News

A Lunch BIT from Korea’s Online Gaming Empire by Dal Yong Jin

A Lunch BIT from Korea’s Online Gaming Empire by Dal Yong Jin

Why is online gaming such a cultural phenomenon in Korea?  Since the 1960s Korean culture has been seen as one to quickly change and to keep up with the latest technologies and consumer products. Gaming is no different—gaming in Korea has really spearheaded the industry globally and become one of the fastest creative industries worldwide. In Korea’s Online Gaming Empire, Dal Yong Jin takes an interesting approach and examines the rapid growth of this industry in social, cultural, and economic terms.

A Lunch BIT from Eco-Business by Peter Dauvergne and Jane Lister

A Lunch BIT from Eco-Business by Peter Dauvergne and Jane Lister

What’s behind the high-profile efforts of large corporations to embrace sustainable policies? Why are these big-brand companies making zero-waste and sustainable-packaging promises? Why do they seem to be accelerating their efforts? Is this merely crafty marketing? Are they using feel-good rhetoric to placate governments, activists, and consumers?

Happy Chinese New Year!

Happy Chinese New Year!

In honor of Chinese New Year, Matthias Messmer and Hsin-Mei Chuang share reflections on select images from their book, China’s Vanishing World. This book offers readers a rare opportunity to glimpse China as it once was, and as it will soon no longer be.

In memoriam: Zoltan Torey

In memoriam: Zoltan Torey

Sad news: Zoltan Torey, a clinical psychologist and philosopher of mind, has passed away at the age of 85.

Surveillance or Security in the NSA Report

Surveillance or Security in the NSA Report

Much commentary has already been generated by the report from the President’s Review Group on Intelligence and Communications Technologies – widely referred to as “The NSA Report” – especially its recommendation that the NSA discontinue the controversial Section 215 program of collecting telephony metadata. We thought it worth pointing out that Susan Landau’s authoritative book on the subject, Surveillance or Security?, is cited in a footnote in the report at page 192, during a discussion of cryptography standards.