Review: Mobilizing Generation 2.0–A Practical Guide to Using Web2.0 Technologies to Recruit, Organize and Engage Youth

5 Star, Education (General), Information Society, Information Technology
Web 2.0 3
Amazon Page

Superb, Well-Presented, Helpful at Multiple Levels, May 10, 2008

Ben Rigby

Edit of 18 May to recommend Groundswell: Winning in a World Transformed by Social Technologies as a different book, with more practical tips and annecdotal support, but in no way does that reduce my appreciation for this book. Both are excellent, I think of them as truly complementary of one another.

—–

I *like* this book. Although I have years of exposure to advanced information technology and read everything by gurus like Paul Strasssman (cf. Information Productivity: Assessing Information Management Costs of U. S. Corporationsand Stephen E. Arnold (Arnold IT, look for “Google 2.0: The Calculating Predator, not sold on Amazon), I learned stuff from this book, and I found it to be exactly right for getting an old-school CEO or other management skeptic “oriented.”

In 268 well-organized and well-presented pages, the book covers:

+ Blogging
+ Social Networking
+ Video and Photo Sharing
+ Mobile Phones
+ Wikis
+ Maps
+ Virtual Worlds

Each chapter has extremely clear headlines, gray boxes, figures, and endnotes. To get a sense of the book and the online offerings that back it up, visit mobilizingyouth.org, just add the www.

A special value is short essays from top practitioners including Mitch Kapor whose essay, next to last, focuses on the coming convergence of virtual worlds and social networking. Visit BigPictureSmallWorld for a sense of the possibilities there–I have very deep admiration for Medard Gabel, who built the analog World Game with Buckminster Fuller, and I am so very eager to see him create EarthGame(TM) in which we all play ourselves and have access to all information in all languages all the time–at that point, we will end looting of our commonwealth, end corruption, and create invite wealth or as he puts it in the title of his new book, “Seven Billion Billionaires.”

Most useful to me were the following:

+ Use all these tools internally to get a sense of them, before trying to do something with the broader online population

+ One billion people are connected, the rest are not, but what the billion do with their connections could impact on how quickly we get the other 5-6 billion connected and creating wealth

+ 55% of teens are active online, 80% of college students have a Facebook profile

+ Digg is an example of a global intelligence service in which every citizen is an intelligence consumer, collector, and producer

+ Cool examples that I will certainly look into include Care2, Causes, Hi5, and Gather

+ Politicians (including the three running for President now) simply do not get it. They are still using phone banks that call at all hours and spamming (Obama does less of it) instead of asking permission and then building on the relationship

+ I am very impressed by the natural manner in which the book communicates the relationship between having a good story with heroes, villians, and catalysts, and the sequence of fund-raising via text connection and follow-up. This book strikes me as both a very very good elementary text for digital immigrants (us old guys) and also a useful “once over” for the more experienced who may be overlooking a couple of pieces of the overall campaign.

+ The book emphasizes the many uses of the wiki, many of them internal, some external, but the most important being that wikis are a way of crowd sourcing. See the first book from Earth Intelligence Network, Collective Intelligence: Creating a Prosperous World at Peace (free at oss.net/CIB just add the www, but utterly lovely here at Amazon) and especially the later chapters on large scale collective and collaborative intelligence in action.

+ Tag clouds are vital, as is the selection of unique tags for clusters of informaiton you want to make easily available.

+ Virtual worlds are in their infancy, and when they finally develop, will be extraordinary as nuanced immersive learning environments (low cost low risk environmental, I would add).

The last essay from Katrin Verclas is great, and I selected the following quote with which to end this review–it captures the essence:

“Web 2.0 describes a participatory, bottom-up, decentralized world full of individual expression where people have direct access to one another and enjoy an unprecedented ability to organize, meet, and coordinate without centralized control or traditional hierarchies.”

YES!

