18 research outputs found

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Security of Ubiquitous Computing Systems

    Get PDF
    The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license

    Critical Programming: Toward a Philosophy of Computing

    Get PDF
    Beliefs about the relationship between human beings and computing machines and their destinies have alternated from heroic counterparts to conspirators of automated genocide, from apocalyptic extinction events to evolutionary cyborg convergences. Many fear that people are losing key intellectual and social abilities as tasks are offloaded to the everywhere of the built environment, which is developing a mind of its own. If digital technologies have contributed to forming a dumbest generation and ushering in a robotic moment, we all have a stake in addressing this collective intelligence problem. While digital humanities continue to flourish and introduce new uses for computer technologies, the basic modes of philosophical inquiry remain in the grip of print media, and default philosophies of computing prevail, or experimental ones propagate false hopes. I cast this as-is situation as the post-postmodern network dividual cyborg, recognizing that the rational enlightenment of modernism and regressive subjectivity of postmodernism now operate in an empire of extended mind cybernetics combined with techno-capitalist networks forming societies of control. Recent critical theorists identify a justificatory scheme foregrounding participation in projects, valorizing social network linkages over heroic individualism, and commending flexibility and adaptability through life long learning over stable career paths. It seems to reify one possible, contingent configuration of global capitalism as if it was the reflection of a deterministic evolution of commingled technogenesis and synaptogenesis. To counter this trend I offer a theoretical framework to focus on the phenomenology of software and code, joining social critiques with textuality and media studies, the former proposing that theory be done through practice, and the latter seeking to understand their schematism of perceptibility by taking into account engineering techniques like time axis manipulation. The social construction of technology makes additional theoretical contributions dispelling closed world, deterministic historical narratives and requiring voices be given to the engineers and technologists that best know their subject area. This theoretical slate has been recently deployed to produce rich histories of computing, networking, and software, inform the nascent disciplines of software studies and code studies, as well as guide ethnographers of software development communities. I call my syncretism of these approaches the procedural rhetoric of diachrony in synchrony, recognizing that multiple explanatory layers operating in their individual temporal and physical orders of magnitude simultaneously undergird post-postmodern network phenomena. Its touchstone is that the human-machine situation is best contemplated by doing, which as a methodology for digital humanities research I call critical programming. Philosophers of computing explore working code places by designing, coding, and executing complex software projects as an integral part of their intellectual activity, reflecting on how developing theoretical understanding necessitates iterative development of code as it does other texts, and how resolving coding dilemmas may clarify or modify provisional theories as our minds struggle to intuit the alien temporalities of machine processes

    Undergraduate and Graduate Course Descriptions, 2007 Winter

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Winter 2007

    Undergraduate and Graduate Course Descriptions, 2007 Fall

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Fall 2007

    Undergraduate and Graduate Course Descriptions, 2006 Fall

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Fall 2006

    Undergraduate and Graduate Course Descriptions, 2008 Summer

    Get PDF
    Wright State University undergraduate and graduate course descriptions from Summer 2008

    Jihadi Audiovisuality and its Entanglements

    Get PDF
    Explores the use of images, sounds and videos in Jihadi media and how people engage with them Fosters theoretical approaches to audiovisuality in the context of ‘propagandistic’ imagery Points to strategies and logics of appropriation within and around Jihadi audiovisuality, such as humour, re-enactments and memetic forms of cultural resistance Considers cultural and aesthetic expressions that evolve in response to Jihadi media output Presents empirically grounded research, combined with historical, multi-modal, rhetorical, ethnomusicological and digital audio-visual analysis and interpretations Case studies include: an exploration of: staged violence in IS productions; the appropriation of IS’s nashÄ«d SÌŁalÄ«l al-SÌŁawārim in digital contexts; the responses by social workers and former supporters of jihadi groups and movements; and how researchers themselves are part of the entanglements caused by politicisation and securitisation of Islam ISIS is often described as a terrorist organisation that uses social media to empower its supporters and reinforce its message. Through 12 case studies, this book examines the different ways in which Jihadi groups and their supporters use visualisation, sound production and aesthetic means to articulate their cause in online as well as offline contexts. Divided into four thematic sections, the chapters probe Jihadi appropriation of traditional and popular cultural expressions and show how, in turn, political activists appropriate extremist media to oppose and resist the propaganda. By conceptualising militant Islamist audiovisual productions as part of global media aesthetics and practices, the authors shed light on how religious actors, artists, civil society activists, global youth, political forces, security agencies and researchers engage with mediated manifestations of Jihadi ideology to deconstruct, reinforce, defy or oppose the messages
    corecore