000 | 09820cam a2200733 a 4500 | ||
---|---|---|---|
001 | u11638 | ||
003 | SA-PMU | ||
005 | 20210418123408.0 | ||
008 | 120307s2012 nyu b 001 0 eng | ||
010 | _a 2012007625 | ||
040 |
_aDLC _beng _cDLC _dBTCTA _dYDXCP _dCDX _dBWX _dUPM _dWAU _dUKMGB _dCUT _dOCLCF _dCHVBK _dOCLCO |
||
016 | 7 |
_a016044205 _2Uk |
|
019 |
_a814303319 _a814303329 |
||
020 | _a9780415807135 (hardback) | ||
020 | _a0415807131 (hardback) | ||
020 | _a9780415807142 (paperback) | ||
020 | _a041580714X (paperback) | ||
020 | _a9780203153277 (ebook) | ||
020 | _a0203153278 (ebook) | ||
035 |
_a(OCoLC)731925009 _z(OCoLC)814303319 _z(OCoLC)814303329 |
||
042 | _apcc | ||
050 | 0 | 0 |
_aHM851 _b.D856 2012 |
082 | 0 | 0 |
_a303.48/33 _223 |
084 |
_aBUS000000 _aBUS083000 _aCOM013000 _2bisacsh |
||
100 | 1 | _aDumas, M. Barry. | |
245 | 1 | 0 |
_aDiving into the bitstream : _binformation technology meets society in a digital world / _cM. Barry Dumas. |
260 |
_aNew York : _bRoutledge, _c2012. |
||
300 |
_axxiii, 268 p. ; _c26 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
520 |
_a"Nationwide, and indeed worldwide, there has been a growing awareness of the importance of access to information. Accordingly, information technology (IT), broadly defined and its role beyond the internal workings of businesses has leapt into the social consciousness. Diving into the Bitstream distinguishes itself by weaving together the concepts and conditions of IT. What distinguishes these trends is their focus on the impacts of IT on societies, and the responsibilities of IT's creators and users. The author pulls together important, often complex issues in the relationships among information, information technologies, and societal constructs. The text explores a synopsis of these issues that are foundations for further consideration. "-- _cProvided by publisher. |
||
520 |
_a"This book weaves together the concepts and conditions of IT to offer a contextualized look at one of the most popular, relevant, and promising industries of today. But what distinguishes this book is its focus on the impact of IT on societies, and the responsibilities of IT's creators and users. The author pulls together important, often complex issues from the relationships among information, information technologies, and societal constructs. With its wide array of topics and easy-to-process language and presentation, this book creates a space for a reader to not only learn, but also to evaluate and question the implications of IT's place in society"-- _cProvided by publisher. |
||
504 | _aIncludes bibliographical references (p. [258]-260) and index. | ||
505 | 8 | _aCan we suspend our beliefs? -- Understanding numbers -- reading between the lines -- An aura of accuracy -- Precision may not be relevant -- Extreme values render averages misleading -- Forecasts presume continuance -- Correlation is not causation -- Comparability counts -- Missing information -- Rounding does not mean loss of accuracy -- Context eliminates vagueness -- And so -- we are what we know -- Consequences -- The business difference -- when too much information isn't -- Personalization -- the answer or the question? -- Attention everyone -- now hear this -- Who's on it first? -- 3. Connections -- the Internet, the Web, and the others -- In the beginning -- a little shiny ball -- A modest start -- the ARPANET -- Slow progress, then boom -- the Internet -- So what actually is the Internet and how does it work? -- Finding the trees in the forest -- the domain name system -- Sorry, we're all out of addresses -- IP revisited -- Addresses galore and more -- IPv6. | |
505 | 8 | _aConnecting to the Internet -- Consumers and providers -- the network neutrality debate -- The regulation dilemma -- On the go -- bringing the Internet along -- The World Wide Web -- It began with a proposal -- So what actually is the Web? -- The Web 1-2-3 -- Behind the portal -- A Web site for any business -- or for you -- And the others -- And so -- wielding power -- The persistent digital divide -- 4. That is to say -- free expression and privacy -- The free expression mandate -- Limits to protection -- Many limits are contextual -- Audience and purpose can make a difference -- So can the type of IT and the role of the FCC -- Broadcast media -- Different treatment for cell phones, VoIP, and cable TV -- Venue ownership takes precedence -- Censorship -- the one-way street -- The Chinese experience -- Breaching the barriers -- A stealth approach -- Privacy complicates the picture -- A fuzzier mandate -- Disclosure -- Public lives, private lives -- IT affects outcomes. | |