See also:
The Tao of Democracy: Using Co-Intelligence to Create a World That Works for All
The World Cafe: Shaping Our Futures Through Conversations That Matter
Society's Breakthrough!: Releasing Essential Wisdom and Virtue in All the People
The Change Handbook: The Definitive Resource on Today's Best Methods for Engaging Whole Systems
How to Change the World: Social Entrepreneurs and the Power of New Ideas, Updated Edition
The New Craft of Intelligence: Personal, Public, & Political–Citizen's Action Handbook for Fighting Terrorism, Genocide, Disease, Toxic Bombs, & Corruption
Spoiling for a Fight: Third-Party Politics in America

Vote on Review

Review: R & D Collaboration on Trial–The Microelectronics and Computer Technology Corporation

3 Star, Information Technology

R&DExcellent in its Time, Overtaken by Time & Technology & Mindset, March 25, 2008

David V. Gibson

I have been toying with the need for a national skunkworks to create a complete open source software suite of analytic tools including open source multi-lingual and multi-media data ingestion and sense-making, and so I bought this book in part because the Microelectronics and Computer Corporation (MCC) was the “big deal” in the last quarter century of the 20th Century.

Bottom line: don't bother. The bulk of the book, while very detailed and certainly a worthy effort of reporting and sense-making, does not really apply to today's circumstances, when three big things are different:

1) Changes to the Earth and the marketplace are at light speed

2) Technology is no longer a top-down massive investment challenge

3) Social entrepreneurs, triple-bottom lines, and blended value propositions are the norm for those who seek to invent the future.

I can see now–in hind-sight, that the MIT Media Lab was the better venture, and still sets a gold standard for others to consider.

The final chapter of this book, entitled “Lessons Learned,” I found only two gems in that chapter:

1) Despite all the challenges of heterogeneous collaboration, benefits do emerge, and they are often unexpected and not part of the original concept of operations.

2) The challenge for the US is not technology invention, but technology application.

I was serving in the Office of Information Technology (OIT) of the Central Intelligence Agency (CIA) in the late 1990's, and I well remember the Japanese Fifth Generation Project that inspired fear among U.S. electronic companies (never mind all the great Japanese espionage against us at the same time). I well remember all the expectation of machine learning, artificial intelligence, and so on. And I know for a fact that today, fully 26 years after CIA's Office of Scientific and Weapons Research (OSWR) identified the eighteen functionalities needed for a desktop analytic toolkit called CATALYST (Computer Aided Tools for the Analysis of Science & Technology)–see the image above–the U.S. Intelligence Community, despite a $60 billion annual budget, still has total crap on its desktops; its vaunted Intelink system is a “crapshoot” in the words of its own managers; it cannot access the 96% of the information that is openly available in 183 languages it does not speak; and there is no one place (I am NOT making this up) where all of the information from across all of the disciplines can come together and be made sense of.

I conclude, from this book and my life experience, that LINUX is the right model, and we need to do more in open source hardware, and refuse to buy into proprietary black boxes. I am interested in helping to find funding for anyone that can build an Application Oriented Network (AON) router-server that can provide AON functionality at the hand-held or laptop or desktop point of creation; that can be updated without having to throw away the plastic container; and that is completely open source. CISCO CEO refuses to do this. Anyone else?

A few other books that come to mind in relation to this one….
Media Lab, The – Inventing The Future At MIT
The Second Self: Computers and the Human Spirit, Twentieth Anniversary Edition
Hackers: Heroes of the Computer Revolution
The Hacker Crackdown: Law And Disorder On The Electronic Frontier
Out of Control: The New Biology of Machines, Social Systems, & the Economic World
Silicon Snake Oil: Second Thoughts on the Information Highway
Building a Knowledge-Driven Organization
Competing On Internet Time: Lessons From Netscape And Its Battle With Microsoft
The Age of Missing Information
In the Absence of the Sacred: The Failure of Technology and the Survival of the Indian Nations

I won't list books by Strassmann, Drucker, or Steele, but I will offer three final thoughts as I put this book away:

1. Strassmann: most firms' investments in information technology return a NEGATIVE return on investment;

2. Drucker: we've spent the last 50 years focusing on the T in IT, we need to spend the next 50 focused on the I–one reason I do not think Google will succeed, just as NSA has not succeeded in 50 years; and

3. Steele citing Bamford: the ultimate computing machine, no larger than a small ball, powered by a tiny battery, capable of doing petaflops of calculations against unstructured data, remains “the human brain.”

