Michael Heim
- Published in print:
- 1994
- Published Online:
- October 2011
- ISBN:
- 9780195092585
- eISBN:
- 9780199852987
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195092585.001.0001
- Subject:
- Philosophy, Metaphysics/Epistemology
Computers have dramatically altered life in the late 20th century. Today we can draw on worldwide computer links, speeding up communications for radio, newspapers, and television. Ideas fly back and ...
More
Computers have dramatically altered life in the late 20th century. Today we can draw on worldwide computer links, speeding up communications for radio, newspapers, and television. Ideas fly back and forth and circle the globe at the speed of electricity. And just around the corner lurks full-blown virtual reality, in which we will be able to immerse ourselves in a computer simulation not only of the actual physical world, but of any imagined world. As we begin to move in and out of a computer-generated world, this book asks, how will the way we perceive our world change? This book considers this and other philosophical issues of the Information Age. With an eye for the dark as well as the bright side of computer technology, it explores the logical and historical origins of our computer-generated world and speculates about the future direction of our computerized lives. The book discusses such topics as the effect of word-processing on the English language. The book also looks into the new kind of literacy promised by Hypertext. And it also probes the notion of virtual reality, “cyberspace”—the computer-simulated environments that have captured the popular imagination and may ultimately change the way we define reality itself. Just as the definition of interface itself has evolved from the actual adaptor plug used to connect electronic circuits into human entry into a self-contained cyberspace, so too will the notion of reality change with the current technological drive. Like the introduction of the automobile, the advent of virtual reality will change the whole context in which our knowledge and awareness of life are rooted. And along the way, the book covers such intriguing topics as how computers have altered our thought habits, how we will be able to distinguish virtual from real reality, and the appearance of virtual reality in popular culture (as in Star Trek's holodeck, William Gibson's Neuromancer, and Stephen King's Lawnmower Man).Less
Computers have dramatically altered life in the late 20th century. Today we can draw on worldwide computer links, speeding up communications for radio, newspapers, and television. Ideas fly back and forth and circle the globe at the speed of electricity. And just around the corner lurks full-blown virtual reality, in which we will be able to immerse ourselves in a computer simulation not only of the actual physical world, but of any imagined world. As we begin to move in and out of a computer-generated world, this book asks, how will the way we perceive our world change? This book considers this and other philosophical issues of the Information Age. With an eye for the dark as well as the bright side of computer technology, it explores the logical and historical origins of our computer-generated world and speculates about the future direction of our computerized lives. The book discusses such topics as the effect of word-processing on the English language. The book also looks into the new kind of literacy promised by Hypertext. And it also probes the notion of virtual reality, “cyberspace”—the computer-simulated environments that have captured the popular imagination and may ultimately change the way we define reality itself. Just as the definition of interface itself has evolved from the actual adaptor plug used to connect electronic circuits into human entry into a self-contained cyberspace, so too will the notion of reality change with the current technological drive. Like the introduction of the automobile, the advent of virtual reality will change the whole context in which our knowledge and awareness of life are rooted. And along the way, the book covers such intriguing topics as how computers have altered our thought habits, how we will be able to distinguish virtual from real reality, and the appearance of virtual reality in popular culture (as in Star Trek's holodeck, William Gibson's Neuromancer, and Stephen King's Lawnmower Man).
Douglas E. Cowan
- Published in print:
- 2007
- Published Online:
- September 2007
- ISBN:
- 9780195177299
- eISBN:
- 9780199785537
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195177299.003.0014
- Subject:
- Religion, Religion and Society
This chapter considers NRMs and the Internet from two broad perspectives: (a) new religions on the Web, and (b) the Internet as both a pedagogical tool for teaching about NRMS and a sociological or ...
More
This chapter considers NRMs and the Internet from two broad perspectives: (a) new religions on the Web, and (b) the Internet as both a pedagogical tool for teaching about NRMS and a sociological or anthropological research site for the study of NRMs. In terms of the Internet as a research site, the chapter offers some suggestions for the exploration online discussion forums as evidence (or not) of emergent electronic communities. It concludes with a discussion of the Internet as one component in a responsible research and teaching agenda, and suggestions for teaching students how to employ the World Wide Web usefully and responsibly.Less
This chapter considers NRMs and the Internet from two broad perspectives: (a) new religions on the Web, and (b) the Internet as both a pedagogical tool for teaching about NRMS and a sociological or anthropological research site for the study of NRMs. In terms of the Internet as a research site, the chapter offers some suggestions for the exploration online discussion forums as evidence (or not) of emergent electronic communities. It concludes with a discussion of the Internet as one component in a responsible research and teaching agenda, and suggestions for teaching students how to employ the World Wide Web usefully and responsibly.
