SlideShare a Scribd company logo
1 of 23
2013
NAME -.
ENROLLMENT NO BRANCH -
CIVIL/B
11/29/2013
cyber revolution
2
The term information revolution (sometimes called also the "informational revolution")
describes current economic, social and technological trends beyond the Industrial
Revolution.
Many competing terms have been proposed that focus on different aspects of this
societal development. The British polymath crystallographer J. D. Bernal (1939)
introduced the term "scientific and technical revolution" in his book The Social Function
of Science to describe the new role that science and technology are coming to play
within society. He asserted that science is becoming a "productive force", using
the Marxist Theory of Productive Forces.After some controversy, the term was taken
up by authors and institutions of the then-Soviet Bloc. Their aim was to show
that socialism was a safe home for the scientific and technical ("technological" for some
authors) revolution, referred to by the acronym STR. The book Civilization at the
Crossroads, edited by the Czech philosopher Radovan Richta (1969), became a standard
reference for this topic.
Daniel Bell (1980) challenged this theory and advocated post-industrial society, which
would lead to a service economy rather than socialism.Many other authors presented
their views, including Zbigniew Brzezinski (1976) with his "Technetronic Society".
Information in social and economic activities
The main feature of the information revolution is the growing economic, social and
technological role of information. Information-related activities did not come up with
the Information Revolution. They existed, in one form or the other, in all human
societies, and eventually developed into institutions, such as the Platonic
Academy,Aristotle's Peripatetic school in the Lyceum, the Musaeum and the Library of
Alexandria, or the schools of Babylonian astronomy. The Agricultural Revolution and
the Industrial Revolution came up when new informational inputs were produced by
individual innovators, or by scientific and technical institutions. During the Information
Revolution all these activities are experiencing continuous growth, while other
information-oriented activities are emerging.
3
Information is the central theme of several new sciences, which emerged in the 1940s,
including Shannon's (1949) Information Theoryand Wiener's (1948) Cybernetics. Wiener
stated also: "information is information not matter or energy". This aphorism suggests
that information should be considered along with matter andenergy as the third
constituent part of the Universe; information is carried by matter or by energy.
We can outline a hierarchy to distinguish between data, information, knowledge,
and wisdom.Data are sensations, facts, figures, etc., that are independent and atomic in
nature. Information can be described alternately as organized data, the patterns that
exist in data, or the underlying meaning of interrelated pieces of dataKnowledge is the
ability to comprehend and use informationWisdom is the ability to make the best use of
knowledge.
Data and information are easily transferablein the modern world, whether through oral,
written or electronic methods. Knowledge, however, is built by one personand
transferred (more slowly) through education and human interaction. Wisdom is the least
transferrable by virtue of being built upon the other three with the addition of personal
experience and reflection on one's experience
Information is then further considered as an economic activity, since firms and
institutions are involved in its production, collection, exchange, distribution, circulation,
processing, transmission, and control. Labor is also divided into physical labor (use of
muscle power) and informational labor (use of intellectual power).A new economic sector
is thereby identified, the Information Sector, which amalgamates information-related
labor activities.
4
The theory of information revolution
The term information revolution may relate to, or contrast with, such widely used terms
as Industrial Revolution and Agricultural Revolution. Note, however, that you may prefer
mentalist to materialist paradigm. The following fundamental aspects of the theory of
information revolution can be given:
1. The object of economic activities can be conceptualized according to the
fundamental distinction between matter, energy, and information. These apply both
to the object of each economic activity, as well as within each economic activity or
enterprise. For instance, an industry may process matter (e.g. iron) using energy
and information (production and process technologies, management, etc.).
2. Information is a factor of production (along with capital, labor, land (economics)),
as well as a product sold in the market, that is, a commodity. As such, it
acquires use value and exchange value, and therefore a price.
3. All products have use value, exchange value, and informational value. The latter can
be measured by the information content of the product, in terms of innovation,
design, etc.
4. Industries develop information-generating activities, the so-called Research and
Development (R&D) functions.
5. Enterprises, and society at large, develop the information control and processing
functions, in the form of management structures; these are also called "white-
collar workers", "bureaucracy", "managerial functions", etc.
6. Labor can be classified according to the object of labor, into information labor and
non-information labor.
7. Information activities constitute a large, new economic sector, the information
sector along with the traditional primary sector, secondary sector, and tertiary
sector, according to the three-sector hypothesis. These should be restated
because they are based on the ambiguous definitions made by Colin Clark (1940),
who included in the tertiary sector all activities that have not been included in the
primary (agriculture, forestry, etc.) and secondary (manufacturing)
sectors.The quaternary sector and the quinary sector of the economy attempt to
classify these new activities, but their definitions are not based on a clear
conceptual scheme, although the latter is considered by some as equivalent with
the information sector.
5
8. From a strategic point of view, sectors can be defined as information sector, means
of production, means of consumption, thus extending the classical Ricardo-
Marx model of the Capitalist mode of production (see Influences on Karl
Marx). Marx stressed in many occasions the role of the "intellectual element" in
production, but failed to find a place for it into his model.
9. Innovations are the result of the production of new information, as new products,
new methods of production, patents, etc. Diffusion of innovations manifests
saturation effects (related term: market saturation), following certain cyclical
patterns and creating "economic waves", also referred to as "business cycles".
There are various types of waves, such as Kondratiev wave (54 years), Kuznets
swing (18 years), Juglar cycle (9 years) and Kitchin (about 4 years, see also Joseph
Schumpeter) distinguished by their nature, duration, and, thus, economic impact.
10. Diffusion of innovations causes structural-sectoral shifts in the economy,
which can be smooth or can create crisis and renewal, a process which Joseph
Schumpeter called vividly "creative destruction".
From a different perspective, Irving E. Fang (1997) identified six 'Information
Revolutions': writing, printing, mass media, entertainment, the 'tool shed' (which we call
'home' now), and the Information Highway. In this work the term 'information
revolution' is used in a narrow sense, to describe trends in communication media.
6
Measuring and modeling the Information Revolution
Modeling the Informational Revolution.
Porat (1976) measured the Information Sector in the US using the input-output
analysis; OECD has included statistics on the Information Sector in the economic
reports of its member countries.Veneris (1984, 1990) explored the theoretical, economic
and regional aspects of the Informational Revolution and developed a systems
dynamics simulation computer model.
These works can be seen as following the path originated with the work of Fritz
Machlup who in his (1962) book "The Production and Distribution of Knowledge in the
United States", claimed that the "knowledge industry represented 29% of the US gross
national product", which he saw as evidence that the Information Age has begun. He
defines knowledge as a commodity and attempts to measure the magnitude of the
production and distribution of this commodity within a modern economy. Machlup divided
information use into three classes: instrumental, intellectual, and pastime knowledge. He
identified also five types of knowledge: practical knowledge; intellectual knowledge, that
is, general culture and the satisfying of intellectual curiosity; pastime knowledge, that is,
knowledge satisfying non-intellectual curiosity or the desire for light entertainment and
emotional stimulation; spiritual or religious knowledge; unwanted knowledge, accidentally
acquired and aimlessly retained.
7
More recent estimates have reached the following results:
ļ‚· the worldā€™s technological capacity to receive information through one-
way broadcast networks grew at a sustained compound annual growth rate of 7%
between 1986 and 2007;
ļ‚· the world's technological capacity to store information grew at a sustained
compound annual growth rate of 25% between 1986 and 2007;
ļ‚· the world's effective capacity to exchange information through two-
way telecommunication networks grew at a sustained compound annual growth rate
of 30% during the same two decades;
ļ‚·
8
The cyber revolution
It used to be that word of mouth, newspapers and letters were the most efficient ways
to communicate. People could spend days or weeks waiting for a postcard from a family
member, and groups of people would need to plan months ahead of time for gatherings.
Back then, information moved at a snailā€™s pace. By todayā€™s standards, Paul Revereā€™s
midnight ride would be unnecessary: An e-mail or text would have worked just fine.
Technologies, like the Internet and cellphones, have transformed communication.
The Internet has revolutionized the way humans socialize and obtain information. A
letter nowadays would seem archaic, a postcard anachronistic, however sentimental
either may be. I canā€™t remember the last time I opened a book for the purpose of
research, or if I ever have at all. I merely have to open my laptop, click on Google
Chrome and all the information I will ever need is right at my fingertips. Why would I
bother with an index or a table of contents when I have a search bar?
Although the ease with which we obtain information has devalued communication and
traditional media, the Internet revolution has obvious benefits. What used to take days
or weeks now takes a couple of seconds. One person can invite hundreds of other people
to an event via Facebook. Twitter allows us to keep up with what our favorite celebrities
are doing or thinking at all times.More importantly, to people for whom communication
has been limited, social networking provides the ability to organize, galvanize and
mobilize from behind a computer screen or from a cellphone. This was made apparent by
the recent overthrow of the Egyptian government. In response to the assault and death
of Alexandria blogger and businessman Khaled Said, a Google marketing executive, Wael
Ghonim, created the Facebook page ā€œWe Are All Khaled Said.ā€ The page generated
outrage among Egyptian citizens and sparked a popular movement against the Mubarak
regime.
For the various dictatorships that exist around the world, perhaps there is no greater
threat to their rule than the Internet. Governments can restrict access (as in North
Korea) or ban certain websites, but some citizens manage to find ways to circumvent
filters and firewalls. In addition, Internet proxies make completely eliminating the
power of the Internet very difficult. Despite what oppressive governments may teach in
schools, and the propaganda that they try to infuse into the minds of people, these
governments cannot completely control the websites that their citizens visit. The truth,
9
however diluted or polluted it may be, is now accessible to anyone with a stable
connection.
Young Egyptians recognized the injustices being perpetrated by their government, such
as the murder of Khaled Said, so they took advantage of the one resource that would
provide uncensored information and allow them to mobilize quickly. The Egyptian
government was either unaware of or powerless to prevent the uprising. They saw no
picket signs, no shouting and no protestā€”to them all seemed well. The government did
not realize that a real revolution was picking up steam in quiet cyber cafes and cubicles
across Egypt.
Because of the rapid flow of information, similar protests erupted in Iran and Libya
shortly after the uprising in Egypt Jan. 25. Citizens of these Arab nations are using the
Internet in similar ways to organize opposition to oppressive regimes.
Many people lament the disconnect that the Internet has created between people. What
if, instead, it serves as a vehicle for bringing us together? Viral videos, often used for
humorous or commercial purposes, can also spread footage of atrocities, unite people in
outrage and ultimately provide fertilizer for the seeds of revolution.