Vote on Review

Review: The Future of the Internet–And How to Stop It

5 Star, Future, Information Society, Information Technology

Future InternetSuperb, Engrossing, Useful, Relevant, Alarming, March 25, 2008

Jonathan Zittrain

I ordered this book on the strength of the title, and on receiving it, discovered that the author is the Professor of Internet Governance and Regulation at Oxford University, and co-founder of the Berkman Center for Internet & Society at the Harvard Law School (they hate it when we just say “Harvard”–must be a culture thing). So right off I know this is at least as serious a book as I hoped for.

The book is instructive without being tedious, alarming without being hysterical. It is balanced, informed, and most relevant to all of us.

The entire book focuses on the transformation of the Internet from one in which the innovation could be done at the edges, with generative innovation that built on the provided software or hardware, to one in which we are allowed to buy tethered appliances like iPhone or X-Box that are “locked down.”

Even PCs are being locked down today, and with this and other examples the author has my total attention.

He suggests that the end point matters, and that the confrontation between flexibility and openness, versus security and perfect reliability (and later, perfect enforcement) is one that requires more creative thinking rather than knee jerk mandates one way or the other.

He notes that historically IBM tried to bundle everything, and they were forced by anti-trust to unbundle, just as AT&T was, as Microsoft was, and as Google will be if the USG Government ever gets either honest or informed–either will do. Look for my book review of “Google 2.0: The Calculating Predator” to understand this suprnational unsupervised threat to multiple sectors, never mind privacy and copyright.

In a nutshell, he frames the challenge as that of modularity within which the end-user can innovate, versus walled gardens that are locked down.

In passing the author vindicates both Morris, and the manner in which justice was applied. Morris intended to count the computers on the Internet, and screwed up the code. The judge intended to punish him but not end his promising career. All good.

The author discusses what Vint Cerf and others have, the degree to which bots have taken over tens of millions of computers, using broadband connections left on at all times to create a subrosa network that does evil.

On page 63, three important principles from the author on generativity:

1. Our information technology ecosystem functions best with generative technology (i.e. NOT with locked down appliances hard-wired to a center)

2. Generativity instigates a pattern both within and beyond the technological layers of the information technology ecosystem (i.e. content collaboration and social collaboration and value-added)

3. Proponents of generative systems ignore the drawbacks attendant to generativity success at their peril.

This is followed by a great discussion of features of a generative system as they would be hoped for by the author:

– Leverage
– Adaptability
– Base of mastery
– Accessibility
– Transferability

He cites benefits of a generative system as including:

– Non-profit social innovation
– Disruptive innovation
– Broad participation
– Generative systems from generative building blocks
– Recursion (of value) to content and then to society

The scary chapter in the book–the author is elegant but one needs little help to imagine the worst–discusses how tethered appliances enable “perfect enforcement” to include GPS devices turned on remotely to serve as audio surveillance on demand, and so on.

Turning to solutions, the author distinguishes between flexibility needed at the content level (he is laudatory about Wikipedia) and the technology layer. He discusses one possible solution, a Green-Red split system in which the Green system is locked down and totally reliable, and the Red system is open to innovation but also treated with caution.

He calls for better easier security tools for group and individual use, but as one who could never ever find a coder willing to document their code, and as one completely fed up with the pig code that comes out of Microsoft and Norton–pig in the sense of way too much crap and way too big a footprint–I fear that only an open source conversion experience will do. I note with interest a chart that shows that Sun Open Systems are the LAST to plug security holes, Not good.

The author suggests a “least harm” protocol.

He calls for a very large conversation among end-users, coders, manufacturers, regulators, and so on, and what I hear him saying is that the “system of systems” is on auto-pilot, the government is out of brakes (or brains, I would add), and if we don't all do a collective “STOP, We Want to Discuss This,” we are destined to suffer the same fate as the sheep at Virginia Polytechnic who stood still while a moron killed 20+ of them–stood still while he reloaded. Had the sheep “rushed and crushed,” no more than one or at most two would have died. I am harsh here, because information technology can either be our cage or our liberation, and the author is very well qualified to present the case for concern.

