MODELLO PER LA STRUTTURAZIONE SU FILE WORD DELLE NOTIZIE DA INSERIRE NEL DATABASE

 

Materia o Classe Tematica (da scegliere dalla lista): hacktivism

Tipologia o genere (da scegliere dalla lista): Sociologia e politicalibro

Argomento Principale (max. 35 caratteri): Cyberpower [questo argomento non è presente nel THESAURUS, quindi devi segnalare la cosa nel campo VARIE]

Argomento secondario 1 (max. 35 caratteri): Critica di Adrian Mihalache[qui devi scrivere ciò che è l’argomento della critica. Attenzione devi usare solo una parola (o poco più). Non deve essere una frase, ma una parola chiave]

Argomento secondario 2 (max. 35 caratteri): Critica di Sara Steinidem

Argomento secondario 3 (max. 35 caratteri): Risposta di Tim Jordanidem

Persona o gruppo/collettivo (max. 35 caratteri): Adrian Mihalache Adrian [prima il cognome  e poi il nome], Sara Stein Sara, Tim Jordan Tim

 

Autore (max. 35 caratteri): Tim Jordan Tim


Titolo (max. 100 caratteri): Le recensioni di Adrian Mihalache e Sara Stein [a che cosa???]e la risposta di Tim Jordan

[in ogni caso mi sembra che il testo parli di “Cyberpower: The Culture and Politics of Cyberspace and the Internet” e dunque quello potrebbe essere il TITOLO, mentre quello che tu hai scritto qui sopra (completandolo meglio) potrebbe essere la DESCRIZIONE BREVE. Ciò che si deve capire dal TITOLO e DESCRIZIONE BREVE è che la notizia contiene recensioni, e risposta, del libro di Jordan]

Data dell'evento (max. 4 caratteri): 2000

Luogo dell'evento (max. 35 caratteri): USA

Descrizione breve (max. 255 caratteri):

Secondo la critica di Adrian Mihalache,Tim Jordan fa una distinzione interessante fra Cyberspace  Internet e lo spazio informativo dei flussi; nel senso che il Cyberspace include  Internet e lo spazio dei flussi ma include un certo numero di altre reti che non possono essere collegate ad Internet e contiene le risorse che non fanno parte dello spazio dei flussi indagando così ad esempio il campo dell’alimentazione.

Dal punto di vista di Sarah Stein i modelli di vita virtuale sono l'argomento del  Cyberspace di Tim Jordan il quale li descrive come una cartografia delle alimentazioni che circolano con le vite virtuali e come una tabella delle forze che modellano la politica, la tecnologia e la coltura delle società virtuali.

L’autore del testo sostiene che le autrici trattano il  Cyberspace come una sorta di manuale ed entrambe esplorano i problemi con troppa semplificazione. Ma ci sono contraddizioni nelle loro descrizioni perché il libro non è stato scritto come manuale  ma per essere accessibile e per mantenere il  Cyberspace al centro dell’attenzione. Poichè le note delle due autrici lo fanno apparire come un manuale e non come un testo introduttivo ai concetti chiave del cyberspace, l’autore desidera confermare che ha scritto un libro ambizioso nel tentativo di affermare il concetto di alimentazione  all'interno del Cyberspace e di Internet ed esprimere queste idee perchè la maggior parte della gente possa leggerle.[riduci. Max. 255 caratteri. Questa interessante sintesi che hai fatto è un lavoro in più che non avevo richiesto. Dato che lo hai fatto potresti comunque inserirlo all’inizio del campo TESTO]

 

 

Dati bibliografici o fonte bibliografica della notizia (max. 255 caratteri):

http://www.google.it/search?hl=it&lr=&ie=UTF-8&oe=UTF-8&q=Tim+Jordan,+Cyber+power:+The+Culture+and+Politics+of+Cyberspace+and+the+Internet,+London+and+New+York:+Routledge+1999&spell=1Cyberpower: The Culture and Politics of Cyberspace and the Internet