505 | 8 | _aIdentifying the unidentified -- With our knowledge and without -- Personalization revisited -- Personalization's analog, data profiling -- The whistleblower -- risk and reward -- Laws and protections, more or less -- WikiLeaks -- global whistleblower, global hero, global villain -- Security -- yet another complication -- And so -- where do we stand? -- IT on the job -- Which leaves us where? -- 5. What's mine is whose? -- intellectual property -- Intellectual property -- what and why -- Copyright -- a little history -- The IT effect -- Legislators try to cope -- WIPO to the rescue -- The DMCA -- DRM invigorated -- BitTorrent joins the fray -- Unlocking content -- Copyright holders fight infringement -- Rethinking business models -- Patent -- a little history -- WIPO steps in -- Types of patents -- Protection but not secrecy -- The IT effect -- Taking unfair advantage -- Legislative difficulty -- Patent cache -- the new battle armor and armament -- Trademark -- a little history. | |
505 | 8 | _aTypes of trademarks -- Trademark dilution -- And so -- innovation stimulator or destroyer -- Copyright -- sensible and strange -- Patents follow a similar path -- Trademarks -- not quite as clear-cut as they seem -- It all comes down to this -- 6. You, me, and everyone else -- alone together and vice versa -- Relationships -- Some definitions -- A little history -- Bulletin boards -- a precursor -- Fidonet, expanding reach -- Next up, social networks -- Aspects of socializing -- The socialization debates -- Business on board -- Impacts rising -- A variety of purposes -- Upending the social order -- a spark and sometimes a flame -- And so -- the many directions of impact -- Implications for control -- From the bottom -- replacing formal organizations -- Spreading the news -- Too much of a good thing? -- balance, please -- 7. Attacks, bit by bit -- from nuisance to cyber warfare -- A brief history of hacking -- A broad range of activities -- Inside out -- leaky barriers. | |
505 | 8 | _aThe privacy sphere deflates -- A big bag of tricks -- Spam -- Denial of service attacks -- Spoofing -- Social engineering -- Malware -- Fighting back -- Firewalls -- Proxy servers -- Screening software -- Antivirus programs -- Spam avoidance -- Identification -- Human at the keyboard -- Two key user authentication adds security -- Code signing -- Securing transmissions -- Honeypots -- laying a trap to catch hackers -- Cyber terrorism and cyber warfare -- a rain of bit bombs to attack people, systems, and infrastructure -- Points of attack -- And so -- keeping the bad guys at bay -- Security adds other issues -- 8. Mind and machine -- artificial intelligence -- A little history -- A different view -- The imitated mind -- Sense and sensibility -- Progress on many fronts -- Becoming ordinary -- And so -- master or slave? -- Computing power -- the end of the line? -- Day to day -- Mind and matter -- 9. We are what we do -- ethics and responsibilities -- A little background. | |
505 | 8 | _aSome major concepts -- Conflict of interest -- IT enters the picture -- IT as a neutral actor -- IT as a preordained actor -- IT as an ethical actor -- Funding influences development -- Intersections -- Free expression -- Privacy -- Implications -- Intellectual property -- Artificial intelligence -- Professional ethics -- The green way -- And so -- reaping what we sow -- 10. The future lies ahead -- we're off to see ... -- Some semi-persistent patterns -- Platform convergence -- Dedicated devices have a role -- Media convergence -- Cultural convergence -- The cloud -- More clouds in the forecast -- Revaluing privacy -- Identity, hidden or revealed -- Tracking and more -- Facial recognition software -- Legal safeguards fall short -- Network neutrality, up or down? -- The shifting digital divide -- Another look at AI -- The cyborg scenario -- Helping or snooping? -- Workforce shifts -- old trend, new twist -- And so -- the global imperative, keeping up with the chip. | |
650 | 0 |
_aInformation technology _xSocial aspects. |
|
650 | 0 | _aInformation society. | |
650 | 7 |
_aBUSINESS & ECONOMICS / General. _2bisacsh |
|
650 | 7 |
_aBUSINESS & ECONOMICS / Information Management. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Computer Literacy. _2bisacsh |
|
650 | 7 |
_aInformation society. _2fast _0(OCoLC)fst00972767 |
|
650 | 7 |
_aInformation technology _xSocial aspects. _2fast _0(OCoLC)fst00973131 |
|
650 | 7 |
_aNeue Medien. _0(DE-588)4196910-8 _2gnd |
|
650 | 7 |
_aInformationstechnik. _0(DE-588)4026926-7 _2gnd |
|
650 | 7 |
_aSozialer Wandel. _0(DE-588)4077587-2 _2gnd |
|
938 |
_aBaker and Taylor _bBTCP _nBK0009972747 |
||
938 |
_aCoutts Information Services _bCOUT _n20487829 |
||
938 |
_aYBP Library Services _bYANK _n7343904 |
||
029 | 1 |
_aAU@ _b000048817552 |
|
029 | 1 |
_aCHBIS _b007157875 |
|
029 | 1 |
_aCHNEW _b000564259 |
|
029 | 1 |
_aCHVBK _b035544481 |
|
029 | 1 |
_aCHVBK _b181196301 |
|
029 | 1 |
_aNZ1 _b14334855 |
|
942 | _cBOOK | ||
994 |
_aZ0 _bSUPMU |
||
948 | _hNO HOLDINGS IN SUPMU - 155 OTHER HOLDINGS | ||
596 | _a1 2 | ||
999 |
_c2881 _d2881 |