Book picks similar to
Cutting Code; Software and Sociality by Adrian Mackenzie


grad-school
media-studies
mydigitallibrary
digital-culture

On Television


Pierre Bourdieu - 1996
    Bourdieu shows how the ratings game has transformed journalism -- and hence politics -- and even such seemingly removed fields as law, science, art, and philosophy. Bourdieu had long been concerned with the role of television in cultural and political life when he bypassed the political and commercial control of the television networks and addressed his country's viewers from the television station of the College de France. "On Television," which expands on that lecture, not only describes the limiting and distorting effect of television on journalism and the world of ideas, but offers the blueprint for a counterattack.

Cyberwar: How Russian Hackers and Trolls Helped Elect a President - What We Don't, Can't, and Do Know


Kathleen Hall Jamieson - 2018
    In particular, was his victory the result of Russian meddling in our political system? Up until now, the answer to that has been equivocal at best given how difficult it is to prove. Trump has vociferously denied it, as has Vladimir Putin himself. Even the famous intelligence reports establishing that the Russians interfered hold back from saying whether the interference tipped the scales in the outcome.In Cyberwar, however, the eminent scholar Kathleen Hall Jamieson, who sifted through a vast amount of polling and voting data, is able to conclude with a reasonable degree of certainty that Russian help was crucial in elevating Trump to the Oval Office. Put simply, by changing the behavior of key players and altering the focus and content of mainstream news, Russian hackers reshaped the 2016 electoral dynamic. At the same time, Russian trolls used social media to target voting groups indispensable to a Trump victory or Clinton defeat. There are of course many arguments on offer that push against the idea that the Russians handed Trump his victory. Russia's goal was fomenting division, not electing Trump. Most of the Russian ads reportedly did not reference either the election or a candidate. Nor did they differ much from U.S.-based messaging that was already in play. Russian intervention did not surgically target Trump in key states. Finally, if WikiLeaks' releases of stolen email had truly affected the vote, Clinton's perceived honesty would have dropped in October. Jamieson, drawing from her four decades of research on the role of media in American elections, dispenses with these arguments through a forensic tracing of both Russian hackers' impact on media coverage as well as the ebbs and flows of Trump's polling support over the course of the campaign. To be sure, it is impossible to prove with absolute certainty that the Russians handed the election to Trump because there is too much that we don't know. That said, the lessons of a half century of research on the role of media framing in elections strongly suggests that many voters' opinions were altered by Russia's wide-ranging and coordinated campaign-including at least seventy eight thousand votes in three key states. Combining scholarly rigor with a bracing argument, Cyberwar shows that we can now be reasonably confident that Russian efforts helped put Trump in the White House.

The Boy Looked at Johnny: The Obituary of Rock and Roll


Julie Burchill - 1978
    Book by Julie Burchill, Tony Parsons

Optimal Cupid: Mastering the Hidden Logic of OkCupid


Christopher McKinlay - 2014
     Christopher McKinlay has been featured in Wired Magazine for his groundbreaking analysis of OkCupid. For the first time he’s showing non-experts how to turn Internet dating on its head. This concise guide will show anyone (straight, gay, male or female) the procedure McKinlay used to meet his fiancee and how the same ideas can transform their lives and bring them from browsing to contact. One summer evening while logged into a supercomputer in Colorado waiting for a large computation, McKinlay was killing time on OkC when he was troubled by a problem: what if large groups of people responded to OkCupid’s personality questionnaire in statistically similar ways? He created custom software to scrape data from the site, collecting over 6,000,000 answers to OkC’s “match questions” from more than 20,000 real users. This data made clear he’d been using the site the wrong way. Based on his findings, McKinlay (a mathematics PhD), optimized his own profile. The transformation was profound. He went from showing a “match percentage” of 90% with a few hundred women in the L.A. area to showing 90% or higher with over 30,000 local women. Unsolicited messages from attractive strangers began flooding his inbox. With a foreword by Jon Finkel, McKinlay’s insightful how-to will teach you how to benefit from the buried statistical patterns of online romance.