In his book, ā€œFuture Hype: The Myths of Technology Change,ā€ Bob Seidensticker points
out that ā€œa technology isnā€™t inherently good or bad, but it will have an impact, which is
why itā€™s not neutral.ā€ The Internet has resulted in people taking for granted the ability
to communicate and obtain information in a matter of seconds. Information was once a
valuable luxury, but it is now a cheaply obtained commodity. However, the Internet also
has come to serve as a means for people without a voice to express themselves. By using
the Internet as a source of information and communication, those who have been
rendered silent in the past finally have the freedom to overcome their oppressors.
with Cyber War Will Not Take Place, Thomas Rid has written an important volume at a
critical juncture of the cyber-conflict debate. In a rush to articulate a new threat after
the end of the Cold War, the demise of regional powers in the Middle East and North
Africa (such as Syria, Iraq, and Libya, making Israel more secure), and the near total
rejection of the Global War on Terror, the next threat to materialize appears to be
cyber war. This is the impression one might get if engaging the current security
discourse. Both the United Nations and United States have argued that the threat of
10
cyber warfare is greater than the danger of terrorism, a striking reversal barely ten
years after 9/11. Yet, as Rid notes (along with others in this developing literature), the
threat of cyber warfare often is overstated and near nonexistent.
1 Building on an article in Journal of Strategic Studies (2012), Rid argues, very forcibly,
that cyber war will not take
His argument is based on logic and a careful engagement of what the term ā€˜warā€™ really
means. Defining terms is important in this exercise. He defines war in the manner of Carl
von Clausewitz and posits that it is an act of force and violence used in order to obtain a
political objective. Since cyber war does not include violence or force in its conduct, it is
tough to argue that cyber war will take place because the tactic rarely can breach the
gap between violations of information and data, on one hand, and physical harm, on the
other. Of course, one can make the argument that this breach can happen. The
influential Tallinn Manual that evaluates customary international legal standards as they
apply to cyber technologies points out that a pacemaker can be a target of hackers and
even suggests this could be a legal step taken by a state.3 At the recent Black Hat 2013
conference, it was demonstrated that smart cars can be taken over remotely, the same
fear was put forth for the 787 Dreamliner plane when software flaws were pointed out.4
Yet, these dangers are hypothetical; to make the leap from the hypothetical to the
actual is perhaps disingenuous or, as some might argue, dangerous.
Overall, Ridā€™s argument is nuanced. When Rid asserts that cyber war will not take place,
he is speaking of something very specific - warfare in conventional terms. ā€œMost cyber
attacks are not violent and cannot sensibly be understood as a form of violent actionā€
(12). Of course there will be cyber battles, but it is not at all clear that cyber security
will dominate the international affairs landscape in the future. Rid notes that the cyber
attacks that have happened in the past (specifically in Estonia and Georgia) have been
very minor in terms of their impact. The rush to push the threat to the top of the
security agenda in some ways makes the issue a self-fulfilling prophecy in that if the
threat is overstated, then states will overreact to the fear and build their own cyber
armies. This would then provoke the security dilemma and push the other side to react.
Because of this process, a careful evaluation of the cyber threat is critical at this
juncture.
Another important aspect of the book is its coverage of cyber weapons. By defining
cyber weapons on a spectrum, Rid is able to carefully classify each tactic according to its
11
actual usage and practices. A potential limitation of this discussion is that it is not
detailed enough. There is room here, and a need, to educate non-cyber practitioners
about the details of cyber actions. The rest of the book covers many important issues in
the cyber debate. Rid notes that the oft-stated attribution problem is a political, not a
technical, problem. This is an important insight that many in the cyber community seem
to miss. He also discusses the actual content of cyber attacks which are generally
espionage or sabotage activities. Understanding the tactic in this manner pushes us away
from frames of warfare and towards applications of defense and internal resiliency.
Since governments have dealt with espionage and sabotage as long as humans have
organized as collective enemies, why should cyber tactics be treated as something new
when they are the continuation of age-old practices?
The main flaw of the book is simply that Rid does not take his argument beyond the
context of war to examine the nature of cyber conflict in general. In the preface to the
book he sets this question up by suggesting that cyber attacks are making conflicts less
violent. This is an interesting and important hypothesis that needs more engagement. To
be fair, this request does not reflect Ridā€™s goal and perhaps goes beyond the bounds of
this book. He has also addressed this question in other places - see his recent article in
Foreign Policy entitled Cyber Sabotage is Easy where he engages the issue of a lack of
sabotage operations.5 In this volume he could have gone further, but here he sticks to a
cohesive argument, develops it, and executes in a well written and easy to grasp style. In
this context, Cyber War Will Not Happen is a foundational text in the cyber security
field.
Ridā€™s volume is an important piece of evidence in the cyber-conflict debate. Any
responsible scholar should use this volume to counter the divergent perspective
contained in the Clarke and Knake volume Cyber War, perhaps the most widely read tome
in the field.6 We are witnessing the development of a new strain of security research.
This developing area differs different from past tactics that have been engaged in the
security discourse such as nuclear warfare, terrorism, and counterinsurgency in that
skepticism seems early on to have developed from the academic perspective. Ridā€™s volume
advances this perspective through a careful engagement of the term and the limitations
of the practice of cyber war.
Perhaps this is a positive development. Possibly we have learned our lessons from past
failures to fully explore the implications and contexts of the security discourse before
12
rushing to action in the policy sphere. There are many threats to society, and to meet
them effectively we must fully dissect and engage those that would seek to articulate
emerging threats on the landscape without challenge. In a rush to push the cyber threat,
we might be missing more critical issues such as the consolidation of Arab Spring
democracies (Egypt), mass-migration in the context of ongoing conflicts (Syria), and
energy security (the post-Soviet States). It is likely that the cyber threat is
overstated; Ridā€™s volume is the first shot fired against those would seek to make
cyberspace the realm of conflict.
Brandon Valeriano (Ph.D. Vanderbilt University, 2003) is a Senior Lecturer at the
University of Glasgow in the Department of Politics and Global Security. Dr. Valerianoā€™s
main research interests include investigations of the causes of conflict and peace as well
as the study race/ethnicity from the international perspective. Ongoing research
explores interstate rivalry, classification systems of war, arms buildups, cyber conflict,
popular culture and foreign policy, and Latino foreign policy issues. Dr. Valeriano has
published over two dozen articles and book chapters in such outlets as the Journal of
Politics, International Studies Quarterly, International Interactions, Third World
Quarterly, and Policy Studies Journal. He recently published a book on the origins of
rivalry (Becoming Rivals, Routledge 2012) and a book on China, Tibet, and Hollywood
(Palgrave, 2012). He is currently wrapping up production on two more books (one that
empirically examines cyber conflict) and preparing a book length exploration of Latino
International Politics.
13
WE ARE all to a degree citizens of the emerging cyber world. We cannot imagine
ourselves and our businesses without cellphones, e-mail, the internet, Skype and social
networks.
Sociologists and economists hail this as a "new revolution" creating a "network society"
of "digital capitalism" with a higher penetration than the print and industrial revolutions.
There is no doubt about the benefits of this new cyber world: enormous capacity for
data storage and data retrieval, high efficiencies in terms of all kinds of digital
transactions, and connectivity to any place on Earth not imagined even 30 years ago.
But as with any human system, the ambiguities and moral questions should not escape us.
Let us not lose our critical mind set and be swept away by this wonderful new world.
First, the idea that all people gladly use and benefit from technology is only partially
true. Yes, cellphones have improved the lot of those at the so-called "bottom of the
pyramid". But in reality, poor people sometimes have to choose between food and airtime.
Also, the economic and educational inequalities of the world may be reinforced by fast-
moving cyber innovation. Those who are enjoying their smartphones, video learning and
internet banking are leaving billions of people behind.
This revolution has a crude edge to it: if you do not participate, you do not exist.
Second, there is no doubt the cyber age has democratised access to information. The
movement towards free and open access is, in principle, a good one. Anything one wants
to know is at oneā€™s fingertips.
But there is a huge difference between information and knowledge. Information needs
interpretation. For that a hermeneutic skill is required, and such a skill is based on
learning to distinguish between bad and good information.
The dramatic rise in weak writing skills and plagiarism among students points to one
thing: many know how to cut and paste. They know where the information is and, on the
basis of superficial correspondences, hope that the copy is appropriate to the topic. But
few know how to make distinctions, distil insights or create new knowledge.
As cyber citizens we appear smart, but we are actually quite dumb.
Third, we have gained in information and efficiencies of transactions of all sorts, but
information vulnerability is hitting governments, banks and individuals hard. (A friend
14
recently had R100,000 stolen from his secure online account.) Billions are spent on
information security as not all those surfing the cyber world are good people looking to
book an airline ticket. "Cyber warfare" is now a reality.
Having our information held by others ā€” including the state ā€” may render the concept
of privacy outdated. We cannot hide from the eyes of Big Brother. Gaining access to
information about our movements, our shopping habits and even our genetic dispositions
(for medical and life insurance companies) is getting easier.
Our enthusiasm for the almost daily novelties conjured up by cyber entrepreneurs may
blind us to the slow but sure curtailment of our liberties.
Fourth, a huge benefit of the cyber world is connectivity and seemingly effortless
communication no longer restricted by geography. The social impacts are not all
beneficial: clinical psychologists tell us cyber addiction is on the rise. There are physical
and social symptoms of addiction and withdrawal, and the "drug" in this case may be a
smartphone, which has become an integral part of social identity formation.
Cyber people connect virtually, but can hardly talk at the dinner table.
ā€¢ NaudĆ© is the former head of the business school and currently deputy vice-chancellor:
academic at the Nelson Mandela Metro University in Port Elizabeth. He writes in his
personal capacity. This article is to inform and educate, not to advise.
15
What is cyber revolution?
its using of technology to the great extent
Information Technology Has The Potential To Change Societal Structure And Processes
Similar In Scale To That Of Both The Agricultural Revolution And The Industrial
Revolution. On This Basis Governments Should Ensure Provision Of Information Techno...
...to that of both the Agricultural Revolution and the Industrial Revolution. On this basis
governments should ensure provision of Information Technology to all members of
society as a matter of urgency. Discuss.
Today, we are experiencing a technological revolution. There is nothing silent or stealthy
about it ā€“ we are aware of new technology arriving every year. In-your-face advertising
and attractive shop displays tempt buyers at every turn, and this yearā€™s new model is
next yearā€™s dinosaur. This revolution is global, not local. Many years ago in India, there
was a campaign to have a ā€œtap in every villageā€ ā€“ such a simple aim. Now every home
ā€œneeds a computerā€.
The Information Technology(IT) revolution has brought a lot of good. It has improved
the way we communicate, storage and retrieval of information has never been easier, and
we have new ways of learning, working, trading and enjoying ourselves. Technology brings
