Philosophy Of The Information Age

Information, misinformation and fake news in the information age - the 21st century threatens to wreak havoc on the social organisation of information and knowledge. 

We are awash in a glut of information coming at us from all sources, some reliable, some unreliable. But the old top-down authorities that once functioned to certify some information as true and other information as false, are quickly being dismantled. 

How can we distinguish the good from the bad, the wheat from the chaff? We all face epistemological problems hardly imagined by our predecessors.

Finding a new basis for social identification. Distant and powerful forces, not answerable to local communities, shape so much of our lives. How can we sustain local communities, communities with which we can identify? 

Or in the new cyber age is the very idea of a local community an outmoded parochial idea suited only to centuries gone by?
The Mind-Body problem. Neuroscience is revealing so much about the brain. Does this new knowledge solve age-old mysteries of the mind? Or does it reduce the mind to mere dumb matter and rob us of what we once thought was so special about us?

Can freedom survive the onslaught of science? Science, especially neuro-science, is revealing more and more about the true workings of the mind, threatening to explode our ancient beliefs about things like the freedom of the will. 

Can traditional practices that, presuppose human freedom, survive this scientific onslaught? If we are not really free is it really permissible to punish people, and even put them to death, for their wrongful acts?

Intellectual property, in the age of re-mix culture. Ideas now spread like wildfire, mixing and re-mixing in the blink of an eye. Can the very idea of intellectual property survive in the age of re-mix? Are outmoded ideas of property stifling the growth of a new culture?

We need new models of collective decision making and collective rationality. Solving the problems of the 21st Century will require coordinated rational action on a massive scale. 

But we really have no models of collective rationality, no idea of the institutional, social, political and economic structures that will allow us to meet these challenges. 

Neouto

You Might Also Read

Does Fake News Affect Threat Intelligence?:

Algorithms: An Unseen Influence On The UK Election:
 

 

« US Spy Chiefs Look For UK Guidance On Cybersecurity
The Pentagon Puts Google’s AI To Use »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

National Defense Industry Association (NDIA) - USA

National Defense Industry Association (NDIA) - USA

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

Montimage

Montimage

Montimage develops tools for testing and monitoring networks, applications and services; in particular, for the verification of functional, performance (QoS/QoE) and security aspects.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

Hellenic Accreditation System (ESYD)

Hellenic Accreditation System (ESYD)

ESYD is the national accreditation body for Greece. The directory of members provides details of organisations offering certification services for ISO 27001.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

RELIANOID

RELIANOID

RELIANOID is an application delivery controller and load balancing system that ensures high performance and security of IT services on a massive scale.