Blown to Bits
Your Life, Liberty, and Happiness After the Digital Explosion Blown to Bits was authored by by Hal Abelson (MIT), Ken Ledeen (private sector) and Harry Lewis (Harvard). The book has been released under creative commons and can be downloaded in pdf format at no charge or purchased in book form at online bookstores for between $10 - $18. It provides an honest look at how personal digital data impacts an individual's privacy and how this data is used by the government to protect citizens at the expense of their privacy. The authors provide an analysis of how computers and the internet have fundamentally changed our personal lives by examining the negative as well as the positive changes that technology has initiated.
Blown to Bits provides a thorough view of digital data and the affect it has on producers and consumers. It focuses on the ramifications of making personal information available on the internet, bullying and the rights of government to access our information to counter terrorism and provide a safe environment for citizens.
Blown to Bits provides a thorough view of digital data and the affect it has on producers and consumers. It focuses on the ramifications of making personal information available on the internet, bullying and the rights of government to access our information to counter terrorism and provide a safe environment for citizens.
Chapter Discussion Questions
Chapter 1: What does the term "Digital Explosion mean, why is it happening and what is at stake?
Chapter 2: Is personal information lost, abandoned or surrendered freely?
Chapter 3: How can secrets and or surprises be camouflaged throughout electronic documents?
Chapter 4: How will cloud storage affect bits?
Chapter 5: How are codes used in digital data and how can they be broken?
Chapter 6: Who own the digital data?
Chapter 7: How can digital expression be guarded to erase bullying and character assassination?
Chapter 8: How can bits be used to support old metaphors, new technologies and free speech?
Questions to Consider When Reading all Chapters
Chapter 2: Is personal information lost, abandoned or surrendered freely?
Chapter 3: How can secrets and or surprises be camouflaged throughout electronic documents?
Chapter 4: How will cloud storage affect bits?
Chapter 5: How are codes used in digital data and how can they be broken?
Chapter 6: Who own the digital data?
Chapter 7: How can digital expression be guarded to erase bullying and character assassination?
Chapter 8: How can bits be used to support old metaphors, new technologies and free speech?
Questions to Consider When Reading all Chapters
- What is the future of reputations, gossip, rumor and privacy on the Internet?
- Can you control who sees all the personal information about you?
- Can email be truly confidential when nothing seems to be private?
- Should the Internet be censored the way radio and TV are?
- Is it a federal crime to download music?
- When you use Google or Yahoo to search for data, how do they decide which sites to show you?
- Do you have free speech in the digital world?
- Do you have a voice in shaping government or corporate policies about any of this
Make your own slideshow at Animoto.
Digital Footprint
I am a digital citizen provides a critical look at digital data and how users can move towards a more positive digital profile.
|
|