iOS app Android app

Cyberspace

Tessitura

Mona R. Washington | Posted 09.01.2016 | Arts
Mona R. Washington

2015 - 2016 Cyberspace. Facebook. COLLEGE ACQUAINTANCE ONE and COLLEGE ACQUAINTANCE TWO exchange private messages. June 12, 2015 College Acq...

How Expertise Dies: Of Character, Credentials, and Crap

David Katz, M.D. | Posted 05.31.2016 | Healthy Living
David Katz, M.D.

Perhaps no topic better illustrates the enormous gap between knowledge and ignorance, and its profound importance to the ambient understanding of all ...

What Do Lebanese Information/Media Ministers Do?

Magda Abu-Fadil | Posted 03.03.2016 | Media
Magda Abu-Fadil

It's an intriguing question that continues to baffle those whose countries don't have ministries controlling how information and media work, and a fair number of Lebanese who find such institutions and their heads relics from a bygone age.

Space Past Failure: The Musk of Zero

David Katz, M.D. | Posted 12.22.2016 | Healthy Living
David Katz, M.D.

Until this week, it was space 3, Elon Musk, zero. One Falcon 9 Rocket exploded shortly after takeoff, and two that flew as hoped failed to land as int...

A Laptop And A Webcam Don't Make You a Broadcaster

Fred Lundgren | Posted 11.03.2016 | Media
Fred Lundgren

Please excuse me while I step into my bedroom closet and express my exasperation with a primal scream, where my audience will be about the same as your podcast, that is unless my two dogs follow me into the closet.

5 Ways We Absurdly Manipulate the Facebook 'Like' Button

Erris Langer Klapper | Posted 10.27.2016 | Healthy Living
Erris Langer Klapper

After a recent conversation with a friend, I began to wonder if the power of the Facebook like is a figment of my imagination. Can your so-called Facebook friends send you subliminal messages by liking or not liking your status and photos?

Why Technology, Not Geography, Is Key to Cybersecurity

Carl Bildt | Posted 10.26.2016 | World
Carl Bildt

SEOUL -- The solution to privacy concerns lies not in data localization, but in the development of secure systems and the proper use of encryption. Data storage actually means the continuous transfer of data between users, with no regard for Westphalian borders. Policies born of confusion, chaos and confrontation have no place in this new world of opportunities.

Media Ethics: Whose Standards?

Magda Abu-Fadil | Posted 05.23.2016 | Media
Magda Abu-Fadil

Broadcast media are under intense pressure, given tight deadlines, security threats, competition and shrinking budgets. The key challenges are: How do we define media ethics and who sets the standards when the journalism of terror is becoming the new normal?

Bye, Bye, Starbucks! Hello,'Café Glass'

Brandon Judell | Posted 05.05.2016 | Entertainment
Brandon Judell

Just imagine living in this eternal Facebook dystopia where Mark Zuckerberg has replaced the Holy Trinity. A domain where a snap of the fingers generates a virtual keyboard. A punch in the air and you've ordered a sweet potato latte.

Different Prefixes, Same Meaning: Cyber, Digital, Net, Online, E-, Virtual

Dr. Jovan Kurbalija | Posted 06.15.2015 | World
Dr. Jovan Kurbalija

This week, the Global Cyberspace Conference takes place in The Hague (16-17 April). In March, UNESCO hosted a conference on Connecting the Dots in Digital Space. The NETmundial Initiative had a meeting in Stanford recently.

The Girl or Guy of Your Nightmares

Francis Levy | Posted 04.22.2015 | Arts
Francis Levy

What if you were grotesquely deformed and you wanted no one to see you? Yet you had a need for contact and so began to communicate online employing another avatar. This isn't even the stuff of science fiction. It probably takes place.

Cyber Safe or Cyber Insecurity?

Sister Jenna | Posted 02.19.2015 | Entertainment
Sister Jenna

We must each examine our own inner security systems, the ones which will reveal who we really are, and emerge the virtues to the surface, so they can naturally protect our minds and lives. It is our hearts that must never be hacked.

