Author: Anthimos Alexandros Tsirigotis
Publisher: Springer
ISBN: 3319508474
Category : Political Science
Languages : en
Pages : 184
Book Description
This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here, Tsirigotis rallies against this technocentric account and establishes how cyberspace, first and foremost, should be categorized as a new way to understand war and military power in the Information Age. Using genre analysis and Corpus Linguistics, the author scrutinizes how cyberspace has changed the way the UK comprehends war and military power, and how the cybernetisation of war has manifested itself in Britain's approach to national defense and security.
Cybernetics, Warfare and Discourse
Author: Anthimos Alexandros Tsirigotis
Publisher: Springer
ISBN: 3319508474
Category : Political Science
Languages : en
Pages : 184
Book Description
This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here, Tsirigotis rallies against this technocentric account and establishes how cyberspace, first and foremost, should be categorized as a new way to understand war and military power in the Information Age. Using genre analysis and Corpus Linguistics, the author scrutinizes how cyberspace has changed the way the UK comprehends war and military power, and how the cybernetisation of war has manifested itself in Britain's approach to national defense and security.
Publisher: Springer
ISBN: 3319508474
Category : Political Science
Languages : en
Pages : 184
Book Description
This book critiques mainstream beliefs about cyberwarfare and forges a new path in the way of defining this largely misunderstood concept. Rather than outlining cyberspace as a new technology applied in military operations, here, Tsirigotis rallies against this technocentric account and establishes how cyberspace, first and foremost, should be categorized as a new way to understand war and military power in the Information Age. Using genre analysis and Corpus Linguistics, the author scrutinizes how cyberspace has changed the way the UK comprehends war and military power, and how the cybernetisation of war has manifested itself in Britain's approach to national defense and security.
The Closed World
Author: Paul N. Edwards
Publisher: MIT Press
ISBN: 9780262550284
Category : Computers
Languages : en
Pages : 468
Book Description
The Closed World offers a radically new alternative to the canonical histories of computers and cognitive science. Arguing that we can make sense of computers as tools only when we simultaneously grasp their roles as metaphors and political icons, Paul Edwards shows how Cold War social and cultural contexts shaped emerging computer technology--and were transformed, in turn, by information machines. The Closed World explores three apparently disparate histories--the history of American global power, the history of computing machines, and the history of subjectivity in science and culture--through the lens of the American political imagination. In the process, it reveals intimate links between the military projects of the Cold War, the evolution of digital computers, and the origins of cybernetics, cognitive psychology, and artificial intelligence. Edwards begins by describing the emergence of a "closed-world discourse" of global surveillance and control through high-technology military power. The Cold War political goal of "containment" led to the SAGE continental air defense system, Rand Corporation studies of nuclear strategy, and the advanced technologies of the Vietnam War. These and other centralized, computerized military command and control projects--for containing world-scale conflicts--helped closed-world discourse dominate Cold War political decisions. Their apotheosis was the Reagan-era plan for a " Star Wars" space-based ballistic missile defense. Edwards then shows how these military projects helped computers become axial metaphors in psychological theory. Analyzing the Macy Conferences on cybernetics, the Harvard Psycho-Acoustic Laboratory, and the early history of artificial intelligence, he describes the formation of a "cyborg discourse." By constructing both human minds and artificial intelligences as information machines, cyborg discourse assisted in integrating people into the hyper-complex technological systems of the closed world. Finally, Edwards explores the cyborg as political identity in science fiction--from the disembodied, panoptic AI of 2001: A Space Odyssey, to the mechanical robots of Star Wars and the engineered biological androids of Blade Runner--where Information Age culture and subjectivity were both reflected and constructed. Inside Technology series
Publisher: MIT Press
ISBN: 9780262550284
Category : Computers
Languages : en
Pages : 468
Book Description
The Closed World offers a radically new alternative to the canonical histories of computers and cognitive science. Arguing that we can make sense of computers as tools only when we simultaneously grasp their roles as metaphors and political icons, Paul Edwards shows how Cold War social and cultural contexts shaped emerging computer technology--and were transformed, in turn, by information machines. The Closed World explores three apparently disparate histories--the history of American global power, the history of computing machines, and the history of subjectivity in science and culture--through the lens of the American political imagination. In the process, it reveals intimate links between the military projects of the Cold War, the evolution of digital computers, and the origins of cybernetics, cognitive psychology, and artificial intelligence. Edwards begins by describing the emergence of a "closed-world discourse" of global surveillance and control through high-technology military power. The Cold War political goal of "containment" led to the SAGE continental air defense