, , , e.a.

Blown to Bits

Your Life, Liberty, and Happiness After the Digital Explosion

Specificaties
Paperback, blz. | Engels
Pearson Education | e druk, 2019
ISBN13: 9780134850016
Rubricering
Pearson Education e druk, 2019 9780134850016
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Blown to Bits, Second Edition is the brilliant, plain-English guide to digital technology, how it’s changing the world, and what you need to know to survive in tomorrow’s digital world. A best-seller when it was first published in 2010, the issues it addresses are more crucial than ever. Now, its expert authors have thoroughly updated Blown to Bits to demystify the social, political, and personal issues everyone is talking about: from social media and big data to fake news, cyberattacks, and privacy. Both authoritative and accessible, this guide doesn’t just reveal the workings of the technologies that are central to your life: it also illuminates the policy decisions citizens need to make about these technologies… because you can try to ignore them, but they won’t ignore you!

Specificaties

ISBN13:9780134850016
Taal:Engels
Bindwijze:Paperback

Inhoudsopgave

<div> Preface&nbsp; &nbsp; &nbsp;xvii </div> <div> <br> </div> <div> Chapter 1&nbsp; Digital Explosion </div> <div> <br> </div> <div> Why Is It Happening, and What Is at Stake?&nbsp; &nbsp; &nbsp;1 </div> <div> <br> </div> <div> The Explosion of Bits, and Everything Else&nbsp; &nbsp; &nbsp;4 </div> <div> <br> </div> <div> The Koans of Bits&nbsp; &nbsp; &nbsp;7 </div> <div> <br> </div> <div> Good and Ill, Promise and Peril&nbsp; &nbsp; &nbsp;17 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;19 </div> <div> <br> </div> <div> Chapter 2&nbsp; Naked in the Sunlight </div> <div> <br> </div> <div> Privacy Lost, Privacy Abandoned&nbsp; &nbsp; &nbsp;21 </div> <div> <br> </div> <div> 1984 Is Here, and We Like It&nbsp; &nbsp; &nbsp;21 </div> <div> <br> </div> <div> Location, Location, Location&nbsp; &nbsp; &nbsp;27 </div> <div> <br> </div> <div> Big Brother, Abroad and in the United States&nbsp; &nbsp; &nbsp;32 </div> <div> <br> </div> <div> The Internet of Things&nbsp; &nbsp; &nbsp;42 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;48 </div> <div> <br> </div> <div> Chapter 3&nbsp; Who Owns Your Privacy? </div> <div> <br> </div> <div> The Commercialization of Personal Data&nbsp; &nbsp; &nbsp;51 </div> <div> <br> </div> <div> What Kind of Vegetable Are You?&nbsp; &nbsp; &nbsp;51 </div> <div> <br> </div> <div> Footprints and Fingerprints&nbsp; &nbsp; &nbsp;57 </div> <div> <br> </div> <div> Fair Information Practice Principles&nbsp; &nbsp; &nbsp;64 </div> <div> <br> </div> <div> Always On&nbsp; &nbsp; &nbsp;70 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;71 </div> <div> <br> </div> <div> Chapter 4&nbsp; Gatekeepers </div> <div> <br> </div> <div> Who's in Charge Here?&nbsp; &nbsp; &nbsp;75 </div> <div> <br> </div> <div> Who Controls the Flow of Bits?&nbsp; &nbsp; &nbsp;75 </div> <div> <br> </div> <div> The Open Internet?&nbsp; &nbsp; &nbsp;76 </div> <div> <br> </div> <div> Connecting the Dots: Designed for Sharing and Survival&nbsp; &nbsp; &nbsp;79 </div> <div> <br> </div> <div> The Internet Has No Gatekeepers?&nbsp; &nbsp; &nbsp;85 </div> <div> <br> </div> <div> Links Gatekeepers: Getting Connected&nbsp; &nbsp; &nbsp;86 </div> <div> <br> </div> <div> Search Gatekeepers: If You Can't Find It, Does It Exist?