Varie o autore dell'inserimento (max. 255 caratteri): Mario Rossi, mariorossi@topolinia.it argomento mancante: Cyberpower

Testo (max. 64.000 caratteri):


      Cyberpower: The Culture and Politics of Cyberspace and the Internet

 

      Author: Tim Jordan

      Publisher: London and New York: Routledge, 1999

      Review Published: October 2000

 

 

      REVIEW 1: Adrian Mihalache

 

      Tim Jordan's view on "power" is systemic and structural: according to him,

      "power" is the name applied to that which structures culture, politics,

      and economics (1). Without the "lines of force," any field -- be it

      magnetic, electric, social, or other -- would be devoid of form. Power is,

      consequently, related to information because it in-forms; it provides a

      pattern for the contradictory and interdependent actions that take place

      in a specific area. The area Jordan selects for his approach is cyberspace

      and his book is an attempt to "chart the forces that pattern the politics,

      technology and culture of virtual societies" (3). He makes clear cut

      distinctions between (a) "power" from the individual viewpoint, which

      involves fluid identities, the restructuring of hierarchies and

      informational constructs, (b) "power" at the social level, including

      wired-rules within on-line communities and on-line/off-line communication

      protocols, and (c) "power" at the imaginary level, that is, the dominant

      metaphors, dreams and stories that deal with "power."

 

      The first chapter examines three theories of power which Jordan thinks

      relevant in the context: Max Weber's concept of power as a possession of

      the individuals, Barry Barnes' one of power as the constituent of social

      order, and Michel Foucault's power as domination. While Weber's position

      stands clearly apart, the other two seem somewhat overlapping at first

      sight. However, the final distinction provided by Jordan is satisfactory:

      "Foucault argues that attempting to define power in the abstract is not

      necessary; instead a methodology for studying power is needed. [. . .]

      Foucault considers whether power should be studied as a relation or as a

      possession, while Barnes and Weber analyze whether power is a relation or

      a possession" (19, my own highlight).

 

      In Chapter 2, cyberspace is analyzed from the perspective of cyberpunk and

      from the development of its underlying infrastructure. He reminds the

      reader that Internet was developed from the ARPA project of building up a

      distributed computer network that would survive partial destruction in the

      case of a nuclear attack. As a result, a myth of the intrinsic

      anti-hierarchical nature of cyberspace was born, clearly contradicted by

      the present-day centralized management of the assignment of IP numbers and

      names (41). However, Jordan does not get into the political controversy

      that the role of ICANN triggered in and out of cyberspace. As far as the

      intuitive perception of the latter is concerned, Jordan believes that its

      "spatial" features resulted form joining together "the visions of

      cyberpunk to the reality of networks," thus creating "a concept of

      cyberspace as a place that currently exists" (56).

 

      Chapter 3 examines the issues concerning individual powers in cyberspace.

      Three aspects are enumerated as worth examining: identity fluidity,

      anti-hierarchism and information as reality (65). Jordan realizes that

      "online characters are constructed and judged through a number of markers

      that replace offline ones: addresses, handles, signatures, self-portraits

      and styles" (79). However, whether the style works or not, whether it is

      in fact a "correct" style, is determined by others (71). While the

      people-on-the-net went cyber in order to escape the stifling power

      relationships from "real life," cyber-behavior does not fail to induce new

      such relationships. Jordan examines one specific behavior, the "trolling,"

      which consists of posting unobviously false statements in order to make

      fun of those who take them at their face value. He notes that "when

      trolling is used systematically to establish boundaries between those who

      can recognize and enjoy a good troll from those who cannot, then a system

      of dominance appears out of the individual actions of those able to

      indulge in trollingbecause of the powers they possess in cyberspace"

      (88-89). He also mentions how legislation from off-line tries to limit

      individual power on-line (95), but does not delve into the subject.