benefits and prosperity to its users, but it leaves the under privileged behind, creating a
ā€œdigital divideā€.
The digital divide is a term used to describe ā€œthe gap between those who have 'ever' and
those who have 'never' used a computer or the internetā€ (Young, 2005). Digital divides
can exist between young and old, urban and rural locations and country to country.
Information Technology has changed individual lives and it is beginning to change
societyā€™s structure. Unless we deliver IT to all members of society, those without access
to computers will have less opportunities than those who do.
ā€œWe are witnessing an explosion of computer applications for peaceful goals -- for
economic development, education, monitoring environmental conditions and in publishing.ā€
(Pollard, 2002)
16
E-commerce has boomed in recent years to allow direct trade with consumers.
Businesses now...
The One Cyber Revolution is a forward thinking, full service communication agency with a
presence in India, South Africa and USA. Our work is primarily in developing impactful,
ever-lasting brands that communicate the aspirations of our clients. We have a highly
specialized team of software developers capable of delivering large scale-longer term
and smaller impact projects. Ours is an energy driven agency with a real passion for
functional aesthetics within design.
Our diverse team works from numerous locations globally and around the clock to deliver
premium quality campaigns on every project we commit ourselves to. Our gaze is future
bound and our ears are permanently fixated on the ground - This is why we know how to
reach out to your target audience in their preferred channel allowing you to control
every precious moment of a customerā€™s full attention.
Telecommunication is the transmission of messages, over significant distances, for the
purpose of communication. In earlier times, telecommunications involved the use of visual
signals, such as smoke, semaphore telegraphs, signal flags, and optical heliographs, or
audio messages via coded drumbeats, lung-blown horns, or sent by loud whistles, for
example.
In the modern age of electricity and electronics, telecommunications has typically
involved the use of electric means such as the telegraph, the telephone, and the
17
teletype, the use of microwave communications, the use of fiber optics and their
associated electronics, and/or the use of the Internet. The first breakthrough into
modern electrical telecommunications came with the development of the telegraph
during the 1830s and 1840s. The use of these electrical means of communications
exploded into use on all of the continents of the world during the 19th century, and
these also connected the continents via cables on the floors of the ocean. These three
systems of communications all required the use of conducting metal wires.
A revolution in wireless telecommunications began in the first decade of the 20th
century, with Guglielmo Marconi winning the Nobel Prize in Physics in 1909 for his
pioneering developments in wireless radio communications. Other early inventors and
developers in the field of electrical and electronic telecommunications included Samuel
F.B. Morse, Edwin Armstrong, Joseph Henry, and Lee de Forest (who invented the
triode) of the United States, as well as John Logie Baird of Scotland, Nikola Tesla, an
Serbian emigrant to the United States, and Alexander Graham Bell of Scotland, who
lived in Canada, and then invented the telephone in the United States.
Information Technology has the potential to change societal structure and processes
similar in scale to that of both the Agricultural Revolution and the Industrial Revolution.
On this basis governments should ensure provision of Information Technology to all
members of society as a matter of urgency. Discuss.
Today, we are experiencing a technological revolution. There is nothing silent or stealthy
about it ā€“ we are aware of new technology arriving every year. In-your-face advertising
and attractive shop displays tempt buyers at every turn, and this yearā€™s new model is
next yearā€™s dinosaur. This revolution is global, not local. Many years ago in India, there
was a campaign to have a ā€œtap in every villageā€ ā€“ such a simple aim. Now every home
ā€œneeds a computerā€.
18
The Information Technology(IT) revolution has brought a lot of good. It has improved
the way we communicate, storage and retrieval of information has never been easier, and
we have new ways of learning, working, trading and enjoying ourselves. Technology brings
benefits and prosperity to its users, but it leaves the under privileged behind, creating a
ā€œdigital divideā€.
The digital divide is a term used to describe ā€œthe gap between those who have 'ever' and
those who have 'never' used a computer or the internetā€ (Young, 2005). Digital divides
can exist between young and old, urban and rural locations and country to country.
Information Technology has changed individual lives and it is beginning to change
societyā€™s structure. Unless we deliver IT to all members of society, those without access
to computers will have less opportunities than those who do.
ā€œWe are witnessing an explosion of computer applications for peaceful goals -- for
economic development, education, monitoring environmental conditions and in publishing.ā€
The Cybernetic Revolution and the Crisis of Capitalism
By Jerry Harris and Carl Davidson The Chicago Third Wave Study Group In the early
1970s U.S. capitalism began to suffer a deepening crisis of accumulation. This crisis
sprang from the very heart of the modern industrial system, arising out of fundamental
contradictions in its exploitation of labor and its conditions of production. But this crisis
also occurred along side a postmodern revolution in microelectronics and computer
technologies, creating significant changes in the forms of accumulation and wealth
creation. The two dynamics have created a new historic juncture for rethinking
established theories of political and social change. Marxist economists such as Paul
Sweezy have long tracked the cris is of accumulation. Recently key extensions have been
added by eco-Marxist James O'Connor. But radicals also need to take note of the
important contributions of Alvin and Heidi Toffler and their three waves theory. The
Tofflers describe agricultural society as the first wave and industrial society as the
second wave. They have added new insights into the nature of changes in the economic
base where knowledge has become the most important tool of production. This became
possible because of the revolution in the means of production, or information
technologies. Toffler calls this information society the third wave, or what we'll call
19
information capitalism. For about 200 years "second-wave" industrial capitalism was
generally expanding and dynamic. Although punctuated by cycles of economic crisis, it
grew into imperialism and built a world market. In the metropolitan countries, the circle
of wealth grew wider, as a substantial number of workers organized unions and attained
"middle class" living standards. But in the early 1970s industrial capitalism hit new
limitations to its growth. The crisis was all sided, including both labor and nature. In a
frantic race to maintain profits, the system began to toss huge.
Reearch methodology
The important elements that researcher Should note while earching related literure
include:
* Reports studie of closely related problems that have been investigated.
* Design of the study, including procedurese employed and data gathering instrument
used.
* Populations that were sampled and sampled methods employed.
* Variables that were defined.
* Extraneous variables that could have affected the finding.
* Faults that could have been avoided.
Recommendation for further research.
The review of literature has certain advantage;
* This indicate that the research has dine a lot of work in choosing this problem and
he/she is aware with what has already been researched and also with what is to be
researched.
* It eliminates the risk and chances of duplication of the already researched work.
* Italo help the researcher in formulating the hypothesis on basis of what is already
known about known that particular problem.
20
NUCLEAR TECHNOLOGY
Introduction:
Nuclear technology is technology that involves the reactions of atomic nuclei. Among the
notable nuclear technologies are nuclear power, nuclear medicine, and nuclear weapons. It
has found applications from smoke detectors to nuclear reactors, and from gun sights to
nuclear weapons.
History and scientific background:
In 1896, Henri Becquerel was investigating phosphorescence in uranium salts when he
discovered a new phenomenon which came to be called radioactivity. He,Pierre Curie and
Marie Curie began investigating the phenomenon. In the process, they isolated the
element radium, which is highly radioactive. They discovered that radioactive materials
produce intense, penetrating rays of three distinct sorts, which they labeled alpha, beta,
and gamma after the Greek letters. The new phenomenon of radioactivity was seized
upon by the manufacturers of quack medicine (as had the discoveries of electricity and
magnetism, earlier), and a number of patent medicines and treatments involving
radioactivity were put forward. Gradually it was realized that the radiation produced by
radioactive decay was ionizing radiation, and that even quantities too small to burn posed
a severe long-term hazard. Many of the scientists working on radioactivity died of
cancer as a result of their exposure. Radioactive patent medicines mostly disappeared,
but other applications of radioactive materials persisted, such as the use of radium salts
to produce glowing dials on meters.
In the modern age of electricity and electronics, telecommunications has typically
involved the use of electric means such as the telegraph, the telephone, and the
teletype, the use of microwave communications, the use of fiber optics and their
associated electronics, and/or the
Is this Essay helpful? Join OPPapers to read more and access more than 460,000 just
like it!
get better grades
use of the Internet. The first breakthrough into modern electrical telecommunications
came with the development of the telegraph during the 1830s and 1840s. The use of
21
these electrical means of communications exploded into use on all of the continents of
the world during the 19th century, and these also connected the continents via cables on
the floors of the ocean. These three systems of communications all required the use of
conducting metal wires.
A revolution in wireless telecommunications began in the first decade of the 20th
century, with Guglielmo Marconi winning the Nobel Prize in Physics in 1909 for his
pioneering developments in wireless radio communications. Other early inventors and
developers in the field of electrical and electronic telecommunications included Samuel
F.B. Morse, Edwin Armstrong, Joseph Henry, and Lee de Forest (who invented the
triode) of the United States, as well as John Logie Baird of Scotland, Nikola Tesla, an
Serbian emigrant to the United States, and Alexander Graham Bell of Scotland, who
lived in Canada, and then invented the telephone in the United States.
22
The Limits of Cyber-Revolutions
Revolutions remain a tricky business. Even as social-networking sites have changed the
way insurrections are built, the daily headlines from the Middle East are a reminder that
a robust Twitter following and a widely followed Facebook group are only half the battle.
At some point, an uprising, to truly be one, needs a physical staging ground. And whatā€™s
gone underappreciated this Arab Spring is just how much hangs on what happens as
protests make the jump from virtual to actual, old-fashioned public spaces.
In Egypt, that of course happened at Tahrir Square. When Ismail the Magnificent
ordered the redesign of Cairo in the second half of the nineteenth century, he created
broad boulevards and public squares inspired by Haussmannā€™s Paris, where heā€™d received
his educationā€”a layout that had the benefit of allowing the military to move swiftly
through the city to stamp out unrest, per Haussmannā€™s intent.ā€ So when Egyptian
dissidents, following extensive online preparations, began to reclaim Tahrir for the
public on January 25ā€”and then ignored the curfews and the commands to return to
workā€”their actions were much more than symbolic. Without the ability to control space,
Mubarak suddenly could not govern.
23
Syrian president Bashar al-Assad no doubt took note of the events in Cairo; more
brutally than Mubarak would dare (or at least more brutally than the Egyptian Army
would go along with), he has enforced his countryā€™s emergency laws, his troops arresting
protesters to try to clear the public spaces surrounding Umayyad Mosque in Damascusā€”
and, elsewhere, firing into peaceful crowdsā€”and send that countryā€™s nascent rebellion
back to its computers. In Bahrain, King Hamad bin Isa Al Khalifa has gone so far as to
bulldoze the 300-foot monument at the center of Manamaā€™s Pearl Square, hoping that
might defuse the revolutionary yearnings of the young people encamped around it. Libyaā€™s
rebels, meanwhile, have their strip of shoreline in Benghazi, spared for now from
Qaddafiā€™s forces by coalition airstrikes. But theyā€™ve said they have no desire to make
that city a confederate capital. Victory will come only when they can safely mass in
Tripoliā€™s Green Square.

