The emergence of the hominids, more than five million years ago, marked the start of the human odyssey through space and time. This book deals with the last stage of this fascinating journey: the exploration of cyberspace and cybertime. Through the rapid global implementation of information and communication technologies, a new realm for human experience and imagination has been disclosed. Reversely, these postgeographical and posthistorical technologies have started to colonize our bodies and minds. Taking Homer's Odyssey and Kubrick's 2001: A Space Odyssey as his starting point, the author investigates the 'informatization of the world-view', focusing on its implications for our culture – arts, religion, and science – and, ultimately, our form of life. Moving across a wide range of disciplines, varying from philosophical anthropology and palaeontology to information theory, and from astrophysics to literary, film and new media studies, the author discusses our 'cyberspace odyssey' from a reflective position beyond euphoria and nostalgia. His analysis is as profound as nuanced and deals with issues that will be high on the agenda for many decades to come. In 2003 a Dutch Edition of Cyberspace Odyssey received the Socrates Prize for the best philosophy book published in Dutch.
Should we fear or welcome the internet’s evolution? The “internet of things” is the rapidly growing network of everyday objects—eyeglasses, cars, thermostats—made smart with sensors and internet addresses. Soon we will live in a pervasive yet invisible network of everyday objects that communicate with one another. In this original and provocative book, Philip N. Howard envisions a new world order emerging from this great transformation in the technologies around us.
Howard calls this new era a Pax Technica. He looks to a future of global stability built upon device networks with immense potential for empowering citizens, making government transparent, and broadening information access. Howard cautions, however, that privacy threats are enormous, as is the potential for social control and political manipulation. Drawing on evidence from around the world, he illustrates how the internet of things can be used to repress and control people. Yet he also demonstrates that if we actively engage with the governments and businesses building the internet of things, we have a chance to build a new kind of internet—and a more open society.
Digital Leaders are Made―Not Born
"Fail forward, fail fast, fail better is a winning concept from Qualman's latest book, Digital Leader."
— Tony Hsieh, New York Times bestselling author and CEO of Zappos.com, Inc.
Continue reading “Digital Leader: 5 Simple Keys to Success and Influence”
The emergence of new information communication technologies—such as the Internet and social media networking sites and platforms—has strongly affected social movement activism. In this compelling and timely book, Victoria Carty examines these movements and their uses of digital technologies within the context of social movement theory and history.
With an accessible and unique mix of theory and real-world examples, Social Movements and New Technology takes readers on a tour through MoveOn and Tea Party e-mail campaigns, the hacktavist tactics of Anonymous, global online protests against rapists and rape culture, and the tweets and Facebook pages that accompanied uprisings across the Arab world, Europe, and the United States. In each case study, the reader is invited to examine the movement, organization or protest and their use of digital tools through the lens of social movement theory. Discussion questions at the end of each chapter invite critical thinking and further reflection and debate.
The advent of the cyber age fundamentally reduced our ability to protect our privacy: the main threat is no longer the extent of the personal information is collected by various surveillance systems of the government (or corporations)—but how the information is used. Once collected, information can very often be accessed and misused by anyone in the world. This book lays out the foundations for a privacy doctrine suitable to the cyber age and examines the implications of the availability of personal information to corporations and major federal agencies.