Filed under book | Tags: · actor-network-theory, google, internet, media studies, media theory, software, surveillance
Meistgenutzte Suchmaschine, weltgrößter Datensammler, teuerstes Medienunternehmen – es liegt nahe, »Google« als Supermacht zu bezeichnen. Und doch greift diese Beschreibung zu kurz.
Unter Bezug auf Michel Foucault sowie die Akteur-Netzwerk-Theorie entwickelt Theo Röhle ein präzises, relationales Verständnis von Macht, das den Blick auf die vielfältigen Interaktionen der beteiligten Akteure öffnet und ein komplexes System von Verhandlungen zutage fördert.
Eine zeitgemäße Analyse digitaler Medienmacht an der Schnittstelle von Medienwissenschaft, Informationswissenschaft und Surveillance Studies.
Publisher transcript, Bielefeld, 2010
Benedetta Brevini, Arne Hintz, Patrick McCurdy (eds.): Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society (2013)
Filed under book | Tags: · hacktivism, internet, journalism, mass media, wikileaks
Revelations published by the whistleblower platform WikiLeaks, including the releases of U.S. diplomatic cables in what became referred to as ‘Cablegate’, put WikiLeaks into the international spotlight and sparked intense about the role and impact of leaks in a digital era. Beyond WikiLeaks opens a space to reflect on the broader implications across political and media fields, and on the transformations that result from new forms of leak journalism and transparency activism. A select group of renowned scholars, international experts, and WikiLeaks ‘insiders’ discuss the consequences of the WikiLeaks saga for traditional media, international journalism, freedom of expression, policymaking, civil society, social change, and international politics. From short insider reports to elaborate and theoretically informed academic texts, the different chapters provide critical assessments of the current historical juncture of our mediatized society and offer outlooks of the future. Authors include, amongst others, Harvard University’s Yochai Benkler, Graham Murdoch of Loughborough University, net activism scholar, Gabriella Coleman, the Director for International Freedom of Expression at the Electronic Frontier Foundation, Jillian York, and Guardian editor, Chris Elliott. The book also includes a conversation between philosopher, Slavoj Zizek, and WikiLeaks founder, Julian Assange, and its prologue is written by Birgitta Jónsdóttir, Icelandic MP and editor of the WikiLeaks video, Collateral Murder.
Publisher Palgrave Macmillan, 2013
ISBN 1137275758, 9781137275752
Hacking Politics: How Geeks, Progressives, The Tea Party, Gamers, Anarchists and Suits Teamed Up to Defeat SOPA and Save the Internet (2013)
Filed under book | Tags: · activism, internet, internet activism, law, politics, sopa
Hacking Politics is a firsthand account of how a ragtag band of activists and technologists overcame a $90 million lobbying machine to defeat the most serious threat to Internet freedom in memory. The book is a revealing look at how Washington works today – and how citizens successfully fought back.
Written by the core Internet figures – video gamers, Tea Partiers, tech titans, lefty activists and ordinary Americans among them – who defeated a pair of special interest bills called SOPA (“Stop Online Piracy Act”) and PIPA (“Protect IP Act”), Hacking Politics provides the first detailed account of the glorious, grand chaos that led to the demise of that legislation and helped foster an Internet-based network of amateur activists.
Included are more than thirty original contributions from across the political spectrum, featuring writing by Internet freedom activist Aaron Swartz; Lawrence Lessig of Harvard Law School; novelist Cory Doctorow; Rep. Zoe Lofgren (D-CA.); Jamie Laurie (of the alt-rock/hip-hop group The Flobots); Ron Paul; Mike Masnick, CEO and founder of Techdirt; Kim Dotcom, internet entrepreneur; Tiffiniy Cheng, co-founder and co-director of Fight for the Future; Alexis Ohanian, co-founder of Reddit; Nicole Powers of Suicide Girls; Josh Levy, Internet Campaign Director at Free Press, and many more.
Edited by David Moon, Patrick Ruffini, and David Segal
Publisher OR Books, May 2013
publisher (pay-what-you-wish)Comment (0)
Filed under book | Tags: · freedom, internet, pornography
How has the Internet, a medium that thrives on control, been accepted as a medium of freedom? Why is freedom increasingly indistinguishable from paranoid control? In Control and Freedom, Wendy Hui Kyong Chun explores the current political and technological coupling of freedom with control by tracing the emergence of the Internet as a mass medium. The parallel (and paranoid) myths of the Internet as total freedom/total control, she says, stem from our reduction of political problems into technological ones.