More Related Content

What's hot

Right to equality
Right to equalityRight to equality
Right to equalityshreyan dutta
Ā 
The right to information act (rti),
The right to information act (rti),The right to information act (rti),
The right to information act (rti),varunchandok18
Ā 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection ActDrDiplinaBarman
Ā 
Presentation RTI ACT 2005 PART -I
Presentation RTI ACT 2005 PART -IPresentation RTI ACT 2005 PART -I
Presentation RTI ACT 2005 PART -IAvinash Kumar Gupta
Ā 
Indian Constitution - Swaminath S
Indian Constitution - Swaminath SIndian Constitution - Swaminath S
Indian Constitution - Swaminath SSwaminath Sam
Ā 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rightsCepal & Co.
Ā 
Introduction to Patent Law
Introduction to Patent LawIntroduction to Patent Law
Introduction to Patent LawMichael E. Dukes
Ā 

What's hot (10)

Right to equality
Right to equalityRight to equality
Right to equality
Ā 
The right to information act (rti),
The right to information act (rti),The right to information act (rti),
The right to information act (rti),
Ā 
Collective bargaining
Collective bargainingCollective bargaining
Collective bargaining
Ā 
Consumer Protection Act
Consumer Protection ActConsumer Protection Act
Consumer Protection Act
Ā 
Dpsp
DpspDpsp
Dpsp
Ā 
Presentation RTI ACT 2005 PART -I
Presentation RTI ACT 2005 PART -IPresentation RTI ACT 2005 PART -I
Presentation RTI ACT 2005 PART -I
Ā 
Indian Constitution - Swaminath S
Indian Constitution - Swaminath SIndian Constitution - Swaminath S
Indian Constitution - Swaminath S
Ā 
IT Act 2000
IT Act 2000IT Act 2000
IT Act 2000
Ā 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Ā 
Introduction to Patent Law
Introduction to Patent LawIntroduction to Patent Law
Introduction to Patent Law
Ā 

Similar to Cyber revoution

INFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.LINFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.Lanujessy
Ā 
The informational or post industrial revolution
The informational or post industrial revolutionThe informational or post industrial revolution
The informational or post industrial revolutionFernando Alcoforado
Ā 
Chapter3 black
Chapter3 blackChapter3 black
Chapter3 blackokeee
Ā 
Artificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdfArtificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdfgtsachtsiris
Ā 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusvafopoulos
Ā 
yonas bishaw information society-evolvement
yonas bishaw information society-evolvementyonas bishaw information society-evolvement
yonas bishaw information society-evolvementyonasbishaw
Ā 
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1PsalmGGeraldino
Ā 
Open science economy
Open science economyOpen science economy
Open science economympt001
Ā 
The information society (Group 1)
The information society (Group 1)The information society (Group 1)
The information society (Group 1)Bianca Abarca
Ā 
Artificial Intelligence The Future Of Labour And Employment
Artificial Intelligence  The Future Of Labour And EmploymentArtificial Intelligence  The Future Of Labour And Employment
Artificial Intelligence The Future Of Labour And EmploymentJoe Andelija
Ā 
T16 technol innnovation ee
T16 technol innnovation eeT16 technol innnovation ee
T16 technol innnovation eeElisio Estanque
Ā 
Information society
Information societyInformation society
Information societyPragya Parajuli
Ā 
Nilis cert in info man - rb on 'info and know' man - 1 oct 11
Nilis   cert in info man - rb on 'info and know' man - 1 oct 11Nilis   cert in info man - rb on 'info and know' man - 1 oct 11
Nilis cert in info man - rb on 'info and know' man - 1 oct 11NILISSL
Ā 
From analog to digital: new ways of teaching and learning. A quick view of IC...
From analog to digital: new ways of teaching and learning. A quick view of IC...From analog to digital: new ways of teaching and learning. A quick view of IC...
From analog to digital: new ways of teaching and learning. A quick view of IC...eLearning Papers
Ā 
Oriented education for the future
Oriented education for the futureOriented education for the future
Oriented education for the futureFernando Alcoforado
Ā 
The University, technology and co-operation
The University, technology and co-operationThe University, technology and co-operation
The University, technology and co-operationRichard Hall
Ā 
Essay Technology
Essay TechnologyEssay Technology
Essay TechnologyApril Clark
Ā 

Similar to Cyber revoution (20)

INFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.LINFORMATION SOCIETY Anandraj.L
INFORMATION SOCIETY Anandraj.L
Ā 
The informational or post industrial revolution
The informational or post industrial revolutionThe informational or post industrial revolution
The informational or post industrial revolution
Ā 
Technocultures
TechnoculturesTechnocultures
Technocultures
Ā 
Chapter3 black
Chapter3 blackChapter3 black
Chapter3 black
Ā 
Artificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdfArtificial intelligence in the field of economics.pdf
Artificial intelligence in the field of economics.pdf
Ā 
Vafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janusVafopoulos is the 2faces of janus
Vafopoulos is the 2faces of janus
Ā 
yonas bishaw information society-evolvement
yonas bishaw information society-evolvementyonas bishaw information society-evolvement
yonas bishaw information society-evolvement
Ā 
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
SCIENCE TECHNOLOGY AND SOCIETY MODULE 1
Ā 
Open science economy
Open science economyOpen science economy
Open science economy
Ā 
The information society (Group 1)
The information society (Group 1)The information society (Group 1)
The information society (Group 1)
Ā 
Artificial Intelligence The Future Of Labour And Employment
Artificial Intelligence  The Future Of Labour And EmploymentArtificial Intelligence  The Future Of Labour And Employment
Artificial Intelligence The Future Of Labour And Employment
Ā 
T16 technol innnovation ee
T16 technol innnovation eeT16 technol innnovation ee
T16 technol innnovation ee
Ā 
Innovation systems 101-lecture-4
Innovation systems 101-lecture-4Innovation systems 101-lecture-4
Innovation systems 101-lecture-4
Ā 
Information society
Information societyInformation society
Information society
Ā 
HOW THE WORLD WAS BROUGHT DOWN TO ITS KNEES
HOW THE WORLD WAS BROUGHT DOWN TO ITS KNEESHOW THE WORLD WAS BROUGHT DOWN TO ITS KNEES
HOW THE WORLD WAS BROUGHT DOWN TO ITS KNEES
Ā 
Nilis cert in info man - rb on 'info and know' man - 1 oct 11
Nilis   cert in info man - rb on 'info and know' man - 1 oct 11Nilis   cert in info man - rb on 'info and know' man - 1 oct 11
Nilis cert in info man - rb on 'info and know' man - 1 oct 11
Ā 
From analog to digital: new ways of teaching and learning. A quick view of IC...
From analog to digital: new ways of teaching and learning. A quick view of IC...From analog to digital: new ways of teaching and learning. A quick view of IC...
From analog to digital: new ways of teaching and learning. A quick view of IC...
Ā 
Oriented education for the future
Oriented education for the futureOriented education for the future
Oriented education for the future
Ā 
The University, technology and co-operation
The University, technology and co-operationThe University, technology and co-operation
The University, technology and co-operation
Ā 
Essay Technology
Essay TechnologyEssay Technology
Essay Technology
Ā 

Recently uploaded

定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€3sw2qly1
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on DeliveryCall Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Deliverybabeytanya
Ā 
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€Fs
Ā 
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€Fs
Ā 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
Ā 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
Ā 
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作ys8omjxb
Ā 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfMilind Agarwal
Ā 
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€Fs
Ā 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
Ā 
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€z xss
Ā 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkataanamikaraghav4
Ā 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Roomdivyansh0kumar0
Ā 

Recently uploaded (20)

定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(CCęƕäøščƁ书)ē¾Žå›½ē¾Žå›½ē¤¾åŒŗ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum šŸ‘‰ 8250192130 Available With Room
Ā 
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on DeliveryCall Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Call Girls In Mumbai Central Mumbai ā¤ļø 9920874524 šŸ‘ˆ Cash on Delivery
Ā 
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(LincolnęƕäøščƁ书)ꖰč„æå…°ęž—č‚Æ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(UAL学位čƁ)č‹±å›½ä¼¦ę•¦č‰ŗęœÆ大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
Ā 
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in  Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Jamuna Vihar Delhi reach out to us at šŸ”9953056974šŸ”
Ā 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
Ā 
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Potsdam FH学位čƁ,ę³¢čŒØ坦åŗ”ē”ØꊀęœÆ大学ęƕäøščƁ书1:1制作
Ā 
Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort ServiceHot Sexy call girls in  Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Hot Sexy call girls in Rk Puram šŸ” 9953056974 šŸ” Delhi escort Service
Ā 
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdfThe Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
The Intriguing World of CDR Analysis by Police: What You Need to Know.pdf
Ā 
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€å®šåˆ¶(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
定制(AUTęƕäøščƁ书)ꖰč„æå…°å„„å…‹å…°ē†å·„大学ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Ā 
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€åŠžē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
办ē†(UofRęƕäøščƁ书)ē½—切ę–Æē‰¹å¤§å­¦ęƕäøščÆęˆē»©å•åŽŸē‰ˆäø€ęƔäø€
Ā 
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Uttam NagaršŸ” 9953056974 šŸ” Delhi escort Service
Ā 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Ā 
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls KolkataVIP Call Girls Kolkata Ananya šŸ¤Œ  8250192130 šŸš€ Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya šŸ¤Œ 8250192130 šŸš€ Vip Call Girls Kolkata
Ā 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
Ā 
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar šŸ‘‰ 8250192130 Available With Room
Ā 