system, Rand Corporation studies of nuclear strategy, and the advanced technologies of the Vietnam War. These and other centralized, computerized military command and control projects--for containing world-scale conflicts--helped closed-world discourse dominate Cold War political decisions. Their apotheosis was the Reagan-era plan for a " Star Wars" space-based ballistic missile defense. Edwards then shows how these military projects helped computers become axial metaphors in psychological theory. Analyzing the Macy Conferences on cybernetics, the Harvard Psycho-Acoustic Laboratory, and the early history of artificial intelligence, he describes the formation of a "cyborg discourse." By constructing both human minds and artificial intelligences as information machines, cyborg discourse assisted in integrating people into the hyper-complex technological systems of the closed world. Finally, Edwards explores the cyborg as political identity in science fiction--from the disembodied, panoptic AI of 2001: A Space Odyssey, to the mechanical robots of Star Wars and the engineered biological androids of Blade Runner--where Information Age culture and subjectivity were both reflected and constructed. Inside Technology series
Flame Wars
Author: Mark Dery
Publisher: Duke University Press
ISBN: 9780822315407
Category : Computers
Languages : en
Pages : 360
Book Description
Essays on electronic communication, cyberpunk culture, and rants and flames in cyberspace consider subjects such as the magazine Mondo 2000, the typewriter, virtual reality, feminism, comics, and erotica for cybernauts. Includes blurry b&w photos and illustrations, and an interviews with science fictions writers Samuel R. Delaney, Greg Tate, and Tricia Rose. Paper edition (unseen), $13.95. Annotation copyright by Book News, Inc., Portland, OR.
Publisher: Duke University Press
ISBN: 9780822315407
Category : Computers
Languages : en
Pages : 360
Book Description
Essays on electronic communication, cyberpunk culture, and rants and flames in cyberspace consider subjects such as the magazine Mondo 2000, the typewriter, virtual reality, feminism, comics, and erotica for cybernauts. Includes blurry b&w photos and illustrations, and an interviews with science fictions writers Samuel R. Delaney, Greg Tate, and Tricia Rose. Paper edition (unseen), $13.95. Annotation copyright by Book News, Inc., Portland, OR.
The Organizational Complex
Author: Reinhold Martin
Publisher: MIT Press
ISBN: 0262633264
Category : Architecture
Languages : en
Pages : 325
Book Description
A historical and theoretical analysis of corporate architecture in the United States after the Second World War. The Organizational Complex is a historical and theoretical analysis of corporate architecture in the United States after the Second World War. Its title refers to the aesthetic and technological extension of the military-industrial complex, in which architecture, computers, and corporations formed a network of objects, images, and discourses that realigned social relations and transformed the postwar landscape. In-depth case studies of architect Eero Saarinen's work for General Motors, IBM, and Bell Laboratories and analyses of office buildings designed by Skidmore, Owings & Merrill trace the emergence of a systems-based model of organization in architecture, in which the modular curtain wall acts as both an organizational device and a carrier of the corporate image. Such an image—of the corporation as a flexible, integrated system—is seen to correspond with a "humanization" of corporate life, as corporations decentralize both spatially and administratively. Parallel analyses follow the assimilation of cybernetics into aesthetics in the writings of artist and visual theorist Gyorgy Kepes, as art merges with techno-science in the service of a dynamic new "pattern-seeing." Image and system thus converge in the organizational complex, while top-down power dissolves into networked, pattern-based control. Architecture, as one among many media technologies, supplies the patterns—images of organic integration designed to regulate new and unstable human-machine assemblages.
Publisher: MIT Press
ISBN: 0262633264
Category : Architecture
Languages : en
Pages : 325
Book Description
A historical and theoretical analysis of corporate architecture in the United States after the Second World War. The Organizational Complex is a historical and theoretical analysis of corporate architecture in the United States after the Second World War. Its title refers to the aesthetic and technological extension of the military-industrial complex, in which architecture, computers, and corporations formed a network of objects, images, and discourses that realigned social relations and transformed the postwar landscape. In-depth case studies of architect Eero Saarinen's work for General Motors, IBM, and Bell Laboratories and analyses of office buildings designed by Skidmore, Owings & Merrill trace the emergence of a systems-based model of organization in architecture, in which the modular curtain wall acts as both an organizational device and a carrier of the corporate image. Such an image—of the corporation as a flexible, integrated system—is seen to correspond with a "humanization" of corporate life, as corporations decentralize both spatially and administratively. Parallel analyses follow the assimilation of cybernetics into aesthetics in the writings of artist and visual theorist Gyorgy Kepes, as art merges with techno-science in the service of a dynamic new "pattern-seeing." Image and system thus converge in the organizational complex, while top-down power dissolves into networked, pattern-based control. Architecture, as one among many media technologies, supplies the patterns—images of organic integration designed to regulate new and unstable human-machine assemblages.
