Access the full text.
Sign up today, get DeepDyve free for 14 days.
K. Gallagher (1996)
Darwin’s Dangerous Idea: Evolution and the Meanings of LifeInternational Philosophical Quarterly, 36
(1997)
Cyberpunk as Social Theory: William Gibson and the Sociological Imagination
Jerry Kang, D. Cuff (2004)
Pervasive Computing: Embedding the Public SphereCenter for Embedded Network Sensing, 62
A. Galloway (2004)
Intimations of everyday life: Ubiquitous computing and the cityCultural Studies, 18
(2005)
Knowing Capitalism
D. Haraway (2013)
A Cyborg Manifesto
(2003)
Combat Zones that See (CTS)', Board Agency Announcement
(2006)
Hacker Cracks, Clones RFID Passport
(1997)
Virtual Culture, Urban Polarization and Social Science Fiction
N. Hayles (2005)
My Mother Was a Computer: Digital Subjects and Literary Texts
Jin Shin, Sang Kim (2006)
A Mathematical Theory of Communication
Roger Burrows, N. Ellison (2004)
Sorting Places Out? Towards a social politics of neighbourhood informatizationInformation, Communication & Society, 7
(2006)
RFID Passports Take Off’, C/NetNews.com (26 October), URL: http://news.com.com/RFID+passports+take+off/2100–7348_3–6130016.html?tag= st.ref.goo
A. Galloway (2001)
Protocol, or, How Control Exists after DecentralizationRethinking Marxism, 13
R. Pruett (2006)
Identification - Friend or Foe? The Strategic Uses and Future Implications of the Revolutionary New ID Technologies
N. Thrift (2004)
Remembering the Technological Unconscious by Foregrounding Knowledges of PositionEnvironment and Planning D: Society and Space, 22
M. Featherstone, Roger Burrows (1995)
Cyberspace/Cyberbodies/Cyberpunk: Cultures of Technological Embodiment
(2005)
Shaping Things
Charles Meadows (2010)
Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watch Your Every MoveJ. Assoc. Inf. Sci. Technol., 61
N. Gershenfeld (1999)
When things start to think
(1996)
Kinds of Minds: Toward an Understanding of Consciousness
Big Brother Gets a Brain
(2007)
Company Pushes FRID Implants for Immigrants, Guest Workers
M. Andrejevic (2003)
Monitored Mobility in the Era of Mass CustomizationSpace and Culture, 6
(2007)
Technological Platforms and the Layers of Patent Data', National Science Foundation Grant No
M. Bhuptani, S. Moradpour (2005)
RFID Field Guide: Deploying Radio Frequency Identification Systems
(2007)
Edible RFIDs’, New Scientist (12 February)
(2007)
Tagging Tokyo’s Streets with No Name
(2005)
Data Mining and Predictive Analytics: Battlespace Awareness for the War on Terror
(2007)
Narrative and Database: Natural Symbionts’, PMLA
K. Lang, D. Cuff (2005)
Pervasive Computing: Embeddingthe Public SphereWashington and Lee Law Review, 62
Jörg Rech (2001)
Knowledge Discovery in DatabasesKünstliche Intell., 15
(2005)
RFID Watches over School Kids in Japan
D. Cuff (2003)
Pervasive Computing and the Public Realm
S. Graham (2005)
Software-sorted geographiesProgress in Human Geography, 29
M. Mcneil (1992)
Simians, Cyborgs and Women: The Reinvention of NatureFeminist Review, 41
(2004)
US Department of Defense Issues Updated RFID Policy
(1987)
The Luster of Capital
(2006)
VeriChip Wants to Test Human Implantable RFID on Military
Leslie Marsh (2009)
Natural-Born Cyborgs: Minds, Technologies, and the Future of Human Intelligence
(2007)
Project to Tag Tokyo Neighborhood with RFID
(2004)
Wal-Mart Tagging Fuels RFID Market’, News.com (22 December), URL: http://newcom.com/Wal-Mart+tagging++fuels+RFID+market/ 2100-1012_3-5501432.html
(1969)
Information, Mechanism, Meaning
M. Crang, S. Graham (2007)
SENTIENT CITIES Ambient intelligence and the politics of urban spaceInformation, Communication & Society, 10
Vida Bajc (2007)
IntroductionAmerican Behavioral Scientist, 50
J. Crandall (1999)
Anything That Moves: Armed VisionCtheory
Informatics and Information Processing vs. Mathematics and Physics', presentation at the Institute for Creative Technologies
(2005)
Electronic Tags Used to Track Immigrants’, The New Standard (5 September), URL: http://newstandardnews.net/content/index.cfm
M. Heidegger (1983)
The Fundamental Concepts of Metaphysics: World, Finitude, Solitude
H. Dreyfus (1992)
What computers still can't do - a critique of artificial reason
(2005)
L.A. County Jail to Track Inmates
RFID tags, small microchips no bigger than grains of rice, are currently being embedded in product labels, clothing, credit cards, and the environment, among other sites. Activated by the appropriate receiver, they transmit information ranging from product information such as manufacturing date, delivery route, and location where the item was purchased to (in the case of credit cards) the name, address, and credit history of the person holding the card. Active RFIDs have the capacity to transmit data without having to be activated by a receiver; they can be linked with embedded sensors to allow continuous monitoring of environmental conditions, applications that interest both environmental groups and the US military. The amount of information accessible through and generated by RFIDs is so huge that it may well overwhelm all existing data sources and become, from the viewpoint of human time limitations, essentially infinite. What to make of these technologies will be interrogated through two contemporary fictions, David Mitchell's Cloud Atlas and Philip K. Dick's Ubik . Cloud Atlas focuses on epistemological questions — who knows what about whom, in a futuristic society where all citizens wear embedded RFID tags and are subject to constant surveillance. Resistance takes the form not so much of evasion (tactical moves in a complex political Situation) but rather as a struggle to transmit information to present and future stakeholders in a world on the brink of catastrophe. Ubik, by contrast, focuses on deeper ontological questions about the nature of reality itself. Both texts point to the necessity to reconceptualize information as ethical action embedded in contexts and not merely as a quantitative measure of probabilities.
"Theory, Culture & Society" – SAGE
Published: Mar 1, 2009
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.