 

      Chapter 4 takes up "The Virtual Social." When examining the social in

      cyberspace, Jordan is aware of "the constant oscillation felt by users of

      technology between operating technology as an inert, asocial 'thing' and

      manipulating technology according to alive, social 'values'" (100-101). He

      argues that social power in cyberspace is a Foucauldian form of power; it

      is made up of networks of dominated and dominator (104). The substance of

      the chapter is dedicated to the wired rules that induce relationships of

      power in cyberspace without people even realizing it. The analysis of the

      inherent regulating power of advanced information technology would have

      been outstanding, had it not been better deployed in Lawrence Lessig's

      excellent book, although more recent than Jordan's, Code and Other Rules

      of Cyberspace [Reviewed by RCCS in August 2000], Jordan tells Lessig's

      story in a more muddled way. However, he is the first to tell it.

 

      In this "social" chapter, the author also takes up the issue of property

      in cyberspace and rallies to the common opinion of the irrelevance of

      property concepts in relation to informational products. He quotes John

      Perry Barlow, the author of the "Cyberspace Manifesto" saying that:

      "Property (tangible) can be taken from you. [. . .] If I own a horse and

      you steal it, I can't ride it any more and its value has been lost to me.

      But if I have an idea and you steal it, not only do I still have the same

      idea, but the fact that two people now have the idea makes it

      intrinsically more valuable (116).

 

      This reasoning is as false as it is elementary, since giving information

      away necessarily involves a loss for the supplier, who loses his or her

      competitive edge with respect to the receiver. It is true that, at his

      turn, he may access freely more information than he is ever capable of

      supplying, but this is another matter worth looking into which Jordan

      overlooks. Moreover, the fact that the book as a knowledge repository was

      the first form of commodity also suggests that the issues of information

      property are more complex than Jordan's philosophy dreams of. The

      references to Microsoft's case (126) are, of course, obsolete, as any such

      examples from the immediate are bound to be. For example, Lessig's

      analysis of W2K suffers from the same cause. The conclusion of this

      section has the authority of the obvious: "creating greater complexity in

      the underlying technology of cyberspace distances individual users from

      cyberspace's fundamental fabric and transfers control of that fabric to an

      expertise-based elite (130).

 

      Chapter 5 examines the social at the border between online and offline.

      This is a good opportunity for the author to state his views on

      globalization, and to draw a line between global and planetary. He

      describes the four categories of workers that globalization brings about:

      high-value producers, high-volume producers, raw materials producers, and

      redundant producers (143-144). Information has become both the central

      resource for and the key driving force of socio-economies. The human mind

      is a direct productive force, not just a decisive element of the

      production system. Consequently, offline production, consumption, and

      politics rely on cyberspace, the territory par excellence where symbols

      are manipulated and information is processed. As a result, "governments

      legislate about cyberspace, corporations build and rebuild it to their

      design, politicians apply it to electioneering and consumers demand its

      support" (144). However, cyberspace is not just a function of offline

      life, but has created its own social structures and forms of community.

      Hence, possible conflicts between online and offline, which have to be

      managed and kept within control. The main differences are, for the time

      being, ideological. Freedom, for instance, is rarely mentioned in

      mainstream media anymore, but it is ferociously defended -- and exercised

      daily -- on the Net (163). As Jordan puts it, "for democratic politicians

      to gain power they must receive the votes of people whose main, if not

      sole, source of information about the politics comes from the media,

      hence, the media (and, among them, web-based multimedia) fashion the

      politics" (165).

 

      Jordan makes an interesting distinction between cyberspace, the Internet,

      and the informational space of flows. "Cyberspace includes the Internet

      and the space of flows but it also includes a number of other computer

      networks that may not be connected to the Internet and contains resources

      that are not part of the space of flows (for instance MUDs). The space of

      flows includes all parts of cyberspace and the Internet that contribute to

      the three core elements of the space of flows: global, real-time,

      never-ending" (170-171). Also, "the space of flows is, consequently, the

      peculiar set of abilities to manipulate information that cyberspace offers

      to offline space" (171).