Drawing on the theories of Gilles Deleuze and Michel Foucault and analyzing such phenomena as Webcams and face-recognition technology, Chun argues that the relationship between control and freedom in networked contact is experienced and negotiated through sexuality and race. She traces the desire for cyberspace to cyberpunk fiction and maps the transformation of public/private into open/closed. Analyzing “pornocracy,” she contends that it was through cyberporn and the government’s attempts to regulate it that the Internet became a marketplace of ideas and commodities. Chun describes the way Internet promoters conflated technological empowerment with racial empowerment and, through close examinations of William Gibson’s Neuromancer and Mamoru Oshii’s Ghost in the Shell, she analyzes the management of interactivity in narratives of cyberspace.
The Internet’s potential for democracy stems not from illusory promises of individual empowerment, Chun argues, but rather from the ways in which it exposes us to others (and to other machines) in ways we cannot control. Using fiber optic networks—light coursing through glass tubes—as metaphor and reality, Control and Freedom engages the rich philosophical tradition of light as a figure for knowledge, clarification, surveillance, and discipline, in order to argue that fiber-optic networks physically instantiate, and thus shatter, enlightenment.
Publisher MIT Press, 2006
ISBN 0262033321, 9780262033329
Filed under book | Tags: · arpanet, botnet, captcha, history of technology, internet, malware, spam, technology, usenet
The vast majority of all email sent every day is spam, a variety of idiosyncratically spelled requests to provide account information, invitations to spend money on dubious products, and pleas to send cash overseas. Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand.
This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam’s entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms—spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.
Publisher MIT Press, 2013
ISBN 026201887X, 9780262018876
Download (removed on 2013-5-20 upon request of the publisher)Comment (0)
Filed under manual | Tags: · google, hacking, internet, research, search, security, technology, web
“The manual just released by the NSA following a FOIA request filed in April by MuckRock. The book is filled with advice for using search engines, the Internet Archive and other online tools.” (source)
Publisher Center for Digital Content of the National Security Agency, February 2007
Unclassified in May 2013
via Marcell Mars, via Wired
Michael Geist (ed.): The Copyright Pentalogy: How the Supreme Court of Canada Shook the Foundations of Canadian Copyright Law (2013)
Filed under book | Tags: · canada, copyright, fair use, internet, law, net neutrality, technology
In the summer of 2012, the Supreme Court of Canada issued rulings on five copyright cases in a single day. The cases represent a seismic shift in Canadian copyright law, with the Court providing an unequivocal affirmation that copyright exceptions such as fair dealing should be treated as users’ rights, while emphasizing the need for a technology neutral approach to copyright law.
The Court’s decisions, which were quickly dubbed the “copyright pentalogy,” included no fees for song previews on services such as iTunes, no additional payment for music included in downloaded video games, and that copying materials for instructional purposes may qualify as fair dealing. The Canadian copyright community soon looked beyond the cases and their litigants and began to debate the larger implications of the decisions. Several issues quickly emerged.
This book represents an effort by some of Canada’s leading copyright scholars to begin the process of examining the long-term implications of the copyright pentalogy. The diversity of contributors ensures an equally diverse view on these five cases, contributions are grouped into five parts. Part 1 features three chapters on the standard of review in the courts. Part 2 examines the fair dealing implications of the copyright pentalogy, with five chapters on the evolution of fair dealing and its likely interpretation in the years ahead. Part 3 contains two chapters on technological neutrality, which the Court established as a foundational principle of copyright law. The scope of copyright is assessed in Part 4 with two chapters that canvas the exclusive rights under the copyright and the establishment of new “right” associated with user-generated content. Part 5 features two chapters on copyright collective management and its future in the aftermath of the Court’s decisions.
This volume represents the first comprehensive scholarly analysis of the five rulings. Edited by Professor Michael Geist, the Canada Research Chair in Internet and E-commerce Law at the University of Ottawa, the volume includes contributions from experts across Canada. This indispensable volume identifies the key aspects of the Court’s decisions and considers the implications for the future of copyright law in Canada.
Publisher University of Ottawa Press, April 2013
Creative Commons License Attribution-Non Commercial Share Alike 3.0