
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet: general works &#8211; The Bell Bookshop</title>
	<atom:link href="https://www.bellbookshop.co.uk/product-tag/internet-general-works/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.bellbookshop.co.uk</link>
	<description>Henley-on-Thames</description>
	<lastBuildDate>Tue, 24 Mar 2026 11:38:08 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://www.bellbookshop.co.uk/wp-content/uploads/2020/08/cropped-Bell-Background-Blue-32x32.png</url>
	<title>Internet: general works &#8211; The Bell Bookshop</title>
	<link>https://www.bellbookshop.co.uk</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>How to Save the Internet</title>
		<link>https://www.bellbookshop.co.uk/product/how-to-save-the-internet/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 04 Sep 2025 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=50639</guid>

					<description><![CDATA[Radical, reasonable, deeply felt and disarmingly honest, How To Save the Internet sets out a blueprint for a new era of global cooperation in order to reform Big Tech while preserving the fundamental openness of the internet - and thus the greatest opportunity for development and democratic empowerment of our lifetime.]]></description>
										<content:encoded><![CDATA[<p><b>&#8216;A wake-up call we cannot afford to ignore&#8217; </b>TONY BLAIR</p>
<p><b>&#8216;A vital read for anyone building or regulating the next era of technology&#8217; </b>REID HOFFMAN</p>
<p><b>The global, open internet is fragmenting.</b></p>
<p>As democracies seek to rein in the power of Big Tech, as Silicon Valley pivots to an America-first agenda, as authoritarian regimes such as China and Russia segregate their populations from the rest of the internet, the most powerful tool ever created for bringing the world together risks being dismantled.</p>
<p>Taking us behind the scenes at Meta and his interactions with world leaders, Nick Clegg, Meta&#8217;s former President, Global Affairs, sets out where Big Tech has gone wrong, how Silicon Valley&#8217;s insularity has blinded it to its missteps, and the radical reforms of the global platforms that are now needed if they are to secure a long-term future.</p>
<p>But he also makes the case that many of the charges against them &#8211; including that their algorithms polarise, manipulate and harm &#8211; are vastly overstated or simply untrue. And while new laws that regulate these corporations are essential, imposing national borders on the internet cannot be the answer. That will fatally undermine its capacity for knowledge-sharing, collaboration, education, trade, medical and scientific research, and ultimately for the improvement and empowerment of billions of lives.</p>
<p><b>Radical, reasonable, deeply felt and disarmingly honest, <i>How To Save the Internet </i>sets out a blueprint for the global cooperation we need in order to reform Big Tech while preserving the fundamental openness of the internet on which our future so depends.</p>
<p>&#8216;A gripping and timely book. Nick Clegg writes with clarity, authority and urgency&#8217; </b>PETER FRANKOPAN</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fancy bear goes phishing</title>
		<link>https://www.bellbookshop.co.uk/product/fancy-bear-goes-phishing-2/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 02 May 2024 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=40091</guid>

					<description><![CDATA[With lucidity and wit, Scott Shapiro establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human story, he tells the fascinating tales of perpetrators including Robert Morris Jr, the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian 'Dark Avenger' who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone and the Russian intelligence officers who sought to take control of a US election, among others. In telling their stories, he exposes the hackers' tool kits and gives fresh answers to vital questions - why is the internet so vulnerable, and what can we do in response?]]></description>
										<content:encoded><![CDATA[<p><b>Hacking, espionage, war and cybercrime as you&#8217;ve never read about them before</b></p>
<p><i>Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National Committee network, grabbed what it could, and may have contributed to the election of Donald Trump.</i></p>
<p><i>Robert Morris was curious. Experimenting one night, the graduate student from Cornell University released &#8220;the Great Worm&#8221; and became the first person to crash the internet.</i></p>
<p><i>Dark Avenger was in love. To impress his crush, the Bulgarian hacker invented the first mutating computer virus-engine and nearly destroyed the anti-virus industry.</i></p>
<p>Why is the internet so insecure? How do hackers exploit its vulnerabilities? <i>Fancy Bear Goes Phishing </i>tells the stories of five great hacks, their origins, motivations and consequences. As well as Fancy Bear, Robert Morris and Dark Avenger, we meet Cameron Lacroix, a sixteen-year-old from South Boston, who hacked Paris Hilton&#8217;s cell phone because he wanted to be famous and Paras Jha, a Rutgers undergraduate, who built a giant botnet designed to get him out of his calculus exam and disrupt the online game Minecraft, but which almost destroyed the internet in the process. Scott Shapiro&#8217;s five stories demonstrate that computer hacking is not just a tale of technology, but of human beings.</p>
<p>Yet as Shapiro shows, hackers do not just abuse computer code &#8211; they exploit the philosophical principles of computation: the very features that make computers possible also make hacking possible. He explains how our information society works, the ways our data is stored and manipulated, and why it is so subject to exploitation. Both intellectual romp and dramatic true-crime narrative, <i>Fancy Bear Goes Phishing </i>exposes the secrets of the digital age.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Code dependent</title>
		<link>https://www.bellbookshop.co.uk/product/code-dependent/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 21 Mar 2024 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=38995</guid>

