We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This chapter explores how readers who have chosen an e-book decide on their next step, contrasting the motivations for purchase (or conditional use license purchase), loan, and piracy. It draws on legal scholarship, book history, and fan studies to investigate how bookness and realness in the form of meaningful ownership can be constituted if desired, acknowledging that bookness and realness may be unwanted when readers prefer temporary, unauthorised, or unambiguously illegal uses. This recasts e-books as an integral part of building a personal library: sometimes as components, but sometimes just as tools. It concludes with evolving understanding of the rights of the reader and the fraught question of e-book control, and readers’ experiences of conflict with corporate entities over ownership of their collections. This further demonstrates how readers are able to move flexibly between conceptions of e-books as real books, ersatz books, and digital proxies.
This chapter examines e-book realness in terms of identity and love: e-books shared or not shared, displayed or not displayed, and made a cherished part of the reader’s personal history or barred from such status. It examines aspects of display and cultural capital in forms specific to digital and forms specific to print. It investigates how stereotypes (of some readers as unqualified and some reading practices as inferior) and assumptions (including tropes of furtive reading) interact with existing narratives of literary decline, technology as a threat to culture, and women as incompetent readers. It explores love for reading devices as well as love for print, and how identity as a bibliophile proves compatible with e-reading. E-books are only sometimes real, but it is their very flexibility that makes them so valuable to book lovers. They can be public or private, permanent or ephemeral, valuable or valueless, intimate or distant, depending on one’s usage and settings but also on one’s idea of what an e-book is; and, as demonstrated, that idea is highly adaptable and at least sometimes under one’s conscious control.
This chapter investigates first encounters with e-books and the processes by which readers evaluate a given work. Drawing on Genette’s theories of paratext and Drucker’s of performative materiality, it examines how trust is established and legitimacy constituted in practice, considering realness and bookness in terms of a given e-book’s status as cultural product and cultural object, and the ways in which e-book legitimacy can hinge on relationship to a print edition or to traditional mainstream publishing. It analyses readers’ rationale of realness on the theme of equivalence, contrasting conceptions of an e-book as real because ‘bits and ink – there’s no difference’ and unreal because they are ‘not the same product’. Finally, it considers the digital proxy and the ersatz book as two discrete types of e-book unrealness.
Public whistleblowers can struggle to gain support. Working with colleagues can help. When formal shields like laws and official channels prove useless, whistleblowers can turn to other workers in the same situation. This is illustrated with the case of Christian Smalls, warehouse manager at Amazon who was fired for speaking out about health and safety issues during the COVID-19 pandemic. Christian went public with his disclosures, supported by close colleagues initially and quickly extending his support base to senators, broadsheet journalists and prime-time TV producers, all of whom covered his struggle. Even Amazon executives came out against their company’s attacks on whistleblowers. This chapter also showcases the mistakes organizations can make when engaged in aggressive reprisal, mistakes that can backfire. Whistleblowers’ former training as managers can strengthen their capacity to strategize, organize and make the most of such unintended consequences. Whistleblower alliances with supportive colleagues are critical for success, but tensions can emerge in the high-stress and fast-changing context of an escalating and high-profile whistleblowing disclosure.
In Chapter 6, we present our reconceptualization of organizational control. We discuss four fundamental shifts in organizations – from face-to-face work to remote work; from stable, full-time work to alternative work arrangements; from human managers to algorithmic control; and from traditional to platform-mediated gig work – and discuss the impact of these shifts on organizational control. Our reconceptualization consists of both a conceptual part, where we advance a configurational approach to model the causal complexity inherent in organizational control, and an empirical part, where we present exemplary archetypes of control configurations across a variety of twenty-first-century organizations, including US trucking companies, GitLab, Amazon warehouses, Uber, and Upwork.
In 1997 Amazon started as a small online bookseller. It is now the largest bookseller in the US and one of the largest companies in the world, due, in part, to its implementation of algorithms and access to user data. This Element explains how these algorithms work, and specifically how they recommend books and make them visible to readers. It argues that framing algorithms as felicitous or infelicitous allows us to reconsider the imagined authority of an algorithm's recommendation as a culturally situated performance. It also explores the material effects of bookselling algorithms on the forms of labor of the bookstore. The Element ends by considering future directions for research, arguing that the bookselling industry would benefit from an investment in algorithmic literacy.