Lawrence B. Solum
- Published in print:
- 2009
- Published Online:
- May 2009
- ISBN:
- 9780199561131
- eISBN:
- 9780191721199
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199561131.003.0003
- Subject:
- Business and Management, Information Technology, Political Economy
This chapter presents a typology of various models of governance forms that impinge, or are assumed to impinge, on the Internet. Five such models are analysed. One model is based on a view of the ...
More
This chapter presents a typology of various models of governance forms that impinge, or are assumed to impinge, on the Internet. Five such models are analysed. One model is based on a view of the Internet as a self-governing realm of individual liberty beyond the reach of government control. Another model takes as its point of departure the inherently cross-border nature of the Internet and sees transnational, quasi-private cooperatives or international organizations based on treaty arrangements as the most relevant institutions for Internet governance. A third model is based on the notion that many regulatory decisions are made by the code and architecture of the Internet. A fourth model is premised on the idea that as the Internet grows in importance fundamental regulatory decisions will be made by national governments through legal regulation. Finally, there is the model of market regulation and economics which assumes that market forces drive the fundamental decisions about the nature of the Internet. The chapter argues that no single one of these models captures all of the facets of Internet governance or offers the solution to all of the problems raised by Internet governance. It concludes with a discussion of the issue of network neutrality and attempts thereby to cast light on the future utility of the models concerned.Less
This chapter presents a typology of various models of governance forms that impinge, or are assumed to impinge, on the Internet. Five such models are analysed. One model is based on a view of the Internet as a self-governing realm of individual liberty beyond the reach of government control. Another model takes as its point of departure the inherently cross-border nature of the Internet and sees transnational, quasi-private cooperatives or international organizations based on treaty arrangements as the most relevant institutions for Internet governance. A third model is based on the notion that many regulatory decisions are made by the code and architecture of the Internet. A fourth model is premised on the idea that as the Internet grows in importance fundamental regulatory decisions will be made by national governments through legal regulation. Finally, there is the model of market regulation and economics which assumes that market forces drive the fundamental decisions about the nature of the Internet. The chapter argues that no single one of these models captures all of the facets of Internet governance or offers the solution to all of the problems raised by Internet governance. It concludes with a discussion of the issue of network neutrality and attempts thereby to cast light on the future utility of the models concerned.
Gary R. Bunt
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9781469643168
- eISBN:
- 9781469643182
- Item type:
- book
- Publisher:
- University of North Carolina Press
- DOI:
- 10.5149/northcarolina/9781469643168.001.0001
- Subject:
- History, History of Religion
This book explores the diverse ways digital technology is shaping how Muslims across vast territories relate to religious authorities in fulfilling spiritual, mystical, and legalistic agendas. From ...
More
This book explores the diverse ways digital technology is shaping how Muslims across vast territories relate to religious authorities in fulfilling spiritual, mystical, and legalistic agendas. From social networks to websites, essential elements of religious practices and authority now have representation online. Muslims, embracing the immediacy and general accessibility of the internet, are increasingly turning to cyberspace for advice and answers to important religious questions. Online environments often challenge traditional models of authority, however. One result is the rise of digitally literate religious scholars and authorities whose influence and impact go beyond traditional boundaries of imams, mullahs, and shaikhs. The book shows how online rhetoric and social media are being used to articulate religious faith by many different kinds of Muslim organizations and individuals, from Muslim comedians and women’s rights advocates to jihad-oriented groups, such as the “Islamic State” and al-Qaeda, which relied on strategic digital media policies to augment and justify their authority and draw recruits. Hashtag Islam makes clear that understanding CIEs is crucial for the holistic interpretation of authority in contemporary Islam.Less
This book explores the diverse ways digital technology is shaping how Muslims across vast territories relate to religious authorities in fulfilling spiritual, mystical, and legalistic agendas. From social networks to websites, essential elements of religious practices and authority now have representation online. Muslims, embracing the immediacy and general accessibility of the internet, are increasingly turning to cyberspace for advice and answers to important religious questions. Online environments often challenge traditional models of authority, however. One result is the rise of digitally literate religious scholars and authorities whose influence and impact go beyond traditional boundaries of imams, mullahs, and shaikhs. The book shows how online rhetoric and social media are being used to articulate religious faith by many different kinds of Muslim organizations and individuals, from Muslim comedians and women’s rights advocates to jihad-oriented groups, such as the “Islamic State” and al-Qaeda, which relied on strategic digital media policies to augment and justify their authority and draw recruits. Hashtag Islam makes clear that understanding CIEs is crucial for the holistic interpretation of authority in contemporary Islam.
Howard A. Schmidt
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0016
- Subject:
- Information Science, Information Science
This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's ...