I learn for the first time on page 174 of the National Science Foundation's FIND initiative, and that alone is worth the price of the book.

Turning to protections, the author discusses data portability, network neutrality and generativity (I can assure all readers, Google is neither neutral nor generative), Application Program Interface (API) neutrality; privacy, individual liability versus technical mandates, and collective character (digital shunning combined with reputation bankruptcy and a clean sheet fresh start).

He discusses privacy 2.0 and problems such as code, patent, and content thickets. I like very much his reminding us that the Constitution provides for anonymity to encourage unpopular opinions. He naturally discusses data genealogy (what I call data provenance, like an art work), and reputation.

In passing, I love the brutal critique by Gene Spaford of the $100 laptop. He likens its projected impact–exposing millions to the bright side while not fixing their poverty, water, and disease–to subsidizing pet rats for every household just prior to the Black Death plague. My friend Lee Felsenstein is an equally virulent opponent of the $100 laptop, for different reasons. Me personally, I think the cell phone (but not the iPhone) is the only way to educate 5 billion people fast and with day to day relevance to their needs.

I put the book down feeling pensive, and wondering why CISCO CEO John Chambers, who has been asked in writing via Federal Express three times, continues to refuse to create a router-server that is both recyclable (or even better, updatable remotely without having to flip boxes) and that will provide data at rest encryption and Application Oriented Network (AON) features at the point of creation–in other words, every creator can control the privacy, content routing, access, sharing, and so on, and by implementing something like Grub Search on the same box, we can put paid to programmable search engines patented by Google that will only show you what the highest bidder has paid to “allow” you to see, and to the Googleplex, which “confiscates” everything it touches and then claims to “own” it–including your medical records.

This is a great and important book, if you care about the global role of the Internet is creating wealth and consequently peace.

Ten other books that come to mind as equally important:
The Future of Ideas: The Fate of the Commons in a Connected World
Voltaire's Bastards: The Dictatorship of Reason in the West
Manufacturing Consent
Fog Facts: Searching for Truth in the Land of Spin
Managing Privacy: Information Technology and Corporate America
Who Owns Information?
Silicon Snake Oil: Second Thoughts on the Information Highway
In the Absence of the Sacred: The Failure of Technology and the Survival of the Indian Nations
The Tao of Democracy: Using Co-Intelligence to Create a World That Works for All
Collective Intelligence: Creating a Prosperous World at Peace

My bottom line: as we all press toward localized resilience in community, I for one would be happy to shun all tethered appliances and rely solely on collective human intelligence in community. I really like the work of Naomi Klein (No Log, Disaster Capitalism) and Paul Hawken (Blessed Unrest, Natural Capital, Ecology of Commerce). We are all long overdue for a massive boycott of all that is not in our interest, and we can start by evaluating the true costs of fuel, long-distance food and clothing, and perverted uses of water that we are running out of.

Peace.

Vote on Review

Review: Access Denied–The Practice and Policy of Global Internet Filtering

5 Star, Censorship & Denial of Access, Information Operations, Information Society, Information Technology
Access Denied
Amazon Page

Extraordinary, Beautifully Put Together, Basic Reference, March 4, 2008

Ronald J. Deibert

This is a beautifully put together book in terms of brains, content, presentation, and coverage.

An edited work, with ten primary authors, it actually reflects the collaborative efforts of an international network of collaborators, and can safely be considered the seminal basic reference on this topic.

The first 150 pages include an introduction and six chapters, on measuring global internet filtering, the politics and mechanisms of
control, tools and technology for filtering, filtering and the international system, corporate filtering, and ethics. The rest of the book, 285 pages, is taken up by regional overviews and then country-specific summaries of filtering policy.

The motives for filtering are three: politics & power; social norms & morals, and security concerns.

