Identity in the Age of Cloud Computing
by J. D. Lasica
Publisher: The Aspen Institute 2009
Number of pages: 110
As information, software and identity move to the cloud, the roundtable explores the transformative possibilities of this new computing paradigm for culture, commerce and personal communication. The report considers potential consequences for privacy, governance and security, and it includes policy recommendations and advice for the new presidential administration.
Download or read it online for free here:
by Liliana Bounegru, et al. - Public Data Lab
The book explores the use of digital methods to study false viral news, political memes, trolling practices and their social life online. It explains the interplay between digital platforms, misleading information, propaganda and viral content.
by Benjamin Woolley - Penguin
The book examines the reality of virtual reality. It looks at the dramatic intellectual upheavals that gave birth to it, at the hype that surrounds it, at the people who have promoted it, and at the dramatic implications of its development.
by Scott J. Henderson - Lulu.com
This book analyzes the history, ideology, organization, exploits, and political motivations of the Chinese hacker network. Whenever possible, the information contained herein has been taken directly from the Chinese hacker organization itself.
by Ian Bogost - University of Minnesota Press
The ubiquitous iPhone and its kin saturate our lives, changing everything from our communication to our posture. Ian Bogost contrasts the values of Apple's massive success in the twenty-first century with those of its rise in the twentieth.