Preface |
|
xvii | |
|
Chapter 1 Digital Explosion |
|
|
|
Why Is It Happening, and What Is at Stake? |
|
|
1 | (3) |
|
The Explosion of Bits, and Everything Else |
|
|
4 | (3) |
|
|
7 | (10) |
|
Good and 111, Promise and Peril |
|
|
17 | (2) |
|
|
19 | (2) |
|
Chapter 2 Naked in the Sunlight |
|
|
|
Privacy Lost, Privacy Abandoned |
|
|
21 | (1) |
|
1984 Is Here, and We Like It |
|
|
21 | (6) |
|
Location, Location, Location |
|
|
27 | (5) |
|
Big Brother, Abroad and in the United States |
|
|
32 | (10) |
|
|
42 | (6) |
|
|
48 | (3) |
|
Chapter 3 Who Owns Your Privacy? |
|
|
|
The Commercialization of Personal Data |
|
|
51 | (1) |
|
What Kind of Vegetable Are You? |
|
|
51 | (6) |
|
Footprints and Fingerprints |
|
|
57 | (7) |
|
Fair Information Practice Principles |
|
|
64 | (6) |
|
|
70 | (1) |
|
|
71 | (4) |
|
|
|
|
75 | (1) |
|
Who Controls the Flow of Bits? |
|
|
75 | (1) |
|
|
76 | (3) |
|
Connecting the Dots: Designed for Sharing and Survival |
|
|
79 | (6) |
|
The Internet Has No Gatekeepers? |
|
|
85 | (1) |
|
Links Gatekeepers: Getting Connected |
|
|
86 | (8) |
|
Search Gatekeepers: If You Can't Find It, Does It Exist? |
|
|
94 | (10) |
|
Social Gatekeepers: Known by the Company You Keep |
|
|
104 | (8) |
|
|
112 | (5) |
|
|
|
How Codes Became Unbreakable |
|
|
117 | (1) |
|
|
117 | (5) |
|
|
122 | (9) |
|
Lessons for the Internet Age |
|
|
131 | (4) |
|
|
135 | (12) |
|
|
147 | (1) |
|
|
148 | (5) |
|
Chapter 6 Balance Toppled Who Owns the Bits? |
|
|
153 | (40) |
|
|
153 | (2) |
|
Automated Crimes, Automated Justice |
|
|
155 | (5) |
|
The Peer-to-Peer Upheaval |
|
|
160 | (7) |
|
|
167 | (1) |
|
|
168 | (4) |
|
|
172 | (5) |
|
Copyright Koyaanisqatsi: Life Out of Balance |
|
|
177 | (6) |
|
|
183 | (4) |
|
|
187 | (6) |
|
Chapter 7 You Can't Say That on the Internet |
|
|
|
Guarding the Frontiers of Digital Expression |
|
|
193 | (1) |
|
Child Sex Trafficking Goes Digital |
|
|
193 | (5) |
|
Publisher or Distributor? |
|
|
198 | (7) |
|
Protecting Good Samaritans-and a Few Bad Ones |
|
|
205 | (10) |
|
Digital Protection, Digital Censorship, and Self-Censorship |
|
|
215 | (4) |
|
|
219 | (2) |
|
|
221 | (1) |
|
|
222 | (5) |
|
Chapter 8 Bits in the Air Old Metaphors, New Technologies, and Free Speech |
|
|
227 | (38) |
|
|
227 | (1) |
|
How Broadcasting Became Regulated |
|
|
228 | (13) |
|
The Path to Spectrum Deregulation |
|
|
241 | (4) |
|
The Most Beautiful Inventor in the World |
|
|
245 | (10) |
|
What Does the Future Hold for Radio? |
|
|
255 | (6) |
|
|
261 | (4) |
|
Chapter 9 The Next Frontier Al and the Bits World of the Future |
|
|
265 | (23) |
|
Thrown Under a Jaywalking Bus |
|
|
266 | (1) |
|
What's Intelligent About Artificial Intelligence? |
|
|
267 | (1) |
|
Machine Learning: I'll Figure It Out |
|
|
268 | (5) |
|
Algorithmic Decisions: I Thought Only People Could Do That |
|
|
273 | (4) |
|
|
277 | (5) |
|
Bits Lighting Up the World |
|
|
282 | (5) |
|
|
287 | (1) |
Endnotes |
|
288 | (5) |
Index |
|
293 | |