More
This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's Cyberspace Policy Review. The strategy calls for the creation of an Identity Ecosystem. The ecosystem's core is for the key components of a cyber transaction—namely the individual and organization identities, along with the identities of the infrastructure that handles transactions—to operate in a streamlined and safe manner, moving away from the culture of having different user names and passwords for each website. In its place, individuals voluntarily choose a secure privacy-enhancing credential to verify themselves for all types of online transactions from online banking, sending email, maintaining health records, or for any other personal cyber uses. The chapter goes on to describe the Comprehensive National Cyberspace Initiative (CNCI), which outlines a plan for sharing situational awareness among federal, state, and local governments, and private industry partners.Less
This chapter first discusses the National Strategy for Trusted Identities in Cyberspace (NSTIC), established by the White House in 2010 in response to a near-term action item in President Obama's Cyberspace Policy Review. The strategy calls for the creation of an Identity Ecosystem. The ecosystem's core is for the key components of a cyber transaction—namely the individual and organization identities, along with the identities of the infrastructure that handles transactions—to operate in a streamlined and safe manner, moving away from the culture of having different user names and passwords for each website. In its place, individuals voluntarily choose a secure privacy-enhancing credential to verify themselves for all types of online transactions from online banking, sending email, maintaining health records, or for any other personal cyber uses. The chapter goes on to describe the Comprehensive National Cyberspace Initiative (CNCI), which outlines a plan for sharing situational awareness among federal, state, and local governments, and private industry partners.
Susan W. Brenner
- Published in print:
- 2009
- Published Online:
- September 2009
- ISBN:
- 9780195385014
- eISBN:
- 9780199855414
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195385014.003.0007
- Subject:
- Law, Criminal Law and Criminology
This chapter analyzes why the nation-state monopolization of power arose and why it is eroding. As technology evolves in sophistication and pervasiveness, the impact of the virtual overlay cyberspace ...
More
This chapter analyzes why the nation-state monopolization of power arose and why it is eroding. As technology evolves in sophistication and pervasiveness, the impact of the virtual overlay cyberspace has given us will only become more profound. This creates the problem we now need to address: How can our social systems maintain order in a world in which the limitations of physical reality and the influence of territorial boundaries become increasingly irrelevant? It argues that our conceptual and operational approaches to the problem of maintaining order of whatever type are inextricably bound up with the strictures of physical reality and territorial sovereignty.Less
This chapter analyzes why the nation-state monopolization of power arose and why it is eroding. As technology evolves in sophistication and pervasiveness, the impact of the virtual overlay cyberspace has given us will only become more profound. This creates the problem we now need to address: How can our social systems maintain order in a world in which the limitations of physical reality and the influence of territorial boundaries become increasingly irrelevant? It argues that our conceptual and operational approaches to the problem of maintaining order of whatever type are inextricably bound up with the strictures of physical reality and territorial sovereignty.
D. Frank Hsu and Dorothy Marinucci (eds)
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- book
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.001.0001
- Subject:
- Information Science, Information Science
In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ...
More
In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. It collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries. It provides readers with the information they need to secure and sustain the cyberspace ecosystem and to defend themselves against all kinds of adversaries and attacks. It provides critical intelligence on cyber crime and security—including details of real-life operations. Among the many important topics it covers are: building a secure cyberspace ecosystem; public-private partnerships to secure cyberspace; law enforcement to protect cyber citizens and to safeguard cyber infrastructure; and strategy and policy issues relating to the security of the cyberecosystem.Less
In this book, the world's foremost cyber security experts share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack and exploitation. It collects the wisdom of cyber security professionals and practitioners from government, academia, and industry across national and international boundaries. It provides readers with the information they need to secure and sustain the cyberspace ecosystem and to defend themselves against all kinds of adversaries and attacks. It provides critical intelligence on cyber crime and security—including details of real-life operations. Among the many important topics it covers are: building a secure cyberspace ecosystem; public-private partnerships to secure cyberspace; law enforcement to protect cyber citizens and to safeguard cyber infrastructure; and strategy and policy issues relating to the security of the cyberecosystem.
Manuel Castells
- Published in print:
- 2002
- Published Online:
- September 2011
- ISBN:
- 9780199255771
- eISBN:
- 9780191698279
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199255771.003.0007
- Subject:
- Business and Management, Information Technology
This chapter begins by discussing how countries, particularly the United States, control the flow of information in the Internet, as well as the challenges encountered in doing so. It then examines ...
More
This chapter begins by discussing how countries, particularly the United States, control the flow of information in the Internet, as well as the challenges encountered in doing so. It then examines privacy issues occurring in different industries, and the exercise of sovereignty, liberty, and property when privacy vanishes. Next, it discusses several firms that counteract technologies of control by technologies of freedom. Lastly, it talks about the relationship of the society and the government in exercising their rights and power through the use of the Internet.Less
This chapter begins by discussing how countries, particularly the United States, control the flow of information in the Internet, as well as the challenges encountered in doing so. It then examines privacy issues occurring in different industries, and the exercise of sovereignty, liberty, and property when privacy vanishes. Next, it discusses several firms that counteract technologies of control by technologies of freedom. Lastly, it talks about the relationship of the society and the government in exercising their rights and power through the use of the Internet.
