Drawing upon a wide variety of authors, approaches, and ideological contexts, this book offers a comprehensive and detailed critique of the distinct and polemical senses in which the concept of ressentiment (and its cognate 'resentment') is used today. It also proposes a new mode of addressing ressentiment in which critique and polemics no longer set the tone: care. Contemporary tendencies i…
How small-scale drones, satellites, kites, and balloons are used by social movements for the greater good. Drones are famous for doing bad things: weaponized, they implement remote-control war; used for surveillance, they threaten civil liberties and violate privacy. In The Good Drone, Austin Choi-Fitzpatrick examines a different range of uses: the deployment of drones for the greater good. …
The electric vehicle revival reflects negotiations between public policy, which promotes clean, fuel-efficient vehicles, and the auto industry, which promotes high-performance vehicles. Electric cars were once as numerous as internal combustion engine cars before all but vanishing from American roads around World War I. Now, we are in the midst of an electric vehicle revival, and the goal fo…
Why dominant racial and gender groups have preferential access to jobs in computing, and how feminist labor activism in computing culture can transform the field into a force that serves democracy and social justice. Cracking the Bro Code is a bold ethnographic study of sexism and racism in contemporary computing cultures theorized through the analytical frame of the “Bro Code.” Drawing …
First published in 1998, this book explores the links between theories of feminism and the practice of law, and does so through an examination of a number of contemporary themes in feminist legal studies. From an interdisciplinary perspective, this book examines, as one of its overarching themes, the existence of a distinctively female legal voice, or voices. In arguing for a recognition of the…
Exposing hacker methodology with concrete examples, this volume shows readers how to outwit computer predators. With screenshots and step by step instructions, the book discusses how to get into a Windows operating system without a username or password and how to hide an IP address to avoid detection. It explains how to find virtually anything on the Internet and explores techniques that hacker…
Making diverse data in linguistics and the language sciences open, distributed, and accessible: perspectives from language/language acquistiion researchers and technical LOD (linked open data) researchers. This volume examines the challenges inherent in making diverse data in linguistics and the language sciences open, distributed, integrated, and accessible, thus fostering wide data sharing…
An innovative account that brings together cognitive science, ethnography, and literary history to examine patterns of “mindreading” in a wide range of literary works. For over four thousand years, writers have been experimenting with what cognitive scientists call “mindreading”: constantly devising new social contexts for making their audiences imagine complex mental states of chara…
Taking a global viewpoint, this volume addresses issues arising from recent developments in the enduring and topical debates over Genetically Modified Organisms (GMOs) and their relationship to Intellectual Property (IP). The work examines changing responses to the growing acceptance and prevalence of GMOs. Drawing together perspectives from several of the leading international scholars in this…
This book examines mediation topics such as impartiality, self-determination and fair outcomes through popular culture lenses. Popular television shows and award-winning films are used as illustrative examples to illuminate under-represented mediation topics such as feelings and expert intuition, conflicts of interest and repeat business, and deception and caucusing. The author also employs res…