Philosophy Of The Information Age

Information, misinformation and fake news in the information age - the 21st century threatens to wreak havoc on the social organisation of information and knowledge. 

We are awash in a glut of information coming at us from all sources, some reliable, some unreliable. But the old top-down authorities that once functioned to certify some information as true and other information as false, are quickly being dismantled. 

How can we distinguish the good from the bad, the wheat from the chaff? We all face epistemological problems hardly imagined by our predecessors.

Finding a new basis for social identification. Distant and powerful forces, not answerable to local communities, shape so much of our lives. How can we sustain local communities, communities with which we can identify? 

Or in the new cyber age is the very idea of a local community an outmoded parochial idea suited only to centuries gone by?
The Mind-Body problem. Neuroscience is revealing so much about the brain. Does this new knowledge solve age-old mysteries of the mind? Or does it reduce the mind to mere dumb matter and rob us of what we once thought was so special about us?

Can freedom survive the onslaught of science? Science, especially neuro-science, is revealing more and more about the true workings of the mind, threatening to explode our ancient beliefs about things like the freedom of the will. 

Can traditional practices that, presuppose human freedom, survive this scientific onslaught? If we are not really free is it really permissible to punish people, and even put them to death, for their wrongful acts?

Intellectual property, in the age of re-mix culture. Ideas now spread like wildfire, mixing and re-mixing in the blink of an eye. Can the very idea of intellectual property survive in the age of re-mix? Are outmoded ideas of property stifling the growth of a new culture?

We need new models of collective decision making and collective rationality. Solving the problems of the 21st Century will require coordinated rational action on a massive scale. 

But we really have no models of collective rationality, no idea of the institutional, social, political and economic structures that will allow us to meet these challenges. 

Neouto

You Might Also Read

Does Fake News Affect Threat Intelligence?:

Algorithms: An Unseen Influence On The UK Election:
 

 

« US Spy Chiefs Look For UK Guidance On Cybersecurity
The Pentagon Puts Google’s AI To Use »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Grimm Cyber

Grimm Cyber

GRIMM makes the world a more secure place by increasing the cyber resiliency of our client’s systems, networks, and products.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

DefenseStorm

DefenseStorm

DefenseStorm is a Security Data Platform that watches everything on your network and matches it to your policies, providing cybersecurity management that is safe, compliant and cost effective.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

DataTribe

DataTribe

DataTribe is a cyber startup foundry, leveraging deep experience and expertise to build and launch successful product companies.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

Accel

Accel

Accel is a leading venture capital firm that invests in people and their companies from the earliest days through all phases of private company growth. Areas of focus include cybersecurity.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Castlepoint Systems

Castlepoint Systems

Castlepoint Systems is a pioneer in information governance, risk and compliance as a service. An all-in-one solution offering powerful risk management, built in compliance, cybersecurity and audit.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.