Short Story (3)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 20 min
- Cory Doctorow
- 2014
Short Story outlining the breakdown of economic systems and the invasion of privacy when a private company becomes an arm of the state.
- Cory Doctorow
- 2014
-
- 20 min
- Cory Doctorow
- 2014
Scroogled
Short Story outlining the breakdown of economic systems and the invasion of privacy when a private company becomes an arm of the state.
How realistic does this story seem to you? Who gains the most power from digital information? What incentives do corporations have to protect user privacy? What incentives do users have to protect their own privacy?
-
- 20 min
- MIT Press
- 2018
Lilith, a contract laborer, ends up in a dangerous situation when the self-driving ship she rides malfunctions. Kyleen, a human who has undergone a human-editing networking process called “meshing,” is able to control a proxy robot via a brain-computer interface to help Lilith get to her destination safely.
- MIT Press
- 2018
-
- 20 min
- MIT Press
- 2018
Robotic Proxies and Telepresence: “Different Seas” by Alastair Reynolds
Lilith, a contract laborer, ends up in a dangerous situation when the self-driving ship she rides malfunctions. Kyleen, a human who has undergone a human-editing networking process called “meshing,” is able to control a proxy robot via a brain-computer interface to help Lilith get to her destination safely.
How can robotic proxies be helpful to people in danger? Who should be allowed or certified to operate these, in theory? How might these be implicated in inequitable class structures, as outlined in the story? Should humans be networked with machines, and would this really be to the ultimate benefit of humanity?
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
-
- 30 min
- UNIVERSITY OF WÜRZBURG GRADUATE SCHOOLS
- 1982
Cyberspace and Internet Imaginations: “Burning Chrome” by William Gibson
Hardware specialist Automatic Jack is roped into a dangerous hacking scheme with his partner Bobby Quine while they compete for the affections of Rikki. Their plan is to use deadly malware to infiltrate the protections of Chrome, a mysterious overlord of cyberspace who hoards massive amounts of wealth. They enact this plan by entering cyberspace within a program and visualizing the data held within this digital network which connects people all across the globe.
How can malware be used for good, and when should it be used for good? How do imaginations of the internet influence how people perceive this mysterious yet pervasive network? In what ways would making aspects of the internet into tangible images help people understand it better? How should the most powerful stakeholders in a given digital architecture be challenged? How might immersion into cyberspace give people more agency?