Lie Machines - Summary and Key Ideas

Lie Machines explores the complex systems of people, organizations, and social media algorithms that generate and spread political lies, focusing on their production, distribution, and marketing. The book aims to understand how these machines work in order to dismantle them and protect democracy.

The target group of "Lie Machines" includes individuals interested in understanding the mechanisms behind political misinformation and those seeking ways to protect democracy from the influence of disinformation campaigns.

Buy the book
Lie Machines

Key ideas

01

Lie machines threaten democracy by exploiting cognitive biases and manipulating public opinion, eroding trust in democratic institutions.

02

Lie machines exploit personal data to manipulate public opinion, threatening democracy and public trust.

Play in App
03

Junk news threatens democracy by fueling polarization, skepticism, and misinformation.

Play in App
04

Dismantling lie machines and safeguarding democracy demands transparency, personal data control, media literacy, critical thinking, and regular algorithmic audits.

Play in App
05

Play in App
06

Play in App
07

Play in App
08

Play in App
09

Play in App
10

Play in App
11

Play in App
12

Play in App
Get the App
Access all 5 key ideas for free!

Summary & Review

Lie Machines by Philip N. Howard explores the growing influence of lie machines in public life, which are social and technical systems that generate and spread political lies. These machines are built by political actors, social media firms, and paid consultants, and they manipulate data and algorithms to serve a political agenda. The book breaks down lie machines into three main components: production, distribution, and marketing, and discusses their impact on democracy and public opinion.

Philip N. Howard

Philip N. Howard is a professor of sociology, information, and international affairs at the University of Washington. He is an expert in digital media, political communication, and the impact of technology on society, with a focus on the role of information and communication technologies in shaping public life.

advertisement

Is Your Domain Name at Risk?

90% of domains are vulnerable to email fraud and spoofing. Cybercriminals can send emails as you, even if you don't. DMARC stops this.

Check DMARC Now
check is instant and free

Find all the book summaries

Quality book summaries

The Attention Merchants

The Attention Merchants explores the rise of the attention industry, which captures and monetizes human attention through advertising and media. It delves into the history, impact, and consequences of this industry on society and individual lives.

The Art of War

The book The Art of War (5th century BC) is about the ultimate strategy guide for winning battles and succeeding in life. Sun Tzu's timeless principles teach how to outsmart opponents, anticipate their moves and conquer them without ever having to fight.

The Racial Healing Handbook

The Racial Healing Handbook is a comprehensive workbook designed to help individuals of all racial backgrounds understand themselves as racial/cultural beings, challenge privilege, confront systemic racism, and engage in collective healing. It provides practical activities, exercises, and strategies for personal growth and transformation in the context of race and racism.

The Responsibility of Intellectuals

The Responsibility of Intellectuals discusses the role and moral obligations of intellectuals in society, emphasizing their responsibility to seek the truth, expose lies, and challenge the state using their privileged status and opportunities.

Das Parfüm

"Das Parfüm" ist die Geschichte von Jean-Baptiste Grenouille, einem Mann mit einem außergewöhnlichen Geruchssinn, der im 18. Jahrhundert in Frankreich lebt und besessen davon ist, den perfekten Duft zu kreieren. Seine Suche führt ihn auf einen dunklen Pfad, auf dem er sogar zum Mörder wird, um die Essenz unwiderstehlicher Düfte einzufangen.

Click Here to Kill Everybody

Click Here to Kill Everybody explores the increasing security risks in a hyper-connected world, where everything is becoming a computer, and discusses the necessary policy changes to secure the Internet and protect life and property from potential catastrophic cyber attacks.