Cyber revoution

  • 1. 2013 NAME -. ENROLLMENT NO BRANCH - CIVIL/B 11/29/2013 cyber revolution
  • 2. 2 The term information revolution (sometimes called also the "informational revolution") describes current economic, social and technological trends beyond the Industrial Revolution. Many competing terms have been proposed that focus on different aspects of this societal development. The British polymath crystallographer J. D. Bernal (1939) introduced the term "scientific and technical revolution" in his book The Social Function of Science to describe the new role that science and technology are coming to play within society. He asserted that science is becoming a "productive force", using the Marxist Theory of Productive Forces.After some controversy, the term was taken up by authors and institutions of the then-Soviet Bloc. Their aim was to show that socialism was a safe home for the scientific and technical ("technological" for some authors) revolution, referred to by the acronym STR. The book Civilization at the Crossroads, edited by the Czech philosopher Radovan Richta (1969), became a standard reference for this topic. Daniel Bell (1980) challenged this theory and advocated post-industrial society, which would lead to a service economy rather than socialism.Many other authors presented their views, including Zbigniew Brzezinski (1976) with his "Technetronic Society". Information in social and economic activities The main feature of the information revolution is the growing economic, social and technological role of information. Information-related activities did not come up with the Information Revolution. They existed, in one form or the other, in all human societies, and eventually developed into institutions, such as the Platonic Academy,Aristotle's Peripatetic school in the Lyceum, the Musaeum and the Library of Alexandria, or the schools of Babylonian astronomy. The Agricultural Revolution and the Industrial Revolution came up when new informational inputs were produced by individual innovators, or by scientific and technical institutions. During the Information Revolution all these activities are experiencing continuous growth, while other information-oriented activities are emerging.
  • 3. 3 Information is the central theme of several new sciences, which emerged in the 1940s, including Shannon's (1949) Information Theoryand Wiener's (1948) Cybernetics. Wiener stated also: "information is information not matter or energy". This aphorism suggests that information should be considered along with matter andenergy as the third constituent part of the Universe; information is carried by matter or by energy. We can outline a hierarchy to distinguish between data, information, knowledge, and wisdom.Data are sensations, facts, figures, etc., that are independent and atomic in nature. Information can be described alternately as organized data, the patterns that exist in data, or the underlying meaning of interrelated pieces of dataKnowledge is the ability to comprehend and use informationWisdom is the ability to make the best use of knowledge. Data and information are easily transferablein the modern world, whether through oral, written or electronic methods. Knowledge, however, is built by one personand transferred (more slowly) through education and human interaction. Wisdom is the least transferrable by virtue of being built upon the other three with the addition of personal experience and reflection on one's experience Information is then further considered as an economic activity, since firms and institutions are involved in its production, collection, exchange, distribution, circulation, processing, transmission, and control. Labor is also divided into physical labor (use of muscle power) and informational labor (use of intellectual power).A new economic sector is thereby identified, the Information Sector, which amalgamates information-related labor activities.
  • 4. 4 The theory of information revolution The term information revolution may relate to, or contrast with, such widely used terms as Industrial Revolution and Agricultural Revolution. Note, however, that you may prefer mentalist to materialist paradigm. The following fundamental aspects of the theory of information revolution can be given: 1. The object of economic activities can be conceptualized according to the fundamental distinction between matter, energy, and information. These apply both to the object of each economic activity, as well as within each economic activity or enterprise. For instance, an industry may process matter (e.g. iron) using energy and information (production and process technologies, management, etc.). 2. Information is a factor of production (along with capital, labor, land (economics)), as well as a product sold in the market, that is, a commodity. As such, it acquires use value and exchange value, and therefore a price. 3. All products have use value, exchange value, and informational value. The latter can be measured by the information content of the product, in terms of innovation, design, etc. 4. Industries develop information-generating activities, the so-called Research and Development (R&D) functions. 5. Enterprises, and society at large, develop the information control and processing functions, in the form of management structures; these are also called "white- collar workers", "bureaucracy", "managerial functions", etc. 6. Labor can be classified according to the object of labor, into information labor and non-information labor. 7. Information activities constitute a large, new economic sector, the information sector along with the traditional primary sector, secondary sector, and tertiary sector, according to the three-sector hypothesis. These should be restated because they are based on the ambiguous definitions made by Colin Clark (1940), who included in the tertiary sector all activities that have not been included in the primary (agriculture, forestry, etc.) and secondary (manufacturing) sectors.The quaternary sector and the quinary sector of the economy attempt to classify these new activities, but their definitions are not based on a clear conceptual scheme, although the latter is considered by some as equivalent with the information sector.
  • 5. 5 8. From a strategic point of view, sectors can be defined as information sector, means of production, means of consumption, thus extending the classical Ricardo- Marx model of the Capitalist mode of production (see Influences on Karl Marx). Marx stressed in many occasions the role of the "intellectual element" in production, but failed to find a place for it into his model. 9. Innovations are the result of the production of new information, as new products, new methods of production, patents, etc. Diffusion of innovations manifests saturation effects (related term: market saturation), following certain cyclical patterns and creating "economic waves", also referred to as "business cycles". There are various types of waves, such as Kondratiev wave (54 years), Kuznets swing (18 years), Juglar cycle (9 years) and Kitchin (about 4 years, see also Joseph Schumpeter) distinguished by their nature, duration, and, thus, economic impact. 10. Diffusion of innovations causes structural-sectoral shifts in the economy, which can be smooth or can create crisis and renewal, a process which Joseph Schumpeter called vividly "creative destruction". From a different perspective, Irving E. Fang (1997) identified six 'Information Revolutions': writing, printing, mass media, entertainment, the 'tool shed' (which we call 'home' now), and the Information Highway. In this work the term 'information revolution' is used in a narrow sense, to describe trends in communication media.
  • 6. 6 Measuring and modeling the Information Revolution Modeling the Informational Revolution. Porat (1976) measured the Information Sector in the US using the input-output analysis; OECD has included statistics on the Information Sector in the economic reports of its member countries.Veneris (1984, 1990) explored the theoretical, economic and regional aspects of the Informational Revolution and developed a systems dynamics simulation computer model. These works can be seen as following the path originated with the work of Fritz Machlup who in his (1962) book "The Production and Distribution of Knowledge in the United States", claimed that the "knowledge industry represented 29% of the US gross national product", which he saw as evidence that the Information Age has begun. He defines knowledge as a commodity and attempts to measure the magnitude of the production and distribution of this commodity within a modern economy. Machlup divided information use into three classes: instrumental, intellectual, and pastime knowledge. He identified also five types of knowledge: practical knowledge; intellectual knowledge, that is, general culture and the satisfying of intellectual curiosity; pastime knowledge, that is, knowledge satisfying non-intellectual curiosity or the desire for light entertainment and emotional stimulation; spiritual or religious knowledge; unwanted knowledge, accidentally acquired and aimlessly retained.
  • 7. 7 More recent estimates have reached the following results: ļ‚· the worldā€™s technological capacity to receive information through one- way broadcast networks grew at a sustained compound annual growth rate of 7% between 1986 and 2007; ļ‚· the world's technological capacity to store information grew at a sustained compound annual growth rate of 25% between 1986 and 2007; ļ‚· the world's effective capacity to exchange information through two- way telecommunication networks grew at a sustained compound annual growth rate of 30% during the same two decades; ļ‚·
  • 8. 8 The cyber revolution It used to be that word of mouth, newspapers and letters were the most efficient ways to communicate. People could spend days or weeks waiting for a postcard from a family member, and groups of people would need to plan months ahead of time for gatherings. Back then, information moved at a snailā€™s pace. By todayā€™s standards, Paul Revereā€™s midnight ride would be unnecessary: An e-mail or text would have worked just fine. Technologies, like the Internet and cellphones, have transformed communication. The Internet has revolutionized the way humans socialize and obtain information. A letter nowadays would seem archaic, a postcard anachronistic, however sentimental either may be. I canā€™t remember the last time I opened a book for the purpose of research, or if I ever have at all. I merely have to open my laptop, click on Google Chrome and all the information I will ever need is right at my fingertips. Why would I bother with an index or a table of contents when I have a search bar? Although the ease with which we obtain information has devalued communication and traditional media, the Internet revolution has obvious benefits. What used to take days or weeks now takes a couple of seconds. One person can invite hundreds of other people to an event via Facebook. Twitter allows us to keep up with what our favorite celebrities are doing or thinking at all times.More importantly, to people for whom communication has been limited, social networking provides the ability to organize, galvanize and mobilize from behind a computer screen or from a cellphone. This was made apparent by the recent overthrow of the Egyptian government. In response to the assault and death of Alexandria blogger and businessman Khaled Said, a Google marketing executive, Wael Ghonim, created the Facebook page ā€œWe Are All Khaled Said.ā€ The page generated outrage among Egyptian citizens and sparked a popular movement against the Mubarak regime. For the various dictatorships that exist around the world, perhaps there is no greater threat to their rule than the Internet. Governments can restrict access (as in North Korea) or ban certain websites, but some citizens manage to find ways to circumvent filters and firewalls. In addition, Internet proxies make completely eliminating the power of the Internet very difficult. Despite what oppressive governments may teach in schools, and the propaganda that they try to infuse into the minds of people, these governments cannot completely control the websites that their citizens visit. The truth,