					<description><![CDATA[A riveting and revealing exploration of the world created by computer algorithms and its impact on individuals, from the workers across the globe who feed artificial intelligence systems with data to the impact of algorithms on our own behaviour, as consumers and citizens.]]></description>
										<content:encoded><![CDATA[<p><b>Shortlisted for the Women&#8217;s Prize for Non-Fiction 2024</p>
<p>AI is changing what it means to be human. This is the unrivalled investigation into the impact of AI on how we live now.</p>
<p>&#8216;The intimate investigation of AI that we&#8217;ve been waiting for, and it arrives not a moment too soon.&#8217; &#8211; Shoshana Zuboff, author of <i>The Age of Surveillance Capitalism</i></b></p>
<p>Through the voices of ordinary people in places far removed from Silicon Valley, <i>Code Dependent</i> explores the impact of a set of powerful, flawed, and often exploitative technologies on individuals, communities, and our wider society. Madhumita Murgia, AI Editor at the <i>FT</i>, exposes how AI can strip away our collective and individual sense of agency &#8211; and shatter our illusion of free will.</p>
<p>AI is already changing what it means to be human, in ways large and small. In this compelling work, Murgia reveals what could happen if we fail to reclaim our humanity.</p>
<p><b>&#8216;A nuanced, thoughtful and very accessible picture of a world deeply affected by AI&#8217; &#8211; Martha Lane Fox</p>
<p>&#8216;Highly readable and deeply important&#8217; &#8211; <i>The Guardian</i></p>
<p>&#8216;<i>Code Dependent </i>is the <i>No Logo </i>of the 2020s&#8217; &#8211; <i>The Times</i></b></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The dark cloud</title>
		<link>https://www.bellbookshop.co.uk/product/the-dark-cloud/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 14 Sep 2023 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=35253</guid>

					<description><![CDATA[If digital technology were a country, it would be the third-highest consumer of electricity behind China and the United States. Every year, streaming technology generates as much greenhouse gas as Spain - close to 1 per cent of global emissions. One Google search uses as much electricity as a lightbulb left on for up to two minutes. It turns out that the 'dematerialised' digital world, essential for communicating, working, and consuming, is much more tangible than we would like to believe. Today, it absorbs 10 per cent of the world's electricity and represents nearly 4 per cent of the planet's carbon dioxide emissions. We are struggling to understand these impacts, as they are obscured to us in the mirage of 'the cloud'. The result of an investigation carried out over two years on four continents, this book reveals the anatomy of a technology that is virtual only in name.]]></description>
										<content:encoded><![CDATA[<p><strong>A gripping new investigation into the underbelly of digital technology, which reveals not only how costly the virtual world is, but how damaging it is to the environment.</strong></p>
<ul>
<li>If digital technology were a country, it would be the third-highest consumer of electricity behind China and the United States.</li>
<li>Every year, streaming technology generates as much greenhouse gas as Spain &#8211; close to 1 per cent of global emissions.</li>
<li>One Google search uses as much electricity as a lightbulb left on for up to two minutes.
</li>
</ul>
<p>It turns out that the &#8216;dematerialised&#8217; digital world, essential for communicating, working, and consuming, is much more tangible than we would like to believe. Today, it absorbs 10 per cent of the world&#8217;s electricity and represents nearly 4 per cent of the planet&#8217;s carbon dioxide emissions. We are struggling to understand these impacts, as they are obscured to us in the mirage of &#8216;the cloud&#8217;.</p>
<p>The result of an investigation carried out over two years on four continents, <em>The Dark Cloud</em> reveals the anatomy of a technology that is virtual only in name. Under the guise of limiting the impact of humans on the planet, it is already asserting itself as one of the major environmental challenges of the twenty-first century.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The internet con</title>
		<link>https://www.bellbookshop.co.uk/product/the-internet-con/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Tue, 05 Sep 2023 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/product/the-internet-con/</guid>

