Computers and Society in the Past Half Century


Book Description

Almost fifty years ago, the author wrote the first comprehensive critical study of social issues in computing, The Conquest of Will (1976). This new book revisits this seminal study, featuring an overview of technological advances over the past half century, and provides a unique comparison between what was believed and expected of computers back in 1976, and actual outcomes up to the present time. Despite the extraordinary changes in technology, much of what has emerged in contemporary society was anticipated fifty years ago, and we are still grappling with some of the same basic challenges. For example, the computer’s threat to privacy has been a constant issue ever since the late 1950s, but the regulatory framework designed in the 1960s has been upended by the Internet. Artificial Intelligence too has been a contentious issue since the late 1950s, but until recently discussion was largely confined to academia, and there was little urgency to regulate its further development and application. The comparisons offered in this book will highlight what we got right and wrong in the past, and point to the sources of good and bad predictions. While there have been many studies of social issues in computing published since The Conquest of Will appeared in 1976, this is an unusual and valuable longitudinal comparison of the current situation with what prevailed and was predicted half a century ago.




Computers in Swedish Society


Book Description

This book reviews the shift in the historiography of computing from inventors and innovations to a user-perspective, and examines how the relevant sources can be created, collected, preserved, and disseminated. The text describes and evaluates a project in Sweden that documented the stories of around 700 people. The book also provides a critical discussion on the interpretation of oral evidence, presenting three case studies on how this evidence can inform us about the interaction of computing with large-scale transformations in economies, cultures, and societies. Features: describes a historiography aimed at addressing the question of how computing shaped and transformed Swedish society between 1950 and 1980; presents a user-centered perspective on the history of computing, after explaining the benefits of such an approach; examines the documentation of users, describing novel and innovative documentation methods; discusses the pros and cons of collaborative projects between academia and industry.




Science, Technology, and Society


Book Description

Emphasizing an interdisciplinary and international coverage of the functions and effects of science and technology in society and culture, Science, Technology, and Society/B contains over 130 A to Z signed articles written by major scholars and experts from academic and scientific institutions and institutes worldwide. Each article is accompanied by a selected bibliography. Other features include extensive cross referencing throughout, a directory of contributors, and an extensive topical index.




The Winding Passage


Book Description

This collection brings together Daniel Bell's best work in essay form. It deals with a variety of topics: technology and culture, religion and personal identity, intellectuals and their societies, and the uses and abuses of doctrines of social class. The Winding Passage demonstrates the author's continuing concern with the salient issues of our times, while its inspiration draws upon an older, humanistic sociological tradition.




Reframing Technology


Book Description

For over a hundred years, technological change has been framed using a simple narrative: technology drives history. Reframing Technology challenges this idea of technological determinism through metahistorical and literary analyses that locate the birth of contingent frameworks in the historiography of technology in and around the 1930s. The book also traces how the formal discipline of the History of Technology was remarkably preconfigured by four North American authors who were not professional historians, Thorstein Veblen, Stuart Chase, Lewis Mumford, and Marshall McLuhan. They are considered as a continuum and are put in dialogue despite their training in different disciplines. Their work is then linked up with the emergence of formal and institutional inquiry into narratives of technology at the end of the twentieth century. The ideas in the book are applied to current discussions about the future of technology and artificial intelligence. The book’s main argument is that, as the authors listed above suggest, we need to think beyond "the machine," and reframe technology as a cultural practice, rather than thinking of it as an object or a tool.




Technology Assessment--1970


Book Description




Flexible and Stretchable Triboelectric Nanogenerator Devices


Book Description

The book starts with the fundamentals of triboelectric nanogenerators (TENGs), and continues through to fabrication technologies to achieve flexible and stretchable. Then self-powered flexible microsystems are introduced and application examples are presented, including TENG-based active sensors, TENG-powered actuators, artificial intelligence and integrated systems.




Cyber Dragon


Book Description

This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepower—currently the world's second largest economy—with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically.




Techno-Fix


Book Description

Challenges beliefs about technology's assumed potential for enabling a continuation of current consumption rates, arguing for extensive reform while explaining that technological advances are hastening an environmental collapse. Original.