Two types of filtering occur: announced, and disguised. Announced filters show a blocking page, unannounced filters pretend there was an error. Blocking anc be of entire sites, or specific pages identified by keywords.

The eye-opener for me was that filtering is not just on content, but on capability. Skype and Google Earth are two of the primary capabilities that are being denied to the people around the world by repressive ignorant governments who would rather have perpetual poverty than allow the people to leverage every aspect of the Internet including free global communications.

This is a first class intellectual, social, economic, and political contribution to the literature.

I recommend the following ten books along with this one:
The leadership of civilization building: Administrative and civilization theory, symbolic dialogue, and citizen skills for the 21st century
The Big Switch: Rewiring the World, from Edison to Google
The Fortune at the Bottom of the Pyramid: Eradicating Poverty Through Profits (Wharton School Publishing Paperbacks)
The Wealth of Networks: How Social Production Transforms Markets and Freedom
The Web of Inclusion: Architecture for Building Great Organizations
The Ingenuity Gap: Facing the Economic, Environmental, and Other Challenges of an Increasingly Complex and Unpredictable Future
Teaching to Transgress: Education as the Practice of Freedom
The Pirate's Dilemma: How Youth Culture Is Reinventing Capitalism
The Difference: How the Power of Diversity Creates Better Groups, Firms, Schools, and Societies
Collective Intelligence: Creating a Prosperous World at Peace

Vote on Review

Review: The Big Switch–Rewiring the World, from Edison to Google

4 Star, Information Society, Information Technology
Big Switch
Amazon Page

Very Worthwhile, One Major Flaw, March 3, 2008

Nicholas Carr

This is a very worthwhile easy to absorb book. The author is thoughtful, well-spoken, with good notes and currency as of 2007.

The one major flaw in the book is the uncritical comparison of cloud computing with electricity as a utility. That analogy fails when one recognizes that the current electrical system wastes 50% of the power going down-stream, and has become so unreliable that NSA among others is building its own private electrical power plant–with a nuclear core, one wonders? While the author is fully aware of the dangers to privacy and liberty, and below I recap a few of his excellent points, he disappoints in not recognizing that localized resilience and human scale are the core of humanity and community, and that what we really need right now, which John Chambers strangely does not appear willing to offer, is a solar-powered server-router that gives every individual Application Oriented Network control at the point of creation (along with anonymous banking and Grug distributed search), while also creating local pods that can operate independently of the cloud while also blocking Google perverted new programmable search, wherer what you see is not what's in your best interests, but rather what the highest bidder paid to force into your view.

The author cites one source as saying that Google computation can do a task at one tenth of the cost. To learn more, find my review, “Google 2.0: The Calculating Predator” and follow the bread crumbs.

The author touches on software as a service, and I am reminded of the IBM interst in “Services Science.” He has a high regard for Amazon Web Services, as I do, and I was fascinated by his suggestion that Amazon differs from Google, Amazon doing virtualization while Google does task optimization (with computational mathematics). Not sure that is accurate, Google can flip a bit tomorrow and put bankers, entertainers, data service providers, and publishers out of business.

I completely enjoyed th discussion of the impact of electrification and the rise of the middle class, of the migration from World Wide Web to World Wide Computer, and of the emergence of a gift ecnomy.

The author also touches on the erosion of the middle class, citing Jagdish Bhagwati and Ben Bernake as saying that it is the Internet rather than globalization that is hurting the middle class (globalization moved the low cost jobs, the Internet moved the highly-educated jobs).

I was shocked to learn that Google can listen to my background sound via the microphone, meaning that Google is running the equivalent of a warrantless audio penetration of my office. “Do No Evil?” This is very troubling.

Page 161: “A company run by mathematicians and engineers, Google seemsx oblivious to the possible social costs of transparent personalization.” Well said. The only thing more shocking to me is the utter complacency of the top management at Amazon, IBM, Oracle, and Microsoft. Search for the article by Stephen E. Arnold, the world's foremost non-Google expert on Google, look for <Google Pressure Wave: Do the Big Boys Feel It?>.

