Table of Contents

Prologue

  • 0.1 Background
  • 0.2 Opportunities: computer applications
  • 0.3 Risks: technological threats
  • 0.4: Choices: challenges for society
  • 0.5 How to use this book
  • 0.6 A note to instructors

Part I Opportunities

1 Digital inclusion

  • 1.1 Pioneers and visionaries
  • 1.2 Access to the internet
  • 1.3 Internet access across the world
  • 1.4 Internet shutdowns
  • 1.5 Inclusive design of technology
  • 1.6 Gender issues
  • 1.7 Technology for seniors
  • 1.8 Summary
  • 1.9 Key terms

2 Digital media and intellectual property

  • 2.1 Pioneers and visionaries
  • 2.2 Intellectual property: protection and fair use
  • 2.3 Music
  • 2.4 Movies
  • 2.5 Mash-ups
  • 2.6 Textbooks and research publications
  • 2.7 Open access publications
  • 2.8 Software patents
  • 2.9 Open source software
  • 2.10 Creative Commons licensing
  • 2.11 Summary
  • 2.12 Key Terms

3 Computers in education and learning

  • 3.1 Pioneers and visionaries
  • 3.2 Digital simulations and serious gaming
  • 3.3 Presentation technology
  • 3.4 Smart and flipped classrooms
  • 3.5 Intelligent tutoring
  • 3.6 Online learning
  • 3.7 Massive open online courses (MOOCs)
  • 3.8 Ubiquitous use of computers in schools
  • 3.9 Summary
  • 3.10 Key Terms

4 Computers in medicine and health care

  • 4.1 Pioneers and visionaries
  • 4.2 Online health information and online communities of care
  • 4.3 Electronic medical records and personal health records
  • 4.4 Medication data processing
  • 4.5 Big data and infectious disease surveillance and modelling
  • 4.6 Medical simulators
  • 4.7 Artificial body parts and bionic people
  • 4.8 Precision medicine
  • 4.9 Neuroplasticity and brain training
  • 4.10 Robot companions and caregivers for seniors
  • 4.11 Summary
  • 4.12 Key terms

5 Free speech, politics, and government

  • 5.1 Visions, utopias, and dystopias
  • 5.2 Free speech
  • 5.3 Print, broadcast, and internet speech
  • 5.4 Internet speech that draws censorship
  • 5.5 Fake news, filter bubbles, and echo chambers
  • 5.6 E-democracy
  • 5.7 Citizen mobilization via social media
  • 5.8 Campaigning with social media; big data for voter surveillance and targeting
  • 5.9 E-Government
  • 5.10 Summary
  • 5.11 Key terms

6 Law and order, war and peace

  • 6.1 Visions and nightmares
  • 6.2 Use of social media by the police and in dealing with the police
  • 6.3 Citizen mobilization via social media for regime change
  • 6.4 Surveillance by government
  • 6.5 Governmental restrictions of internet access; keeping the net open
  • 6.6 Hacking another country’s elections and politicians
  • 6.7 Cyberespionage, cyberterrorism, and cyberwarfare
  • 6.8 Guided aerial weapons with no person aboard
  • 6.9 Autonomous weapons and robot soldiers
  • 6.10 Summary
  • 6.11 Key terms

Part II Risks

7 Security

  • 7.1 Visions and context
  • 7.2 A security primer
  • 7.3 Hackers
  • 7.4 Cyber-criminals and large-scale system intrusions
  • 7.5 Identity theft
  • 7.6 Security in the digital world
  • 7.7 Electronic voting machines
  • 7.8 The legal response to cybercrime
  • 7.9 What shall we do?
  • 7.10 Summary
  • 7.11 Key terms

8 Safety

  • 8.1 Visions and context
  • 8.2 Frustration, anger, and rage in internet access
  • 8.3 Cyberbullying and revenge porn
  • 8.4 Attention and distraction
  • 8.5 Uncontrollable software development
  • 8.6 Incomprehensible and incorrect software
  • 8.7 Medical devices and safety
  • 8.8 Industrial disasters
  • 8.9 Autonomous vehicles
  • 8.10 The environment
  • 8.11 What shall we do?
  • 8.12 Summary
  • 8.13 Key terms

9 Privacy

  • 9.1 Visions and context
  • 9.2 A privacy primer
  • 9.3 Government data collection
  • 9.4 Consumer privacy
  • 9.5 Health information
  • 9.6 Personal information visible through social media
  • 9.7 Surveillance everywhere
  • 9.8 Recording, remembering, and forgetting
  • 9.9 Confidential information, privacy for government, and whistleblowers
  • 9.10 Privacy laws
  • 9.11 What shall we do?
  • 9.12 Summary
  • 9.13 Key terms

Part III Choices

10 Automation, work, and jobs

  • 10.1 Historical precedents and early warnings
  • 10.2 Identifying job opportunities and the best employees
  • 10.3 Monitoring workers for job performance
  • 10.4 On-demand services in the gig economy
  • 10.5 Automation and fears of unemployment
  • 10.6 Agriculture and automation
  • 10.7 Manufacturing and automation
  • 10.8 Computers in service industries
  • 10.9 The transformation of professions
  • 10.10 The future of employment, jobs, and work
  • 10.11 Our options
  • 10.12 Summary
  • 10.13 Key terms

11 Artificial intelligence, explanations, trust, responsibility, and justice

  • 11.1 Visions and context
  • 11.2 An AI Primer
  • 11.3 AI advances, capabilities, and limits
  • 11.4 What is intelligence?
  • 11.5 Anthropomorphism, feelings, and empathy
  • 11.6 How do we know what a computer knows and how it makes it decisions?
  • 11.7 Trust
  • 11.8 Accountability and responsibility
  • 11.9 Fairness and justice
  • 11.10 Our options
  • 11.11 Summary
  • 11.12 Key terms

12 Lifestyle

  • 12.1 Visions and context
  • 12.2 Connected
  • 12.3 Too connected
  • 12.4 Always connected: technology addiction and workaholism
  • 12.5 The internet of things, voice assistants, and smart cities
  • 12.6 Artificial reality
  • 12.7 Pornography, online dating, and sex robots
  • 12.8 Blockchain and the future of money
  • 12.9 Corporate concentration; social and economic disruption
  • 12.10 Our options
  • 12.11 Summary
  • 12.12 Key terms

13 Epilogue

  • 13.1 Social issues
  • 13.2 Policy/legal choices
  • 13.3 Ethical/moral dilemmas
  • 13.4 Moving forward

14 Afterword: Developments in autumn 2018

  • 14.1 Digital inclusion
  • 14.2 Digital media and intellectual property
  • 14.3 Education and learning
  • 14.4 Medicine and health care
  • 14.5 Free speech, politics, and government
  • 14.6 Law and order, war and peace
  • 14.7 Security
  • 14.8 Safety
  • 14.9 Privacy
  • 14.10 Automation, work, and jobs
  • 14.11 AI
  • 14.12 Lifestyle
  • 14.13 Summary

Notes

Resources

Index