We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
Online ordering will be unavailable from 17:00 GMT on Friday, April 25 until 17:00 GMT on Sunday, April 27 due to maintenance. We apologise for the inconvenience.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This Chapter first presents a minimal set of basic concepts about “dislocations.” After giving a brief overview of the dislocation theory, specific notions such as “Lomer-Cottrell sessile junction” and “stacking fault energy” are detailed, which are exceptionally important for a comprehensive understanding of many of the characteristics, particularly, dislocation-dislocation interactions and their strengths. The second part provides a simple introduction to metallurgy, especially regarding crystallographic structures, placing a special emphasis on the substantial distinction between face-centered cubic (FCC) and body-centered cubic (BCC) structures, which is expected to greatly facilitate further understanding of the associated contrasting features between the two.
Floyd Abrams’ Foreword sets forth the premise of the book: that America has faced recurring episodes of censorship and that censors may be admired in their time, but that freedom of speech, as protected by the First Amendment, has flourished. For that reason, censors try to avoid being called censors.
Chapter 7 examines the mindset of Newton Minow, the Federal Communications Commission (FCC) chairman who summed up the regulator’s view of television by calling it a “vast wasteland.” Minow championed public interest regulation of the broadcast medium based on the theory that the electromagnetic spectrum is scarce and that the government must allocate broadcast licenses and regulate the content of programming.But the spectrum is no more scarce than any other economic good, and the events that led to federal control over broadcasting were contrived to extend government control over the medium. Minow and other like-minded regulators deny that this type of control is censorship, but their efforts caused diminished diversity in programming and dampened innovation. Further, the tenets of broadcast regulation were undermined as new technologies emerged, although that fact did not deter Minow and other like-minded regulators from advocating more government control. Since then, the law and the culture have moved on, rendering the positions that Minow espoused obsolete.
Chapter 8 explores the rise and fall of the FCC’s policy against broadcast indecency by following the exploits of anti-indecency crusader Brent Bozell, founder of the Parents Television Council (PTC).It traces the beginnings of the FCC’s policy in the early days of radio, and how it was transformed as courts began to develop First Amendment doctrine. It explains the birth of the FCC’s current indecency policy with its action against George Carlin’s “seven dirty words,” and how it was driven by political demands to get tough on broadcasters. This reached a crescendo because of the efforts of Bozell’s PTC and similar groups, who bombarded the FCC with spam email campaigns. Politicians responded by imposing skyrocketing fines based on an increasingly incoherent and confusing policy. The widespread chilling effect on broadcasters led courts to rein in the FCC’s authority in this area. Bozell and his fellow crusaders managed only to discredit themselves, to diminish the influence of their organizations, and to undermine FCC authority over broadcast content.
Beginning in the nineteenth century with Anthony Comstock, America's 'censor in chief,' The Mind of the Censor and the Eye of the Beholder explores how censors operate and why they wore out their welcome in society at large. This book explains how the same tactics were tried and eventually failed in the twentieth century, with efforts to censor music, comic books, television, and other forms of popular entertainment. The historic examples illustrate not just the mindset and tactics of censors, but why they are the ultimate counterculture warriors and why, in free societies, censors never occupy the moral high ground. This book is for anyone who wants to know more about why freedom of speech is important and how protections for free expression became part of the American identity.
Most of the existing privacy and security legal frameworks at both the federal and state level provide incomplete safeguards against many of the privacy and information security harms highlighted in earlier chapters. Many of these frameworks have long been critiqued by privacy law experts for their lack of effectiveness. The IoT amplifies these inadequacies as it compounds existing privacy and security challenges.
At the state level, the patchwork of privacy and security legislation creates varying obligations for businesses without consistently ensuring that individuals receive adequate privacy and cybersecurity protection. State legislation also suffers from several shortcomings and is often replete with gaping privacy and security holes. Even the CCPA, the first privacy statute of its kind in the United States, has several limitations. Further, varying state privacy and security legislation also enables unequal access to privacy and security between citizens of different states.
The new generation of aerial photographers is using different wavelengths to sense archaeological features. This is effective but can be expensive. Here the authors use data already collected for environmental management purposes, and evaluate it for archaeological prospection on pasture. They explore the visibility of features in different seasons and their sensitivity to different wavelengths, using principal components analysis to seek out the best combinations. It turns out that this grassland gave up its secrets most readily in January, when nothing much was growing, and overall the method increased the number of known sites by a good margin. This study is of the greatest importance for developing the effective survey of the world's landscape, a quarter of which is under grass.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.