- Table View
- List View
Cyberformalism: Histories of Linguistic Forms in the Digital Archive
by Daniel ShoreA groundbreaking study of how abstract linguistic signs circulate in literature, intellectual history, and popular culture.Linguistic forms are essential to meaning: like words, they make a semantic contribution to the things we say. We inherit them from past writers and speakers and fill them with different words to produce novel utterances. They shape us and the ways we interpret the world. Yet prevalent assumptions about language and the constraints of print-finding tools have kept linguistic forms and their histories hidden from view. Drawing on recent work in cognitive and construction grammar along with tools and methods developed by corpus and computational linguists, Daniel Shore’s Cyberformalism represents a new way forward for digital humanities scholars seeking to understand the textual past. Championing a qualitative approach to digital archives, Shore uses the abstract pattern-matching capacities of search engines to explore precisely those combinatory aspects of language—word order, syntax, categorization—discarded by the "bag of words" quantitative methods that are dominant in the digital humanities. While scholars across the humanities have long explored the histories of words and phrases, Shore argues that increasingly sophisticated search tools coupled with growing full-text digital archives make it newly possible to study the histories of linguistic forms. In so doing, Shore challenges a range of received metanarratives and complicates some of the most basic concepts of literary study. Touching on canonical works by Shakespeare, Milton, Wordsworth, and Kant, even as it takes the full diversity of digitized texts as its purview, Cyberformalism asks scholars of literature, history, and culture to revise nothing less than their understanding of the linguistic sign.
Cybergefahr: Wie wir uns gegen Cyber-Crime und Online-Terror wehren können
by Eddy WillemsMan kann online wählen, Rechnungen bezahlen und Tickets kaufen - aber wie sicher ist das? Überall lauern Viren, Spam, Hackerangriffe und sogar Cyber-Spione. Wie kann man sich schützen und wie sollte man dem Phänomen Cyber-Crime begegnen? Der bekannte Security-Experte Eddy Willems gibt einen Überblick über Online-Gefahren und Möglichkeiten, sich vor ihnen zu schützen. Er erläutert spannend die Vergangenheit, Gegenwart und Zukunft des Cyber-Crime.
Cyberidentities: Canadian and European Presence in Cyberspace
by Leen D'HaenensThis innovative study explores diverse aspects of Canadian and European identity on the information highway and reaches beyond technical issues to confront and explore communication, culture and the culture of communication.
Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks (Information Policy)
by Josephine WolffWhy cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management.As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early &“Internet Security Liability&” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite—to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood.
Cyberjutsu: Cybersecurity for the Modern Ninja
by Ben McCartyLike Sun Tzu's Art of War for Modern Business, this book uses ancient ninja scrolls as the foundation for teaching readers about cyber-warfare, espionage and security.Cyberjutsu presents a practical cybersecurity field guide based on the techniques, tactics, and procedures (TTPs) of the ancient ninja. Author Ben McCarty, a cyber warfare specialist and former NSA developer, analyzes once-secret Japanese scrolls, drawing parallels to modern infosec concepts to provide unique insights on defensive and offensive security. He translates the training methodologies of Japan&’s most notorious covert agents—history&’s first advanced persistent threat (APT)—into highly effective practices for countering information warfare, espionage, supply-chain attacks, zero-day exploits, and more. Each chapter examines one TTP in detail—like assessing gaps in a target&’s defense, striking where the enemy is negligent, and mastering the art of invisibility—and explains what the concept can teach us about the current cybersecurity landscape. McCarty recommends in-depth mitigations and security controls, mapped to the NIST 800-53 standard, and a &“Castle Theory Thought Exercise&” that helps you apply the ancient lesson to protect your castle (network) from enemy ninja (cyber threat actors). You&’ll discover the effectiveness of ancient social engineering strategies and trap-based security controls; see why mapping your network like an adversary gives you the advantage; and apply lessons from old-world tools, like the &“ninja ladder,&” to prevent attacks. Topics also include: • Threat modeling, threat intelligence, and targeted controls • Countermeasures like network sensors, time-based controls, airgaps, and improved authentication protocols • Profiles of insider threats, and ways to recognize them in employees • Covert communication TTPs and their implications for malware command and control (C2) • Methods for detecting attackers, preventing supply-chain attacks, and defending against zero-day exploits In this book, you&’ll see the astonishing power of ninja information-gathering processes—and how adopting them just might be the key to innovating contemporary cybersecurity models.
