Social networks, the personalized Internet, and always-on mobile connectivity are transforming—and expanding—social life. In the new social operating system of “networked individualism,” anyone with an Internet connection and a bit of digital literacy can create online content that has the potential to reach a wide audience. This BIT explores how the boundaries between producers and consumers are becoming blurred, with noncredentialed amateurs participating in many of the arenas that were once limited to recognized and sanctioned experts.
Networked Feminism tells the story of how activists have used media to reconfigure what feminist politics and organizing look like in the United States. Drawing on years spent participating in grassroots communities and observing viral campaigns, Rosemary Clark-Parsons argues that feminists engage in a do-it-ourselves feminism characterized by the use of everyday media technologies. Faced with an electoral system and a history of collective organizing that have failed to address complex systems of oppression, do-it-ourselves feminists do not rely on political organizations, institutions, or authorities. Instead, they use digital networks to build movements that reflect their values and meet the challenges of the current moment, all the while juggling the advantages and limitations of their media tools. Through its practitioner-centered approach, this book sheds light on feminist media activists' shared struggles and best practices at a time when collective organizing for social justice has become more important than ever.
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Networked Graphics equips programmers and designers with a thorough grounding in the techniques used to create truly network-enabled computer graphics and games. Written for graphics/game/VE developers and students, it assumes no prior knowledge of networking.The text offers a broad view of what types of different architectural patterns can be found in current systems, and readers will learn the tradeoffs in achieving system requirements on the Internet. It explains the foundations of networked graphics, then explores real systems in depth, and finally considers standards and extensions.Numerous case studies and examples with working code are featured throughout the text, covering groundbreaking academic research and military simulation systems, as well as industry-leading game designs. - Everything designers need to know when developing networked graphics and games is covered in one volume - no need to consult multiple sources - The many examples throughout the text feature real simulation code in C++ and Java that developers can use in their own design experiments - Case studies describing real-world systems show how requirements and constraints can be managed
The first generation of Digital Natives children who were born into and raised in the digital world are coming of age, and soon our world will be reshaped in their image. Our economy, our politics, our culture, and even the shape of our family life will be forever transformed. But who are these Digital Natives? And what is the world theyre creating going to look like? In Born Digital, leading Internet and technology experts John Palfrey and Urs Gasser offer a sociological portrait of these young people, who can seem, even to those merely a generation older, both extraordinarily sophisticated and strangely narrow. Exploring a broad range of issues, from the highly philosophical to the purely practical, Born Digital will be essential reading for parents, teachers, and the myriad of confused adults who want to understand the digital present and shape the digital future.
Surveys the online social habits of American teens and analyzes the role technology and social media plays in their lives, examining common misconceptions about such topics as identity, privacy, danger, and bullying.
The Internet and digital media have become conduits and locales where millions of Chinese share information and engage in creative expression and social participation. This book takes a cutting-edge look at the impacts and implications of an increasingly networked China. Eleven chapters cover the terrain of a complex social and political environment, revealing how modern China deals with digital media and issues of censorship, online activism, civic life, and global networks. The authors in this collection come from diverse geographical backgrounds and employ methods including ethnography, interview, survey, and digital trace data to reveal the networks that provide the critical components for civic engagement in Chinese society. The Chinese state is a changing, multi-faceted entity, as is the Chinese public that interacts with the new landscape of digital media in adaptive and novel ways. Networked China: Global Dynamics of Digital Media and Civic Engagement situates Chinese internet in its complex, generational context to provide a full and dynamic understanding of contemporary digital media use in China. This volume gives readers new agendas for this study and creates vital new signposts on the way for future research. .
Understanding digital modes and practices of traditional rhetoric are essential in emphasizing information and interaction in human-to-human and human-computer contexts. These emerging technologies are essential in gauging information processes across global contexts. Digital Rhetoric and Global Literacies: Communication Modes and Digital Practices in the Networked World compiles relevant theoretical frameworks, current practical applications, and emerging practices of digital rhetoric. Highlighting the key principles and understandings of the underlying modes, practices, and literacies of communication, this book is a vital guide for professionals, scholars, researchers, and educators interested in finding clarity and enrichment in the diverse perspectives of digital rhetoric research.
The Internet was going to liberate us, but in truth it has not. For every story about the web's empowering role in events such as the Arab Spring, there are many more about the quiet corrosion of civil liberties by companies and governments using the same digital technologies we have come to depend upon. In Consent of the Networked, journalist and Internet policy specialist Rebecca MacKinnon argues that it is time to fight for our rights before they are sold, legislated, programmed, and engineered away. Every day, the corporate sovereigns of cyberspace (Google and Facebook, among others) make decisions that affect our physical freedom -- but without our consent. Yet the traditional solution to unaccountable corporate behavior -- government regulation -- cannot stop the abuse of digital power on its own, and sometimes even contributes to it. A clarion call to action, Consent of the Networked shows that it is time to stop arguing over whether the Internet empowers people, and address the urgent question of how technology should be governed to support the rights and liberties of users around the world.
A crucial aspect of our cultural shift from analog to digital is the continuum between online and off-, the “x-reality” that crosses between the virtual and the real. Our avatars are not just the animated figures that populate our screens but the gestalt of images, text, and multimedia that make up our online identities. In this BIT, B. Coleman looks at the research history in HCI of putting a face on things, the consequences of virtual embodiment, and our perception of simulation.