 

      When examining the alliances and conflicts between offline and online

      elites, Jordan claims that cyberspace, just like any other "Frontier"

      society, has no need for government because "social relations in such

      cases are either freely chosen or are a response to basic human needs"

      (174). This is a utopian argument, already convincingly overruled by

      Lessig's analyses.

 

      In chapter 6, "The Virtual Imaginary," Jordan attempts to tackle power at

      the imaginary level, but does not get beyond such cultural constructs as

      "Utopia and Dystopia," "Cyberspace as Heaven," "Cyborgs" and "Bots" as

      mutants, the first indigenous species of cyberspace, and so on. He ends

      his book with the pertinent observation that "the imaginary does not so

      much connect to the individual and the social as permeate them (212).

 

      Tim Jordan's Cyberpower was written as a textbook and, as such, it has the

      qualities and the defects of such an enterprise. It sacrifices complexity

      to clarity, depth to breadth, originality to completeness. However, it is

      a comprehensive attempt, the first to raise and to analyze some important

      issues on the circuits of power in cyberspace.

 

      Adrian Mihalache:

      Adrian Mihalache is a professor at the Politehnica University in

      Bucharest, Romania, where he teaches Applied Statistics, Reliability

      Theory, Total Quality Management, and Communication Skills. Presently, he

      is a Fulbright Scholar at Western Michigan University, where he is

      involved in the research project "Information Quality Assessment and

      Cultural Diversity Promotion on the WWW." His work on cyberculture is

      based on anthropologic fieldwork methodology and together with professor

      Arthur Helweg, he is working on the book, "Ethnology of Cyberspace," to be

      completed next summer.

 

 

 

 

 

 

      REVIEW 2: Sarah Stein

 

      The patterns of virtual life are the subject of Tim Jordan's Cyberpower, a

      "cartography of the powers that circulate through virtual lives, a chart

      of the forces that pattern the politics, technology and culture of virtual

      societies" (3). This is an accessible and useful work that would fit in

      well to an undergraduate course with a cultural studies approach to

      cyberspace. Organized much like a textbook, each chapter begins with

      several key concepts and definitions elaborated further in the pages that

      follow. A brief glossary of computer culture acronyms is included at the

      end. Sprinkled throughout the book are nine "myths of the electronic

      frontier," that the author recounts as "founding morality tales of

      cyberspace." Jordan's retelling of these cyber-legends includes the moral

      lessons he believes they impart.

 

      The concept of cyberpower is discussed on three levels: the individual,

      the social and the imaginary. The first chapter, "Power and Cyberspace,"

      presents three theoretical frameworks for analyzing power. Jordan states

      that he will address these uncritically, as his aim is to introduce models

      for the analysis of forces that structure cyberspace, rather than engage

      all the problematics of the nature of power itself. He offers brief

      summaries of power as a possession (Max Weber), power as constitutive of

      social order (Barry Barnes), and power as domination (Michel Foucault). He

      ends the chapter with several questions that could be useful in triggering

      discussion among students.

 

      Chapter Two, "Cyberspace and the Matrix," looks at science fiction, the

      actual state of networked computers, and the way these discourses combine

      to produce cyberspace as it is currently lived and understood. Science

      fiction, and in particular cyberpunk, is addressed both as fiction and in

      its claims as social criticism. Jordan follows with the contemporary

      reality of computer networks, with useful sections on the history of the

      Internet and studies on the demographics of Internet use. The first of the

      nine electronic frontier myths appears here, as Jordan cites studies that

      debunk the widely reported notion that ARPANET was designed initially as a

      communications network in the event of nuclear war. The chapter concludes

      by setting the foundation for the rest of the book: "We do not have

      cyberspace as Gibson described it and we do have a computer network that

      can just about be described. Between the two has emerged a social,

      cultural, economic and political space of virtual human interaction -- a

      real cyberspace" (55). From here, Jordan moves to the topic of the

      remaining chapters, power as it sustains and constrains virtual lives and

      possible virtual futures.