Cyberlaw: The Law of the Internet and Information Technology
by Brian CraigFeaturing the most current exploration of cyberlaw, this book helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy. <p><p>Chapters include recent, relevant cases, discussion questions and exercises at the end of each chapter. Using a consistent voice and clear explanations, the author covers the latest developments in cyberlaw-from cases to legislation to regulations.
Cyberlibertarianism: The Right-Wing Politics of Digital Technology
by David GolumbiaAn urgent reckoning with digital technology&’s fundamentally right-wing legal and economic underpinnings In a timely challenge to the potent political role of digital technology, Cyberlibertarianism argues that right-wing ideology was built into both the technical and social construction of the digital world from the start. Leveraging more than a decade of research, David Golumbia traces how digital evangelism has driven the worldwide shift toward the political right, concealing inequality, xenophobia, dishonesty, and massive corporate concentrations of wealth and power beneath the utopian presumption of digital technology as an inherent social good. Providing an incisive critique of the push for open access and open-source software and the legal battles over online censorship and net neutrality, Cyberlibertarianism details how the purportedly democratic internet has been employed as an organizing tool for terror and hate groups and political disinformation campaigns. As he unpacks our naively utopian conception of the digital world, Golumbia highlights technology&’s role in the advancement of hyperindividualist and antigovernment agendas, demonstrating how Silicon Valley corporations and right-wing economists; antiestablishment figures such as Julian Assange, Elon Musk, Peter Thiel, Edward Snowden, and Mark Zuckerberg; and seemingly positive voices such as John Perry Barlow, Cory Doctorow, the Electronic Freedom Foundation, and Wikipedia all have worked to hamper regulation and weaken legal safeguards against exploitation. Drawing from a wide range of thought in digital theory, economics, law, and political philosophy as well as detailed research and Golumbia&’s own experience as a software developer, Cyberlibertarianism serves as a clarion call to reevaluate the fraught politics of the internet. In the hope of providing a way of working toward a more genuinely democratic and egalitarian future for digital technology, this magisterial work insists that we must first understand the veiled dogmas from which it has been constructed. Retail e-book files for this title are screen-reader friendly.
Cyberliteracy: Navigating the Internet with Awareness
by Laura J. GurakFor anyone who has ever felt bewildered, dismayed, or even infuriated by the Internet, this helpful book clearly explains computer communications and how to become literate in cyberspace. With lively stories and interesting case histories, Laura Gurak shows how to sort fact from fiction, detect hoaxes, identify advertising masquerading as product information, protect privacy, and contend with other critical issues related to the new language of the Internet.
Cybernetic Approach to Project Management
by Bogdan LentThis book attempts to reflect the project reality as closely as possible, covering the ISO 21500:2012 standard that has just been introduced and the benefits from the best contributions worldwide and also providing the concise yet powerful tool box. It shall be easy to use and intuitively supportive of project managers. So far, evidence indicates that these targets are successfully met. One of its key recognitions, and in consequence a distinctive feature of this book, is the impact that the project manager's personality has on the fate of the project. The project manager's successful self-management in work & life and in leadership processes should be considered as important in any endeavor as all other project management processes, covered by the new standards and guidelines.