The author touches on Internet utility to terrorists, and our military's vulnerability, but he does not get as deeply into this as he could have. The fact is the Chinese can take out our telecommunications satellites anytime they want, and they are not only hacking into our computers via the Internet, they also appear to have perfected accessing “stand-alone” computers via the electrical connection. See <Chinese Irregular Warfare oss.net>.

The portion ofthe book I most appreciated was the authors discussion of lost privacy and individuality. He says “Computer systems are not at their core technologies of emancipation. They are technologies of control.” He goes on to point out that even a decentralized cloud network can be programmed to monitor and control, and that is precisely where Google is going, monitoring employees and manipulating consumers.

He touches on semantic web but misses Internet Economy Meta Language (Pierre Levy) and Open Hypertextdocument System (Doug Englebart).

He credits Google founders with wanting to get to all information in all languages all the time, and I agree that their motives are largely worthy, but they are out of control–a suprnational entity with zero oversight. I can easily envision the day coming when in addition to 27 secessionist movements across the USA, we will hundreds of virtual secessions in which communities choose to define trusted computing as localized computing.

The book ends beautifully, by saying we will not know where IT is going until our children, the first generation to be wired from day one, become adults.

A few other books I recommend:
Fog Facts: Searching for Truth in the Land of Spin
The Age of Missing Information
The Landscape of History: How Historians Map the Past
Weapons of Mass Deception: The Uses of Propaganda in Bush's War on Iraq
Lost History: Contras, Cocaine, the Press & ‘Project Truth'
The Tao of Democracy: Using Co-Intelligence to Create a World That Works for All
Society's Breakthrough!: Releasing Essential Wisdom and Virtue in All the People
All Rise: Somebodies, Nobodies, and the Politics of Dignity (BK Currents)
Escaping the Matrix: How We the People can change the world
Collective Intelligence: Creating a Prosperous World at Peace

Vote on Review

Review: The Social Life of Information

6 Star Top 10%, Information Operations, Information Society, Information Technology, Misinformation & Propaganda, Values, Ethics, Sustainable Evolution

Social LifeSuperb Primer for Any Age

January 19, 2008

John Seely Brown

I come to this book eight years after it was first published, and with all the accolades and superb reviews that it has already accummulated, my primary focus here, apart from flagging the book for those that follow my reviews, is to suggest that it is one of the finest overviews available and easily exploited as a primer for undergraduates, graduates, or adults pursuing their own continuing education via Amazon, which is now the hub of the World Brain.

As is my custom, I provide here a few highlights from my flyleaf notes, and then link to ten books that can be used to study discrete aspects of the digital age as I have come to understand it.

This is one of the best books I have found that makes the case that “fiber to the forehead” is next to worthless, it is not about acquiring more information, but rather about the nuanced networking and social interpretations of information in context.

Indeed, they say that with all the technologies now pushing and creating digital information, consumption of this information is only increasing among individuals by 1.7 percent a year.

I value this book, in part because I have seen the U.S. secret intelligence community lose its mind, today spending $60 billion a year of the taxpayer's hard-earned money, to create monstrous and often counter-productive technical program that access the 4% of the information we can steal, while ignoring the 94% that is in 183 languages we do not speak, and more often than not, NOT online.

The authors write well, and gifted turns of phrase about, such as “the radical instability of infopunditry.”

They do a superb job of addressing the ills of technology-centered tunnel vision, a point that Peter Drucker made in Forbes ASAP 28 Aug 98, and I repeated in my keynote in Vegas to the National Security Agency (NSA) IT conference, in the early 2000 timeframe. We've spent the past 50 years on the T in IT, we need to start focusing on the I now.

The authors are eloquent in saying that more of the same is not the answer, and I totally agree. Returning to the secret world, I paraphrase an Australian journalist commenting on the pathologies of secret programs, who said that giving more money to dysfunctional secret agencies is like pouring gasoline on a fire. Right on. I want to reduce the secret budget to $12 billion a year, and redirect everything else to US education, global access to open sources in all languages, and free on demand education to the five billion poor via a network of 100 million volunteers with skype and internet access who can answer a cell phone question in any of 183 languages: education “one cell call at a time.”

