Team Poster: Information Please

From 20803

(Difference between revisions)
(The Culture of the Digital Self)
Line 9: Line 9:
==The Culture of the Digital Self==
==The Culture of the Digital Self==
-
In the second section, Poster focuses on the recent growth in identity theft that occurs due to the creation of an identity through global networked computing. He focuses on several case studies where he differentiates the identity of self from the identity that exists in a database. He realizes that in order for identity theft to occur, one’s identity would have to be made tangible. Through digital media, the security of one’s identity is threatened and things that were once “safe” are no longer so.
+
In the second section, Poster focuses on the recent growth in identity theft that occurs due to the creation of an identity through global networked computing. He focuses on several case studies where he differentiates the identity of self from the identity that exists in a database. He realizes that in order for identity theft to occur, one�s identity would have to be made tangible. Through digital media, the security of one�s identity is threatened and things that were once �safe� are no longer so.
==Digital Commodities in Everyday Life==
==Digital Commodities in Everyday Life==
 +
 +
==Key Terms==
==Other Works==
==Other Works==

Revision as of 21:26, 23 April 2008

Contents

Introduction

The purpose of this wiki is to provide background information so that readers can develop a deeper understanding of Mark Poster's book Information Please. We hope that this will be a useful reference guide for people to refer to before reading the book. Our link to Mark Poster should allow readers to gain insight into Poster's personal life and his views. In addition, we will investigate various aspects of the three sections of the book. This includes defining technology jargon,digging deep into crucial topics,and linking various related articles.

The Book

Poster: His Views on Technology

Global Politics and New Media

The Culture of the Digital Self

In the second section, Poster focuses on the recent growth in identity theft that occurs due to the creation of an identity through global networked computing. He focuses on several case studies where he differentiates the identity of self from the identity that exists in a database. He realizes that in order for identity theft to occur, one�s identity would have to be made tangible. Through digital media, the security of one�s identity is threatened and things that were once �safe� are no longer so.

Digital Commodities in Everyday Life

Key Terms

Other Works

This link is to the complete list of works by Poster. [1]

Personal tools