Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

identity of the person behind the Web browser. The same lack of trust establishment mechanisms can be identified at virtually every step of the Web-based interaction. Consequently, we can expect as we go forward the development of a more general interaction model that encompasses both human and computer environments with equal facility, along with the many other interactions that we engage in on a daily basis; and, through this model we can quantitatively assess the levels of trust that we will reasonably expect from the various facets of the interaction environment.

Any consideration of policy, particularly within a comprehensive policy infrastructure, must take into account the ubiquitous concerns about personal privacy if it is to have any measure of popular acceptance. Somewhat like identity, privacy is a complicated concept in its own right. Within the social ecosystems of the United States, privacy presents itself in at least three rather distinct guises: “I am free to do what I want.” “What I do is my business and therefore the fact and results of my actions belong to me.” and “What I do is private; it’s no one else’s concern!” We might paraphrase these aspects as freedom of action, ownership of transactions and opaqueness of interactions.

We have observed that one of the first aspects of establishing a framework for interactions is to arrive at an agreement on the applicable rules of engagement. Paramount among such considerations is the determination that the parties have no prohibitions against participation in the specific transaction. In fact, we live and operate within an environment of such complex and overlapping policy infrastructures that we rarely have complete freedom of action. As we have alluded more than once previously, we often have a problem knowing what policy constraints may be in effect within any given situation.

The ownership of the fact of transactions and of the information involved in transactions is typically a matter of the specific body of law that comprises the foundation of the policy infrastructure within which the interaction occurs. In some instances, these points are subject to negotiation among the respective parties but in many cases they are established by law, subject to the proper consideration of the rights of personal privacy.

We’ve alluded to the concept of negotiation as prelude to interactions. Obviously, this negotiation is only appropriate for certain interactions. When we drive our automobile into the toll booth on a turnpike, the fee we have to pay is non-negotiable. On the other hand, when we walk into an automobile dealership to purchase a new car, the price to be paid for that car is certainly negotiable. Where appropriate, the purpose of negotiation is to seek more detailed agreement by the parties involved as to the conditions and expected results of a specific interaction. The goal of this approach is to minimize post-interaction disagreements due to subjective evaluation of the outcome. This in turn minimizes the need to resort to a consequence infrastructure to sort out interactions gone bad. Pre-interaction negotiation using well-defined terms and actions offers a mechanism through which to achieve this goal. Consider a few areas where current interactions often present problems.

Most obvious is the authentication of the identities of the parties to an interaction. This provides credibility to any negotiation of policy that subsequently occurs. By using both differential identity and experiential identity mechanisms, constraints established by law can be readily addressed. “If you live in Texas, when you buy this product from the Web you must pay this rate of sales tax.” “You must be at least 18 years old to access this material.” “You have two hours to complete this examination.” All of these are relatively routine occurrences for network based


368

10 Power of Prayer

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)