					<description><![CDATA[This isn't a book for people who want to fix Big Tech. It's a detailed disassembly manual for people who want to dismantle it.]]></description>
										<content:encoded><![CDATA[<p>When the tech platforms promised a future of &#8220;connection,&#8221; they were lying. They said their &#8220;walled gardens&#8221; would keep us safe, but those were prison walls.</p>
<p>The platforms locked us into their systems and made us easy pickings, ripe for extraction. Twitter, Facebook and other Big Tech platforms hard to leave by design. They hold hostage the people we love, the communities that matter to us, the audiences and customers we rely on. The impossibility of staying connected to these people after you delete your account has nothing to do with technological limitations: it&#8217;s a business strategy in service to commodifying your personal life and relationships.</p>
<p>We can &#8211; we must &#8211; dismantle the tech platforms. In <i>The Internet Con</i>, Cory Doctorow explains how to seize the means of computation, by forcing Silicon Valley to do the thing it fears most: interoperate. Interoperability will tear down the walls between technologies, allowing users leave platforms, remix their media, and reconfigure their devices without corporate permission.</p>
<p>Interoperability is the only route to the rapid and enduring annihilation of the platforms. <i>The Internet Con</i> is the disassembly manual we need to take back our internet.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Fancy bear goes phishing</title>
		<link>https://www.bellbookshop.co.uk/product/fancy-bear-goes-phishing/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Tue, 23 May 2023 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=31284</guid>

					<description><![CDATA[With lucidity and wit, Scott Shapiro establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human story, he tells the fascinating tales of perpetrators including Robert Morris Jr, the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian 'Dark Avenger' who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton's cell phone and the Russian intelligence officers who sought to take control of a US election, among others. In telling their stories, he exposes the hackers' tool kits and gives fresh answers to vital questions - why is the internet so vulnerable, and what can we do in response?]]></description>
										<content:encoded><![CDATA[<p><b>Hacking, espionage, war and cybercrime as you&#8217;ve never read about them before</b></p>
<p><i>Fancy Bear was hungry. Looking for embarrassing information about Hillary Clinton, the elite hacking unit within Russian military intelligence broke into the Democratic National Committee network, grabbed what it could, and may have contributed to the election of Donald Trump.</i></p>
<p><i>Robert Morris was curious. Experimenting one night, the graduate student from Cornell University released &#8220;the Great Worm&#8221; and became the first person to crash the internet.</i></p>
<p><i>Dark Avenger was in love. To impress his crush, the Bulgarian hacker invented the first mutating computer virus-engine and nearly destroyed the anti-virus industry.</i></p>
<p>Why is the internet so insecure? How do hackers exploit its vulnerabilities? <i>Fancy Bear Goes Phishing </i>tells the stories of five great hacks, their origins, motivations and consequences. As well as Fancy Bear, Robert Morris and Dark Avenger, we meet Cameron Lacroix, a sixteen-year-old from South Boston, who hacked Paris Hilton&#8217;s cell phone because he wanted to be famous and Paras Jha, a Rutgers undergraduate, who built a giant botnet designed to get him out of his calculus exam and disrupt the online game Minecraft, but which almost destroyed the internet in the process. Scott Shapiro&#8217;s five stories demonstrate that computer hacking is not just a tale of technology, but of human beings.</p>
<p>Yet as Shapiro shows, hackers do not just abuse computer code &#8211; they exploit the philosophical principles of computation: the very features that make computers possible also make hacking possible. He explains how our information society works, the ways our data is stored and manipulated, and why it is so subject to exploitation. Both intellectual romp and dramatic true-crime narrative, <i>Fancy Bear Goes Phishing </i>exposes the secrets of the digital age.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Towards a Digital Renaissance</title>
		<link>https://www.bellbookshop.co.uk/product/towards-a-digital-renaissance/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=27789</guid>

