Diese Datenbank enthält über 40.000 Dokumente zu Themen aus den Bereichen Formalerschließung – Inhaltserschließung – Information Retrieval.
© 2015 W. Gödert, TH Köln, Institut für Informationswissenschaft / Powered by litecat, BIS Oldenburg (Stand: 28. April 2022)
1Morozov, E.: ¬The net delusion : the dark side of internet freedom.
New York : Public Affairs, 2011. XVII, 409 S.
Abstract: "The revolution will be Twittered!" declared journalist Andrew Sullivan after protests erupted in Iran. But as journalist and social commentator Evgeny Morozov argues in "The Net Delusion," the Internet is a tool that both revolutionaries and authoritarian governments can use. For all of the talk in the West about the power of the Internet to democratize societies, regimes in Iran and China are as stable and repressive as ever. Social media sites have been used there to entrench dictators and threaten dissidents, making it harder--not easier--to promote democracy. In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also entrenches dictators, threatens dissidents, and makes it harder-not easier-to promote democracy. Buzzwords like "21st-century statecraft" sound good in PowerPoint presentations, but the reality is that "digital diplomacy" requires just as much oversight and consideration as any other kind of diplomacy. Marshalling a compelling set of case studies, " The Net Delusion" shows why the cyber-utopian stance that the Internet is inherently liberating is wrong, and how ambitious and seemingly noble initiatives like the promotion of "Internet freedom" are misguided and, on occasion, harmful.
Inhalt: The Google doctrine -- Texting like it's 1989 -- Orwell's favorite lolcat -- Censors and sensibilities -- Hugo Chavez would like to welcome you to the spinternet -- Why the KGB wants you to join Facebook -- Why Kierkegaard hates slacktivism -- Open networks, narrow minds : cultural contradictions of internet freedom -- Internet freedoms and their consequences -- Making history (more than a browser menu) -- The wicked fix.
Anmerkung: Rez. in: JASIST 62(2011) no.12, S.2540-2543 (C. Leslie)
LCSH: Internet / Political aspects ; Internet / Censorship ; Computers / Access control ; Freedom of information
RSWK: Internet / Informationsfreiheit / Zensur ; Internet / Privatsphäre / Datenschutz ; Internet / Freiheit / Demokratisierung ; Internet / Demokratie / Informationsgesellschaft / Freiheit / Zensur / Überwachung / Diktatur / Soziales Netzwerk / Informationsfreiheit / Informationsverarbeitung ; Internet / Demokratisierung / Utopie (BVB) ; Demokratisierung / Internet / Informationsfreiheit (SWB)
BK: 05.38 / Neue elektronische Medien
LCC: HM851 .M665 2011
RVK: AP 18420
2Laughlin, R.B.: ¬The crime of reason : and the closing of the scientific mind.
New York : Basic Books, 2008. 186 S.
(Edition Unseld ; 2)
Abstract: The Nobel prize-winning author of "A Different Universe" argues that ours is an age of disinformation and ignorance, in which access to knowledge is becoming increasingly restricted and even criminalized. We like to believe that in our modern, technologically advanced world, information is more freely available and flows faster than ever before, and that this free flow of ideas is behind our remarkable creativity. The second part is right: the free flow of ideas is indeed essential to creativity. But according to Nobel Laureate Robert Laughlin, many forces in the modern world conspire to make acquiring information a danger or even a crime. More and more of the really valuable information is private property or a state secret, with the result being that it is now easy for a flash of insight, entirely innocently, to infringe a patent or threaten national security.Within the past ten years it has become illegal to circumvent anti-piracy measures (i.e. to understand encrypted communication) or to distribute code-cracking devices; it is now legal for corporations to monopolize certain forms of communication; and it is possible to patent sales techniques, hiring strategies, and gene sequences. Broad areas of two sciences, physics and biology, are now off limits to public discourse because they are national security risks. Our society is sequestering knowledge more rapidly and thoroughly than any before it.Thus we find ourselves dealing more and more with the bizarre concept of the Crime of Reason, the antisocial and sometimes outright illegal nature of certain intellectual activities. The increasing restrictions on such fertile scientific and technological fields as cryptography, biotechnology, and computer software design are creating a new Dark Age: a time characterized not by light and truth but by disinformation and ignorance. This short, passionately argued book, by a Nobel laureate in physics, offers a stern warning and protest against our apparent collective decision to relinquish our intellectual rights.
Inhalt: Inhalt: The end of reason -- Dangerous knowledge -- The master cryptographer -- Games of chance -- Patently absurd -- The nuclear precedent -- The facts of life -- Clone wars -- Spam spam spam spam -- The troubled utopia.
Wissenschaftsfach: Wissenschaftstheorie ; Kommunikationswissenschaften
LCSH: Freedom of information ; Information policy ; Academic freedom ; Communication of technical information ; Intellectual freedom ; Knowledge management
RSWK: Informationsfreiheit / Informationspolitik / Akademische Freiheit (BVB)
DDC: 323.44/5 / dc22
LCC: JC598 .L38 2008
3Moore, A.D. (Hrsg.): Information ethics : privacy, property, and power.
Seattle, WA : University of Washington Press, 2005. 455 S.