Cybernetic Architectures: Informational Thinking and Digital Design (Routledge Research in Architecture)
by Camilo Andrés Cifuentes QuinFor the past 50 years, the advancements of technology have equipped architects with unique tools that have enabled the development of new computer-mediated design methods, fabrication techniques, and architectural expressions. Simultaneously, in contemporary architecture new frameworks emerged that have radically redefined the traditional conceptions of design, of the built environment, and of the role of architects. Cybernetic Architectures argues that such frameworks have been constructed in direct reference to cybernetic thinking, a thought model that emerged concurrently with the origins of informatics and that embodies the main assumptions, values, and ideals underlying the development of computer science. The book explains how the evolution of the computational perspective in architecture has been parallel to the construction of design issues in reference to the central ideas fostered by the cybernetic model. It unpacks and explains this crucial relationship, in the work of digital architects, between the use of information technology in design and the conception of architectural problems around an informational ontology. This book will appeal to architecture students and scholars interested in understanding the recent transformations in the architectural landscape related to the advent of computer-based design paradigms.
Cybernetic Avatar
by Hiroshi Ishiguro Fuki Ueno Eiki TachibanaThis open access book presents a vision of a future, where avatars play an integral role in shaping the fabric of our interconnected society. The book introduces the authors’ ongoing efforts to advance avatar technologies and is structured into nine chapters. Chapter 1 discusses the potentially revolutionary impact of cybernetic avatars (CAs) as a new medium of communication, liberating individuals from physical barriers and creating more flexible work environments. Chapters 2, 3, and 4 present developments in CAs with advanced autonomous functionality. Chapters 5 and 6 discuss the creation of a CA platform that connects multiple operators and CAs. Chapter 7 explores the physiological and neuroscientific effects of avatars and other media on operators and users. Finally, Chapters 8 and 9 discuss the societal implementation of CAs. This book is stemmed from one of the Moonshot R&D projects funded by the Japan Science and Technology Agency (JST).
Cybernetic Revolutionaries: Technology and Politics in Allende's Chile
by Eden MedinaA historical study of Chile's twin experiments with cybernetics and socialism, and what they tell us about the relationship of technology and politics.In Cybernetic Revolutionaries, Eden Medina tells the history of two intersecting utopian visions, one political and one technological. The first was Chile's experiment with peaceful socialist change under Salvador Allende; the second was the simultaneous attempt to build a computer system that would manage Chile's economy. Neither vision was fully realized—Allende's government ended with a violent military coup; the system, known as Project Cybersyn, was never completely implemented—but they hold lessons for today about the relationship between technology and politics.Drawing on extensive archival material and interviews, Medina examines the cybernetic system envisioned by the Chilean government—which was to feature holistic system design, decentralized management, human-computer interaction, a national telex network, near real-time control of the growing industrial sector, and modeling the behavior of dynamic systems. She also describes, and documents with photographs, the network's Star Trek-like operations room, which featured swivel chairs with armrest control panels, a wall of screens displaying data, and flashing red lights to indicate economic emergencies.Studying project Cybersyn today helps us understand not only the technological ambitions of a government in the midst of political change but also the limitations of the Chilean revolution. This history further shows how human attempts to combine the political and the technological with the goal of creating a more just society can open new technological, intellectual, and political possibilities. Technologies, Medina writes, are historical texts; when we read them we are reading history.
Cybernetic Revolutionaries
by Eden MedinaIn Cybernetic Revolutionaries, Eden Medina tells the history of two intersecting utopian visions, one political and one technological. The first was Chile's experiment with peaceful socialist change under Salvador Allende; the second was the simultaneous attempt to build a computer system that would manage Chile's economy. Neither vision was fully realized--Allende's government ended with a violent military coup; the system, known as Project Cybersyn, was never completely implemented--but they hold lessons for today about the relationship between technology and politics. Drawing on extensive archival material and interviews, Medina examines the cybernetic system envisioned by the Chilean government--which was to feature holistic system design, decentralized management, human-computer interaction, a national telex network, near real-time control of the growing industrial sector, and modeling the behavior of dynamic systems. She also describes, and documents with photographs, the network's Star Trek-like operations room, which featured swivel chairs with armrest control panels, a wall of screens displaying data, and flashing red lights to indicate economic emergencies. Studying project Cybersyn today helps us understand not only the technological ambitions of a government in the midst of political change but also the limitations of the Chilean revolution. This history further shows how human attempts to combine the political and the technological with the goal of creating a more just society can open new technological, intellectual, and political possibilities. Technologies, Medina writes, are historical texts; when we read them we are reading history.
