This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely to lead to satisfactory solutions. Instead, more reflection and better conceptual design are needed, not least to harmonise different perspectives and legal frameworks internationally. The focus of the book is on how we may reconcile high levels of information security with robust degrees of informational privacy, also in connection with recent challenges presented by phenomena such as “big data” and security scandals, as well as new legislation initiatives, such as those concerning “the right to be forgotten” and the use of personal data in biomedical research. The book seeks to offer analyses and solutions of the new tensions, in order to build a fair, shareable and sustainable balance in this vital area of human interactions.
In 2004, Kentaro Toyama, an award-winning computer scientist, moved to India to start a new research group for Microsoft. Its mission: to explore novel technological solutions to the world’s persistent social problems. Together with his team, he invented electronic devices for under-resourced urban schools and developed digital platforms for remote agrarian communities. But after a decade of designing technologies for humanitarian causes, Toyama concluded that no technology, however dazzling, could cause social change on its own.
Technologists and policy-makers love to boast about modern innovation, and in their excitement, they exuberantly tout technology’s boon to society. But what have our gadgets actually accomplished? Over the last four decades, America saw an explosion of new technologies from the Internet to the iPhone, from Google to Facebook but in that same period, the rate of poverty stagnated at a stubborn 13%, only to rise in the recent recession. So, a golden age of innovation in the world’s most advanced country did nothing for our most prominent social ill.
Continue reading “Geek Heresy: Rescuing Social Change from the Cult of Technology”
With the emergence of the internet new forms of crime became possible. From harassment and grooming to fraud and identity theft the anonymity provided by the internet has created a new world of crime of which we all must be aware. The threat of hackers reaches beyond the individual, threatening businesses and even states, and holds worrying implications for the world we live in.
In this enlightening account, Cath Senker unmasks the many guises that cybercrime takes and the efforts of law enforcement to keep pace with the hackers. She reveals the mysterious world of hackers and cybersecurity professionals and reveals a story that is both shocking and surprising. With chapters on political activism and human rights, Senker shows a brighter side of the darknet. For anyone interested in learning more of the world of cyber-criminals and their opponents, this is the perfect starting point.
Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory
The purpose of the book is to critically analyze the contributions and challenges that the spread of information technologies can bring to categories of classic strategic theory. In the first two chapters, the author establishes the context of the book, coming back to the epistemology of revolution in military affairs and its terminology. The third chapter examines the political bases of strategic action and operational strategy, before the next two chapters focus on historical construction of the process of getting to know your opponents and the way in which we consider information collection. Chapter 6 returns to the process of “informationalization” in the doctrine of armed forces, especially in Western countries, and methods of conducting network-centric warfare. The final chapter looks at the attempts of Western countries to adapt to the emergence of techno-guerrillas and new forms of hybrid warfare, and the resulting socio-strategic outcomes.
Continue reading “The Art of War in the Network Age: Back to the Future”
Cybercrime is a complex and ever-changing phenomenon. This book offers a clear and engaging introduction to this fascinating subject by situating it in the wider context of social, political, cultural and economic change. Taking into account recent developments in social networking and mobile communications, this new edition tackles a range of themes spanning criminology, sociology, law, politics and cultural studies, including:
– computer hacking
– piracy and intellectual property theft
– financial fraud and identity theft
– hate speech
– internet pornography
– online stalking
– policing the internet
– surveillance and censorship
Continue reading “Cybercrime and Society”