The Real Cyber War
Author: Shawn M. Powers
Publisher: University of Illinois Press
ISBN: 0252097106
Category : Business & Economics
Languages : en
Pages : 289
Book Description
Contemporary discussion surrounding the role of the internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources. Shawn Powers and Michael Jablonski conceptualize this real cyber war as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems, but also, and more importantly, the variety of ways the internet is used to further a state’s economic and military agendas. Moving beyond debates on the democratic value of new and emerging information technologies, The Real Cyber War focuses on political, economic, and geopolitical factors driving internet freedom policies, in particular the U.S. State Department's emerging doctrine in support of a universal freedom to connect. They argue that efforts to create a universal internet built upon Western legal, political, and social preferences is driven by economic and geopolitical motivations rather than the humanitarian and democratic ideals that typically accompany related policy discourse. In fact, the freedom-to-connect movement is intertwined with broader efforts to structure global society in ways that favor American and Western cultures, economies, and governments. Thought-provoking and far-seeing, The Real Cyber War reveals how internet policies and governance have emerged as critical sites of geopolitical contestation, with results certain to shape statecraft, diplomacy, and conflict in the twenty-first century.
Publisher: University of Illinois Press
ISBN: 0252097106
Category : Business & Economics
Languages : en
Pages : 289
Book Description
Contemporary discussion surrounding the role of the internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources. Shawn Powers and Michael Jablonski conceptualize this real cyber war as the utilization of digital networks for geopolitical purposes, including covert attacks against another state's electronic systems, but also, and more importantly, the variety of ways the internet is used to further a state’s economic and military agendas. Moving beyond debates on the democratic value of new and emerging information technologies, The Real Cyber War focuses on political, economic, and geopolitical factors driving internet freedom policies, in particular the U.S. State Department's emerging doctrine in support of a universal freedom to connect. They argue that efforts to create a universal internet built upon Western legal, political, and social preferences is driven by economic and geopolitical motivations rather than the humanitarian and democratic ideals that typically accompany related policy discourse. In fact, the freedom-to-connect movement is intertwined with broader efforts to structure global society in ways that favor American and Western cultures, economies, and governments. Thought-provoking and far-seeing, The Real Cyber War reveals how internet policies and governance have emerged as critical sites of geopolitical contestation, with results certain to shape statecraft, diplomacy, and conflict in the twenty-first century.
Threatcasting
Author: Brian David Johnson
Publisher: Springer Nature
ISBN: 303102575X
Category : Mathematics
Languages : en
Pages : 285
Book Description
Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.
Publisher: Springer Nature
ISBN: 303102575X
Category : Mathematics
Languages : en
Pages : 285
Book Description
Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.
The Soft Power of War
Author: Lilie Chouliaraki
Publisher: John Benjamins Publishing
ISBN: 902729254X
Category : Language Arts & Disciplines
Languages : en
Pages : 162
Book Description
This book, which was originally published as a Special Issue of Journal of Language & Politics 4:1 (2005), takes the war in Iraq as an exemplary case through which to demonstrate the changing nature of contemporary power. The book convincingly argues that the effective study of international politics depends today upon our understanding of the interplay between hard (military, economic) and soft (symbolic) power. One might say, between the politics of territory, guns or money and the language of narrating the world in coherent and persuasive stories. Bringing together different strands of discourse analysis with social, historical and, to an extent, political analysis, all contributions seek to illustrate the ways in which a variety of public genres, from political speeches to computer games and from educational material to newspaper reports, produce influential knowledge about the war and shape the ethical and political premises upon which the legitimacy of this war and a ‘vision’ of the emergent world order rests.
Publisher: John Benjamins Publishing
ISBN: 902729254X
Category : Language Arts & Disciplines
Languages : en
Pages : 162
Book Description
This book, which was originally published as a Special Issue of Journal of Language & Politics 4:1 (2005), takes the war in Iraq as an exemplary case through which to demonstrate the changing nature of contemporary power. The book convincingly argues that the effective study of international politics depends today upon our understanding of the interplay between hard (military, economic) and soft (symbolic) power. One might say, between the politics of territory, guns or money and the language of narrating the world in coherent and persuasive stories. Bringing together different strands of discourse analysis with social, historical and, to an extent, political analysis, all contributions seek to illustrate the ways in which a variety of public genres, from political speeches to computer games and from educational material to newspaper reports, produce influential knowledge about the war and shape the ethical and political premises upon which the legitimacy of this war and a ‘vision’ of the emergent world order rests.
