You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Traces the revolution in statistics that gave rise to artificial intelligence and predictive algorithms refiguring contemporary capitalism. Our finances, politics, media, opportunities, information, shopping and knowledge production are mediated through algorithms and their statistical approaches to knowledge; increasingly, these methods form the organizational backbone of contemporary capitalism. Revolutionary Mathematics traces the revolution in statistics and probability that has quietly underwritten the explosion of machine learning, big data and predictive algorithms that now decide many aspects of our lives. Exploring shifts in the philosophical understanding of probability in the late...
A bold new theory of cyberwar argues that militarized hacking is best understood as a form of deconstruction From shadowy attempts to steal state secrets to the explosive destruction of Iranian centrifuges, cyberwar has been a vital part of statecraft for nearly thirty years. But although computer-based warfare has been with us for decades, it has changed dramatically since its emergence in the 1990s, and the pace of change is accelerating. In Deconstruction Machines, Justin Joque inquires into the fundamental nature of cyberwar through a detailed investigation of what happens at the crisis points when cybersecurity systems break down and reveal their internal contradictions. He concludes th...
Creating Data Literate Students provides high school librarians and educators with foundational domain knowledge to teach a new subset of information literacy skills -- data and statistical literacy, including: statistics and data comprehension; data as argument; and data visualization. Data -- both raw and displayed in visualizations -- can clarify or confuse, confirm or deny, persuade or deter. Students often learn that numbers are objective, though data in the real world is rarely so. In fact, visualized data -- even from authoritative sources -- can sometimes be anything but objective. Librarians and classroom educators need to be as fluent with quantitative data as they are with text in order to support high schoolers as they engage with data in formal and informal settings. We asked contributors to this volume -- experts in high school curriculum, information literacy and/or data literacy -- to explore the intersections between data and curriculum and identify high-impact strategies for demystifying data for educators and students alike.
A foundational text offering a unified design vocabulary and a common methodology for maximizing the expressive power of digital artifacts. Digital artifacts from iPads to databases pervade our lives, and the design decisions that shape them affect how we think, act, communicate, and understand the world. But the pace of change has been so rapid that technical innovation is outstripping design. Interactors are often mystified and frustrated by their enticing but confusing new devices; meanwhile, product design teams struggle to articulate shared and enduring design goals. With Inventing the Medium, Janet Murray provides a unified vocabulary and a common methodology for the design of digital ...
Dark Finance offers one of the first ethnographic accounts of financial expansion and its political impacts in Eastern Europe. Following workers, managers, and investors in the Macedonian construction sector, Fabio Mattioli shows how financialization can empower authoritarian regimes—not by making money accessible to everyone, but by allowing a small group of oligarchs to monopolize access to international credit and promote a cascade of exploitative domestic debt relations. The landscape of failed deals and unrealizable dreams that is captured in this book portrays finance not as a singular, technical process. Instead, Mattioli argues that finance is a set of political and economic relati...
Knowing how to recognize the role data plays in our lives is critical to navigating today's complex world. In this volume, you'll find two kinds of professional development tools to support that growth. Part I contains pre-made professional development via links to webinars from the 2016 and 2017 4T Virtual Conference on Data Literacy, along with discussion questions and activities that can animate conversations around data in your school. Part II explores data "in the wild" with case studies pulled from the headlines, along with provocative discussion questions, professionals and students alike can explore multiple perspectives at play with Big Data, data privacy, personal data management, ethical data use, and citizen science.
A proposal that algorithms are not simply instructions to be performed but thinking entities that construct digital spatio-temporalities. In Contagious Architecture, Luciana Parisi offers a philosophical inquiry into the status of the algorithm in architectural and interaction design. Her thesis is that algorithmic computation is not simply an abstract mathematical tool but constitutes a mode of thought in its own right, in that its operation extends into forms of abstraction that lie beyond direct human cognition and control. These include modes of infinity, contingency, and indeterminacy, as well as incomputable quantities underlying the iterative process of algorithmic processing. The mai...
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Quantum Theory and the Schism in Physics is one of the three volumes of Karl Popper’s Postscript to the Logic of scientific Discovery. The Postscript is the culmination of Popper’s work in the philosophy of physics and a new famous attack on subjectivist approaches to philosophy of science. Quantum Theory and the Schism in Physics is the third volume of the Postscript. It may be read independently, but it also forms part of Popper’s interconnected argument in the Postscript. It presents Popper’s classic statement on quantum physics and offers important insights into his thinking on problems of method within science and physics as a whole.