You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From the New York Times bestselling author of Nudge and The World According to Star Wars, a revealing account of how today's Internet threatens democracy—and what can be done about it As the Internet grows more sophisticated, it is creating new threats to democracy. Social media companies such as Facebook can sort us ever more efficiently into groups of the like-minded, creating echo chambers that amplify our views. It's no accident that on some occasions, people of different political views cannot even understand one another. It's also no surprise that terrorist groups have been able to exploit social media to deadly effect. Welcome to the age of #Republic. In this revealing book, New York Times bestselling author Cass Sunstein shows how today’s Internet is driving political fragmentation, polarization, and even extremism--and what can be done about it. He proposes practical and legal changes to make the Internet friendlier to democratic deliberation, showing that #Republic need not be an ironic term. Rather, it can be a rallying cry for the kind of democracy that citizens of diverse societies need most.
Across the globe, Google, Amazon, Facebook, Apple and Microsoft have accumulated power in ways that existing regulatory and intellectual frameworks struggle to comprehend. A consensus is emerging that the power of these new digital monopolies is unprecedented, and that it has important implications for journalism, politics, and society. It is increasingly clear that democratic societies require new legal and conceptual tools if they are to adequately understand, and if necessary check the economic might of these companies. Equally, that we need to better comprehend the ability of such firms to control personal data and to shape the flow of news, information, and public opinion. In this volum...
Conspiracy Theory Discourses addresses a crucial phenomenon in the current political and communicative context: conspiracy theories. The social impact of conspiracy theories is wide-ranging and their influence on the political life of many nations is increasing. Conspiracy Theory Discourses bridges an important gap by bringing discourse-based insights to existing knowledge about conspiracy theories, which has so far developed in research areas other than Linguistics and Discourse Studies. The chapters in this volume call attention to conspiracist discourses as deeply ingrained ways to interpret reality and construct social identities. They are based on multiple, partly overlapping analytical frameworks, including Critical Discourse Analysis, rhetoric, metaphor studies, multimodality, and corpus-based, quali-quantitative approaches. These approaches are an entry point to further explore the environments which enable the proliferation of conspiracy theories, and the paramount role of discourse in furthering conspiracist interpretations of reality.
This volume examines all aspects of using agent or individual-based simulation. This approach represents systems as individual elements having their own set of differing states and internal processes. The interactions between elements in the simulation represent interactions in the target systems. What makes this "social" is that it can represent an observed society. Social systems include all those systems where the components have individual agency but also interact with each other. This includes human societies and groups, but also increasingly socio-technical systems where the internet-based devices form the substrate for interaction. These systems are central to our lives, but are among...
Democracy has many attractive features. Among them is its tendency to track the truth, at least under certain idealized assumptions. That basic result has been known since 1785, when Condorcet published his famous jury theorem. But that theorem has typically been dismissed as little more than a mathematical curiosity, with assumptions too restrictive for it to apply to the real world. In An Epistemic Theory of Democracy, Goodin and Spiekermann propose different ways of interpreting voter independence and competence to make jury theorems more generally applicable. They go on to assess a wide range of familiar political practices and alternative institutional arrangements, to determine what constellation of them might most fully exploit the truth-tracking potential of majoritarian democracy. The book closes with a discussion of how epistemic democracy might be undermined, using as case studies the Trump and Brexit campaigns.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory and a multitude of applications. It presents the peer-reviewed proceedings of the VI International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2017), which took place in Lyon on November 29 – December 1, 2017. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure, network dynamics; diffusion, epidemics and spreading processes; resilience and control as well as all the main network applications, including social and political networks; networks in finance and economics; biological and ecological networks and technological networks.
Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict, etc., and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike....
Programming is a creative act. These techniques will help you maximize the power of creativity to improve your software and your satisfaction in creating it. In The Creative Programmer you’ll discover: The seven dimensions of creativity in software engineering The scientific understanding of creativity and how it translates to programming Actionable advice and thinking exercises that will make you a better programmer Innovative communication skills for working more efficiently on a team Creative problem-solving techniques for tackling complex challenges In The Creative Programmer you’ll learn the processes and habits of highly creative individuals and discover how you can build creativit...
A penetrating analysis of weaponized information–one of the most pressing dangers to open societies Now more than ever, communities across the world are integrated into a complex, global information ecosystem that shapes the nature of social, political, and economic life. The ripple effects of actors trying to manipulate or disrupt this information ecosystem are far more severe than the primary effects that are merely being felt in the information space. In fact, the weaponization of narratives has already shown its potential to transform the character of conflict in the twenty-first century. Subversion examines how malicious state and nonstate actors take advantage of the information spac...
These proceedings contain the papers presented at the Third International ICST C- ference on Autonomic Computing and Communication Systems, Autonomics 2009, held at the Cyprus University of Technology, Limassol, Cyprus, during September 9–11, 2009. As for the previous editions of the conference, this year too the primary goal of the event was to allow people working in the areas of communication, design, progr- ming, use and fundamental limits of autonomics pervasive systems to meet and - change their ideas and experiences in the aforementioned issues. In maintaining the tradition of excellence of Autonomics, this year we accepted 11 high-quality papers out of 26 submitted and had 5 invite...