David C. Neice
- Published in print:
- 2002
- Published Online:
- October 2011
- ISBN:
- 9780198296553
- eISBN:
- 9780191685231
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780198296553.003.0003
- Subject:
- Business and Management, Information Technology, Innovation
There are two different types of experiences and interactions that can be encountered in cyberspace. The first is shown in the form of social metaphors about cyberspace that focus on folk theories ...
More
There are two different types of experiences and interactions that can be encountered in cyberspace. The first is shown in the form of social metaphors about cyberspace that focus on folk theories and ‘common-sense’ explanations particularly on Internet participation. The second is presented in the form of social distinctions within cyberspace; this concerns social theory and the signs and rules that comprise the interaction processes. This chapter presents the results from a qualitative empirical study that examined the perceptions and interpretations of intensive Internet-users on social distinctions relevant in cyberspace interactions. Here, it is pointed out that changes involving themes like freedom and creativity, persona, skill, and other such themes are brought about by processes of network peer reciprocity and that processes occurring over the internet can affect the social signification for Internet-users.Less
There are two different types of experiences and interactions that can be encountered in cyberspace. The first is shown in the form of social metaphors about cyberspace that focus on folk theories and ‘common-sense’ explanations particularly on Internet participation. The second is presented in the form of social distinctions within cyberspace; this concerns social theory and the signs and rules that comprise the interaction processes. This chapter presents the results from a qualitative empirical study that examined the perceptions and interpretations of intensive Internet-users on social distinctions relevant in cyberspace interactions. Here, it is pointed out that changes involving themes like freedom and creativity, persona, skill, and other such themes are brought about by processes of network peer reciprocity and that processes occurring over the internet can affect the social signification for Internet-users.
Nevill Drury
- Published in print:
- 2011
- Published Online:
- May 2011
- ISBN:
- 9780199750993
- eISBN:
- 9780199894871
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199750993.003.0010
- Subject:
- Religion, Religion and Society
If we are to understand the nature of contemporary magical practice and its relationship with the “virtual” world of the Internet, it may well be that new paradigms are required—new paradigms for ...
More
If we are to understand the nature of contemporary magical practice and its relationship with the “virtual” world of the Internet, it may well be that new paradigms are required—new paradigms for research into altered states of consciousness and new paradigms for the study of magic, as well. This chapter explores magic in the digital age, commencing with Terence McKenna’s “cyberdelic” fusion of shamanism and technology. We then extend into the specifics of cyberspace itself, for it now seems that the Internet has become an extension of the human psyche—a forum for both its realities and its fantasies. From an esoteric or mystical perspective, what we are really exploring here is a form of interplay between technology and the human imagination that can be expressed as a simple equation—As I imagine, so I become—and this is the very essence of magic. It comes as no surprise that neopagans and occultists of all descriptions have been quick to embrace the Internet as a new means of communication and fantasy role-play. For many, the World Wide Web provides a pathway into the mythic conjurings of the world-at-large—an enticing and increasingly seductive means of engaging with the global imagination. This chapter explores the surprising connections between the contemporary techno-digital age and the American counterculture that preceded it and explains how many neopagans now regard technology and magic as interchangeable. Also considered here are the possible magical cosmologies of the future, with special emphasis on the visionary surreal creations of Swiss artist H. R. Giger, creator of the Alien.Less
If we are to understand the nature of contemporary magical practice and its relationship with the “virtual” world of the Internet, it may well be that new paradigms are required—new paradigms for research into altered states of consciousness and new paradigms for the study of magic, as well. This chapter explores magic in the digital age, commencing with Terence McKenna’s “cyberdelic” fusion of shamanism and technology. We then extend into the specifics of cyberspace itself, for it now seems that the Internet has become an extension of the human psyche—a forum for both its realities and its fantasies. From an esoteric or mystical perspective, what we are really exploring here is a form of interplay between technology and the human imagination that can be expressed as a simple equation—As I imagine, so I become—and this is the very essence of magic. It comes as no surprise that neopagans and occultists of all descriptions have been quick to embrace the Internet as a new means of communication and fantasy role-play. For many, the World Wide Web provides a pathway into the mythic conjurings of the world-at-large—an enticing and increasingly seductive means of engaging with the global imagination. This chapter explores the surprising connections between the contemporary techno-digital age and the American counterculture that preceded it and explains how many neopagans now regard technology and magic as interchangeable. Also considered here are the possible magical cosmologies of the future, with special emphasis on the visionary surreal creations of Swiss artist H. R. Giger, creator of the Alien.
