Brian Martin - Technology for Nonviolent Struggle

Здесь есть возможность читать онлайн «Brian Martin - Technology for Nonviolent Struggle» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: London, Год выпуска: 2001, ISBN: 2001, Издательство: War Resisters’ International, Жанр: Публицистика, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Technology for Nonviolent Struggle: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Technology for Nonviolent Struggle»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Organised nonviolent struggle, using methods such as strikes, boycotts and noncooperation, is a possible alternative to military methods. However, compared to military funding, there has been hardly any financial and organisational support for nonviolent struggle. Putting a priority on nonviolent struggle would lead to significant differences in technological development and scientific method. Research and development relevant to a number of areas — especially communication and survival — are assessed in terms of their relevance to nonviolent struggle. The findings are used to suggest how science and technology used for the purposes of war and repression can be converted most effectively to serve the purposes of nonviolent struggle.
Brian Martin

Technology for Nonviolent Struggle — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Technology for Nonviolent Struggle», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

17.

Thomas Icom, “Cellular interception techniques,” 2600 , Vol. 12, No. 1, Spring 1995, pp. 23-27.

18.

Caller number identification also raises issues concerning protection of personal data. Thus, it is possible that there could be friction between priorities on privacy and on nonviolent resistance. For a discussion of potential problems with surveillance in a social defence system, see Brian Martin, “Possible pathologies of future social defence systems,” Pacifica Review, Vol. 7, No. 1, 1995, pp. 61-68.

19.

On the early history of the British post office, including attempts to shut down alternative posts, see Herbert Joyce, The History of the Post Office from its Establishment down to 1836 (London: Richard Bentley and Son, 1893). On postal worker struggles in Britain, see H. G. Swift, A History of Postal Agitation from Fifty Years Ago till the Present Day (London: C. Arthur Pearson, 1900). For a comprehensive history of disputes in the US Congress over what things should be allowed to be mailed, censorship and wartime controls, see Dorothy Ganfield Fowler, Unmailable: Congress and the Post Office (Athens: University of Georgia Press, 1977). On government attempts to monopolise the post, see Carl Watner, “’Plunderers of the public revenue’: voluntaryism and the mails,” The Voluntaryist , No. 76, October 1995, pp. 1-7. A pilot study of the post in relation to social defence is reported in Alison Rawling, Lisa Schofield, Terry Darling and Brian Martin, “The Australian Post Office and social defence,” Nonviolence Today , No. 14, April/May 1990, pp. 6-8.

20.

See, among others, Ann Cavoukian and Don Tapscott, Who Knows: Safeguarding Your Privacy in a Networked World (New York: McGraw-Hill, 1997); Simon Davies, Monitor: Extinguishing Privacy on the Information Superhighway (Sydney: Pan Macmillan, 1996); David H. Flaherty, Protecting Privacy in Surveillance Societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States (Chapel Hill: University of North Carolina Press, 1989); Oscar H. Gandy, Jr., The Panoptic Sort: A Political Economy of Personal Information (Boulder, CO: Westview, 1993); Simson Garfinkel, Database Nation: The Death of Privacy in the 21st Century (Sebastopol, CA: O’Reilly & Associates, 2000); David Lyon, The Electronic Eye: The Rise of Surveillance Society (Cambridge: Polity Press, 1994); Gary T. Marx, Undercover: Police Surveillance in America (Berkeley: University of California Press, 1988).

21.

There is a vast body of writing about the net. Useful treatments of net culture include Wendy M. Grossman, Net.wars (New York: New York University Press, 1997); Howard Rheingold, The Virtual Community: Finding Connection in a Computerized World (London: Secker and Warburg, 1994).

22.

David S. Bennahum, “The Internet revolution,” Wired, Vol. 5, No. 4, April 1997, pp. 122-129 and 168-173.

23.

Bob Travica and Matthew Hogan, “Computer networks in the x-USSR: technology, uses and social effects,” in Debora Shaw (ed.), ASIS ’92: Proceedings of the 55th ASIS Annual Meeting, Vol. 29 (Medford, NJ: Learned Information, 1992), pp. 120-135.

24.