Cybernetical Intelligence: Engineering Cybernetics with Machine Intelligence
by Kelvin K. WongCYBERNETICAL INTELLIGENCE Highly comprehensive, detailed, and up-to-date overview of artificial intelligence and cybernetics, with practical examples and supplementary learning resources Cybernetical Intelligence: Engineering Cybernetics with Machine Intelligence is a comprehensive guide to the field of cybernetics and neural networks, as well as the mathematical foundations of these technologies. The book provides a detailed explanation of various types of neural networks, including feedforward networks, recurrent neural networks, and convolutional neural networks as well as their applications to different real-world problems. This groundbreaking book presents a pioneering exploration of machine learning within the framework of cybernetics. It marks a significant milestone in the field’s history, as it is the first book to describe the development of machine learning from a cybernetics perspective. The introduction of the concept of “Cybernetical Intelligence” and the generation of new terminology within this context propel new lines of thought in the historical development of artificial intelligence. With its profound implications and contributions, this book holds immense importance and is poised to become a definitive resource for scholars and researchers in this field of study. Each chapter is specifically designed to introduce the theory with several examples. This comprehensive book includes exercise questions at the end of each chapter, providing readers with valuable opportunities to apply and strengthen their understanding of cybernetical intelligence. To further support the learning journey, solutions to these questions are readily accessible on the book’s companion site. Additionally, the companion site offers programming practice exercises and assignments, enabling readers to delve deeper into the practical aspects of the subject matter. Cybernetical Intelligence includes information on: The history and development of cybernetics and its influence on the development of neural networks Developments and innovations in artificial intelligence and machine learning, such as deep reinforcement learning, generative adversarial networks, and transfer learning Mathematical foundations of artificial intelligence and cybernetics, including linear algebra, calculus, and probability theory Ethical implications of artificial intelligence and cybernetics as well as responsible and transparent development and deployment of AI systems Presenting a highly detailed and comprehensive overview of the field, with modern developments thoroughly discussed, Cybernetical Intelligence is an essential textbook that helps students make connections with real-life engineering problems by providing both theory and practice, along with a myriad of helpful learning aids.
Cybernetics: From Past to Future (Studies in Systems, Decision and Control #47)
by D. A. NovikovThis book is a concise navigator across the history of cybernetics, itsstate-of-the-art and prospects. The evolution of cybernetics (from N. Wiener tothe present day) and the reasons of its ups and downs are presented. Thecorrelation of cybernetics with the philosophy and methodology of control, aswell as with system theory and systems analysis is clearly demonstrated. The book presents a detailed analysis focusing on the modern trends ofresearch in cybernetics. A new development stage of cybernetics (the so-calledcybernetics 2. 0) is discussed as a science on general regularities of systemsorganization and control. The author substantiates the topicality ofelaborating a new branch of cybernetics, i. e. organization theory which studiesan organization as a property, process and system. The book is intended for theoreticians andpractitioners, as well as for students, postgraduates and doctoral candidates. In the first place, the target audience includes tutors and lecturers preparingcourses on cybernetics, control theory and systems science.