Bit by Bit: Social Research in the Digital Age


Matthew J. Salganik - 2017
    In addition to changing how we live, these tools enable us to collect and process data about human behavior on a scale never before imaginable, offering entirely new approaches to core questions about social behavior. Bit by Bit is the key to unlocking these powerful methods--a landmark book that will fundamentally change how the next generation of social scientists and data scientists explores the world around us.Bit by Bit is the essential guide to mastering the key principles of doing social research in this fast-evolving digital age. In this comprehensive yet accessible book, Matthew Salganik explains how the digital revolution is transforming how social scientists observe behavior, ask questions, run experiments, and engage in mass collaborations. He provides a wealth of real-world examples throughout and also lays out a principles-based approach to handling ethical challenges.Bit by Bit is an invaluable resource for social scientists who want to harness the research potential of big data and a must-read for data scientists interested in applying the lessons of social science to tomorrow's technologies.Illustrates important ideas with examples of outstanding researchCombines ideas from social science and data science in an accessible style and without jargonGoes beyond the analysis of "found" data to discuss the collection of "designed" data such as surveys, experiments, and mass collaborationFeatures an entire chapter on ethicsIncludes extensive suggestions for further reading and activities for the classroom or self-study

Competing Spectacles: Treasuring Christ in the Media Age


Tony Reinke - 2019
    Maybe we don't want to ask it. But viral videos, digital images, and other spectacles surround us in every direction--competing for our time, our attention, our lust, and our money. So we let our lazy eyes feed on whatever comes our way. As a result, we never stop to consider the consequences of our visual diet on our habits, desires, and longings.Journalist Tony Reinke asked these hard questions himself--critiquing his own habits--and now invites us along to see what he discovered as he investigated the possibilities and the pitfalls of our image-centered world. In the end, he shares the beauty of a Greater Spectacle--capable of centering our souls, filling our hearts, and stabilizing our gaze in this age of the digital spectacle.

Pictures at a Revolution: Five Movies and the Birth of the New Hollywood


Mark Harris - 2008
    Explores the epic human drama behind the making of the five movies nominated for Best Picture in 1967-Guess Who's Coming to Dinner, The Graduate, In the Heat of the Night, Doctor Doolittle, and Bonnie and Clyde-and through them, the larger story of the cultural revolution that transformed Hollywood, and America, forever.

The Future of the Internet and How to Stop It


Jonathan L. Zittrain - 2008
    With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”The book is available to download under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 license: Download PDF. http://futureoftheinternet.org/download

Spam: A Shadow History of the Internet


Finn Brunton - 2013
    Most of it is caught by filters before ever reaching an in-box. Where does it come from? As Finn Brunton explains in Spam, it is produced and shaped by many different populations around the world: programmers, con artists, bots and their botmasters, pharmaceutical merchants, marketers, identity thieves, crooked bankers and their victims, cops, lawyers, network security professionals, vigilantes, and hackers. Every time we go online, we participate in the system of spam, with choices, refusals, and purchases the consequences of which we may not understand.This is a book about what spam is, how it works, and what it means. Brunton provides a cultural history that stretches from pranks on early computer networks to the construction of a global criminal infrastructure. The history of spam, Brunton shows us, is a shadow history of the Internet itself, with spam emerging as the mirror image of the online communities it targets. Brunton traces spam through three epochs: the 1970s to 1995, and the early, noncommercial computer networks that became the Internet; 1995 to 2003, with the dot-com boom, the rise of spam's entrepreneurs, and the first efforts at regulating spam; and 2003 to the present, with the war of algorithms--spam versus anti-spam. Spam shows us how technologies, from email to search engines, are transformed by unintended consequences and adaptations, and how online communities develop and invent governance for themselves.

The Dragonfly Effect: Quick, Effective, and Powerful Ways to Use Social Media to Drive Social Change


Jennifer Aaker - 2010
    But no book addresses how to harness the incredible power of social media to make a difference. "The Dragonfly Effect" shows you how to tap social media and consumer psychological insights to achieve a single, concrete goal. Named for the only insect that is able to move in any direction when its four wings are working in concert, this bookReveals the four "wings" of the Dragonfly Effect-and how they work together to produce colossal resultsFeatures original case studies of global organizations like the Gap, Starbucks, Kiva, Nike, eBay, Facebook; and start-ups like Groupon and COOKPAD, showing how they achieve social good and customer loyaltyLeverage the power of design thinking and psychological research with practical strategiesReveals how everyday people achieve unprecedented results-whether finding an almost impossible bone marrow match for a friend, raising millions for cancer research, or electing the current president of the United States"The Dragonfly Effect" shows that you don't need money or power to inspire seismic change.

