Prologue
- 0.1 Background
- 0.2 Opportunities: computer applications
- 0.3 Risks: technological threats
- 0.4 Choices: challenges for society
- 0.5 How to use this book
- 0.6 A note to instructors
Part I Opportunities
1 Digital inclusion
- 1.1 Pioneers and visionaries
- 1.2 Access to the internet
- 1.3 Internet access across the world
- 1.4 Internet shutdowns
- 1.5 Inclusive design of technology
- 1.6 Gender issues
- 1.7 Technology for seniors
- 1.8 Summary
- 1.9 Key terms
2 Digital media and intellectual property
- 2.1 Pioneers and visionaries
- 2.2 Intellectual property: protection and fair use
- 2.3 Music
- 2.4 Movies
- 2.5 Mash-ups
- 2.6 Textbooks and research publications
- 2.7 Open access publications
- 2.8 Software patents
- 2.9 Open source software
- 2.10 Creative Commons licensing
- 2.11 Summary
- 2.12 Key Terms
3 Computers in education and learning
- 3.1 Pioneers and visionaries
- 3.2 Digital simulations and serious gaming
- 3.3 Presentation technology
- 3.4 Smart and flipped classrooms
- 3.5 Intelligent tutoring
- 3.6 Online learning
- 3.7 Massive open online courses (MOOCs)
- 3.8 Ubiquitous use of computers in schools
- 3.9 Summary
- 3.10 Key Terms
4 Computers in medicine and health care
- 4.1 Pioneers and visionaries
- 4.2 Online health information and online communities of care
- 4.3 Electronic medical records and personal health records
- 4.4 Medication data processing
- 4.5 Big data and infectious disease surveillance and modelling
- 4.6 Medical simulators
- 4.7 Artificial body parts and bionic people
- 4.8 Precision medicine
- 4.9 Neuroplasticity and brain training
- 4.10 Robot companions and caregivers for seniors
- 4.11 Summary
- 4.12 Key terms
5 Free speech, politics, and government
- 5.1 Visions, utopias, and dystopias
- 5.2 Free speech
- 5.3 Print, broadcast, and internet speech
- 5.4 Internet speech that draws censorship
- 5.5 Fake news, filter bubbles, and echo chambers
- 5.6 E-democracy
- 5.7 Citizen mobilization via social media
- 5.8 Campaigning with social media; big data for voter surveillance and targeting
- 5.9 E-Government
- 5.10 Summary
- 5.11 Key terms
6 Law and order, war and peace
- 6.1 Visions and nightmares
- 6.2 Use of social media by the police and in dealing with the police
- 6.3 Citizen mobilization via social media for regime change
- 6.4 Surveillance by government
- 6.5 Governmental restrictions of internet access; keeping the net open
- 6.6 Hacking another country’s elections and politicians
- 6.7 Cyberespionage, cyberterrorism, and cyberwarfare
- 6.8 Guided aerial weapons with no person aboard
- 6.9 Autonomous weapons and robot soldiers
- 6.10 Summary
- 6.11 Key terms
Part II Risks
7 Security
- 7.1 Visions and context
- 7.2 A security primer
- 7.3 Hackers
- 7.4 Cyber-criminals and large-scale system intrusions
- 7.5 Identity theft
- 7.6 Security in the digital world
- 7.7 Electronic voting machines
- 7.8 The legal response to cybercrime
- 7.9 What shall we do?
- 7.10 Summary
- 7.11 Key terms
8 Safety
- 8.1 Visions and context
- 8.2 Frustration, anger, and rage in internet access
- 8.3 Cyberbullying and revenge porn
- 8.4 Attention and distraction
- 8.5 Uncontrollable software development
- 8.6 Incomprehensible and incorrect software
- 8.7 Medical devices and safety
- 8.8 Industrial disasters
- 8.9 Autonomous vehicles
- 8.10 The environment
- 8.11 What shall we do?
- 8.12 Summary
- 8.13 Key terms
9 Privacy
- 9.1 Visions and context
- 9.2 A privacy primer
- 9.3 Government data collection
- 9.4 Consumer privacy
- 9.5 Health information
- 9.6 Personal information visible through social media
- 9.7 Surveillance everywhere
- 9.8 Recording, remembering, and forgetting
- 9.9 Confidential information, privacy for government, and whistleblowers
- 9.10 Privacy laws
- 9.11 What shall we do?
- 9.12 Summary
- 9.13 Key terms
Part III Choices
10 Automation, work, and jobs
- 10.1 Historical precedents and early warnings
- 10.2 Identifying job opportunities and the best employees
- 10.3 Monitoring workers for job performance
- 10.4 On-demand services in the gig economy
- 10.5 Automation and fears of unemployment
- 10.6 Agriculture and automation
- 10.7 Manufacturing and automation
- 10.8 Computers in service industries
- 10.9 The transformation of professions
- 10.10 The future of employment, jobs, and work
- 10.11 Our options
- 10.12 Summary
- 10.13 Key terms
11 Artificial intelligence, explanations, trust, responsibility, and justice
- 11.1 Visions and context
- 11.2 An AI Primer
- 11.3 AI advances, capabilities, and limits
- 11.4 What is intelligence?
- 11.5 Anthropomorphism, feelings, and empathy
- 11.6 How do we know what a computer knows and how it makes it decisions?
- 11.7 Trust
- 11.8 Accountability and responsibility
- 11.9 Fairness and justice
- 11.10 Our options
- 11.11 Summary
- 11.12 Key terms
12 Lifestyle
- 12.1 Visions and context
- 12.2 Connected
- 12.3 Too connected
- 12.4 Always connected: technology addiction and workaholism
- 12.5 The internet of things, voice assistants, and smart cities
- 12.6 Artificial reality
- 12.7 Pornography, online dating, and sex robots
- 12.8 Blockchain and the future of money
- 12.9 Corporate concentration; social and economic disruption
- 12.10 Our options
- 12.11 Summary
- 12.12 Key terms
13 Epilogue
- 13.1 Social issues
- 13.2 Policy/legal choices
- 13.3 Ethical/moral dilemmas
- 13.4 Moving forward
14 Afterword: Developments in autumn 2018
- 14.1 Digital inclusion
- 14.2 Digital media and intellectual property
- 14.3 Education and learning
- 14.4 Medicine and health care
- 14.5 Free speech, politics, and government
- 14.6 Law and order, war and peace
- 14.7 Security
- 14.8 Safety
- 14.9 Privacy
- 14.10 Automation, work, and jobs
- 14.11 AI
- 14.12 Lifestyle
- 14.13 Summary
Notes
Resources
Index