Michael Heim
- Published in print:
- 1994
- Published Online:
- October 2011
- ISBN:
- 9780195092585
- eISBN:
- 9780199852987
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195092585.003.0006
- Subject:
- Philosophy, Metaphysics/Epistemology
The chapter outlines humanity's dependency and marriage to machines. The marriage began with appliance. Applied technology filled our lives with familiar routines. So embedded are machines to our way ...
More
The chapter outlines humanity's dependency and marriage to machines. The marriage began with appliance. Applied technology filled our lives with familiar routines. So embedded are machines to our way of living that we seldom notice them until they breakdown. Appliance gave way to interface. Interface is a phenomenon when two sources of information come face-to-face. This change is made possible by advances in technology such as the development of computer where a human sits in front of it and creates an interactive relationship with it. The human gives input, while the computer enhances and modifies the human's thinking power. Finally, the chapter moves on to the concept of cyberspace, an artificial or represented world that is made up of information that our system produces and that we feed back into the system. The issue the chapter asks is about how humans figure in cyberspace. It asks: what is the human's significance in the virtual landscape designed by software programs?Less
The chapter outlines humanity's dependency and marriage to machines. The marriage began with appliance. Applied technology filled our lives with familiar routines. So embedded are machines to our way of living that we seldom notice them until they breakdown. Appliance gave way to interface. Interface is a phenomenon when two sources of information come face-to-face. This change is made possible by advances in technology such as the development of computer where a human sits in front of it and creates an interactive relationship with it. The human gives input, while the computer enhances and modifies the human's thinking power. Finally, the chapter moves on to the concept of cyberspace, an artificial or represented world that is made up of information that our system produces and that we feed back into the system. The issue the chapter asks is about how humans figure in cyberspace. It asks: what is the human's significance in the virtual landscape designed by software programs?
John Perry Barlow and Adolfo Plasencia
- Published in print:
- 2017
- Published Online:
- January 2018
- ISBN:
- 9780262036016
- eISBN:
- 9780262339308
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262036016.003.0021
- Subject:
- Society and Culture, Technology and Society
John Perry Barlow starts the dialogue explaining the reasons that led him to draw up and disclose his Declaration of the Independence of Cyberspace, in Davos. He then discusses why he believes that ...
More
John Perry Barlow starts the dialogue explaining the reasons that led him to draw up and disclose his Declaration of the Independence of Cyberspace, in Davos. He then discusses why he believes that people who use the term ‘intellectual property’ have got the wrong idea about it, and puts forward his ideas about frontiers in general and in particular the electronic frontier. He deliberates on whether the Economy of Ideas is capitalist, socialist or Marxist, and whether it should be supervised by someone or not. He also explains why cyberspace has still not been dominated by any world power, and explores the contradiction of why the differences between the rich and the poor have increased considerably since the onset of the global Internet revolution, what the cause of this is, and what has happened to all the hopes placed in the Internet by the underprivileged. Finally, he talks about how the structure of local cultures in cyberspace and their relationship with the global culture of the Internet is evolving.Less
John Perry Barlow starts the dialogue explaining the reasons that led him to draw up and disclose his Declaration of the Independence of Cyberspace, in Davos. He then discusses why he believes that people who use the term ‘intellectual property’ have got the wrong idea about it, and puts forward his ideas about frontiers in general and in particular the electronic frontier. He deliberates on whether the Economy of Ideas is capitalist, socialist or Marxist, and whether it should be supervised by someone or not. He also explains why cyberspace has still not been dominated by any world power, and explores the contradiction of why the differences between the rich and the poor have increased considerably since the onset of the global Internet revolution, what the cause of this is, and what has happened to all the hopes placed in the Internet by the underprivileged. Finally, he talks about how the structure of local cultures in cyberspace and their relationship with the global culture of the Internet is evolving.
Ronnapoom Samakkeekarom and Pimpawun Boonmongkon
- Published in print:
- 2011
- Published Online:
- September 2011
- ISBN:
- 9789888083046
- eISBN:
- 9789882207325
- Item type:
- chapter
- Publisher:
- Hong Kong University Press
- DOI:
- 10.5790/hongkong/9789888083046.003.0007
- Subject:
- Society and Culture, Asian Studies
Cyberspace provides a venue for virtual communities in which face-to-face communication does not rely upon physical space. Within this virtual domain, individuals are able to leave aside normative ...
