18 research outputs found
Security of Ubiquitous Computing Systems
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license
Security of Ubiquitous Computing Systems
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license
Critical Programming: Toward a Philosophy of Computing
Beliefs about the relationship between human beings and computing machines and their destinies have alternated from heroic counterparts to conspirators of automated genocide, from apocalyptic extinction events to evolutionary cyborg convergences. Many fear that people are losing key intellectual and social abilities as tasks are offloaded to the everywhere of the built environment, which is developing a mind of its own. If digital technologies have contributed to forming a dumbest generation and ushering in a robotic moment, we all have a stake in addressing this collective intelligence problem. While digital humanities continue to flourish and introduce new uses for computer technologies, the basic modes of philosophical inquiry remain in the grip of print media, and default philosophies of computing prevail, or experimental ones propagate false hopes. I cast this as-is situation as the post-postmodern network dividual cyborg, recognizing that the rational enlightenment of modernism and regressive subjectivity of postmodernism now operate in an empire of extended mind cybernetics combined with techno-capitalist networks forming societies of control. Recent critical theorists identify a justificatory scheme foregrounding participation in projects, valorizing social network linkages over heroic individualism, and commending flexibility and adaptability through life long learning over stable career paths. It seems to reify one possible, contingent configuration of global capitalism as if it was the reflection of a deterministic evolution of commingled technogenesis and synaptogenesis. To counter this trend I offer a theoretical framework to focus on the phenomenology of software and code, joining social critiques with textuality and media studies, the former proposing that theory be done through practice, and the latter seeking to understand their schematism of perceptibility by taking into account engineering techniques like time axis manipulation. The social construction of technology makes additional theoretical contributions dispelling closed world, deterministic historical narratives and requiring voices be given to the engineers and technologists that best know their subject area. This theoretical slate has been recently deployed to produce rich histories of computing, networking, and software, inform the nascent disciplines of software studies and code studies, as well as guide ethnographers of software development communities. I call my syncretism of these approaches the procedural rhetoric of diachrony in synchrony, recognizing that multiple explanatory layers operating in their individual temporal and physical orders of magnitude simultaneously undergird post-postmodern network phenomena. Its touchstone is that the human-machine situation is best contemplated by doing, which as a methodology for digital humanities research I call critical programming. Philosophers of computing explore working code places by designing, coding, and executing complex software projects as an integral part of their intellectual activity, reflecting on how developing theoretical understanding necessitates iterative development of code as it does other texts, and how resolving coding dilemmas may clarify or modify provisional theories as our minds struggle to intuit the alien temporalities of machine processes
Undergraduate and Graduate Course Descriptions, 2007 Winter
Wright State University undergraduate and graduate course descriptions from Winter 2007
Undergraduate and Graduate Course Descriptions, 2007 Fall
Wright State University undergraduate and graduate course descriptions from Fall 2007
Undergraduate and Graduate Course Descriptions, 2006 Fall
Wright State University undergraduate and graduate course descriptions from Fall 2006
Undergraduate and Graduate Course Descriptions, 2008 Summer
Wright State University undergraduate and graduate course descriptions from Summer 2008
Jihadi Audiovisuality and its Entanglements
Explores the use of images, sounds and videos in Jihadi media and how people engage with them
Fosters theoretical approaches to audiovisuality in the context of âpropagandisticâ imagery
Points to strategies and logics of appropriation within and around Jihadi audiovisuality, such as humour, re-enactments and memetic forms of cultural resistance
Considers cultural and aesthetic expressions that evolve in response to Jihadi media output
Presents empirically grounded research, combined with historical, multi-modal, rhetorical, ethnomusicological and digital audio-visual analysis and interpretations
Case studies include: an exploration of: staged violence in IS productions; the appropriation of ISâs nashÄ«d SÌŁalÄ«l al-SÌŁawÄrim in digital contexts; the responses by social workers and former supporters of jihadi groups and movements; and how researchers themselves are part of the entanglements caused by politicisation and securitisation of Islam
ISIS is often described as a terrorist organisation that uses social media to empower its supporters and reinforce its message. Through 12 case studies, this book examines the different ways in which Jihadi groups and their supporters use visualisation, sound production and aesthetic means to articulate their cause in online as well as offline contexts.
Divided into four thematic sections, the chapters probe Jihadi appropriation of traditional and popular cultural expressions and show how, in turn, political activists appropriate extremist media to oppose and resist the propaganda. By conceptualising militant Islamist audiovisual productions as part of global media aesthetics and practices, the authors shed light on how religious actors, artists, civil society activists, global youth, political forces, security agencies and researchers engage with mediated manifestations of Jihadi ideology to deconstruct, reinforce, defy or oppose the messages