The Dark Side of the Internet has grown from the breadth of Rand Hummel's experience counseling with teens whose lives have been affected by their own or a parent's abuse of the Internet. In addition to The Dark Side of the Internet, BJU Press authors have included several original essays on broader issues dealing with the Christian, the world, and culture. - Back cover.
"The revolution will be Twittered!" declared journalist Andrew Sullivan after protests erupted in Iran in June 2009. Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital entertainment. Could the recent Western obsession with promoting democracy by digital means backfire? In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder -- not easier -- to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the reality is that "digital diplomacy" requires just as much oversight and consideration as any other kind of diplomacy. Marshaling compelling evidence, Morozov shows why we must stop thinking of the Internet and social media as inherently liberating and why ambitious and seemingly noble initiatives like the promotion of "Internet freedom" might have disastrous implications for the future of democracy as a whole.
The growth of the Internet has not only given us greater opportunities to freely search for information, it has created also new opportunities for criminal organizations and terrorists to threaten individuals, companies and countries. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences.
Cyberspace is all around us. We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain. In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors. This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.
Exploring the ‘dark side’ of digital diplomacy, this volume highlights some of the major problems facing democratic institutions in the West and provides concrete examples of best practice in reversing the tide of digital propaganda. Digital diplomacy is now part of the regular conduct of International Relations, but Information Warfare is characterised by the exploitation or weaponisation of media systems to undermine confidence in institutions: the resilience of open, democratic discourse is tested by techniques such as propaganda, disinformation, fake news, trolling and conspiracy theories. This book introduces a thematic framework by which to better understand the nature and scope of the threats that the weaponization of digital technologies increasingly pose to Western societies. The editors instigate interdisciplinary discussion and collaboration between scholars and practitioners on the purpose, methods and impact of strategic communication in the Digital Age and its diplomatic implications. What opportunities and challenges does strategic communication face in the digital context? What diplomatic implications need to be considered when governments employ strategies for countering disinformation and propaganda? Exploring such issues, the contributors demonstrate that responses to the weaponisation of digital technologies must be tailored to the political context that make it possible for digital propaganda to reach and influence vulnerable publics and audiences. This book will be of much interest to students of diplomacy studies, counter-radicalisation, media and communication studies, and International Relations in general.
An all-in-one guide to understanding and managing the dark side of our digital lives. It all started out so well: the online world began as an effective tool for communication that carried with it a great promise to level the playing field and eliminate borders. But it’s morphed into something totally unintended. We’ve all had to endure the troll that derails a generally benign conversation; or received that scam email from a wealthy Nigerian prince; or felt the strange feeling of being watched and tracked by advertising companies as we navigate the web. Welcome to the modern internet. These are but a few of the topics that The Dark Side of Our Digital World: And What You Can Do about It examines to get at the root causes of our current problems with information technology, social media, and problematic online behavior. The book explores the issues raised by the negative side of information technology, including surveillance and spying, declining privacy, information overload, surveillance capitalism and big data analytics, conspiracy theories and fake news, misinformation and disinformation, trolling and phishing. What’s ultimately at stake is how we are able to cope with increasingly invasive anti-social behaviors, the overall decline of privacy in the face of total surveillance technologies, and the lack of a quality online experience that doesn’t devolve into flame wars and insults. The future of the internet as well as our societies depends upon our ability to discern truth from lies and reality from propaganda. The book will therefore also examine the possible directions we could take to improve the situation, looking at solutions in the areas of psychology and behavioral conditioning, social engineering through nudging techniques, the development of e-democracy movements, and the implementation of public policy.
TRUE CRIMEA Minnesota dog trainer is found dead of an apparent suicide after detectives find her details on a dark web murder-for-hire site. But who paid $13,000 in Bitcoin to kill this devout Christian and beloved wife and mother? An extraordinary tale of infidelity, betrayal and a shadowy hitman who may not be all he seems.?A Page-3 glamour model is drugged, kidnapped and listed for sale on a dark web human trafficking site. A secret society called Black Death demands a ransom for her safe return, or else she will be sold to sadistic millionaires to use before feeding to the tigers. ?True tales from the dark side of the internet
Focuses on the paradoxical, dialectical, and mystifying facets of human interaction, not merely to elucidate dysfunctional relationship phenomena, but to help readers explore and understand it in relation to a broader understanding about relationships. This volume is of interest to relationship researchers in social psychology and sociology.
In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book helps people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. In less than a decade, personal computers have become part of our daily lives. Many of us come into contact with computers every day, whether at work, school or home. As useful as the new technologies are, they also have a darker side. By making computers part of our daily lives, we run the risk of allowing thieves, swindlers, and all kinds of deviants directly into our homes. Armed with a personal computer, a modem and just a little knowledge, a thief can easily access confidential information, such as details of bank accounts and credit cards. This book is intended to help people avoid harm at the hands of Internet criminals. It offers a tour of the more dangerous parts of the Internet, as the author explains who the predators are, their motivations, how they operate and how to protect against them. Behind the doors of our own homes, we assume we are safe from predators, con artists, and other criminals wishing us harm. But the proliferation of personal computers and the growth of the Internet have invited these unsavory types right into our family rooms. With a little psychological knowledge a con man can start to manipulate us in different ways. A terrorist can recruit new members and raise money over the Internet. Identity thieves can gather personal information and exploit it for criminal purposes. Spammers can wreak havoc on businesses and individuals. Here, an expert helps readers recognize the signs of a would-be criminal in their midst. Focusing on the perpetrators, the author provides information about how they operate, why they do it, what they hope to do, and how to protect yourself from becoming a victim.