 

      Chapter Three, "The Virtual Individual," looks at experiences in virtual

      communities such as the WELL and in MUDs and MOOs. It discusses the

      components of online life in terms of identity fluidity, its

      anti-hierarchical nature, and its constitution by information. Cyberpower

      understood as personal empowerment and the issues of access and online

      rights that result from this concept of power are addressed. The

      discredited Carnegie-Mellon pornography on the Internet study is described

      to lead into a discussion on cyberpolitics, particularly those of free

      speech and censorship. Power, as the experience of cyberspace, is examined

      here in the Weberian sense of individual possession. The chapter concludes

      with a discussion of the limits of understanding cyberpower at the

      individual level, and moves toward cyberpower as a collective force.

 

      Chapter Four and Chapter Five deal with the virtual social. Jordan

      reverses his earlier focus: "Rather than individuals founding societies,

      now societies will be the foundation for individuals" and asks what forms

      of cyberpower appear in online societies (102). The first chapter,

      defining social power in cyberspace as technopower, explores the concept

      of "neutrality" in relation to technological tools and the social values

      embedded in the design and construction of those tools. Jordan applies

      Barnes' and Foucault's theories of power to this notion of technopower,

      using the LambdaMOO virtual rape as told by Julian Dibbell as a case in

      point. He considers the technopower of cyberspace in terms of information,

      information overload, and technoelites (corporate and individual),

      exploring cyberpower as "patterns of social relations that create systems

      of domination, whose articulation in cyberspace fuels an ever more

      dominant elite" (141).

 

      Chapter Five furthers the analysis of the virtual social by exploring

      cyberpower as it appears in the intersections of offline and online

      societies, between virtual life and real life: "Cyberpower of the social

      here pursues the nature of power that both allows cyberspace to reach

      across into offline life and answers demands made on cyberspace by offline

      life" (143). Jordan classifies the three areas of production, consumption,

      and politics as those in which cyberspace has already played a crucial

      role in offline life, in the "space of flows" of informational

      socio-economies. The myth investigated in this chapter is the metaphor of

      the frontier, allowing for a fundamental conception of virtual life as a

      place: "Grasping cyberspace as a place allows notions of control and

      domination of purchase on the virtual lands. The informational space of

      flows becomes something that elites and the grassroots can try to control

      'as their own'" (176).

 

      Chapter Six, "The Virtual Imaginary" examines the utopian and dystopian

      imaginary sides of cyberspace, the immortality of the cyborg versus the

      "Superpanopticon" of total surveillance. Hans Moravec's fantasy of the

      human consciousness downloaded into a robot body is discussed, as is Donna

      Haraway's initial vision of cyborg consciousness. Jordan concludes by

      arguing that the effect of cyberspace's imaginaries of the future is to

      drive work and the formation of social bonds in the present and "in doing

      so, constitutes a third circuit of power coursing through the virtual

      lands. The imaginary binds the virtual social order [and] . . . creates

      the possibility of virtual community" (207). Finally, Jordan's Chapter

      Seven provides a summary of the theoretical frameworks of power he has

      used and a discussion of libertarianism on the Net that fuses individual

      liberty with free market forces.

 

      Cyberpower is successful in driving home the complexity of issues of power

      in relation to cyberspace, and the ongoing struggle between individuals

      and the "cyber-elites" to control it. As an introductory text for

      undergraduates and interested publics, Cyberpower draws together many of

      the significant voices and events that have shaped cyberdiscourse over the

      past decade. Certainly, a reading of this volume would dispel any notions

      that virtual life is transparent, one of unconflicted good or evil.