					<description><![CDATA[An authoritative but readable examination of the digital sector in both the UK and US, 'Towards a Digital Renaissance' traces the excitement and optimism of the early internet, the outsider cyberpunk ethic and open access. But it also monitors the more complex but ultimately more commercialised online world of today, a world dominated by corporate business in which many feel that surveillance has become overwhelming. The author's involvement in various start-ups, both as CEO and investor, led to him being invited to lead Digital Catapult, the UK authority on advanced digital technology, and the book examines the interplay between state and private financing in the digital sector.]]></description>
										<content:encoded><![CDATA[<p>Towards a Digital Renaissance traces the excitement and optimism of the early internet, the outsider cyberpunk ethic and open access. But it also monitors the more complex but ultimately more commercialised online world of today, a world dominated by corporate business in which many feel that surveillance has become overwhelming.Jeremy Silver&#8217;s involvement in various start-ups, both as CEO and investor, led to his leadership of Digital Catapult. Towards a Digital Renaissance examines the interplay between state and private financing in the digital sector. It also argues for the internet&#8217;s potential to transition from a &#8216;medieval&#8217; world of the GAFA big four (Google, Amazon, Facebook and Apple), closed and walled up like medieval city states, to a &#8216;digital renaissance&#8217; based on the free exchange of ideas and an enabling metaverse made up of virtual reality and artificial intelligence that deepens our experience of reality rather than restricting or monitoring it.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Escape</title>
		<link>https://www.bellbookshop.co.uk/product/escape/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 01 Sep 2022 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=25381</guid>

					<description><![CDATA[Journalist Marie Le Conte was born in 1991, the same year the World Wide Web was invented. She had her first blog at 12, a successful music website at 15, a Wikipedia page at 17 and now, at 29, over 78,000 followers on Twitter. From MSN, Tumblr and MySpace, to chat rooms, forums and blogs; Marie is part of the millennial generation that grew up while the internet was growing up with them. The generation that entered a new reality. The generation that saw it all. The generation who are now witnessing its collapse. Where did it go all wrong? How did the internet go from a place where you went to escape real life to where real life is shaped? A place where you could be yourself and find like-minded people to a world of filters and ads? 'Escape' is a fascinating exploration on the birth and death of the internet.]]></description>
										<content:encoded><![CDATA[<p>&#8216;Fifteen years ago, the internet felt like a special place my friends and I had built for each other; by 2020, we were standing on its ruins, wondering if we&#8217;d played a part in its destruction.&#8217; Journalist Marie Le Conte was born in 1991, the same year the World Wide Web was invented. She had her first blog at twelve, a successful music website at fifteen, a Wikipedia page at seventeen and now, at thirty, over 80,000 followers on Twitter. From MSN, Tumblr and MySpace, to chat rooms, forums and blogs; Marie is part of the millennial generation that grew up while the internet was growing up with them.Where did it go all wrong? How did the internet go from a place where you went to escape real life to where real life is shaped? A place where you could be yourself and find like-minded people to a world of filters and ads? A place we are all now desperately trying to escape from?Escape is a fascinating exploration of the rise and demise of the internet. It&#8217;s a look back on the platforms, the people and the online places. It&#8217;s an analysis of the lessons being online has taught us, how the internet has changed us &#8211; and a celebration of the tools it gives us to feel less alone. The online generation have forever altered the world we live in, but is the internet still a place for the people that shaped it?</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Social Warming</title>
		<link>https://www.bellbookshop.co.uk/product/social-warming/</link>
		
		<dc:creator><![CDATA[Emma]]></dc:creator>
		<pubDate>Thu, 28 Jul 2022 00:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.bellbookshop.co.uk/?post_type=product&#038;p=24593</guid>

					<description><![CDATA[<p>An impassioned exploration of the ways in which social media has manipulated us all</p>]]></description>
										<content:encoded><![CDATA[<p><strong>&#8216;Witty, rigorous, and as urgent as a fire alarm&#8217; Dorian Lynskey</strong></p>
<p><strong>&#8216;Cooly prosecutorial&#8217;  <em>Guardian</em></strong></p>
<p><strong>Nobody meant for this to happen.</strong></p>
<p>Facebook didn&#8217;t mean to facilitate a genocide.</p>
<p>Twitter didn&#8217;t want to be used to harass women.</p>
<p>YouTube never planned to radicalise young men.</p>
<p>But with billions of users, these platforms need only tweak their algorithms to generate more &#8216;engagement&#8217;. In so doing, they bring unrest to previously settled communities and  erode our relationships.  </p>
<p>Social warming has happened gradually &#8211; as a by-product of our preposterously convenient digital existence. But the gradual deterioration of our attitudes and behaviour on- and offline &#8211; this vicious cycle of anger and outrage &#8211; is real. And it can be corrected. Here&#8217;s how.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