The authors point out that at its best, technology augments and enhances human capabilities, it does not replace them (less the truly repetitive mechanical aspects).

They observe (in 2000) that 1-2 exabytes of information per year are created, but that much of this is not useful, and there is a major short-fall in sense-making and precision access.

They discuss, most usefully, the reality that designers underestimate what people do (and I would add, what they want or need).

“Information fetishism” is defined as the belief that information and information technology can replaced nuanced relations among people and their individual and shared insights. In Body of Secrets, link below, Jim Bamford ends his second book on NSA by saying that with all the trillions they have spent, they have still not built the ultimate computer, one that runs on a tiny amount of energy, weighs less than a few pounds, and can make petabyte calculations per second: “the human brain.”

The authors respond to earlier criticism about not addressing LINUX, and point out that LINUX is social innovation, not technical innovation. See Wealth of Networks below.

They note that the primary advantage of IT is that it enhances both local and global access. On the downside, it neglects periphery and context.

The authors reassert, compellingly, the value of intermediation, and I am reminded of our earlier criticisms of the Internet, still valid, in that most information is unedited, unformatted, unpaginated, undated, and lacking in source bias insight. This is still true, and Google is making it worse.

By the authors own account, this book addresses:
1) Limits of infopunditry
2) Challenges of software agents
3) Social character of work and learning
4) Limits of management theory
5) Resources for innovation
6) Unnoticed aspects of the document
7) Implications for design
8) Future of information, especially for university

I have a couple of nits, but not enough to warrant removal of one star. This is clearly a seminal work of lasting value.

Nit #1: Organizational Intelligence (Wilensky, 1967) is not to be found in this book. The authors do not go past Quadrant III (see loaded images).

Nit #2: While they have a superb bibliography and include works by Barlow, Kelly, Strassmann, Toffler, and Turkle, they do NOT include the seminal works directly relevant to this book, specifically, Barlow's seminal manifesto, and the following:

Out of Control: The New Biology of Machines, Social Systems, & the Economic World
Information Payoff
Powershift: Knowledge, Wealth, and Power at the Edge of the 21st Century
The Second Self: Computers and the Human Spirit , Twentieth Anniversary Edition

Amazon limits us to ten links. See my earlier lists (the first ten) for 300+ books covering information and intelligence. Here are six more:
The Landscape of History: How Historians Map the Past
Body of Secrets: Anatomy of the Ultra-Secret National Security Agency
Fog Facts: Searching for Truth in the Land of Spin
The Wealth of Networks: How Social Production Transforms Markets and Freedom

I regret the limitation on links. See also such gems as Forbidden Knowledge; Voltaire's Bastards; Age of Missing Information; etc etc.

Review: INFORMATION WARFARE–Chaos on the Electronic Superhighway

5 Star, Asymmetric, Cyber, Hacking, Odd War, Information Operations, Information Society, Information Technology
Amazon Page

5 Stars Still a Best in Class Endeavor

December 1, 2007

Winn Schwartau

I continue to believe this is one of the best in class original references. Winn, Peter Black (RIP) and I were among the first to warn of electronic Pearl Harbors, with Winn being the most knowledeable and the only one invited to brief Congress, where it went in one ear and out the others.

Winn Schwartau was one of the first, along with Peter Black (RIP), to warn Congress and the business world that digital systems would be extremely vulnerable. No one listened.

This book is still in my library. It is the non-fiction “first book” in this area.

For the fictional version that will stun with its surprise ending:
Terminal Compromise

For the best movie showing how easy it is to bring a society down:
Live Free or Die Hard (Full Screen Edition)

Other Hacker Books:
The Second Self: Computers and the Human Spirit , Twentieth Anniversary Edition
Hackers: Heroes of the Computer Revolution
The Hacker Crackdown: Law And Disorder On The Electronic Frontier
The Art of Deception: Controlling the Human Element of Security

Other Hacker DVD:
Hackers
Hackers – Wizards of the Electronic Age

Vote on Review