To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Critics from across the political spectrum attack social media platforms for invading personal privacy. Social media firms famously suck in huge amounts of information about individuals who use their services (and sometimes others as well), and then monetize this data, primarily by selling targeted advertising. Many privacy advocates object to the very collection and use of this personal data by platforms, even if not shared with third parties. In addition, there is the ongoing (and reasonable) concern that the very existence of Big Data creates a risk of leaks. Further, aside from the problem of Big Data, the very existence of social media enables private individuals to invade the privacy of others by widely disseminating personal information. That social media firms’ business practices compromise privacy cannot be seriously doubted. But it is also true that Big Data lies at the heart of social media firms’ business models, permitting them to provide users with free services in exchange for data which they can monetize via targeted advertising. So unless regulators want to take free services away, they must tread cautiously in regulating privacy.
This an assessment of the main themes and arguments of the book. Looking back at Brexit, what is most striking is the subsequent economic decline of the UK – a consequence of Leave demagogues diverting voters’ attention from economic risks. Brexit’s populism was a manifestation of the Europe-wide rise of identitarian politics, the normalisation of national populism and the drift toward authoritarianism. These trends went with viewing the world as a collection separate sovereign nation states. A national population was imagined as a homogeneous mass, potentially embodied in a single sovereign leader. Seeing nations as separated entities brings a focus on foreign others, exemplified in the Brexiters’ fixation on immigration into the UK. Demagoguery, bound up with ‘post-truth’ culture, is used as an explanatory concept throughout this book, but requires redefinition in the age of mass media, data collection and psychological profiling. The most important conclusion is that Brexitspeak, Brexit policies and Brexit attitudes in government constitute threats to representative democracy, foreshadowed in the referendum process and actions by post-Brexit governments.
The globalisation of political technology techniques happens through the circulation of personnel (like Paul Manafort), distance learning and common technologies. Certain states are hub states, both importing and exporting political technology, like Hungary, the United States and Ukraine. Many political consultancy companies (Cambridge Analytica) or even mercenary groups (Wagner) are in fact political technology wholesalers.
This chapter addresses autonomy’s role in democratic governance. Political authority may be justifiable or not. Whether it is justified and how it can come to be justified is a question of political legitimacy, which is in turn a function of autonomy. We begin, in section 8.1, by describing two uses of technology: crime predicting technology used to drive policing practices and social media technology used to influence elections (including by Cambridge Analytica and by the Internet Research Agency). In section 8.2 we consider several views of legitimacy and argue for a hybrid version of normative legitimacy based on one recently offered by Fabienne Peter. In section 8.3 we explain that the connection between political legitimacy and autonomy is that legitimacy is grounded in legitimating processes, which are in turn based on autonomy. Algorithmic systems—among them PredPol and the Cambridge Analytica-Facebook-Internet Research Agency amalgam—can hinder that legitimation process and conflict with democratic legitimacy, as we argue in section 8.4. We conclude by returning to several cases that serve as through-lines to the book: Loomis, Wagner, and Houston Schools.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.