In this Book

  • Critical Cyberculture Studies
  • Book
  • David Silver, Adrienne Massanari, Steve Jones
  • 2006
  • Published by: NYU Press
summary

Starting in the early 1990s, journalists and scholars began responding to and trying to take account of new technologies and their impact on our lives. By the end of the decade, the full-fledged study of cyberculture had arrived. Today, there exists a large body of critical work on the subject, with cutting-edge studies probing beyond the mere existence of virtual communities and online identities to examine the social, cultural, and economic relationships that take place online.

Taking stock of the exciting work that is being done and positing what cyberculture’s future might look like, Critical Cyberculture Studies brings together a diverse and multidisciplinary group of scholars from around the world to assess the state of the field. Opening with a historical overview of the field by its most prominent spokesperson, it goes on to highlight the interests and methodologies of a mobile and creative field, providing a much-needed how-to guide for those new to cyberstudies. The final two sections open up to explore issues of race, class, and gender and digital media's ties to capital and commerce—from the failure of dot-coms to free software and the hacking movement.

This flagship book is a must-read for anyone interested in the dynamic and increasingly crucial study of cyberculture and new technologies.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Copyright
  2. pp. iii-iv
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-viii
  3. restricted access
    • Download PDF Download
  1. Foreword: Dreams of Fields: Possible Trajectories of Internet Studies
  2. pp. ix-xviii
  3. restricted access
    • Download PDF Download
  1. Introduction: Where Is Internet Studies?
  2. pp. 1-14
  3. restricted access
    • Download PDF Download
  1. Part I: Fielding the Field
  2. pp. 15-16
  3. restricted access
    • Download PDF Download
  1. Chapter 1:The Historiography of Cyberculture
  2. pp. 17-28
  3. restricted access
    • Download PDF Download
  1. Chapter 2: Cultural Difference, Theory, and Cyberculture Studies. A Case of Mutual Repulsion
  2. pp. 29-36
  3. restricted access
    • Download PDF Download
  1. Chapter 3: How We Became Postdigital. From CyberStudies to Game Studies
  2. pp. 37-46
  3. restricted access
    • Download PDF Download
  1. Chapter 4: Internet Studies in Times of Terror
  2. pp. 47-54
  3. restricted access
    • Download PDF Download
  1. Chapter 5: Catching the Waves. Considering Cyberculture, Technoculture, and Electronic Consumption
  2. pp. 55-67
  3. restricted access
    • Download PDF Download
  1. Chapter 6: Cyberculture Studies. An Antidisciplinary Approach (version 3.0)
  2. pp. 68-76
  3. restricted access
    • Download PDF Download
  1. Part II: Critical Approaches and Methods
  2. pp. 77-78
  3. restricted access
    • Download PDF Download
  1. Chapter 7: Finding the Quality in Qualitative Research
  2. pp. 79-87
  3. restricted access
    • Download PDF Download
  1. Chapter 8: Web Sphere Analysis and Cybercultural Studies
  2. pp. 88-96
  3. restricted access
    • Download PDF Download
  1. Chapter 9: Connecting the Selves. Computer-Mediated Identification Processes
  2. pp. 97-106
  3. restricted access
    • Download PDF Download
  1. Chapter 10: The Structural Problems of the Internet for Cultural Policy
  2. pp. 107-118
  3. restricted access
    • Download PDF Download
  1. Chapter 11: Cultural Considerations in Internet Policy and Design. A Case Study from Central Asia
  2. pp. 119-128
  3. restricted access
    • Download PDF Download
  1. Chapter 12: Bridging Cyberlife and Real Life. A Study of Online Communities in Hong Kong
  2. pp. 129-139
  3. restricted access
    • Download PDF Download
  1. Chapter 13: Overcoming Institutional Marginalization
  2. pp. 140-158
  3. restricted access
    • Download PDF Download
  1. Chapter 14: The Vertical (Layered) Net. Interrogating the Conditions of Network Connectivity
  2. pp. 159-167
  3. restricted access
    • Download PDF Download
  1. Chapter 15The Construction of Cybersocial Reality
  2. pp. 168-178
  3. restricted access
    • Download PDF Download
  1. Part III: Cultural Difference in/and Cyberculture
  2. pp. 179-180
  3. restricted access
    • Download PDF Download
  1. Chapter 16: E-scaping Boundaries. Bridging Cyberspace and Diaspora Studies through Nethnography
  2. pp. 181-193
  3. restricted access
    • Download PDF Download
  1. Chapter 17: An Interdisciplinary Approach to the Study of Cybercultures
  2. pp. 194-204
  3. restricted access
    • Download PDF Download
  1. Chapter 18: An Action Research (AR) Manifesto for Cyberculture Power to “Marginalized” Cultures of Difference
  2. pp. 205-215
  3. restricted access
    • Download PDF Download
  1. Chapter 19: Cyberstudies and the Politics of Visibility
  2. pp. 216-227
  3. restricted access
    • Download PDF Download
  1. Chapter 20: Disaggregation, Technology,and Masculinity. Elements of Internet Research
  2. pp. 228-242
  3. restricted access
    • Download PDF Download
  1. Chapter 21: Gender, Technology, and Visual Cyberculture. Virtually Women
  2. pp. 243-254
  3. restricted access
    • Download PDF Download
  1. Part IV: Critical Histories of the Recent Past
  2. pp. 255-256
  3. restricted access
    • Download PDF Download
  1. Chapter 22: How Digital Technology Found Utopian Ideology. Lessons from the First Hackers’ Conference
  2. pp. 257-269
  3. restricted access
    • Download PDF Download
  1. Chapter 23: Government.com. ICTs and Reforming Governance in Asia
  2. pp. 270-278
  3. restricted access
    • Download PDF Download
  1. Chapter 24: Dot-Coms and Cyberculture Studies. Amazon.com as a Case Study
  2. pp. 279-293
  3. restricted access
    • Download PDF Download
  1. Chapter 25: Associating Independents. Business Relationships and the Culture of Independence in the Dot-Com Era
  2. pp. 294-308
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.