On hacking see the magazine 2600 and The Knightmare, Secrets of a Super Hacker (Port Townsend, WA: Loompanics, 1994).

25.

For the dabate over government-sponsored encryption, see Whitfield Diffie and Susan Landau, Privaacy on the Line: The Politics of Wiretapping and Encryption (Cambridge, MA: MIT Press, 1998) and Lance J. Hoffman (ed.), Building in Big Brother: The Cryptographic Policy Debate (New York: Springer-Verlag, 1995).

26.

See for example Simson Garfinkel, PGP: Pretty Good Privacy (Sebastopol, CA: O’Reilly & Associates, 1995).

27.

Richard B. Gregg, The Power of Nonviolence (New York: Schocken Books, 1966); Krishnalal Shridharani, War without Violence: A Study of Gandhi’s Method and its Accomplishments (London: Victor Gollancz, 1939).

28.

M. K. Gandhi, An Autobiography or the Story of my Experiments with Truth (Ahmedabad: Navajivan Press, 1927).

29.

According to a constructivist perspective, “truth” is always based on human interests rather than objective reality, and hence is more problematical than Gandhi believed. But for this outline of his ideas, “truth” is used without quotes.

30.

See V. V. Ramana Murti, “Buber’s dialogue and Gandhi’s satyagraha,” Journal of the History of Ideas , Vol. 29, No. 4, 1968, pp. 605-613. I thank Tom Weber for pointing out this reference.

31.

Robert A. Bode, “Gandhi’s theory of nonviolent communication,” Gandhi Marg, Vol. 16, No. 1, April-June 1994, pp. 5-30.

32.

Note that feminists have criticised the Gandhian emphasis on suffering by nonviolent activists.

33.

Thomas Weber, “’The marchers simply walked forward until struck down’: nonviolent suffering and conversion,” Peace & Change , Vol. 18, No. 3, 1993, pp. 267-289.

34.

Johan Galtung, Nonviolence and Israel/Palestine (Honolulu: University of Hawaii Institute for Peace, 1989).

35.

Jürgen Habermas, The Theory of Communicative Action, Vol. 1. Reason and the Rationalization of Society (Boston: Beacon Press, 1984); Jürgen Habermas, The Theory of Communicative Action, Vol. 2. Lifeworld and System: A Critique of Functionalist Reason (Boston: Beacon Press, 1987).

36.

James C. Scott, Domination and the Arts of Resistance: Hidden Transcripts (New Haven, CT: Yale University Press, 1990).

37.

In the appendix, this terminology is explained in the context of theories of technology.

Notes to Chapter 6

1.

On energy vulnerability see Wilson Clark and Jake Page, Energy, Vulnerability, and War: Alternatives for America . New York: Norton, 1981; Amory B. Lovins and L. Hunter Lovins, Brittle Power: Energy Strategy for National Security . Boston: Brick House, 1982; James L. Plummer, ed., Energy Vulnerability . Cambridge, MA: Ballinger, 1982.

2.

See Colin Kearton and Brian Martin, “Technological vulnerability: a neglected area in policy-making”, Prometheus , vol. 7, no. 1, June 1989, pp. 49-60; Peter G. Neumann, Computer-Related Risks (New York: ACM Press, 1995).

3.

Brian Martin, “Technological vulnerability,” Technology in Society, Vol. 12, No. 4, 1996, pp. 511-523.

4.

Geoff Simons, The Scourging of Iraq: Sanctions, Law and Natural Justice (Basingstoke: Macmillan, 1998, 2nd ed.); Nikki van der Gaag (ed.), “Iraq: What United Nations sanctions have done” (theme issue), New Internationalist, No. 316, September 1999.

5.

David Cortright and George A. Lopez (eds.), Economic Sanctions: Panacea or Peacemaking in a Post-Cold War World? (Boulder: Westview Press, 1995).

6.

The contrast between UN inaction over Indonesia’s invasion and occupation and UN-sponsored action over Iraq’s invasion and occupation is striking.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Technology for Nonviolent Struggle»

Представляем Вашему вниманию похожие книги на «Technology for Nonviolent Struggle» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Technology for Nonviolent Struggle»

Обсуждение, отзывы о книге «Technology for Nonviolent Struggle» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x