 

      My criticisms have to do with the author's attempts to cram everything

      that has or can be said about cyberspace into this one text. His chapters

      on the virtual social are dense and sometimes impenetrable, especially in

      the awkward choice of phrases such as "informational space of flows." I

      also found that Jordan's "myths of the electronic frontier" were

      confusingly framed and could have used better explication (perhaps the

      inclusion of Barthes' views on the naturalization of ideological myths

      would have been useful). It didn't help that Jordan's first use of a myth

      was to debunk the popular version of ARPANET origins, while later myths

      were validated accounts used to exemplify the cyberlore that form

      foundational principles of virtual life. But I would recommend Cyberpower

      for seminars aimed at introducing issues of power and the intricate

      interrelatedness of the individual and the social, current realities and

      future visions that continually construct cyberspace.

 

      Sarah Stein:

      Sarah Stein is an assistant professor in the Department of Communication

      at North Carolina State University. She teaches media theory and criticism

      as well as film, video and digital media production. Her research is in

      the areas of visual communication and digital culture. 

      <sstein@unity.ncsu.edu>

 

 

          

UTHOR RESPONSE: Tim Jordan 

 

 

Reviews are like buses . . .

You wait ages for a review of the book you've laboured hard to produce and then two come

along at once. I found both reviews enlightening and only occasionally in the sense that

they found things in my book that I didn't realise were there. There are some related issues

that cross between the two and then a number of more particular points I'd like to respond

to as briefly as I can make myself.

Both authors treat Cyberpower as a text-book and both explore problems of over-complexity

and over-simplification. There are contradictions in their characterisations here.

Cyberpower was not written as a text-book (though I'm not sure how my publisher is

characterising it in North America); it was written to be accessible and to keep cyberspace

at the centre of the picture. As reviewers note, there are some 'text-book' features such as

key concepts but they don't define the text as introductory. I wanted to write a book that

was ambitious in its attempt to grasp power within cyberspace and the Internet and to

express these ideas in ways most people could read. This of course makes it possible that it

will be used as a text-book, which makes my publisher and me quite happy, and where

'text-book' really means 'accessible' then I am grateful for the reviewers' high praise.

However, there is a contradiction between seeing Cyberpower as the first comprehensive

attempt to 'raise and analyze some important circuits of power in cyberspace,' as Mihalache

does, and treating it as a text-book that is over-simplistic. I feel the reviewers'

assumption that Cyberpower is a text-book gets in the way of an assessment of theoretical

innovations I've attempted and that these innovations get little direct treatment. One

example is the failure in both reviews to explore the pivotal (to me) attempt to define the

reasons why cyberspatial technology is constantly spiralling upwards in complexity and how

this results in the simultaneous empowerment and disempowerment of both the digital

grassroots and digital elites. Of course, as reviewers they have limited space but it was

disappointing to see confusion in which my sins are to be both over-simple and over-complex.

Apart from the comments just made, I found little to disagree with in Sarah Stein's review.

She has not presented the more complex ideas within each chapter but has outlined the broad

area of each chapter. Her criticism that there is too much content is interesting; I had

made an effort to ensure there were stories and empirical support for all claims and perhaps

this is the source of the problem. I was puzzled why it is a problem to begin with a myth of

the electronic frontier that is factually untrue as I clearly say that the factual status of

a myth is irrelevant to the myth's function.

Adrian Mihalache's review also raises some interesting questions and a number of points with

which I disagree. In particular, towards its end it seems exhausted with itself and makes a

number of, to me, misguided comments. I will deal with these at the end of my contribution,

