Acknowledgments | p. xiii |
About the author | p. xiv |
Preface | p. xv |
What's it all about? | p. 1 |
Foundation ideas, condensed | p. 1 |
Now let's look a little deeper | p. 3 |
Information | p. 3 |
Information technology | p. 3 |
The Internet and the Web | p. 4 |
New media, old media, mass media | p. 5 |
Societies and cultures | p. 5 |
The information age | p. 7 |
Consumer access | p. 8 |
Provider access | p. 8 |
Free expression, privacy, property, ownership | p. 9 |
Protection and security | p. 11 |
The military | p. 12 |
The e-biz buzz-e-commerce and e-business | p. 12 |
Education | p. 13 |
Artificial intelligence | p. 14 |
The green way | p. 15 |
And so-IT marches on, and we with it | p. 16 |
In sum | p. 18 |
Information to suit-as you like it | p. 20 |
Information-what is it? | p. 20 |
So we come to knowledge | p. 22 |
Where does information come from? | p. 23 |
We know you-data collection | p. 24 |
US politicos and the media wellspring-information sources too | p. 24 |
Truth or consequences | p. 26 |
Fact, fiction, and the in-between-evaluating information | p. 29 |
We are what we believe-selective narrowing | p. 30 |
Brain bias-a complication | p. 30 |
Can we suspend our beliefs? | p. 31 |
Understanding numbers-reading between the lines | p. 32 |
An aura of accuracy | p. 32 |
Precision may not be relevant | p. 34 |
Extreme values render averages misleading | p. 34 |
Forecasts presume continuance | p. 34 |
Correlation is not causation | p. 35 |
Comparability counts | p. 35 |
Missing information | p. 36 |
Rounding does not mean loss of accuracy | p. 36 |
Context eliminates vagueness | p. 37 |
And so-we are what we know | p. 37 |
Consequences | p. 39 |
The business difference-when too much information isn't | p. 39 |
Personalization-the answer or the question? | p. 40 |
Attention everyone-now hear this | p. 41 |
Who's on it first? | p. 41 |
Connections-the Internet, the Web, and the others | p. 44 |
In the beginning-a little shiny ball | p. 44 |
A modest start-the ARPANET | p. 45 |
Slow progress, then boom-the Internet | p. 46 |
So what actually is the Internet and how does it work? | p. 48 |
Finding the trees in the forest-the domain name system | p. 48 |
Sorry, we're all out of addresses-IP revisited | p. 51 |
Addresses galore and more-IPv6 | p. 52 |
Connecting to the Internet | p. 53 |
Consumers and providers-the network neutrality debate | p. 53 |
The regulation dilemma | p. 55 |
On the go-bringing the Internet along | p. 56 |
The World Wide Web | p. 58 |
It began with a proposal | p. 58 |
So what actually is the Web? | p. 59 |
The Web 1-2-3 | p. 59 |
Behind the portal | p. 60 |
A Web site for any business-or for you | p. 62 |
And the others | p. 63 |
And so-wielding power | p. 65 |
The persistent digital divide | p. 67 |
That is to say-free expression and privacy | p. 69 |
The free expression mandate | p. 69 |
Limits to protection | p. 70 |
Many limits are contextual | p. 71 |
Audience and purpose can make a difference | p. 72 |
So can the type of IT and the role of the FCC | p. 72 |
Broadcast media | p. 73 |
Different treatment for cell phones, VoIP, and cable TV | p. 74 |
Venue ownership takes precedence | p. 75 |
Censorship-the one-way street | p. 76 |
The Chinese experience | p. 77 |
Breaching the barriers | p. 78 |
A stealth approach | p. 79 |
Privacy complicates the picture | p. 79 |
A fuzzier mandate | p. 79 |
Disclosure | p. 82 |
Public lives, private lives | p. 84 |
IT affects outcomes | p. 85 |
Identifying the unidentified | p. 86 |
With our knowledge and without | p. 86 |
Personalization revisited | p. 88 |
Personalization's analog, data profiling | p. 88 |
The whistleblower-risk and reward | p. 89 |
Laws and protections, more or less | p. 90 |
WikiLeaks-global whistleblower, global hero, global villain | p. 90 |
Security-yet another complication | p. 92 |
And so-where do we stand? | p. 92 |
IT on the job | p. 92 |
Which leaves us where? | p. 94 |
What's mine is whose?-intellectual property | p. 99 |
Intellectual property-what and why | p. 99 |
Copyright-a little history | p. 100 |
The IT effect | p. 101 |
Legislators try to cope | p. 103 |
WIPO to the rescue | p. 105 |
The DMCA | p. 105 |
DRM invigorated | p. 106 |
BitTorrent joins the fray | p. 106 |