More
Cyberspace provides a venue for virtual communities in which face-to-face communication does not rely upon physical space. Within this virtual domain, individuals are able to leave aside normative attachments to aspects of individual identity, such as sex, class, or ethnicity. This chapter presents the results of a research project based on anthropological concepts and approaches that was conducted to provide an account of the perceptions, explanations, assumptions, belief sets, and meanings related to sexuality and gender among Thai MSM (men who have sex with men) on Camfrog. This study revealed that many MSM used Camfrog to find temporary sexual partners who were particularly able to respond to their specific sexual desires. Some sought long-term relationships. Furthermore, MSM and DJs of all sexual identities could express themselves freely and openly on Camfrog.Less
Cyberspace provides a venue for virtual communities in which face-to-face communication does not rely upon physical space. Within this virtual domain, individuals are able to leave aside normative attachments to aspects of individual identity, such as sex, class, or ethnicity. This chapter presents the results of a research project based on anthropological concepts and approaches that was conducted to provide an account of the perceptions, explanations, assumptions, belief sets, and meanings related to sexuality and gender among Thai MSM (men who have sex with men) on Camfrog. This study revealed that many MSM used Camfrog to find temporary sexual partners who were particularly able to respond to their specific sexual desires. Some sought long-term relationships. Furthermore, MSM and DJs of all sexual identities could express themselves freely and openly on Camfrog.
Mary Poovey (ed.)
- Published in print:
- 2008
- Published Online:
- February 2013
- ISBN:
- 9780226675329
- eISBN:
- 9780226675213
- Item type:
- chapter
- Publisher:
- University of Chicago Press
- DOI:
- 10.7208/chicago/9780226675213.003.0011
- Subject:
- Literature, 19th-century and Victorian Literature
This chapter returns to the topic of the hierarchy of the modern disciplines, and also offers some thoughts about the new genres that are proliferating in cyberspace, apparently beyond the reach of ...
More
This chapter returns to the topic of the hierarchy of the modern disciplines, and also offers some thoughts about the new genres that are proliferating in cyberspace, apparently beyond the reach of all academic programs. The genres of cyberspace are not expected to replace academic disciplines or the genres they have bred anytime soon. Disciplines are too inertial, and too many people have too much invested in systems of credentialization and evaluation simply to let established practices go. Nor will society's appetite for easily managed information likely diminish in the near future.Less
This chapter returns to the topic of the hierarchy of the modern disciplines, and also offers some thoughts about the new genres that are proliferating in cyberspace, apparently beyond the reach of all academic programs. The genres of cyberspace are not expected to replace academic disciplines or the genres they have bred anytime soon. Disciplines are too inertial, and too many people have too much invested in systems of credentialization and evaluation simply to let established practices go. Nor will society's appetite for easily managed information likely diminish in the near future.
Katsuhiko Suganuma and Siu-lun Wong
- Published in print:
- 2012
- Published Online:
- September 2012
- ISBN:
- 9789888083701
- eISBN:
- 9789882209053
- Item type:
- chapter
- Publisher:
- Hong Kong University Press
- DOI:
- 10.5790/hongkong/9789888083701.003.0006
- Subject:
- Society and Culture, Asian Studies
Chapter 6 positions the discussion of the deployment of the ‘Japan’ versus the ‘West’ binary within the context of Japan's queer culture in the age of Internet communication. This chapter focuses on ...
More
Chapter 6 positions the discussion of the deployment of the ‘Japan’ versus the ‘West’ binary within the context of Japan's queer culture in the age of Internet communication. This chapter focuses on a Japanese gay Internet news portal, Gay Japan News in the year 2006. By examining the ways in which the binary comparison of ‘advanced Western gay culture’ versus ‘developing Japanese gay culture’ is put to use, the chapter argues that a use of this binary trope does not necessarily make a site such as Gay Japan News a replica or an exact copy of Western gay cyberspace. It is argued, instead, that such a cross-cultural contact not only brings new sexual knowledge and cultures into Japan, but also sheds light on the history of Japanese queer cultures prior to the Internet age, and puts them into the present context.Less
Chapter 6 positions the discussion of the deployment of the ‘Japan’ versus the ‘West’ binary within the context of Japan's queer culture in the age of Internet communication. This chapter focuses on a Japanese gay Internet news portal, Gay Japan News in the year 2006. By examining the ways in which the binary comparison of ‘advanced Western gay culture’ versus ‘developing Japanese gay culture’ is put to use, the chapter argues that a use of this binary trope does not necessarily make a site such as Gay Japan News a replica or an exact copy of Western gay cyberspace. It is argued, instead, that such a cross-cultural contact not only brings new sexual knowledge and cultures into Japan, but also sheds light on the history of Japanese queer cultures prior to the Internet age, and puts them into the present context.
Diane Singerman
- Published in print:
- 2009
- Published Online:
- September 2011
- ISBN:
- 9789774162886
- eISBN:
- 9781617970351
- Item type:
- chapter
- Publisher:
- American University in Cairo Press
- DOI:
- 10.5743/cairo/9789774162886.003.0003
- Subject:
- Political Science, International Relations and Politics
This chapter reveals the “mapping of state power” as the state implements its master plans, designs parks, buildings, and communities; enforces its regulations and implements court decisions; arrests ...