Anmerkung: Rez. in: JASIST 58(2007) no.2, S.302 (L.A. Ennis):"This is an important and timely anthology of articles "on the normative issues surrounding information control" (p. 11). Using an interdisciplinary approach, Moore's work takes a broad look at the relatively new field of information ethics. Covering a variety of disciplines including applied ethics, intellectual property, privacy, free speech, and more, the book provides information professionals of all kinds with a valuable and thought-provoking resource. Information Ethics is divided into five parts and twenty chapters or articles. At the end of each of the five parts, the editor has included a few "discussion cases," which allows the users to apply what they just read to potential real life examples. Part I, "An Ethical Framework for Analysis," provides readers with an introduction to reasoning and ethics. This complex and philosophical section of the book contains five articles and four discussion cases. All five of the articles are really thought provoking and challenging writings on morality. For instance, in the first article, "Introduction to Moral Reasoning," Tom Regan examines how not to answer a moral question. For example, he thinks using what the majority believes as a means of determining what is and is not moral is flawed. "The Metaphysics of Morals" by Immanuel Kant looks at the reasons behind actions. According to Kant, to be moral one has to do the right thing for the right reasons. By including materials that force the reader to think more broadly and deeply about what is right and wrong, Moore has provided an important foundation and backdrop for the rest of the book. Part II, "Intellectual Property: Moral and Legal Concerns," contains five articles and three discussion cases for tackling issues like ownership, patents, copyright, and biopiracy. This section takes a probing look at intellectual and intangible property from a variety of viewpoints. For instance, in "Intellectual Property is Still Property," Judge Frank Easterbrook argues that intellectual property is no different than physical property and should not be treated any differently by law. Tom Palmer's article, "Are Patents and Copyrights Morally Justified," however, uses historical examples to show how intellectual and physical properties differ. ; Part III, "Privacy and Information Control," has four articles and three discussion cases beginning with an 1890 article from the Harvard Law Review, "The Right to Privacy," written by Samuel A Warren and Louis D. Brandeis. Moore then includes an article debating whether people own their genes, an article on caller I.D., and an article on computer surveillance. While all four articles pose some very interesting questions, Margaret Everett's article "The Social Life of Genes: Privacy, Property, and the New Genetics" is incredible. She does a great job of demonstrating how advances in genetics have led to increased concerns over ownership and privacy of genetic codes. For instance, if someone's genetic code predisposes them to a deadly disease, should insurance companies have access to that information? Part IV, "Freedom of Speech and Information Control," has three articles and two discussion cases that examine speech and photography issues. Moore begins this section with Kent Greenawalt's "Rationales for Freedom of Speech," which looks at a number of arguments favoring free speech. Then the notion of free speech is carried over into the digital world in "Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society" by Jack M. Balkin. At 59 pages, this is the work's longest article and demonstrates how complex the digital environment has made freedom of speech issues. Finally, Part V, "Governmental and Societal Control of Information," contains three articles and three discussion cases which provide an excellent view into the conflict between security and privacy. For instance, the first article, "Carnivore, the FBI's E-mail Surveillance System: Devouring Criminals, Not Privacy" by Griffin S. Durham, examines the FBI's e-mail surveillance program called Carnivore. Durham does an excellent job of demonstrating that Carnivore is a necessary and legitimate system used in limited circumstances and with a court order. Librarians will find the final article in the book, National Security at What Price? A Look into Civil Liberty Concerns in the Information Age under the USA Patriot Act by Jacob R. Lilly, of particular interest. In this article, Lilly uses historical examples of events that sacrificed civil liberties for national security such as the internment of Japanese-Americans during World War II and the McCarthyism of the Cold War era to examine the PATRIOT Act. ; The book also includes an index, a selected bibliography, and endnotes for each article. More information on the authors of the articles would have been useful, however. One of the best features of Information Ethics is the discussion cases at the end of each chapter. For instance, in the discussion cases, Moore asks questions like: Would you allow one person to die to save nine? Should a scientist be allowed to experiment on people without their knowledge if there is no harm? Should marriages between people carrying a certain gene be outlawed? These discussion cases really add to the value of the readings. The only suggestion would be to have put them at the beginning of each section so the reader could have the questions floating in their heads as they read the material. Information Ethics is a well thought out and organized collection of articles. Moore has done an excellent job of finding articles to provide a fair and balanced look at a variety of complicated and far-reaching topics. Further, the work has breadth and depth. Moore is careful to include enough historical articles, like the 1890 Warren article, to give balance and perspective to new and modern topics like E-mail surveillance, biopiracy, and genetics. This provides a reader with just enough philosophy and history theory to work with the material. The articles are written by a variety of authors from differing fields so they range in length, tone, and style, creating a rich tapestry of ideas and arguments. However, this is not a quick or easy read. The subject matter is complex and one should plan to spend time with the book. The book is well worth the effort though. Overall, this is a highly recommended work for all libraries especially academic ones."
LCSH: Freedom of information ; Information society ; Intellectual property ; Privacy, Right of ; Communication / Moral and ethical aspects ; Information technology / Social aspects
BK: 06.00 / Information und Dokumentation: Allgemeines ; 06.35 / Informationsmanagement
DDC: 175 (SWB) ; 323.44/5 22 (GBV;LoC)
LCC: JC585.I59 2005
4Haywood, T.: ¬The withering of public access.
London : Library Association, 1989. VI,42 S.
(Viewpoints in LIS; 4)
Abstract: A powerful argued case for the proposition that public access to information is being impeded by the convergence of certain economic, political and technological tendencies
LCSH: Freedom of information / Great Britain
Precis: Great Britain / Freedom of information