Unlocking content | p. 108 |
Copyright holders fight infringement | p. 109 |
Rethinking business models | p. 112 |
Patent-a little history | p. 113 |
WIPO steps in | p. 114 |
Types of patents | p. 116 |
Protection but not secrecy | p. 117 |
The IT effect | p. 117 |
Taking unfair advantage | p. 118 |
Legislative difficulty | p. 119 |
Patent cache-the new battle armor and armament | p. 120 |
Trademark-a little history | p. 121 |
Types of trademarks | p. 121 |
Trademark dilution | p. 122 |
And so-innovation stimulator or destroyer | p. 123 |
Copyright-sensible and strange | p. 123 |
Patents follow a similar path | p. 125 |
Trademarks-not quite as clear-cut as they seem | p. 127 |
It all comes down to this | p. 129 |
You, me, and everyone else-alone together and vice versa | p. 132 |
Relationships | p. 132 |
Some definitions | p. 133 |
A little history | p. 133 |
Bulletin boards-a precursor | p. 134 |
Fidonet, expanding reach | p. 135 |
Next up, social networks | p. 135 |
Aspects of socializing | p. 137 |
The socialization debates | p. 138 |
Business on board | p. 139 |
Impacts rising | p. 140 |
A variety of purposes | p. 140 |
Upending the social order-a spark and sometimes a flame | p. 144 |
And so-the many directions of impact | p. 151 |
Implications for control | p. 152 |
From the bottom-replacing formal organizations | p. 153 |
Spreading the news | p. 154 |
Too much of a good thing?-balance, please | p. 154 |
Attacks, bit by bit-from nuisance to cyber warfare | p. 157 |
A brief history of hacking | p. 158 |
A broad range of activities | p. 160 |
Inside out-leaky barriers | p. 162 |
The privacy sphere deflates | p. 163 |
A big bag of tricks | p. 164 |
Spam | p. 164 |
Denial of service attacks | p. 166 |
Spoofing | p. 167 |
Social engineering | p. 168 |
Malware | p. 170 |
Fighting back | p. 172 |
Firewalls | p. 173 |
Proxy servers | p. 173 |
Screening software | p. 173 |
Antivirus programs | p. 174 |
Spam avoidance | p. 174 |
Identification | p. 175 |
Human at the keyboard | p. 176 |
Two key user authentication adds security | p. 176 |
Code signing | p. 178 |
Securing transmissions | p. 178 |
Honeypots-laying a trap to catch hackers | p. 178 |
Cyber terrorism and cyber warfare-a rain of bit bombs to attack people, systems, and infrastructure | p. 179 |
Points of attack | p. 179 |
And so-keeping the bad guys at bay | p. 181 |
Security adds other issues | p. 183 |
Mind and machine-artificial intelligence | p. 187 |
A little history | p. 188 |
A different view | p. 191 |
The imitated mind | p. 191 |
Sense and sensibility | p. 192 |
Progress on many fronts | p. 193 |
Becoming ordinary | p. 200 |
And so-master or slave? | p. 201 |
Computing power-the end of the line? | p. 202 |
Day to day | p. 202 |
Mind and matter | p. 203 |
We are what we do-ethics and responsibilities | p. 206 |
A little background | p. 206 |
Some major concepts | p. 207 |
Conflict of interest | p. 208 |
IT enters the picture | p. 210 |
IT as a neutral actor | p. 211 |
IT as a preordained actor | p. 211 |
IT as an ethical actor | p. 212 |
Funding influences development | p. 213 |
Intersections | p. 214 |
Free expression | p. 214 |
Privacy | p. 217 |
Implications | p. 219 |
Intellectual property | p. 220 |
Artificial intelligence | p. 222 |
Professional ethics | p. 225 |
The green way | p. 226 |
And so-reaping what we sow | p. 228 |
The future lies ahead-we're off to see ... | p. 231 |
Some semi-persistent patterns | p. 231 |
Platform convergence | p. 232 |
Dedicated devices have a role | p. 233 |
Media convergence | p. 234 |
Cultural convergence | p. 236 |
The cloud | p. 237 |
More clouds in the forecast | p. 239 |
Revaluing privacy | p. 239 |
Identity, hidden or revealed | p. 240 |
Tracking and more | p. 242 |
Facial recognition software | p. 243 |
Legal safeguards fall short | p. 243 |
Network neutrality, up or down? | p. 244 |
The shifting digital divide | p. 246 |
Another look at Al | p. 248 |
The cyborg scenario | p. 249 |
Helping or snooping? | p. 249 |
Workforce shifts-old trend, new twist | p. 249 |
And so-the global imperative, keeping up with the chip | p. 251 |
Addendum | p. 255 |
Additional reading | p. 258 |
Index | p. 261 |
Table of Contents provided by Ingram. All Rights Reserved. |