The Amazon basin has the largest number of fish in the world, and among the most common fishes of the Neotropical region, the threespot (Leporinus friderici) is cited, which in relation to its microparasitic fauna, has described only 1 species of the genus Henneguya, Henneguya friderici. The Myxozoa class is considered an obligate parasite, being morphologically characterized by spores formed by valves connected by a suture line. This study describes a new species of Henneguya sp. in the Amazon region for L. friderici. This parasite was found in the host's pyloric caeca and caudal kidney, with mature spores with a total spore length of 38.4 ± 2.5 (35.9–40.9) μm; the spore body 14.4 ± 1.1 (13.3–15.5) μm and 7.3 ± 0.6 (6.7–7.9) μm wide. Regarding its 2 polar capsules, they had a length of 5.1 ± 0.4 (4.7–5.5) μm and a width of 2.0 ± 0.1 (1.9–2.1) μm in the same pear-shaped, and each polar capsule contained 9–11 turns. Morphological and phylogenetic analyses denote that this is a new species of the genus Henneguya.
Over the last half-decade, worker-led struggles have spread across US cafes, warehouses, universities, media outlets, and beyond. Reviving the bottom-up spirit that enabled unions to make their big breakthrough in the 1930s, recent worker-to-worker initiatives have shown how this can be done in our sprawled out, economically decentralized conditions. Building off the best traditions of left trade unionism, and leaning on the novel affordances of digital tools, they’ve pioneered new forms of organizing that can extend widely enough to confront the systemic ills plaguing working people.
The book’s overall conclusion summarizes the argument advanced in this book. Despite advancing a theory that utilizes security practice to achieve security as a state of being, it ends on a cautionary note. To wit, although we have established the existence of mandatory securitization, the same should not be considered a ready-made solution to the world ills but rather a necessary evil in an insecure world. The conclusion argues that decision-makers concerned with improving the world should ultimately concern themselves with eradicating the sources of insecurity and not with fighting fires.
Chapter 2 explores the Ecuadorean rainforest landscape, its inhabitants, and their first interactions with the oil industry before large-scale oil extraction started in the late 1960s. It starts by looking back at the millennia of gradual changes when the history of crude oil and the tropical rainforest environment started to intersect. An exploration of the geographical properties of the Amazon landscapes, as well as their flora and fauna including human inhabitants, visualizes the lively environment encountered by the first oilmen visiting the area in the period between the 1920s and the 1960s. Two multinational oil companies, the Leonard Exploration Company and Shell, undertook major efforts to discover petroleum reserves in the Ecuadorean Amazon. Even though their exploration programs failed in the end, their pioneering work of mapping and surveying the rainforest and its subsoil laid the foundation for large-scale petroleum extraction decades later.
The Metamorphosis of the Amazon sheds new light on the complex history of the Ecuadorian rainforest, revealing how oil development and its social and ecological repercussions triggered its metamorphosis. When international oil giants such as Shell and Texaco started to dig for oil in remote rainforest locations, a process was born that eventually altered the fabric of the Amazon forever. Oil infrastructure paved way for a disastrous industrial and agricultural landscape polluted by the hazardous waste management of the oil industry. Adopting a unique approach, Maximilian Feichtner does not recount the established narrative of oil companies vs. suffering local communities, he instead centers the rainforest ecosystem itself – its rivers, animals, and climate conditions – and the often neglected actors of this history: the oilmen and their experiences as people affected by a pollution they perpetrated and witnessed. This title is part of the Flip it Open Programme and may also be available Open Access. Check our website Cambridge Core for details.
This article examines whether mass deforestation could be prosecuted as a crime against humanity under Article 7 of the Rome Statute. It does so in respect of the situation in the Brazilian Legal Amazon in 2019–2021, where the unbridled exploitation and destruction of the rainforest had a disastrous impact at local, regional and global levels. The article covers three main aspects. First, it explores the existing limits of international criminal law for prosecuting mass deforestation as a crime against humanity, and the contours within which criminalization would be possible. Secondly, it discusses the challenges inherent in the anthropocentric nature of the chapeau requirement of Article 7 for the criminalization of mass deforestation under that provision. Thirdly, it analyses the extent to which mass deforestation could qualify as persecution and/or an ‘other inhumane act’ under Articles 7(1)(h) and (k) of the Rome Statute.
For many years, the existence of ancient human settlements in the Amazon was deemed impossible, particularly those as old as 12,000 BP as found in Pedra Pintada Cave in Monte Alegre, in the state of Pará, by Anna Roosevelt and colleagues in the 1990s and by Edithe Pereira's team in 2014. In this article, we present the results of the technological analyses of the bifacial tools found in the cave, focusing on raw materials, techniques, shaping and retouching methods, and technical procedures. The analyses indicate careful knapping, with no mistakes, in hundreds of flakes in the shaping and retouching phases, as well as fragmented tools with flaws. Whenever possible, we compare the results to the data published by Roosevelt and colleagues in 1996 from the same site.