More
This chapter reveals the “mapping of state power” as the state implements its master plans, designs parks, buildings, and communities; enforces its regulations and implements court decisions; arrests people and collects fines; demolishes buildings; shutters workshops; bulldozes markets; and forcibly “removes” residents and their noisy, polluting, or “dirty” workshops and businesses from one area to another due to the “public interest” or disasters such as fires, earthquakes, or rock slides. It also argues that globalization, cyberspace, and the new media have allowed “peripheral 'Ulama” to become central to the Egyptian public sphere. Before looking at the expansion of the new religious networks, it is useful to explain how Nasser's reforms were justified and integrated into the intertwined and ambivalent mythical tales of tradition and modernity centrality and decline, that made al-Azhar a nationally emblematic institution through its physical presence in Islamic Cairo and in the functions it represents. It also describes the enlargement of al-Azhar's territories.Less
This chapter reveals the “mapping of state power” as the state implements its master plans, designs parks, buildings, and communities; enforces its regulations and implements court decisions; arrests people and collects fines; demolishes buildings; shutters workshops; bulldozes markets; and forcibly “removes” residents and their noisy, polluting, or “dirty” workshops and businesses from one area to another due to the “public interest” or disasters such as fires, earthquakes, or rock slides. It also argues that globalization, cyberspace, and the new media have allowed “peripheral 'Ulama” to become central to the Egyptian public sphere. Before looking at the expansion of the new religious networks, it is useful to explain how Nasser's reforms were justified and integrated into the intertwined and ambivalent mythical tales of tradition and modernity centrality and decline, that made al-Azhar a nationally emblematic institution through its physical presence in Islamic Cairo and in the functions it represents. It also describes the enlargement of al-Azhar's territories.
Vinay Lal
- Published in print:
- 2005
- Published Online:
- October 2012
- ISBN:
- 9780195672442
- eISBN:
- 9780199081929
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195672442.003.0001
- Subject:
- History, Historiography
This book explores the politics underlying the rise of history to prominence in modern India. It offers an account of the nationalist obsession with history in nineteenth-century India, examines the ...
More
This book explores the politics underlying the rise of history to prominence in modern India. It offers an account of the nationalist obsession with history in nineteenth-century India, examines the relationship between nation-building and the making of Indian history, and discusses the emergence of subaltern history in relation to strand of Indian historiography known as the Cambridge School. It also looks at the debate between historians over the origins of the Babri Masjid, recent attempts to communalize such figures as Vivekananda, the attempted legitimization of ‘fringe’ historical scholarship, and the revisionism of those who purport to establish Aryanism as the only foundation of Indian civilization. Finally, this book extends the discussion of Indian histories to those being generated in cyberspace in the North American Indian and specifically Hindu diaspora.Less
This book explores the politics underlying the rise of history to prominence in modern India. It offers an account of the nationalist obsession with history in nineteenth-century India, examines the relationship between nation-building and the making of Indian history, and discusses the emergence of subaltern history in relation to strand of Indian historiography known as the Cambridge School. It also looks at the debate between historians over the origins of the Babri Masjid, recent attempts to communalize such figures as Vivekananda, the attempted legitimization of ‘fringe’ historical scholarship, and the revisionism of those who purport to establish Aryanism as the only foundation of Indian civilization. Finally, this book extends the discussion of Indian histories to those being generated in cyberspace in the North American Indian and specifically Hindu diaspora.
Vinay Lal
- Published in print:
- 2005
- Published Online:
- October 2012
- ISBN:
- 9780195672442
- eISBN:
- 9780199081929
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195672442.003.0006
- Subject:
- History, Historiography
This chapter explores how the politics of Hinduism has played itself out in cyberspace and how Hinduism itself gradually merged into Hindutva politics. It considers the Indian diaspora in the United ...