  • 9. 9 however diluted or polluted it may be, is now accessible to anyone with a stable connection. Young Egyptians recognized the injustices being perpetrated by their government, such as the murder of Khaled Said, so they took advantage of the one resource that would provide uncensored information and allow them to mobilize quickly. The Egyptian government was either unaware of or powerless to prevent the uprising. They saw no picket signs, no shouting and no protestā€”to them all seemed well. The government did not realize that a real revolution was picking up steam in quiet cyber cafes and cubicles across Egypt. Because of the rapid flow of information, similar protests erupted in Iran and Libya shortly after the uprising in Egypt Jan. 25. Citizens of these Arab nations are using the Internet in similar ways to organize opposition to oppressive regimes. Many people lament the disconnect that the Internet has created between people. What if, instead, it serves as a vehicle for bringing us together? Viral videos, often used for humorous or commercial purposes, can also spread footage of atrocities, unite people in outrage and ultimately provide fertilizer for the seeds of revolution. In his book, ā€œFuture Hype: The Myths of Technology Change,ā€ Bob Seidensticker points out that ā€œa technology isnā€™t inherently good or bad, but it will have an impact, which is why itā€™s not neutral.ā€ The Internet has resulted in people taking for granted the ability to communicate and obtain information in a matter of seconds. Information was once a valuable luxury, but it is now a cheaply obtained commodity. However, the Internet also has come to serve as a means for people without a voice to express themselves. By using the Internet as a source of information and communication, those who have been rendered silent in the past finally have the freedom to overcome their oppressors. with Cyber War Will Not Take Place, Thomas Rid has written an important volume at a critical juncture of the cyber-conflict debate. In a rush to articulate a new threat after the end of the Cold War, the demise of regional powers in the Middle East and North Africa (such as Syria, Iraq, and Libya, making Israel more secure), and the near total rejection of the Global War on Terror, the next threat to materialize appears to be cyber war. This is the impression one might get if engaging the current security discourse. Both the United Nations and United States have argued that the threat of
  • 10. 10 cyber warfare is greater than the danger of terrorism, a striking reversal barely ten years after 9/11. Yet, as Rid notes (along with others in this developing literature), the threat of cyber warfare often is overstated and near nonexistent. 1 Building on an article in Journal of Strategic Studies (2012), Rid argues, very forcibly, that cyber war will not take His argument is based on logic and a careful engagement of what the term ā€˜warā€™ really means. Defining terms is important in this exercise. He defines war in the manner of Carl von Clausewitz and posits that it is an act of force and violence used in order to obtain a political objective. Since cyber war does not include violence or force in its conduct, it is tough to argue that cyber war will take place because the tactic rarely can breach the gap between violations of information and data, on one hand, and physical harm, on the other. Of course, one can make the argument that this breach can happen. The influential Tallinn Manual that evaluates customary international legal standards as they apply to cyber technologies points out that a pacemaker can be a target of hackers and even suggests this could be a legal step taken by a state.3 At the recent Black Hat 2013 conference, it was demonstrated that smart cars can be taken over remotely, the same fear was put forth for the 787 Dreamliner plane when software flaws were pointed out.4 Yet, these dangers are hypothetical; to make the leap from the hypothetical to the actual is perhaps disingenuous or, as some might argue, dangerous. Overall, Ridā€™s argument is nuanced. When Rid asserts that cyber war will not take place, he is speaking of something very specific - warfare in conventional terms. ā€œMost cyber attacks are not violent and cannot sensibly be understood as a form of violent actionā€ (12). Of course there will be cyber battles, but it is not at all clear that cyber security will dominate the international affairs landscape in the future. Rid notes that the cyber attacks that have happened in the past (specifically in Estonia and Georgia) have been very minor in terms of their impact. The rush to push the threat to the top of the security agenda in some ways makes the issue a self-fulfilling prophecy in that if the threat is overstated, then states will overreact to the fear and build their own cyber armies. This would then provoke the security dilemma and push the other side to react. Because of this process, a careful evaluation of the cyber threat is critical at this juncture. Another important aspect of the book is its coverage of cyber weapons. By defining cyber weapons on a spectrum, Rid is able to carefully classify each tactic according to its
  • 11. 11 actual usage and practices. A potential limitation of this discussion is that it is not detailed enough. There is room here, and a need, to educate non-cyber practitioners about the details of cyber actions. The rest of the book covers many important issues in the cyber debate. Rid notes that the oft-stated attribution problem is a political, not a technical, problem. This is an important insight that many in the cyber community seem to miss. He also discusses the actual content of cyber attacks which are generally espionage or sabotage activities. Understanding the tactic in this manner pushes us away from frames of warfare and towards applications of defense and internal resiliency. Since governments have dealt with espionage and sabotage as long as humans have organized as collective enemies, why should cyber tactics be treated as something new when they are the continuation of age-old practices? The main flaw of the book is simply that Rid does not take his argument beyond the context of war to examine the nature of cyber conflict in general. In the preface to the book he sets this question up by suggesting that cyber attacks are making conflicts less violent. This is an interesting and important hypothesis that needs more engagement. To be fair, this request does not reflect Ridā€™s goal and perhaps goes beyond the bounds of this book. He has also addressed this question in other places - see his recent article in Foreign Policy entitled Cyber Sabotage is Easy where he engages the issue of a lack of sabotage operations.5 In this volume he could have gone further, but here he sticks to a cohesive argument, develops it, and executes in a well written and easy to grasp style. In this context, Cyber War Will Not Happen is a foundational text in the cyber security field. Ridā€™s volume is an important piece of evidence in the cyber-conflict debate. Any responsible scholar should use this volume to counter the divergent perspective contained in the Clarke and Knake volume Cyber War, perhaps the most widely read tome in the field.6 We are witnessing the development of a new strain of security research. This developing area differs different from past tactics that have been engaged in the security discourse such as nuclear warfare, terrorism, and counterinsurgency in that skepticism seems early on to have developed from the academic perspective. Ridā€™s volume advances this perspective through a careful engagement of the term and the limitations of the practice of cyber war. Perhaps this is a positive development. Possibly we have learned our lessons from past failures to fully explore the implications and contexts of the security discourse before
  • 12. 12 rushing to action in the policy sphere. There are many threats to society, and to meet them effectively we must fully dissect and engage those that would seek to articulate emerging threats on the landscape without challenge. In a rush to push the cyber threat, we might be missing more critical issues such as the consolidation of Arab Spring democracies (Egypt), mass-migration in the context of ongoing conflicts (Syria), and energy security (the post-Soviet States). It is likely that the cyber threat is overstated; Ridā€™s volume is the first shot fired against those would seek to make cyberspace the realm of conflict. Brandon Valeriano (Ph.D. Vanderbilt University, 2003) is a Senior Lecturer at the University of Glasgow in the Department of Politics and Global Security. Dr. Valerianoā€™s main research interests include investigations of the causes of conflict and peace as well as the study race/ethnicity from the international perspective. Ongoing research explores interstate rivalry, classification systems of war, arms buildups, cyber conflict, popular culture and foreign policy, and Latino foreign policy issues. Dr. Valeriano has published over two dozen articles and book chapters in such outlets as the Journal of Politics, International Studies Quarterly, International Interactions, Third World Quarterly, and Policy Studies Journal. He recently published a book on the origins of rivalry (Becoming Rivals, Routledge 2012) and a book on China, Tibet, and Hollywood (Palgrave, 2012). He is currently wrapping up production on two more books (one that empirically examines cyber conflict) and preparing a book length exploration of Latino International Politics.
  • 13. 13 WE ARE all to a degree citizens of the emerging cyber world. We cannot imagine ourselves and our businesses without cellphones, e-mail, the internet, Skype and social networks. Sociologists and economists hail this as a "new revolution" creating a "network society" of "digital capitalism" with a higher penetration than the print and industrial revolutions. There is no doubt about the benefits of this new cyber world: enormous capacity for data storage and data retrieval, high efficiencies in terms of all kinds of digital transactions, and connectivity to any place on Earth not imagined even 30 years ago. But as with any human system, the ambiguities and moral questions should not escape us. Let us not lose our critical mind set and be swept away by this wonderful new world. First, the idea that all people gladly use and benefit from technology is only partially true. Yes, cellphones have improved the lot of those at the so-called "bottom of the pyramid". But in reality, poor people sometimes have to choose between food and airtime. Also, the economic and educational inequalities of the world may be reinforced by fast- moving cyber innovation. Those who are enjoying their smartphones, video learning and internet banking are leaving billions of people behind. This revolution has a crude edge to it: if you do not participate, you do not exist. Second, there is no doubt the cyber age has democratised access to information. The movement towards free and open access is, in principle, a good one. Anything one wants to know is at oneā€™s fingertips. But there is a huge difference between information and knowledge. Information needs interpretation. For that a hermeneutic skill is required, and such a skill is based on learning to distinguish between bad and good information. The dramatic rise in weak writing skills and plagiarism among students points to one thing: many know how to cut and paste. They know where the information is and, on the basis of superficial correspondences, hope that the copy is appropriate to the topic. But few know how to make distinctions, distil insights or create new knowledge. As cyber citizens we appear smart, but we are actually quite dumb. Third, we have gained in information and efficiencies of transactions of all sorts, but information vulnerability is hitting governments, banks and individuals hard. (A friend
  • 14. 14 recently had R100,000 stolen from his secure online account.) Billions are spent on information security as not all those surfing the cyber world are good people looking to book an airline ticket. "Cyber warfare" is now a reality. Having our information held by others ā€” including the state ā€” may render the concept of privacy outdated. We cannot hide from the eyes of Big Brother. Gaining access to information about our movements, our shopping habits and even our genetic dispositions (for medical and life insurance companies) is getting easier. Our enthusiasm for the almost daily novelties conjured up by cyber entrepreneurs may blind us to the slow but sure curtailment of our liberties. Fourth, a huge benefit of the cyber world is connectivity and seemingly effortless communication no longer restricted by geography. The social impacts are not all beneficial: clinical psychologists tell us cyber addiction is on the rise. There are physical and social symptoms of addiction and withdrawal, and the "drug" in this case may be a smartphone, which has become an integral part of social identity formation. Cyber people connect virtually, but can hardly talk at the dinner table. ā€¢ NaudĆ© is the former head of the business school and currently deputy vice-chancellor: academic at the Nelson Mandela Metro University in Port Elizabeth. He writes in his personal capacity. This article is to inform and educate, not to advise.
  • 15. 15 What is cyber revolution? its using of technology to the great extent Information Technology Has The Potential To Change Societal Structure And Processes Similar In Scale To That Of Both The Agricultural Revolution And The Industrial Revolution. On This Basis Governments Should Ensure Provision Of Information Techno... ...to that of both the Agricultural Revolution and the Industrial Revolution. On this basis governments should ensure provision of Information Technology to all members of society as a matter of urgency. Discuss. Today, we are experiencing a technological revolution. There is nothing silent or stealthy about it ā€“ we are aware of new technology arriving every year. In-your-face advertising and attractive shop displays tempt buyers at every turn, and this yearā€™s new model is next yearā€™s dinosaur. This revolution is global, not local. Many years ago in India, there was a campaign to have a ā€œtap in every villageā€ ā€“ such a simple aim. Now every home ā€œneeds a computerā€. The Information Technology(IT) revolution has brought a lot of good. It has improved the way we communicate, storage and retrieval of information has never been easier, and we have new ways of learning, working, trading and enjoying ourselves. Technology brings benefits and prosperity to its users, but it leaves the under privileged behind, creating a ā€œdigital divideā€. The digital divide is a term used to describe ā€œthe gap between those who have 'ever' and those who have 'never' used a computer or the internetā€ (Young, 2005). Digital divides can exist between young and old, urban and rural locations and country to country. Information Technology has changed individual lives and it is beginning to change societyā€™s structure. Unless we deliver IT to all members of society, those without access to computers will have less opportunities than those who do. ā€œWe are witnessing an explosion of computer applications for peaceful goals -- for economic development, education, monitoring environmental conditions and in publishing.ā€ (Pollard, 2002)