Cybernetics 2.0: A General Theory of Adaptivity and Homeostasis in the Brain and in the Body (Springer Series on Bio- and Neurosystems #14)
by Bernard WidrowThis book takes the notions of adaptivity and learning from the realm of engineering into the realm of biology and natural processes. It introduces a Hebbian-LMS algorithm, an integration of unsupervised Hebbian learning and supervised LMS learning in neural networks, as a mathematical representation of a general theory for synaptic learning in the brain, and adaptation and functional control of homeostasis in living systems. Written in a language that is able to address students and scientists with different backgrounds, this book accompanies readers on a unique journey through various homeostatic processes in living organisms, such as body temperature control and synaptic plasticity, explaining how the Hebbian-LMS algorithm can help understand them, and suggesting some open questions for future research. It also analyses cell signalling pathways from an unusual perspective, where hormones and hormone receptors are shown to be regulated via the principles of the Hebbian-LMS algorithm. It further discusses addiction and pain, and various kinds of mood disorders alike, showing how they can be modelled with the Hebbian-LMS algorithm. For the first time, the Hebbian-LMS algorithm, which has been derived from a combination of Hebbian theory from the neuroscience field and the LMS algorithm from the engineering field of adaptive signal processing, becomes a potent model for understanding how biological regulation works. Thus, this book is breaking new ground in neuroscience by providing scientists with a general theory for how nature does control synaptic learning. It then goes beyond that, showing that the same principles apply to hormone-mediated regulation of physiological processes. In turn, the book tackles in more depth the concept of learning. It covers computer simulations and strategies for training neural networks with the Hebbian-LMS algorithm, demonstrating that the resulting algorithms are able to identify relationships between unknown input patterns. It shows how this can translate in useful ideas to understand human memory and design cognitive structures. All in all, this book offers an absolutely, unique, inspiring reading for biologists, physiologists, and engineers, paving the way for future studies on what we could call the nature’s secret learning algorithm.
Cybernetics and Algorithms in Intelligent Systems: Proceedings Of 7th Computer Science On-line Conference 2018, Volume 3 (Advances In Intelligent Systems And Computing #765)
by Radek SilhavyThis book presents new approaches and methods applied to real-world problems, and in particular, exploratory research relating to novel approaches in the field of cybernetics and automation control theory. Particularly focusing on modern trends in selected fields of interest, it presents new algorithms and methods in intelligent systems in cybernetics. This book constitutes the third volume of the refereed proceedings of the Cybernetics and Algorithms in Intelligent Systems Section of the 7th Computer Science On-line Conference 2018 (CSOC 2018), held online in April 2018.
Cybernetics and Applied Systems
by Constantin Virgil NegoitaIn light of the enormous interest in building intelligent systems, this volume blends theory, applications, and methodology of cybernetics taking it out of the realm of the abstract and explaining how cybernetics can contribute to an improved understanding of intelligence. Among the topics of the 17
Cybernetics and Automation Control Theory Methods in Intelligent Algorithms: Proceedings of 8th Computer Science On-line Conference 2019, Vol. 3 (Advances in Intelligent Systems and Computing #986)
by Radek SilhavyThis book discusses novel intelligent-system algorithms and methods in cybernetics, presenting new approaches in the field of cybernetics and automation control theory. It constitutes the proceedings of the Cybernetics and Automation Control Theory Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.
Cybernetics and Control Theory in Systems: Proceedings of 13th Computer Science On-line Conference 2024, Volume 2 (Lecture Notes in Networks and Systems #1119)
by Radek Silhavy Petr SilhavyAddressing key issues in modern cybernetics and informatics, this book presents vital research within networks and systems. It offers an extensive overview of the latest methods, algorithms, and design innovations. This book compiles the meticulously reviewed proceedings of the Networks and Systems in Cybernetics session of the 13th Computer Science Online Conference 2024 (CSOC 2024), held virtually in April 2024.
Cybernetics and Mathematics Applications in Intelligent Systems: Proceedings of the 6th Computer Science On-line Conference 2017 (CSOC2017), Vol 2 (Advances in Intelligent Systems and Computing #574)
by Radek Silhavy Roman Senkerik Zuzana Kominkova Oplatkova Petr Silhavy Zdenka ProkopovaThis book presents new methods for and approaches to real-world problems as well as exploratory research describing novel mathematics and cybernetics applications in intelligent systems. It focuses on modern trends in selected fields of technological systems and automation control theory. It also introduces new algorithms, methods and applications of intelligent systems in automation, technological and industrial applications. This book constitutes the refereed proceedings of the Cybernetics and Mathematics Applications in Intelligent Systems Section of the 6th Computer Science On-line Conference 2017 (CSOC 2017), held in April 2017.
