OCLC-licensed vendor bibliographic record.
In this book, Christopher Baber uses embodied cognition as a lens through which to view both how designers engage in creative practices and how people use designed artifacts. This view of cognition as enactive, embedded, situated, or distributed, without recourse to internal representations, provides a theoretical grounding that makes possible a richer account of human interaction with technolo…
How America used its technological leadership in the 1950s and the 1960s to foster European collaboration and curb nuclear proliferation, with varying degrees of success.OCLC-licensed vendor bibliographic record.
In a July 2017 piece in Inside Higher Ed, Joshua Kim asked: “Why is it that books about technological-induced economic change tend to focus on every other information industry except for higher education?” The answer is because no one knows quite what is happening yet. It is too new. The automation economy, resulting from the technologies of the fourth industrial revolution (4IR), is changi…
"Today almost every aspect of life for which data exists can be rendered as a network. Financial data, social networks, biological ecologies: all are visualized in links and nodes, lines connecting dots. A network visualization of a corporate infrastructure could look remarkably similar to that of a terrorist organization. In An Aesthesia of Networks, Anna Munster argues that this uniformity ha…
Interdisciplinary perspectives on the role of new information technologies, including mobile phones, wireless networks, and biometric identification, in the global refugee crisis.OCLC-licensed vendor bibliographic record.
An examination of the uses of data within a changing knowledge infrastructure, offering analysis and case studies from the sciences, social sciences, and humanities."'Big Data' is on the covers of Science, Nature, the Economist, and Wired magazines, on the front pages of the Wall Street Journal and the New York Times. But despite the media hyperbole, as Christine Borgman points out in this exam…
An examination of how technological failures defined nature and national identity in Cold War Canada.OCLC-licensed vendor bibliographic record.
Although women have been at the forefront of art and technology creation, no source has adequately documented their core contributions to the field. Women, Art, and Technology, which originated in a Leonardo journal project of the same name, is a compendium of the work of women artists who have played a central role in the development of new media practice.The book includes overviews of the his…
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…