The Amazon River dolphin Inia geoffrensis occurs throughout the basins of the Amazon and Orinoco Rivers and is categorized as Endangered on the IUCN Red List. Using satellite tracking data from eight dolphins (one female and seven males) in the Peruvian Amazon, we demonstrate that these dolphins inhabit a variety of habitat types and have core areas and home range areas of variable magnitudes. To gain a better understanding of how threats affect these dolphins, we examined the distance of dolphin records to locations of current and potential future anthropogenic threats. On average, dolphin home ranges overlapped with fisheries by 89%. Dolphins were found at an average distance of 252 km from the nearest proposed dam and 125 km from the nearest proposed dredging site. Given that many of these threats are still in the planning stage, we advise the government to consider the negative effects these activities have already had on other riverine species before proceeding. Additionally, efforts should be made to expand river dolphin tracking programmes to span multiple seasons, to track more females at our study sites and to increase the numbers tracked overall in other areas to improve our knowledge of the species' movement patterns.
Until recently, those wanting to escape the effects of terrestrial light pollution could leave cities and travel to the countryside to observe the night sky. But increasingly there is nowhere, and therefore no way, to escape the pollution from the thousands of satellites being launched each year. ‘Mega-constellations’ composed of thousands or even tens of thousands of satellites are designed to provide low-cost, low-latency, high-bandwidth Internet around the world. This chapter outlines how the application of the ‘consumer electronic product model’ to satellites could lead to multiple tragedies of the commons, from the loss of access to certain orbits because of space debris, to changes to the chemistry of Earth’s upper atmosphere, to increased dangers on Earth’s surface from re-entered satellite components. Mega-constellations require a shift in perspectives and policies. Instead of looking at single satellites, we need to evaluate systems of thousands of satellites, launched by multiple states and companies, all operating within a shared ecosystem.
The rapid development of mega-constellations raises difficult issues of international law, including liability for collisions involving satellites. Establishing ‘causation’ – that the actions of one satellite operator caused a specific collision with another space object and resulted in damage – could be a challenge, especially in the context of knock-on collisions where debris from an initial collision later collides with one or more spacecraft, including satellites. A further challenge is determining, in the absence of binding international rules on the design and operation of satellites, what is ‘reasonable’ behaviour and therefore what constitutes ‘negligence’. This chapter also addresses the interference to astronomy that is increasingly resulting from light and radio spectrum pollution from satellites. A full interpretation of the Outer Space Treaty leads to the conclusion that states are already required to take certain steps, including conducting an environmental impact assessment, before licensing mega-constellations, because of the obligation of ‘due regard to the corresponding interests of all other States Parties to the Treaty’.
The content of this book is rather controversial. It paints a rather bleak picture, that the current EU legal economic system being developed for the data-driven economy is both outdated and – to some extent – a policy at war with itself. It promotes dominant platforms to detriment of others. Moreover, the fundamentals for creating rules are also missing. A liberal economic system needs to be based on aspects of a rights system, otherwise, we risk losing innovation, the establishment of new markets, and the creation of wealth, while we will see increasing market failures. Without a legal system for rights to data, we will lose out of a just system for the distribution of wealth. Indeed, it is time that the data-driven economy and the internet economy are granted their ‘property’ rights, reflecting the new paradigm of the data-driven industrial revolution. Moreover, such a regime fits well with the European economic constitution now being established.
Generally, it might seem that the problem of a few system leaders hoarding data should be addressed by competition law. Market power and monopolizations generally trigger competition-law remedies. However, as will be discussed below, when it comes to accessing data, and especially when access to data should be granted as a continuing service, competition law is generally the wrong platform to use. Access or forced collaboration is difficult to establish under competition law. The case law of the Court of Justice of the European Union (CJEU) makes it difficult to succeed in arguing that a refusal to grant access to data is an abuse of market dominance under Article 102 TFEU. Proving market dominance in data-related markets is a challenging undertaking and is highly case specific. Similarly, the very stringent requirements defining abuse were developed for different situations and may need to be adapted to circumstances of the data-driven economy. More importantly, only undertakings would be able to rely on a right to access data under Article 102 TFEU, which would generally exclude access claims of consumers. Finally, the enforcement system of competition law does not seem to be sufficiently effective to guarantee competitive markets for the mass phenomenon of data lock-ins caused by connected devices.1
Sector-specific regulations apply in several network industries. The telecom sector and infrastructures such as utilities have been regulated based on the notion that they are natural monopolies and need to be regulated to prevent facilitation of monopolies. However, in the beginning of the internet era, large tech escaped regulation.1
Data is vital to the internet-based economy and will become even more important in the old economy as the Internet of Things (IoT) gains ground. The competitiveness of firms will increasingly depend on timely access to relevant data and the ability to use that data to develop new, innovative applications and products. In consumer-oriented businesses, the relevant data is often personal information; although this data is becoming increasingly collectable, only a few firms have access to larger amounts of it.1