I hope all readers who read Mihalache's review will ensure they read my second to last

paragraph as well. First, I feel Mihalache is unfair in several times taking an

anachronistic approach to my book. ICANN and Lessig are used as examples when they would

have been difficult for me to discuss. Though Mihalache notes this of Lessig he uses that

author twice and at no point is fair enough to tell the reader that this review comes nearly

eighteen months after publication of my book. Second, and without wishing to attack Lessig's

book in anyway, I feel Mihalache does not present the detail of my argument in a way that

allows comparison to Lessig's on power in cyberspace and that my argument is substantially

different. Most important, though Mihalache presents the notion of technopower (not my

invention but drawn from a wide range of work), he does not present the particular nature of

technopower in cyberspace that I theorise. This is an ever-spiralling dance between

grassroots and elites in which elites, through their control of technology or the fabric of

cyberspace, both create tools that empower grassroots individuals and enhance the elite's

control of cyberspace. The statement Mihalache quotes may have the 'authority of the

obvious' but it does have a significantly more complex explanation than is allowed for in

the review. Sadly, academia is not like the Olympics and while I don't mind being first I'd

rather have my ideas presented clearly.

Third, Mihalache interestingly takes issue with the notion that information can be given

away without loss to the giver. His own reasoning seems to depend on the fact that giving

away information means the giver loses their competitive edge. First, the point in the

section of Cyberpower being discussed related to the distinction between material and

immaterial goods. In this context, Mihalache's criticism does not work as it simply is the

case that you can give an idea away and keep it whereas you cannot give your horse or stereo

or car or book away and keep it. Mihalache's criticism here is unfair in its failure to take

account of the specific argument at stake. However, it is an interesting general point and

within the category of immaterial goods like ideas, is it possible for there to be

competitive advantage through secrecy? Of course this would seem true in some cases (though

no criticism of my own argument because I was dealing with the distinction between

immaterial and material goods). What Mihalache does not seem to allow for is that the

opposite is quite possibly just as true. The multiplication of certain immaterial goods such

as software can enhance not undermine the value of my particular copy. If I am the only one

with an email programme what is it worth? But if I copy it to many other people who then

also use it, my programme is quite likely worth more to me? These are interesting questions

and Mihalache provides a beginning point for their discussion.

Finally, Mihalache's review contains a couple of sections near the end that are dismissive

and misleading. The most important claim that seriously misrepresents my arguments paints me

as a libertarian simpleton. Mihalache argues Lessig has already over-ruled my utopian case

that cyberspace is a frontier in which government is not needed. First, I hold my hand up I

had not taken into account Lessig's arguments published only a year after my own -- my

crystal ball was clearly on the fritz. But, putting that aside, the more important point is

that I do not argue as Mihalache suggests I do. The section being referred to comes from an

examination of the myth of frontier as applied to cyberspace and it notes two

interpretations of this myth, though Mihalache only mentions one. One interpretation claims

the frontier is a place of community beyond government and the other that frontiers are

places of colonialism and conquest. I explicitly hold up people's accounts to explore what

such seemingly opposed versions might have in common. Mihalache drags these arguments out of

context, entirely ignoring the fact that I explicitly address flaws in the libertarian

utopian conception of the electronic frontier. I do not endorse the libertarian utopia of

the frontier or argue it is true but explore how it and conceptions of the frontier as a

place of rapine, conquest, and death might be related and what that says about cyberspatial

conceptions of the electronic frontier. The second major difficulty I find with this review

is Mihalache's throwaway paragraph on my analysis of the imaginary. This paragraph bears

little resemblance to the actual chapter and its ideas (nor does the book end on p.212 with

the words Mihalache quotes). I can only ask readers to ignore the second to last paragraph

of this review.

I feel honoured for Cyberpower to be included within Resource Center for Cyberculture

Studies excellent series of reviews. I hope my own, Stein and Mihalache's views on my book

make it seem worth a look.

 

Tim Jordan


Email (max 35 caratteri): T.R.Jordan@open.ac.uk

Sito web (max 50 caratteri): http://www.google.it/search?hl=it&lr=&ie=UTF-8&oe=UTF-8&q=Tim+Jordan,+Cyber+power:+The+Culture+and+Politics+of+Cyberspace+and+the+Internet,+London+and+New+York:+Routledge+1999&spell=1