the Fifties, letters took weeks to arrive overseas, with anything more urgent being sent by costly telegram, over phone wires. In the intelligence world, the success of decoding Enigma and the entire field of de-encryption remained a secret, Alan Turing continued to be an unsung hero, and machine intelligence had very little acknowledged role, it was mainly human centred. In the Sixties, protest was on the streets and no-one, apart from traffic engineers, knew what networking meant. In just one lifetime, all that has changed and the pace of that change has rapidly accelerated too. The evolution of cyberspace has brought many advantages to societies once separated by distances but now able to communicate, bank, educate and socialize online and in real time. It has also brought many unanticipated dangers. Some, including radicalization, grooming, phishing, banking fraud, stalking, identity theft and denial of service attacks, are the stuff of daily news. Others, including the security and defence revolutions in military affairs, are much less discussed, despite the fact that the cyber-world originated and is firmly rooted in a military architecture of space based satellites and associated communications infrastructure. This chapter critically assesses some of the mythology of just who are the cyber bad guys, the extent to which these constructions are open to wider processes of perceptions management and the need to identify the rather more hidden agendas facilitated by emerging new capability sets in cyberspace and the so called ‘internet of things.’ That world is still tremendously Anglo-centric, notions of just whose security is being protected remain contested, and we are only at the beginning of a more global debate on big data and the challenge of meaningful governance.
Effective management of pest arthropods' development of resistance to pesticides is important for... more Effective management of pest arthropods' development of resistance to pesticides is important for the future profitability of cotton. New registrations for pest control products are difficult to obtain and costly to develop. Pesticide applications that do not provide adequate control waste money, unnecessarily increase the overall pesticide load on the environment, and expose other insects to these products.
Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI, 2013
Daily we provide new information about ourselves, when shopping, travelling, communicating on the... more Daily we provide new information about ourselves, when shopping, travelling, communicating on the Internet or telephone, or even when we are simply eating out at a local restaurant. The collection of information is a constant in our lives, with the commercial sector profiling every aspect of our behaviour, from the insurance policies we purchase to the beer we drink. Much of this data is gathered without consumers being aware of the extent to which their privacy and anonymity are being compromised. Whilst the criminal fraternity may also wish to misuse our personal information for fraud or theft, the motives of the largest agencies collating this data are much less obvious or transparent. A recent series of reports to the European Parliament has identified the emergence of new technologies of political control. Such technology can watch and listen to our every move, this is not fiction, although the key player, the US National Security Agency is the same secretive organisation that ...
Nursing standard (Royal College of Nursing (Great Britain) : 1987), Jan 17, 1996
GOD. There, I mentioned Him! Within a generation, nursing in particular and society in general ha... more GOD. There, I mentioned Him! Within a generation, nursing in particular and society in general has steadily dismantled the barriers about taboo subjects. It is possible to watch TV programmes covering the most intimate aspects of dying or even how to wear a condom. And religion? Well, you might catch TTiought for the day' on Radio 4, or tune in to politically correct, multifaith documentaries, or join in with the happy- clappy Jesus set on satellite channels.
Nursing standard (Royal College of Nursing (Great Britain) : 1987), Jan 10, 1997
May I thank the many nurses who contributed to our building fund appeal which raised £120,000, an... more May I thank the many nurses who contributed to our building fund appeal which raised £120,000, and helped us to buy Highland Hall.
Nursing Standard, 1996
THE FUTURE can appear scary in times of change. Sometimes the rate of change seems so great as to... more THE FUTURE can appear scary in times of change. Sometimes the rate of change seems so great as to be almost overwhelming.
Surveillance & Society
Edward Snowden is exemplary of this strange and contradictory age of surveillance and transparenc... more Edward Snowden is exemplary of this strange and contradictory age of surveillance and transparency: far from being a senior internal figure like Drake or Binney, an actual working spy like Madsen or Tice, or even a developer for a technology provider and contractor like Margaret Newsham or Klein, he was simply a systems administrator, one of many recruited on rolling contracts with different private sector contractors for the NSA, in his last assignment for Booz Allen Hamilton – Mike McConnell’s outfit. But his position gave him unprecedented accessed inside an agency that was revealed as being networked and insecure to a reasonably well-trained hacker as any other organization in the wider society it monitors. We do not intend to tell his story here. It has been well-documented by Glenn Greenwald in No Place to Hide (2014), by Laura Poitras (2014) in Citizenfour – the two investigative journalists whom Snowden originally approached – and the team from The Guardian newspaper, for wh...
Written in a unique format, Shades of Deviance is a turbo-driven guide to crime and deviance, off... more Written in a unique format, Shades of Deviance is a turbo-driven guide to crime and deviance, offering 56 politically engaged, thought-provoking and accessibly written accounts of a wide range of socially and legally prohibited acts. This book will be essential reading for undergraduate students in the fields of criminology and sociology and those preparing to embark on degree courses in these fields, as well as general readers. Written by field-leading experts from across the globe and designed for those who want a clear and exciting introduction to the complex areas of crime and deviance, this book provides a large number of short overviews of a wide range of social problems, harms and criminal acts. Offering a series of cutting-edge and critical treatments of issues such as war and murder, paedophilia, ecocide, human experimentation, stalking and sexting, this book also gives a guide to further readings and suggestions for other media to develop the reader’s understanding of thes...
The end of the Cold War ushered in a new phase of global security in which new threats and challe... more The end of the Cold War ushered in a new phase of global security in which new threats and challenges emanate from non-conventional sources, and in which the weapons and means to prosecute war harness new technology. By the mid-1990's terms such as cyberwar and netwar were being used to explain a new way of thinking about war. The intervening years have seen the development of new defence policies, such as the US 2020 Vision and the Revolution in Military Affairs, whilst the threat of terrorism has become a painful and sad reality. The period has also seen the development and deployment of a range of new technologies for military operations ranging from new smart mechanisms to deliver weapons, to surveillance and communications technologies that can change the very nature of warfare and security. This book attempts to consider this balance between the technologies and policies deployed to respond to terror and the need for human and civil rights.
EC Efforts to restrict exports of torture and execution equipment from member states
Digital Compositing for Film and Video, 2010
ABSTRACT A novel medialess dynamic particle filtration technique extending patented Boundary Laye... more ABSTRACT A novel medialess dynamic particle filtration technique extending patented Boundary Layer Momentum Transfer (BLMT) technology, removes sticky aerosols without contaminating mechanical collection media. In this filter, incoming air passes through boundary layers generated on parallel stacks of rotating disks, excluding particles larger than a critical size, and allowing their agglomeration and collection. Because no paint solids accumulate on the rotating surfaces, flow, back pressure and filtration efficiency remain constant. It thus met the two project goals of decreasing HazWaste generation and removing paint as well as a conventional arrestor. An 800-ACFM prototype BLMT, spinning 180 eight-inch-diameter disks at 4,000 RPM, excluded > 98% (by mass) of a directly sprayed aerospace paint without fouling. In combination with a downstream volatile organic compound (VOC) control unit, this BLMT device will abate hazardous paint overspray emissions at or below Clean Air Act standards. Paint solids may be recovered for recycling. unlimited scale-up is feasible using multiple modular devices, which can also tailor air movement. Projected annual operating and initial acquisition costs for a 25,000-ACFM BLMT system are - 35% less than for an equivalent, conventional three-stage filter system.
Proceedings of the American Society for Information Science and Technology, 2008
In this panel we investigate the relation between social capital and methods of populist, post-co... more In this panel we investigate the relation between social capital and methods of populist, post-coordinate knowledge management which has popularly been termed "Web 2.0" or "Library 2.0." We include in this examination the management of