{"title":"社会信息圈中的机会、威胁和依赖","authors":"Greg Austin","doi":"10.1093/oxfordhb/9780198800682.013.2","DOIUrl":null,"url":null,"abstract":"The technological revolution outlined in the previous chapter has unleashed a social upheaval. If a suite of machines came to be so central in global and national social order, as well as in our personal lives, how does that affect our security? Bearing in mind that we are only at the dawn of the cyber age, what will the future hold? This chapter gives an overview of the profound impact of the information revolution on human welfare for better and for worse, from the individual and community levels to the national and international levels. The chapter begins with some insight into how philosophers have viewed these questions. It then looks at how leading actors have responded to the opportunities and threats. The chapter’s most important single theme is the issue of dependency, arguably the most ignored security aspect of the information age.","PeriodicalId":336846,"journal":{"name":"The Oxford Handbook of Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Opportunity, Threat, and Dependency in the Social Infosphere\",\"authors\":\"Greg Austin\",\"doi\":\"10.1093/oxfordhb/9780198800682.013.2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The technological revolution outlined in the previous chapter has unleashed a social upheaval. If a suite of machines came to be so central in global and national social order, as well as in our personal lives, how does that affect our security? Bearing in mind that we are only at the dawn of the cyber age, what will the future hold? This chapter gives an overview of the profound impact of the information revolution on human welfare for better and for worse, from the individual and community levels to the national and international levels. The chapter begins with some insight into how philosophers have viewed these questions. It then looks at how leading actors have responded to the opportunities and threats. The chapter’s most important single theme is the issue of dependency, arguably the most ignored security aspect of the information age.\",\"PeriodicalId\":336846,\"journal\":{\"name\":\"The Oxford Handbook of Cyber Security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Oxford Handbook of Cyber Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1093/oxfordhb/9780198800682.013.2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Oxford Handbook of Cyber Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oxfordhb/9780198800682.013.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Opportunity, Threat, and Dependency in the Social Infosphere
The technological revolution outlined in the previous chapter has unleashed a social upheaval. If a suite of machines came to be so central in global and national social order, as well as in our personal lives, how does that affect our security? Bearing in mind that we are only at the dawn of the cyber age, what will the future hold? This chapter gives an overview of the profound impact of the information revolution on human welfare for better and for worse, from the individual and community levels to the national and international levels. The chapter begins with some insight into how philosophers have viewed these questions. It then looks at how leading actors have responded to the opportunities and threats. The chapter’s most important single theme is the issue of dependency, arguably the most ignored security aspect of the information age.