Table of Contents

  • Prologue
    • 0.1 Background
    • 0.2 Opportunities: computer applications
    • 0.3 Risks: technological threats
    • 0.4: Choices: challenges for society
    • 0.5 How to use this book
    • 0.6 A note to instructors
  • Part I Opportunities
    • 1 Digital inclusion
      • 1.1 Pioneers and visionaries
      • 1.2 Access to the internet
      • 1.3 Internet access across the world
      • 1.4 Internet shutdowns
      • 1.5 Inclusive design of technology
      • 1.6 Gender issues
      • 1.7 Technology for seniors
      • 1.8 Summary
      • 1.9 Key terms
    • 2 Digital media and intellectual property
      • 2.1 Pioneers and visionaries
      • 2.2 Intellectual property: protection and fair use
      • 2.3 Music
      • 2.4 Movies
      • 2.5 Mash-ups
      • 2.6 Textbooks and research publications
      • 2.7 Open access publications
      • 2.8 Software patents
      • 2.9 Open source software
      • 2.10 Creative Commons licensing
      • 2.11 Summary
      • 2.12 Key Terms
    • 3 Computers in education and learning
      • 3.1 Pioneers and visionaries
      • 3.2 Digital simulations and serious gaming
      • 3.3 Presentation technology
      • 3.4 Smart and flipped classrooms
      • 3.5 Intelligent tutoring
      • 3.6 Online learning
      • 3.7 Massive open online courses (MOOCs)
      • 3.8 Ubiquitous use of computers in schools
      • 3.9 Summary
      • 3.10 Key Terms
    • 4 Computers in medicine and health care
      • 4.1 Pioneers and visionaries
      • 4.2 Online health information and online communities of care
      • 4.3 Electronic medical records and personal health records
      • 4.4 Medication data processing
      • 4.5 Big data and infectious disease surveillance and modelling
      • 4.6 Medical simulators
      • 4.7 Artificial body parts and bionic people
      • 4.8 Precision medicine
      • 4.9 Neuroplasticity and brain training
      • 4.10 Robot companions and caregivers for seniors
      • 4.11 Summary
      • 4.12 Key terms
    • 5 Free speech, politics, and government
      • 5.1 Visions, utopias, and dystopias
      • 5.2 Free speech
      • 5.3 Print, broadcast, and internet speech
      • 5.4 Internet speech that draws censorship
      • 5.5 Fake news, filter bubbles, and echo chambers
      • 5.6 E-democracy
      • 5.7 Citizen mobilization via social media
      • 5.8 Campaigning with social media; big data for voter surveillance and targeting
      • 5.9 E-Government
      • 5.10 Summary
      • 5.11 Key terms
    • 6 Law and order, war and peace
      • 6.1 Visions and nightmares
      • 6.2 Use of social media by the police and in dealing with the police
      • 6.3 Citizen mobilization via social media for regime change
      • 6.4 Surveillance by government
      • 6.5 Governmental restrictions of internet access; keeping the net open
      • 6.6 Hacking another country’s elections and politicians
      • 6.7 Cyberespionage, cyberterrorism, and cyberwarfare
      • 6.8 Guided aerial weapons with no person aboard
      • 6.9 Autonomous weapons and robot soldiers
      • 6.10 Summary
      • 6.11 Key terms
  • Part II Risks
    • 7 Security
      • 7.1 Visions and context
      • 7.2 A security primer
      • 7.3 Hackers
      • 7.4 Cyber-criminals and large-scale system intrusions
      • 7.5 Identity theft
      • 7.6 Security in the digital world
      • 7.7 Electronic voting machines
      • 7.8 The legal response to cybercrime
      • 7.9 What shall we do?
      • 7.10 Summary
      • 7.11 Key terms
    • 8 Safety
      • 8.1 Visions and context
      • 8.2 Frustration, anger, and rage in internet access
      • 8.3 Cyberbullying and revenge porn
      • 8.4 Attention and distraction
      • 8.5 Uncontrollable software development
      • 8.6 Incomprehensible and incorrect software
      • 8.7 Medical devices and safety
      • 8.8 Industrial disasters
      • 8.9 Autonomous vehicles
      • 8.10 The environment
      • 8.11 What shall we do?
      • 8.12 Summary
      • 8.13 Key terms
    • 9 Privacy
      • 9.1 Visions and context
      • 9.2 A privacy primer
      • 9.3 Government data collection
      • 9.4 Consumer privacy
      • 9.5 Health information
      • 9.6 Personal information visible through social media
      • 9.7 Surveillance everywhere
      • 9.8 Recording, remembering, and forgetting
      • 9.9 Confidential information, privacy for government, and whistleblowers
      • 9.10 Privacy laws
      • 9.11 What shall we do?
      • 9.12 Summary
      • 9.13 Key terms
  • Part III Choices
    • 10 Automation, work, and jobs
      • 10.1 Historical precedents and early warnings
      • 10.2 Identifying job opportunities and the best employees
      • 10.3 Monitoring workers for job performance
      • 10.4 On-demand services in the gig economy
      • 10.5 Automation and fears of unemployment
      • 10.6 Agriculture and automation
      • 10.7 Manufacturing and automation
      • 10.8 Computers in service industries
      • 10.9 The transformation of professions
      • 10.10 The future of employment, jobs, and work
      • 10.11 Our options
      • 10.12 Summary
      • 10.13 Key terms
    • 11 Artificial intelligence, explanations, trust, responsibility, and justice
      • 11.1 Visions and context
      • 11.2 An AI Primer
      • 11.3 AI advances, capabilities, and limits
      • 11.4 What is intelligence?
      • 11.5 Anthropomorphism, feelings, and empathy
      • 11.6 How do we know what a computer knows and how it makes it decisions?
      • 11.7 Trust
      • 11.8 Accountability and responsibility
      • 11.9 Fairness and justice
      • 11.10 Our options
      • 11.11 Summary
      • 11.12 Key terms
    • 12 Lifestyle
      • 12.1 Visions and context
      • 12.2 Connected
      • 12.3 Too connected
      • 12.4 Always connected: technology addiction and workaholism
      • 12.5 The internet of things, voice assistants, and smart cities
      • 12.6 Artificial reality
      • 12.7 Pornography, online dating, and sex robots
      • 12.8 Blockchain and the future of money
      • 12.9 Corporate concentration; social and economic disruption
      • 12.10 Our options
      • 12.11 Summary
      • 12.12 Key terms
    • 13 Epilogue
      • 13.1 Social issues
      • 13.2 Policy/legal choices
      • 13.3 Ethical/moral dilemmas
      • 13.4 Moving forward
    • 14 Afterword: Developments in autumn 2018
      • 14.1 Digital inclusion
      • 14.2 Digital media and intellectual property
      • 14.3 Education and learning
      • 14.4 Medicine and health care
      • 14.5 Free speech, politics, and government
      • 14.6 Law and order, war and peace
      • 14.7 Security
      • 14.8 Safety
      • 14.9 Privacy
      • 14.10 Automation, work, and jobs
      • 14.11 AI
      • 14.12 Lifestyle
      • 14.13 Summary
  • Notes
  • Resources
  • Index