&nbsp; &nbsp; &nbsp;94 </div> <div> <br> </div> <div> Social Gatekeepers: Known by the Company You Keep&nbsp; &nbsp; &nbsp;104 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;112 </div> <div> <br> </div> <div> Chapter 5&nbsp; Secret Bits </div> <div> <br> </div> <div> How Codes Became Unbreakable&nbsp; &nbsp; &nbsp;117 </div> <div> <br> </div> <div> Going Dark&nbsp; &nbsp; &nbsp;117 </div> <div> <br> </div> <div> Historical Cryptography&nbsp; &nbsp; &nbsp;122 </div> <div> <br> </div> <div> Lessons for the Internet Age&nbsp; &nbsp; &nbsp;131 </div> <div> <br> </div> <div> Secrecy Changes Forever&nbsp; &nbsp; &nbsp;135 </div> <div> <br> </div> <div> Cryptography Unsettled&nbsp; &nbsp; &nbsp;147 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;148 </div> <div> <br> </div> <div> Chapter 6&nbsp; Balance Toppled </div> <div> <br> </div> <div> Who Owns the Bits?&nbsp; &nbsp; &nbsp;153 </div> <div> <br> </div> <div> Stealing Music&nbsp; &nbsp; &nbsp;153 </div> <div> <br> </div> <div> Automated Crimes, Automated Justice&nbsp; &nbsp; &nbsp;155 </div> <div> <br> </div> <div> The Peer-to-Peer Upheaval&nbsp; &nbsp; &nbsp;160 </div> <div> <br> </div> <div> No Commercial Skipping&nbsp; &nbsp; &nbsp;167 </div> <div> <br> </div> <div> Authorized Use Only&nbsp; &nbsp; &nbsp;168 </div> <div> <br> </div> <div> Forbidden Technology&nbsp; &nbsp; &nbsp;172 </div> <div> <br> </div> <div> Copyright Koyaanisqatsi: Life Out of Balance&nbsp; &nbsp; &nbsp;177 </div> <div> <br> </div> <div> The Limits of Property&nbsp; &nbsp; &nbsp;183 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;187 </div> <div> <br> </div> <div> Chapter 7&nbsp; You Can't Say That on the Internet </div> <div> <br> </div> <div> Guarding the Frontiers of Digital Expression&nbsp; &nbsp; &nbsp;193 </div> <div> <br> </div> <div> Child Sex Trafficking Goes Digital&nbsp; &nbsp; &nbsp;193 </div> <div> <br> </div> <div> Publisher or Distributor?&nbsp; &nbsp; &nbsp;198 </div> <div> <br> </div> <div> Protecting Good Samaritans—and a Few Bad Ones&nbsp; &nbsp; &nbsp;205 </div> <div> <br> </div> <div> Digital Protection, Digital Censorship, and Self-Censorship&nbsp; &nbsp; &nbsp;215 </div> <div> <br> </div> <div> What About Social Media?&nbsp; &nbsp; &nbsp;219 </div> <div> <br> </div> <div> Takedowns&nbsp; &nbsp; &nbsp;221 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;222 </div> <div> <br> </div> <div> Chapter 8&nbsp; Bits in the Air </div> <div> <br> </div> <div> Old Metaphors, New Technologies, and Free Speech&nbsp; &nbsp; &nbsp;227 </div> <div> <br> </div> <div> Censoring the Candidate&nbsp; &nbsp; &nbsp;227 </div> <div> <br> </div> <div> How Broadcasting Became Regulated&nbsp; &nbsp; &nbsp;228 </div> <div> <br> </div> <div> The Path to Spectrum Deregulation&nbsp; &nbsp; &nbsp;241 </div> <div> <br> </div> <div> The Most Beautiful Inventor in the World&nbsp; &nbsp; &nbsp;245 </div> <div> <br> </div> <div> What Does the Future Hold for Radio?&nbsp; &nbsp; &nbsp;255 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;261 </div> <div> <br> </div> <div> Chapter 9&nbsp; The Next Frontier </div> <div> <br> </div> <div> AI and the Bits World of the Future&nbsp; &nbsp; &nbsp;265 </div> <div> <br> </div> <div> Thrown Under a Jaywalking Bus&nbsp; &nbsp; &nbsp;266 </div> <div> <br> </div> <div> What's Intelligent About Artificial Intelligence?&nbsp; &nbsp; &nbsp;267 </div> <div> <br> </div> <div> Machine Learning: I'll Figure It Out&nbsp; &nbsp; &nbsp;268 </div> <div> <br> </div> <div> Algorithmic Decisions: I Thought Only People Could Do That&nbsp; &nbsp; &nbsp;273 </div> <div> <br> </div> <div> What's Next&nbsp; &nbsp; &nbsp;277 </div> <div> <br> </div> <div> Bits Lighting Up the World&nbsp; &nbsp; &nbsp;282 </div> <div> <br> </div> <div> A Few Bits in Conclusion&nbsp; &nbsp; &nbsp;287 </div> <div> <br> </div> <div> Endnotes&nbsp; &nbsp; &nbsp;288 </div> <div> <br> </div> <div> Index&nbsp; &nbsp; &nbsp;293 </div> <div> <br> </div> <div> <br> </div> <div> <br> </div> <div> <br> </div>

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Blown to Bits