  • 16. 16 E-commerce has boomed in recent years to allow direct trade with consumers. Businesses now... The One Cyber Revolution is a forward thinking, full service communication agency with a presence in India, South Africa and USA. Our work is primarily in developing impactful, ever-lasting brands that communicate the aspirations of our clients. We have a highly specialized team of software developers capable of delivering large scale-longer term and smaller impact projects. Ours is an energy driven agency with a real passion for functional aesthetics within design. Our diverse team works from numerous locations globally and around the clock to deliver premium quality campaigns on every project we commit ourselves to. Our gaze is future bound and our ears are permanently fixated on the ground - This is why we know how to reach out to your target audience in their preferred channel allowing you to control every precious moment of a customerā€™s full attention. Telecommunication is the transmission of messages, over significant distances, for the purpose of communication. In earlier times, telecommunications involved the use of visual signals, such as smoke, semaphore telegraphs, signal flags, and optical heliographs, or audio messages via coded drumbeats, lung-blown horns, or sent by loud whistles, for example. In the modern age of electricity and electronics, telecommunications has typically involved the use of electric means such as the telegraph, the telephone, and the
  • 17. 17 teletype, the use of microwave communications, the use of fiber optics and their associated electronics, and/or the use of the Internet. The first breakthrough into modern electrical telecommunications came with the development of the telegraph during the 1830s and 1840s. The use of these electrical means of communications exploded into use on all of the continents of the world during the 19th century, and these also connected the continents via cables on the floors of the ocean. These three systems of communications all required the use of conducting metal wires. A revolution in wireless telecommunications began in the first decade of the 20th century, with Guglielmo Marconi winning the Nobel Prize in Physics in 1909 for his pioneering developments in wireless radio communications. Other early inventors and developers in the field of electrical and electronic telecommunications included Samuel F.B. Morse, Edwin Armstrong, Joseph Henry, and Lee de Forest (who invented the triode) of the United States, as well as John Logie Baird of Scotland, Nikola Tesla, an Serbian emigrant to the United States, and Alexander Graham Bell of Scotland, who lived in Canada, and then invented the telephone in the United States. Information Technology has the potential to change societal structure and processes similar in scale to that of both the Agricultural Revolution and the Industrial Revolution. On this basis governments should ensure provision of Information Technology to all members of society as a matter of urgency. Discuss. Today, we are experiencing a technological revolution. There is nothing silent or stealthy about it ā€“ we are aware of new technology arriving every year. In-your-face advertising and attractive shop displays tempt buyers at every turn, and this yearā€™s new model is next yearā€™s dinosaur. This revolution is global, not local. Many years ago in India, there was a campaign to have a ā€œtap in every villageā€ ā€“ such a simple aim. Now every home ā€œneeds a computerā€.
  • 18. 18 The Information Technology(IT) revolution has brought a lot of good. It has improved the way we communicate, storage and retrieval of information has never been easier, and we have new ways of learning, working, trading and enjoying ourselves. Technology brings benefits and prosperity to its users, but it leaves the under privileged behind, creating a ā€œdigital divideā€. The digital divide is a term used to describe ā€œthe gap between those who have 'ever' and those who have 'never' used a computer or the internetā€ (Young, 2005). Digital divides can exist between young and old, urban and rural locations and country to country. Information Technology has changed individual lives and it is beginning to change societyā€™s structure. Unless we deliver IT to all members of society, those without access to computers will have less opportunities than those who do. ā€œWe are witnessing an explosion of computer applications for peaceful goals -- for economic development, education, monitoring environmental conditions and in publishing.ā€ The Cybernetic Revolution and the Crisis of Capitalism By Jerry Harris and Carl Davidson The Chicago Third Wave Study Group In the early 1970s U.S. capitalism began to suffer a deepening crisis of accumulation. This crisis sprang from the very heart of the modern industrial system, arising out of fundamental contradictions in its exploitation of labor and its conditions of production. But this crisis also occurred along side a postmodern revolution in microelectronics and computer technologies, creating significant changes in the forms of accumulation and wealth creation. The two dynamics have created a new historic juncture for rethinking established theories of political and social change. Marxist economists such as Paul Sweezy have long tracked the cris is of accumulation. Recently key extensions have been added by eco-Marxist James O'Connor. But radicals also need to take note of the important contributions of Alvin and Heidi Toffler and their three waves theory. The Tofflers describe agricultural society as the first wave and industrial society as the second wave. They have added new insights into the nature of changes in the economic base where knowledge has become the most important tool of production. This became possible because of the revolution in the means of production, or information technologies. Toffler calls this information society the third wave, or what we'll call
  • 19. 19 information capitalism. For about 200 years "second-wave" industrial capitalism was generally expanding and dynamic. Although punctuated by cycles of economic crisis, it grew into imperialism and built a world market. In the metropolitan countries, the circle of wealth grew wider, as a substantial number of workers organized unions and attained "middle class" living standards. But in the early 1970s industrial capitalism hit new limitations to its growth. The crisis was all sided, including both labor and nature. In a frantic race to maintain profits, the system began to toss huge. Reearch methodology The important elements that researcher Should note while earching related literure include: * Reports studie of closely related problems that have been investigated. * Design of the study, including procedurese employed and data gathering instrument used. * Populations that were sampled and sampled methods employed. * Variables that were defined. * Extraneous variables that could have affected the finding. * Faults that could have been avoided. Recommendation for further research. The review of literature has certain advantage; * This indicate that the research has dine a lot of work in choosing this problem and he/she is aware with what has already been researched and also with what is to be researched. * It eliminates the risk and chances of duplication of the already researched work. * Italo help the researcher in formulating the hypothesis on basis of what is already known about known that particular problem.
  • 20. 20 NUCLEAR TECHNOLOGY Introduction: Nuclear technology is technology that involves the reactions of atomic nuclei. Among the notable nuclear technologies are nuclear power, nuclear medicine, and nuclear weapons. It has found applications from smoke detectors to nuclear reactors, and from gun sights to nuclear weapons. History and scientific background: In 1896, Henri Becquerel was investigating phosphorescence in uranium salts when he discovered a new phenomenon which came to be called radioactivity. He,Pierre Curie and Marie Curie began investigating the phenomenon. In the process, they isolated the element radium, which is highly radioactive. They discovered that radioactive materials produce intense, penetrating rays of three distinct sorts, which they labeled alpha, beta, and gamma after the Greek letters. The new phenomenon of radioactivity was seized upon by the manufacturers of quack medicine (as had the discoveries of electricity and magnetism, earlier), and a number of patent medicines and treatments involving radioactivity were put forward. Gradually it was realized that the radiation produced by radioactive decay was ionizing radiation, and that even quantities too small to burn posed a severe long-term hazard. Many of the scientists working on radioactivity died of cancer as a result of their exposure. Radioactive patent medicines mostly disappeared, but other applications of radioactive materials persisted, such as the use of radium salts to produce glowing dials on meters. In the modern age of electricity and electronics, telecommunications has typically involved the use of electric means such as the telegraph, the telephone, and the teletype, the use of microwave communications, the use of fiber optics and their associated electronics, and/or the Is this Essay helpful? Join OPPapers to read more and access more than 460,000 just like it! get better grades use of the Internet. The first breakthrough into modern electrical telecommunications came with the development of the telegraph during the 1830s and 1840s. The use of
  • 21. 21 these electrical means of communications exploded into use on all of the continents of the world during the 19th century, and these also connected the continents via cables on the floors of the ocean. These three systems of communications all required the use of conducting metal wires. A revolution in wireless telecommunications began in the first decade of the 20th century, with Guglielmo Marconi winning the Nobel Prize in Physics in 1909 for his pioneering developments in wireless radio communications. Other early inventors and developers in the field of electrical and electronic telecommunications included Samuel F.B. Morse, Edwin Armstrong, Joseph Henry, and Lee de Forest (who invented the triode) of the United States, as well as John Logie Baird of Scotland, Nikola Tesla, an Serbian emigrant to the United States, and Alexander Graham Bell of Scotland, who lived in Canada, and then invented the telephone in the United States.
  • 22. 22 The Limits of Cyber-Revolutions Revolutions remain a tricky business. Even as social-networking sites have changed the way insurrections are built, the daily headlines from the Middle East are a reminder that a robust Twitter following and a widely followed Facebook group are only half the battle. At some point, an uprising, to truly be one, needs a physical staging ground. And whatā€™s gone underappreciated this Arab Spring is just how much hangs on what happens as protests make the jump from virtual to actual, old-fashioned public spaces. In Egypt, that of course happened at Tahrir Square. When Ismail the Magnificent ordered the redesign of Cairo in the second half of the nineteenth century, he created broad boulevards and public squares inspired by Haussmannā€™s Paris, where heā€™d received his educationā€”a layout that had the benefit of allowing the military to move swiftly through the city to stamp out unrest, per Haussmannā€™s intent.ā€ So when Egyptian dissidents, following extensive online preparations, began to reclaim Tahrir for the public on January 25ā€”and then ignored the curfews and the commands to return to workā€”their actions were much more than symbolic. Without the ability to control space, Mubarak suddenly could not govern.
  • 23. 23 Syrian president Bashar al-Assad no doubt took note of the events in Cairo; more brutally than Mubarak would dare (or at least more brutally than the Egyptian Army would go along with), he has enforced his countryā€™s emergency laws, his troops arresting protesters to try to clear the public spaces surrounding Umayyad Mosque in Damascusā€” and, elsewhere, firing into peaceful crowdsā€”and send that countryā€™s nascent rebellion back to its computers. In Bahrain, King Hamad bin Isa Al Khalifa has gone so far as to bulldoze the 300-foot monument at the center of Manamaā€™s Pearl Square, hoping that might defuse the revolutionary yearnings of the young people encamped around it. Libyaā€™s rebels, meanwhile, have their strip of shoreline in Benghazi, spared for now from Qaddafiā€™s forces by coalition airstrikes. But theyā€™ve said they have no desire to make that city a confederate capital. Victory will come only when they can safely mass in Tripoliā€™s Green Square.