The Digital Mystique: How the Culture of Connectivity Can Empower Your Life – Online and Off, was published in Fall 2014 by Seal Press, part of the Perseus Books Group. It is now available for sale at bookstores and online.
– Amazon (paperback and Kindle)
– Apple iBooks / iTunes (e-book only)
– Barnes & Noble
– Book Passage (autographed copies in San Francisco)
– Indiebound (local bookstores)
– Indigo (Canada)
– Kepler’s Bookstore (autographed copies in Menlo Park)
– Powell’s Books
Sarah Granger—a nationally recognized expert on online culture and social technology—shows us how digital media is shaping our lives in real time. Whether it’s how we raise our children, communicate in love and partnerships, support causes, or establish friendships and trust, Granger pinpoints the best ways to seize digital opportunities to make our lives richer and fuller.
While the Internet era is one that is frequently criticized as undermining our health, privacy, concentration, and ability to sustain real-world relationships, Granger takes a more optimistic and empowering view. She shares real-life stories and surprising facts about our lives—both online and off—to shed new and fascinating light on the positive effects of the digital media revolution, showing us how we can personally learn, grow, and thrive by engaging in our digitized world.
Sarah has previously contributed chapters and essays to the following books:
Diplomacy, Development and Security in the Information Age – Sarah Granger is a contributing co-author of chapter on “Cybersecurity and Modern Grand Strategy.”
The information revolution is permanently changing the face of international relations. Wired, networked protestors help power and publicize the Arab Spring, leading to the downfall of authoritarian regimes long believed unshakable. Secret cables published by Wikileaks expose the mechanics of U.S. foreign policy decisionmaking to a global public. Chinese Internet users spread photo evidence to expose corrupt local officials. Israelis and Palestin- ians use video and social media to add another dimension to real-time conflict. But what do these disparate events really tell us?
This working paper series intends to illuminate this narrative by delving further into the trends in international affairs that have been accelerated or otherwise augmented by the information revolution. In focusing on transparency and volatility, the papers in this series also serve to deconstruct the hype surrounding key concepts of the information age. (Sarah’s co-authored paper is on p. 99 of the PDF.)
Shift & Reset: Strategies for Addressing Serious Issues in a Connected Society – Sarah Granger contributes an essay on “Mobile, Global, Virtual, Tangible: Governments Embrace the Social Revolution as Introduced by the Internet.”
In these challenging economic times, it is more important than ever for nonprofits to focus on shaping policy, building capacity, developing talent, improving their marketing and promotion, fundraising, and developing partnerships/collaboration for organizational success. Shift & Reset: Strategies for Supporting Causes in a Connected Society teaches the nonprofit/social change/philanthropy/cause community how to take advantage of rapidly changing technologies and new communication ecosystem that exist in our connected society.
Ethical Hacking – Sarah Granger contributes a chapter on “Social Engineering Fundamentals,” reprinted from her original Security Focus feature article.
“The basic goals of social engineering are the same as hacking in general: to gain unauthorized access to systems or information in order to commit fraud, network intrusion, industrial espionage, identity theft, or simply to disrupt the system or network. Typical targets include telephone companies and answering services, big-name corporations and financial institutions, military and government agencies, and hospitals. The Internet boom had its share of industrial engineering attacks in start-ups as well, but attacks generally focus on larger entities.” This chapter focuses on social engineering tactics used by computer hackers.