Art, Cybernetics and Pedagogy in Post-War Britain
Author: Kate Sloan
Publisher: Routledge
ISBN: 0429886357
Category : Art
Languages : en
Pages : 334
Book Description
This is the first full-length study about the British artist Roy Ascott, one of the first cybernetic artists, with a career spanning seven decades to date. The book focuses on his early career, exploring the evolution of his early interests in communication in the context of the rich overlaps between art, science and engineering in Britain during the 1950s and 1960s. The first part of the book looks at Ascott’s training and early work. The second park looks solely at Groundcourse, Ascott’s extraordinary pedagogical model for visual arts and cybernetics which used an integrative and systems-based model, drawing in behaviourism, analogue machines, performance and games. Using hitherto unpublished photographs and documents, this book will establish a more prominent place for cybernetics in post-war British art.
Publisher: Routledge
ISBN: 0429886357
Category : Art
Languages : en
Pages : 334
Book Description
This is the first full-length study about the British artist Roy Ascott, one of the first cybernetic artists, with a career spanning seven decades to date. The book focuses on his early career, exploring the evolution of his early interests in communication in the context of the rich overlaps between art, science and engineering in Britain during the 1950s and 1960s. The first part of the book looks at Ascott’s training and early work. The second park looks solely at Groundcourse, Ascott’s extraordinary pedagogical model for visual arts and cybernetics which used an integrative and systems-based model, drawing in behaviourism, analogue machines, performance and games. Using hitherto unpublished photographs and documents, this book will establish a more prominent place for cybernetics in post-war British art.
Cyberwars in the Middle East
Author: Ahmed Al-Rawi
Publisher: Rutgers University Press
ISBN: 1978810121
Category : History
Languages : en
Pages : 135
Book Description
Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.
Publisher: Rutgers University Press
ISBN: 1978810121
Category : History
Languages : en
Pages : 135
Book Description
Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other. On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.
From Newspeak to Cyberspeak
Author: Slava Gerovitch
Publisher: MIT Press
ISBN: 9780262572255
Category : History
Languages : en
Pages : 386
Book Description
In this book, Slava Gerovitch argues that Soviet cybernetics was not just an intellectual trend but a social movement for radical reform in science and society as a whole. Followers of cybernetics viewed computer simulation as a universal method of problem solving and the language of cybernetics as a language of objectivity and truth. With this new objectivity, they challenged the existing order of things in economics and politics as well as in science. The history of Soviet cybernetics followed a curious arc. In the 1950s it was labeled a reactionary pseudoscience and a weapon of imperialist ideology. With the arrival of Khrushchev's political "thaw," however, it was seen as an innocent victim of political oppression, and it evolved into a movement for radical reform of the Stalinist system of science. In the early 1960s it was hailed as "science in the service of communism," but by the end of the decade it had turned into a shallow fashionable trend. Using extensive new archival materials, Gerovitch argues that these fluctuating attitudes reflected profound changes in scientific language and research methodology across disciplines, in power relations within the scientific community, and in the political role of scientists and engineers in Soviet society. His detailed analysis of scientific discourse shows how the Newspeak of the late Stalinist period and the Cyberspeak that challenged it eventually blended into "CyberNewspeak."
Publisher: MIT Press
ISBN: 9780262572255
Category : History
Languages : en
Pages : 386
Book Description
In this book, Slava Gerovitch argues that Soviet cybernetics was not just an intellectual trend but a social movement for radical reform in science and society as a whole. Followers of cybernetics viewed computer simulation as a universal method of problem solving and the language of cybernetics as a language of objectivity and truth. With this new objectivity, they challenged the existing order of things in economics and politics as well as in science. The history of Soviet cybernetics followed a curious arc. In the 1950s it was labeled a reactionary pseudoscience and a weapon of imperialist ideology. With the arrival of Khrushchev's political "thaw," however, it was seen as an innocent victim of political oppression, and it evolved into a movement for radical reform of the Stalinist system of science. In the early 1960s it was hailed as "science in the service of communism," but by the end of the decade it had turned into a shallow fashionable trend. Using extensive new archival materials, Gerovitch argues that these fluctuating attitudes reflected profound changes in scientific language and research methodology across disciplines, in power relations within the scientific community, and in the political role of scientists and engineers in Soviet society. His detailed analysis of scientific discourse shows how the Newspeak of the late Stalinist period and the Cyberspeak that challenged it eventually blended into "CyberNewspeak."