More
This chapter explores how the politics of Hinduism has played itself out in cyberspace and how Hinduism itself gradually merged into Hindutva politics. It considers the Indian diaspora in the United States, where nearly 1.7 million Indians, most of them Hindus, reside. It then discusses the state of democracy and authoritarianism in cyberspace. It argues that cyberspace has become the true home of those Indians in North America who imagine themselves as the authentic Aryans. It looks at the predominance of Indians in Silicon Valley, and suggests that Hinduism and the Internet were made for each other. The chapter analyses the websites of the Hindu Students Council, the Vishwa Hindu Parishad of America, the Global Hindu Electronic Network, and other similar organizations to show how the work of earlier generations of Hindu nationalist historians has acquired a new and dangerous kind of urgency and plausibility.Less
This chapter explores how the politics of Hinduism has played itself out in cyberspace and how Hinduism itself gradually merged into Hindutva politics. It considers the Indian diaspora in the United States, where nearly 1.7 million Indians, most of them Hindus, reside. It then discusses the state of democracy and authoritarianism in cyberspace. It argues that cyberspace has become the true home of those Indians in North America who imagine themselves as the authentic Aryans. It looks at the predominance of Indians in Silicon Valley, and suggests that Hinduism and the Internet were made for each other. The chapter analyses the websites of the Hindu Students Council, the Vishwa Hindu Parishad of America, the Global Hindu Electronic Network, and other similar organizations to show how the work of earlier generations of Hindu nationalist historians has acquired a new and dangerous kind of urgency and plausibility.
Kendall Lori
- Published in print:
- 2002
- Published Online:
- May 2012
- ISBN:
- 9780520230361
- eISBN:
- 9780520935983
- Item type:
- chapter
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520230361.003.0001
- Subject:
- Anthropology, American and Canadian Cultural Anthropology
This chapter provides an examination of BlueSky's social contexts and the effects they have on people's online interactions, with an emphasis on gender. It discusses Falcon, a hangout on an online ...
More
This chapter provides an examination of BlueSky's social contexts and the effects they have on people's online interactions, with an emphasis on gender. It discusses Falcon, a hangout on an online forum called BlueSky, and presents an approximation of a set of conversations that occurred online and entirely through text. In the ethnography of BlueSky, the usage of pub metaphor assists in the interpretation BlueSky's social world. The Falcon provides a space in which people enact and negotiate masculine identities within a particular class and race context. However, discussions that construct cyberspace as a distinctively different arena of social interaction emphasizes the differences between online and offline interactions and suggest that offline rules concerning identity do not apply online. Through these forums participants bring particular backgrounds and understandings to their interpretations of each other's presentation of self—online they behave in certain style that depends on gender. The chapter also looks at what people gain from their online participation and what offline experience and knowledge they bring to their online interactions.Less
This chapter provides an examination of BlueSky's social contexts and the effects they have on people's online interactions, with an emphasis on gender. It discusses Falcon, a hangout on an online forum called BlueSky, and presents an approximation of a set of conversations that occurred online and entirely through text. In the ethnography of BlueSky, the usage of pub metaphor assists in the interpretation BlueSky's social world. The Falcon provides a space in which people enact and negotiate masculine identities within a particular class and race context. However, discussions that construct cyberspace as a distinctively different arena of social interaction emphasizes the differences between online and offline interactions and suggest that offline rules concerning identity do not apply online. Through these forums participants bring particular backgrounds and understandings to their interpretations of each other's presentation of self—online they behave in certain style that depends on gender. The chapter also looks at what people gain from their online participation and what offline experience and knowledge they bring to their online interactions.
Kendall Lori
- Published in print:
- 2002
- Published Online:
- May 2012
- ISBN:
- 9780520230361
- eISBN:
- 9780520935983
- Item type:
- chapter
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520230361.003.0008
- Subject:
- Anthropology, American and Canadian Cultural Anthropology
This chapter presents a summary analysis of identity and power on BlueSky. Researchers critically claim that online interaction is more egalitarian or even that it subverts offline hierarchies. As ...
More
This chapter presents a summary analysis of identity and power on BlueSky. Researchers critically claim that online interaction is more egalitarian or even that it subverts offline hierarchies. As demonstrated by available demographics of online participants, cyberspace remains a realm populated mostly by the white and middle class and is still largely dominated by men. Members of these groups benefit both from the current social structures and, in greater numbers, from online participation and the advantages. The Internet provides a haven from prejudice and social disadvantage, this relieves the more powerful of the responsibility either to change social structures in the offline world or to change their own behavior and beliefs. Online participants can see no evil, hear no evil, and claim to speak no evil without making any attempts to create a more inclusive environment, either offline or online. Online forums such as BlueSky potentially become just more exclusive enclaves to which the privileged can retreat.Less
This chapter presents a summary analysis of identity and power on BlueSky. Researchers critically claim that online interaction is more egalitarian or even that it subverts offline hierarchies. As demonstrated by available demographics of online participants, cyberspace remains a realm populated mostly by the white and middle class and is still largely dominated by men. Members of these groups benefit both from the current social structures and, in greater numbers, from online participation and the advantages. The Internet provides a haven from prejudice and social disadvantage, this relieves the more powerful of the responsibility either to change social structures in the offline world or to change their own behavior and beliefs. Online participants can see no evil, hear no evil, and claim to speak no evil without making any attempts to create a more inclusive environment, either offline or online. Online forums such as BlueSky potentially become just more exclusive enclaves to which the privileged can retreat.