The written word has been a central bearer of culture since antiquity. But its position is now being challenged by the powerful media of electronic communication. In this penetrating and witty book James O'Donnell takes a reading on the promise and the threat of electronic technology for our literate future.
In Avatars of the Word O'Donnell reinterprets today's communication revolution through a series of refracted comparisons with earlier revolutionary periods: the transition from oral to written culture, from the papyrus scroll to the codex, from copied manuscript to print. His engaging portrayals of these analogous epochal moments suggest that our steps into cyberspace are not as radical as we might think. Observing how technologies of the word have affected the shaping of culture in the past, and how technological transformation has been managed, we regain models that can help us navigate the electronic transformation now underway. Concluding with a focus on the need to rethink the modern university, O'Donnell specifically addresses learning and teaching in the humanities, proposing ways to seek the greatest benefit from electronic technologies while steering clear of their potential pitfalls.
Cyber Blockades is the first book to examine the phenomena of blockade operations in cyberspace, large-scale attacks on infrastructure or systems that aim to prevent an entire state from sending or receiving electronic data. Cyber blockades can take place through digital, physical, and/or electromagnetic means. Blockade operations have historically been considered acts of war, thus their emergence in cyberspace has significant implications for international law and for our understanding of cyber warfare.
The author defines and explains the emerging concept of “cyber blockades” and presents a unique comparison of blockade operations in five different domains—on land, at sea, in the air, in space, and in cyberspace—identifying common elements as well as important distinctions. Alison Lawlor Russell’s framework for defining cyber blockades, understanding how they occur, and considering the motivations of actors who employ them is applied with in-depth analysis of the cyber attacks on Estonia in 2007 and on Georgia during the 2008 Georgia-Russia War.
Blockade operations have occurred in cyberspace and will doubtlessly be used again in the future, by both state and non-state actors alike, because of the unique advantages of this type of attack. This book offers recommendations for policymakers contemplating or confronted by such attacks. Cyber Blockades is also a must-read for scholars and students of security studies, terrorism, substate groups, and the future of warfare.
In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes.
Cyberspace and National Security brings together scholars, policy analysts, and information technology executives to examine current and future threats to cyberspace. They discuss various approaches to advance and defend national interests, contrast the US approach with European, Russian, and Chinese approaches, and offer new ways and means to defend interests in cyberspace and develop offensive capabilities to compete there. Policymakers and strategists will find this book to be an invaluable resource in their efforts to ensure national security and answer concerns about future cyberwarfare.
Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet
Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences.
Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.
Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.
Advocates a cybersecurity “social contract” between government and business in seven key economic sectors
Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.
A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.
Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.
“A must-read…It reveals important truths.”
—Vint Cerf, Internet pioneer
“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.”
—Thomas Rid, author of Active Measures
Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists.
Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph.
“A helpful reminder…of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.”
—Jonathan Freedland, New York Review of Books
“The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.”
—General David Petraeus, former Director of the CIA
“Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’”
—Richard Harknett, former Scholar-in-Residence at United States Cyber Command
Most Internet users are familiar with trolling—aggressive, foul-mouthed posts designed to elicit angry responses in a site’s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims.
Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attacker’s “revenge porn” were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs.
Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.
To err is human; to err in digital culture is design. In the glitches, inefficiencies, and errors that ergonomics and usability engineering strive to surmount, Peter Krapp identifies creative reservoirs of computer-mediated interaction. Throughout new media cultures, he traces a resistance to the heritage of motion studies, ergonomics, and efficiency; in doing so, he shows how creativity is stirred within the networks of digital culture.
Noise Channels offers a fresh look at hypertext and tactical media, tunes into laptop music, and situates the emergent forms of computer gaming and machinima in media history. Krapp analyzes text, image, sound, virtual spaces, and gestures in noisy channels of computer-mediated communication that seek to embrace—rather than overcome—the limitations and misfires of computing. Equally at home with online literature, the visual tactics of hacktivism, the recuperation of glitches in sound art, electronica, and videogames, or machinima as an emerging media practice, he explores distinctions between noise and information, and how games pivot on errors at the human–computer interface.
Grounding the digital humanities in the conditions of possibility of computing culture, Krapp puts forth his insight on the critical role of information in the creative process.
The essays in Small Tech investigate the cultural impact of digital tools and provide fresh perspectives on mobile technologies such as iPods, digital cameras, and PDAs and software functions like cut, copy, and paste and WYSIWYG. Together they advance new thinking about digital environments.
Contributors: Wendy Warren Austin, Edinboro U; Jim Bizzocchi, Simon Fraser U; Collin Gifford Brooke, Syracuse U; Paul Cesarini, Bowling Green State U; Veronique Chance, U of London; Johanna Drucker, U of Virginia; Jenny Edbauer, Penn State U; Robert A. Emmons Jr., Rutgers U; Johndan Johnson-Eilola, Clarkson U; Richard Kahn, UCLA; Douglas Kellner, UCLA; Karla Saari Kitalong, U of Central Florida; Steve Mann, U of Toronto; Lev Manovich, U of California, San Diego; Adrian Miles, RMIT U; Jason Nolan, Ryerson U; Julian Oliver; Mark Paterson, U of the West of England, Bristol; Isabel Pedersen, Ryerson U; Michael Pennell, U of Rhode Island; Joanna Castner Post, U of Central Arkansas; Teri Rueb, Rhode Island School of Design; James J. Sosnoski; Lance State, Fordham U; Jason Swarts, North Carolina State U; Barry Wellman, U of Toronto; Sean D. Williams, Clemson U; Jeremy Yuille, RMIT U.
Byron Hawk is assistant professor of English at George Mason University.
David M. Rieder is assistant professor of English at North Carolina State University.
Ollie Oviedo is associate professor of English at Eastern New Mexico University.
READERS
Browse our collection.
PUBLISHERS
See BiblioVault's publisher services.
STUDENT SERVICES
Files for college accessibility offices.
UChicago Accessibility Resources
home | accessibility | search | about | contact us
BiblioVault ® 2001 - 2024
The University of Chicago Press