Cybernetics and Systems: Social and Business Decisions (Routledge-Giappichelli Systems Management)
by Sergio Barile Raul Espejo Igor Perko Marialuisa SavianoSociety is now facing challenges for which the traditional management toolbox is increasingly inadequate. Well-grounded theoretical frameworks, such as systems thinking and cybernetics, offer general level interpretation schemes and models that are capable of supporting understanding of complex phenomena and are not impacted by the passage of time. This book serves the knowledge society to address the complexity of decision making and problem solving in the 21st century with contributions from systems and cybernetics. A multi-disciplinary approach has been adopted to support diversity and to develop inter- and trans-disciplinary knowledge within the shared thematic of problem solving and decision making in the 21st century. Its conceptual thread is cyber/systemic thinking, and its realisation is supported by a wide network of scientists on the basis of a highly participative agenda. The book provides a platform of knowledge sharing and conceptual frameworks developed with multi-disciplinary perspectives, which are useful to better understand the fast changing scenario and the complexity of problem solving in the present time.
Cybernetics and the Constructed Environment: Design Between Nature and Technology
by Zihao ZhangGrounded in contemporary landscape architecture theory and practice, Cybernetics and the Constructed Environment blends examples from art, design, and engineering with concepts from cybernetics and posthumanism, offering a transdisciplinary examination of the ramifications of cybernetics on the constructed environment. Cybernetics, or the study of communication and control in animals and machines, has grown increasingly relevant nearly 80 years after its inception. Cyber-physical systems, sensing networks, and spatial computing—algorithms and intelligent machines—create endless feedback loops with human and non-human actors, co-producing a cybernetic environment. Yet, when an ecosystem is meticulously managed by intelligent machines, can we still call it wild nature? Posthumanism ideas, such as new materialism, actor-network theory, and object-oriented ontology, have become increasingly popular among design disciplines, including landscape architecture, and may have provided transformative frameworks to understand this entangled reality. However, design still entails a sense of intentionality and an urge to control. How do we, then, address the tension between the designer’s intentionality and the co-produced reality of more-than-human agents in the cybernetic environment? Is posthumanism enough to develop a framework to think beyond our all-too-human ways of thinking? For researchers, scholars, practitioners, and students in environmental design and engineering disciplines, this book maps out a paradigm of environmentalism and ecological design rooted in non-communication and uncontrollability, and puts a speculative turn on cybernetics.Chapters 8 and 9 of this book are freely available as a downloadable Open Access PDF at http://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license.
Cybernetics Approaches in Intelligent Systems: Computational Methods in Systems and Software 2017, vol. 1 (Advances in Intelligent Systems and Computing #661)
by Radek Silhavy Petr Silhavy Zdenka ProkopovaThis book discusses new approaches and methods in the cybernetics, algorithms and software engineering in the scope of the intelligent systems. It brings new approaches and methods to real-world problems and exploratory research that describes novel approaches in the cybernetics, algorithms and software engineering in the scope of the intelligent systems. This book constitutes the refereed proceedings of the Computational Methods in Systems and Software 2017, a conference that provided an international forum for the discussion of the latest high-quality research results in all areas related to computational methods, statistics, cybernetics and software engineering.
Cybernetics, Cognition and Machine Learning Applications: Proceedings of ICCCMLA 2020 (Algorithms for Intelligent Systems)
by Vinit Kumar Gunjan P. N. Suganthan Jan Haase Amit KumarThis book includes the original, peer reviewed research articles from the 2nd International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA 2020), held in August, 2020 at Goa, India. It covers the latest research trends or developments in areas of data science, artificial intelligence, neural networks, cognitive science and machine learning applications, cyber physical systems and cybernetics.