Advertisement

The Networked Self in the Modulated Society

  • Julie E. Cohen

Abstract

The theme of the book — global community, global archipelago or a new civility? — echoes a question that has often been posed about transformative new technologies:1 Will such technologies connect us or divide us? Will networked information technologies produce a new global cosmopolitanism characterized by enlightened tolerance and mutual recognition of common interest and common ground, or will they fragment civil society into discrete cultural enclaves animated by narrower and more tribal interests? Each view has its partisans, and since the early days of the Internet, the two have vied with each other for supremacy.

Keywords

Civil Society Consumer Surplus Everyday Practice Global Civil Society Digital Artifact 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ambrose, ML & Ausloos, J 2013, ‘The right to be forgotten across the pond’, Journal of Information Policy, vol. 3, pp. 1–23.CrossRefGoogle Scholar
  2. Carr, N 2011, The Shallows: What the Internet Is Doing to Our Brains, W.W. Norton, New York.Google Scholar
  3. Castells, M 1996, The Rise of the Network Society, Wiley-Blackwell, New York.Google Scholar
  4. Cohen, JE 2012a, Configuring the Networked Self: Law, Code, and the Play of Everyday Practice, Yale University Press, New Haven.Google Scholar
  5. Cohen, JE 2012b, ‘Configuring the networked citizen’, in Imagining New Legalities: Privacy and Its Possibilities in the 21st Century, Stanford University Press, Stanford, pp. 129–53.CrossRefGoogle Scholar
  6. Cohen, JE 2013, ‘What privacy is for’, Harvard Law Review, vol. 126, no. 7, pp. 1904–33.Google Scholar
  7. Deleuze, G 1995, ‘Postscript on control societies’, in Negotiations 1972–1990, trans. Martin Joughin, Columbia University Press, New York, pp. 177–82.Google Scholar
  8. Eggers, D 2013, The Circle, Alfred A. Knopf, New York.Google Scholar
  9. Elmer, G 2004, Profiling Machines: Mapping the Personal Information Economy, MIT Press, Cambridge, MA.Google Scholar
  10. Foucault, M 2007, Security, Territory, Population: Lectures at the College de France 1977–1978, trans. Graham Burchell, Picador, New York.CrossRefGoogle Scholar
  11. Foucault, M 1983, ‘Afterword: The subject and power’, in Michel Foucault: Beyond Structuralism and Hermeneutics, 2nd edn., University of Chicago Press, Chicago, pp. 208–26.Google Scholar
  12. Fuchs, C, Boersma, K, Albrechtslund, A & Sandoval, M 2012, ‘Introduction: Internet and surveillance’, in Internet and Surveillance: The Challenges of Web 2.0 and Social Media, eds. Christian Fuchs, Kees Boersma, Anders Albrechtslund & Marisol Sandoval, Routledge, New York, pp. 1–28.Google Scholar
  13. Gergen, KJ 2002, ‘The challenge of absent presence’, in Perpetual Contact: Mobile Communication, Private Talk, Public Performance, eds. James E. Katz & Mark A. Aakhus, Cambridge University Press, New York, pp. 227–41.Google Scholar
  14. Huxley, A 2006, Brave New World, Harper Perennial, New York.Google Scholar
  15. Johnson, J 1988, ‘Mixing humans and nonhumans together: The sociology of a door-closer’, Social Problems, vol. 33, no. 3, pp. 298–310.CrossRefGoogle Scholar
  16. Murakami Wood, D ed. 2006, A Report on the Surveillance Society for the Information Commissioner by the Surveillance Studies Network, Mark Siddoway/Knowledge House, London.Google Scholar
  17. Nussbaum, MC 2000, Women and Human Development, Cambridge University, New York.CrossRefGoogle Scholar
  18. Nygren, KG & Gidlund, KL 2012, ‘The pastoral power of technology: Rethinking alienation in digital culture’, TripleC, vol. 10, no. 2, pp. 509–17.Google Scholar
  19. Pasquale, F 2015, The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press, Cambridge, MA.CrossRefGoogle Scholar
  20. Pfaffenberger, BC 1992, ‘Social anthropology of technology’, Annual Review of Anthropology, vol. 21, no. 1, pp. 491–516.CrossRefGoogle Scholar
  21. Sandel, M 2012, What Money Can’t Buy: The Limits of Markets, Farrar, Strous, & Giroux, New York.Google Scholar
  22. Sen, A 2004, ‘Elements of a theory of human rights’, Philosophy and Public Affairs, vol. 32, no. 4, pp. 315–56.CrossRefGoogle Scholar
  23. Shteyngart, G 2010, Super Sad True Love Story, Random House, New York.Google Scholar
  24. Steeves, V & Regan, P 2014, ‘Young people online and the social value of privacy’, Journal of Information, Communication and Ethics in Society, vol. 12, no. 4, pp. 298–313.CrossRefGoogle Scholar
  25. Terranova, T 2013, ‘Free labor’, in Digital Labor: The Internet as Playground and Factory, ed. Trebor Scholz, Routledge, New York, pp. 33–57.Google Scholar
  26. Verbeek, PP 2005, What Things Do: Philosophical Reflections on Technology, Agency, and Design, Pennsylvania State University Press, University Park, PA.Google Scholar
  27. Weinberger, D 2012, Too Big to Know: Rethinking Knowledge Now that the Facts Aren’t the Facts, Experts Are Everywhere, and the Smartest Person in the Room Is the Room, Basic Books, New York.Google Scholar
  28. Wyatt, S 2007, ‘Technological determinism is dead; Long live technological determinism’, in The Handbook of Science and Technology Studies, 3rd edn., MIT Press, Cambridge, MA, pp. 165–80.Google Scholar

Copyright information

© Julie E. Cohen 2015

Authors and Affiliations

  • Julie E. Cohen

There are no affiliations available

Personalised recommendations