The Dos and Don'ts of Digital Kindness

Dr. Jodi Gold | Posted 01.20.2015 | Parents
Dr. Jodi Gold

Most parents teach their children to be kind and caring -- but only IRL (in real life). So how do we teach Digital Kindness? My list of Dos and Don'ts gives families a checklist all technology users should memorize -- grown-ups included.

Cli-Fi Is Real

Scott Thill | Posted 12.30.2014 | Green
Scott Thill

That we have been sleepwalking through such massive destabilization for decades proves that we are much better at consensually hallucinating than we are at separating our sciences and fictions.

Spies Will Be Spies in War, Peace and Cyberspace

Lothar Determann | Posted 09.13.2014 | World
Lothar Determann

Consumers and employees agree every day to share massive amounts of personal data via various forms of tracking and surveillance technologies with companies that notify consumers and employees they should not expect privacy. In such open, limited-privacy segments of cyberspace, the government seems justified to emphasize security and patrol virtual worlds like city roads and public places.

Where Did Press Freedom Suffer Most in 2013? Online

Josh Stearns | Posted 04.29.2014 | Media
Josh Stearns

As the spaces and places in which we publish, speak and assemble grow more connected, the geography of freedom is in flux. We'll need to draw new maps, and forge new paths, and fight new battles to protect our rights online and off.

Much Ado About Photoshop?

Magda Abu-Fadil | Posted 02.23.2014 | Media
Magda Abu-Fadil

Last week the Lebanese government released an official picture of a newly formed cabinet (after more than 10 months of political stalemate) that reporters and bloggers spotted as photoshopped.

The Next Threat To Press Freedom

The Huffington Post | Catherine Taibi | Posted 02.06.2014 | Media

The Committee to Protect Journalists has added "cyberspace" to its "Risk List," placing it beside Egypt and Syria in terms of places where press free...

American Law Schools and the Psychology of Cyber-Hysteria

Brian Leiter | Posted 03.02.2014 | College
Brian Leiter

The cyber-mob counsels against earning a J.D. without offering any other guidance; yet the best evidence demonstrates that a J.D. is a good financial investment for the vast majority over the long term.

Cyber-Harassment: What the Online Community Can Do to Stop the Trolls

Jade Walker | Posted 10.15.2013 | Media
Jade Walker

Over the course of my 22 years in journalism, I have been threatened numerous times. Sometimes the subjects of my stories didn't like having their misdeeds aired to the public, and so they lashed out. Sometimes, the people involved were just nuts.

Homo Sapiens Cybens

Francis Levy | Posted 10.02.2013 | Comedy
Francis Levy

In an Op-Ed piece entitled "Weiner's Woman," (NYT, 7/30/13), Susan Jacoby remarks that women who participate in internet sex are "not victims of men l...

Reorienting Narrative: E-lit as Psychogeography

Illya Szilak | Posted 08.11.2013 | Books
Illya Szilak

In much of her work, writer/artist J. R. Carpenter fabricates hybrid places that are both "virtual" and attached to real world locales.

Strategic Stability in Cyberspace

Franz-Stefan Gady | Posted 08.09.2013 | Politics
Franz-Stefan Gady

One of the principle questions moving forward will be how the United States and China can manage to contain their disagreements over cyberspace without an escalation in cyber rivalry and the risk of a full-scale cyber war.

Instagram: Social Tool or Social Problem?

Barbara Greenberg | Posted 06.30.2013 | Parents
Barbara Greenberg

Capturing moments and sharing memories has usually been a source of joy. Photos are, after all, intended to capture history, lovely moments and times spent together. They are also intended to bring a bit of happiness to the viewer, correct?

Can Cyborgs Fall in Love?

Dr. Craig Malkin | Posted 02.27.2013 | TED Weekends
Dr. Craig Malkin

Our deepest attachments develop when we can show all of who we are and be accepted, and that includes romantic love. The crudely pixilated self of cyberspace can hardly represent the best of us.