Infotopia: How Many Minds Produce Knowledge


Cass R. Sunstein - 2006
    Beset from all sides by a never-ending barrage of media, how can we ensure that the most accurate information emerges and is heeded? In this book, Cass R. Sunstein develops a deeply optimisticunderstanding of the human potential to pool information, and to use that knowledge to improve our lives.In an age of information overload, it is easy to fall back on our own prejudices and insulate ourselves with comforting opinions that reaffirm our core beliefs. Crowds quickly become mobs. The justification for the Iraq war, the collapse of Enron, the explosion of the space shuttle Columbia--all ofthese resulted from decisions made by leaders and groups trapped in information cocoons, shielded from information at odds with their preconceptions. How can leaders and ordinary people challenge insular decision making and gain access to the sum of human knowledge?Stunning new ways to share and aggregate information, many Internet-based, are helping companies, schools, governments, and individuals not only to acquire, but also to create, ever-growing bodies of accurate knowledge. Through a ceaseless flurry of self-correcting exchanges, wikis, coveringeverything from politics and business plans to sports and science fiction subcultures, amass--and refine--information. Open-source software enables large numbers of people to participate in technological development. Prediction markets aggregate information in a way that allows companies, rangingfrom computer manufacturers to Hollywood studios, to make better decisions about product launches and office openings. Sunstein shows how people can assimilate aggregated information without succumbing to the dangers of the herd mentality--and when and why the new aggregation techniques are soastoundingly accurate.In a world where opinion and anecdote increasingly compete on equal footing with hard evidence, the on-line effort of many minds coming together might well provide the best path to infotopia.

Theories of the Information Society


Frank Webster - 1995
    This third edition brings the book right up to date with both new theoretical work and, social and technological changes (such as the rapid growth of the Internet and accelerated globalization), reassessing the work of key theorists in light of these changes.This book is essential reading for students of contemporary social theory and anybody interested in social and technological change in the post-war era. It addresses issues of central concern to students of sociology, politics, communications, information science, cultural studies, computing and librarianship.

The Rise of the Network Society: The Information Age: Economy, Society and Culture, Volume I


Manuel Castells - 1996
    Based on research in the USA, Asia, Latin America, and Europe, it aims to formulate a systematic theory of the information society which takes account of the fundamental effects of information technology on the contemporary world.

Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media


Tarleton Gillespie - 2018
    Whether faced with “fake news” or livestreamed violence, “content moderators”—who censor or promote user‑posted content—have never been more important. This is especially true when the tools that social media platforms use to curb trolling, ban hate speech, and censor pornography can also silence the speech you need to hear.   In this revealing and nuanced exploration, award‑winning sociologist and cultural observer Tarleton Gillespie provides an overview of current social media practices and explains the underlying rationales for how, when, and why these policies are enforced. In doing so, Gillespie highlights that content moderation receives too little public scrutiny even as it is shapes social norms and creates consequences for public discourse, cultural production, and the fabric of society. Based on interviews with content moderators, creators, and consumers, this accessible, timely book is a must‑read for anyone who’s ever clicked “like” or “retweet.”

Race After Technology: Abolitionist Tools for the New Jim Code


Ruha Benjamin - 2019
    Presenting the concept of the "New Jim Code," she shows how a range of discriminatory designs encode inequity by explicitly amplifying racial hierarchies; by ignoring but thereby replicating social divisions; or by aiming to fix racial bias but ultimately doing quite the opposite. Moreover, she makes a compelling case for race itself as a kind of technology, designed to stratify and sanctify social injustice in the architecture of everyday life.This illuminating guide provides conceptual tools for decoding tech promises with sociologically informed skepticism. In doing so, it challenges us to question not only the technologies we are sold but also the ones we ourselves manufacture.If you adopt this book for classroom use in the 2019-2020 academic year, the author would be pleased to arrange to Skype to a session of your class. If interested, enter your details in this sign-up sheet https: //buff.ly/2wJsvZr