Skip to main content

Home/ Digital Ethnography at Kansas State University/ Group items tagged evidence

Rss Feed Group items tagged

Mike Wesch

Origin of language - Wikipedia, the free encyclopedia - 1 views

  • One of the intriguing abilities that language users have is that of high-level reference, or the ability to refer to things or states of being that are not in the immediate realm of the speaker. This ability is often related to theory of mind, or an awareness of the other as a being like the self with individual wants and intentions. According to Chomsky, Hauser and Fitch (2002), there are six main aspects of this high-level reference system: Theory of mind Capacity to acquire nonlinguistic conceptual representations, such as the object/kind distinction Referential vocal signals Imitation as a rational, intentional system Voluntary control over signal production as evidence of intentional communication Number representation
  •  
    "One of the intriguing abilities that language users have is that of high-level reference, or the ability to refer to things or states of being that are not in the immediate realm of the speaker. This ability is often related to theory of mind, or an awareness of the other as a being like the self with individual wants and intentions. According to Chomsky, Hauser and Fitch (2002), there are six main aspects of this high-level reference system: * Theory of mind * Capacity to acquire nonlinguistic conceptual representations, such as the object/kind distinction * Referential vocal signals * Imitation as a rational, intentional system * Voluntary control over signal production as evidence of intentional communication * Number representation"
Ampere Software

Microsoft software development services - 0 views

  •  
    Ampere possess solid experience in software development with Microsoft technologies, we provide MS .NET programming and Silver light based application development solutions. We apply cutting edge Microsoft technologies to create successful software products and the status of Microsoft partner is an evidence of Ampere correspondence to recognized coding standards.
Mark Clayson

Fast Cash Loans With No Credit Check- Immediate And Speedy Financial Plan For Your Unpl... - 0 views

  •  
    No substance, if you have bad evidence of credit check, when it comes to borrow resources because in your pressing circumstances you can take the help of appraisal fast cash loans with no credit check enhance on the internet.
Mike Wesch

Phantom's Trees, part two « zunguzungu - 0 views

  • The crux of Carpenter’s insight, I think, is that he isn’t just interested in a privileging of sight over other senses, but a particular way of thinking of sight as touch, of imagining that the things we see are real. On a certain level, of course, we do know that if we look at a row of trees, the “trees” are real while the “row” is imaginary, but — at the same time — Carpenter is not wrong to note that we do tend to act as if these mental bridges are real. Jonathan Edwards’ notion that what God “sees” produces reality gets secularized into practices we do without thinking about it: seeing is believing, we say, and despite all the evidence that seeing a thing is practically synonymous with seeing it wrong, we can still use phrases like “photographic evidence” as if it’s not an oxymoron.
Ali Safe

Health & Safety Manufacturing Industry Is Stakeholders Responsibility - 0 views

  •  
    The nerve-wrecking statistics and accounts of serious accidents in the manufacturing industry call for employees and employers in the sector to put their safety while undertaking their daily tasks before anything else. While it is evident that workstation hazard spectrum is extreme, regulatory measures must be observed keenly because the environs are full of hazardous substances, edifices, objects and machinery.
masquebf1

sac lancel bb pas cher De - 0 views

«Si je comprends bien, tu te mets à ton compte !» Cette remarque de Nicolas Sarkozy à Jean-François Copé, lorsque ce dernier lui a annoncé la création de son club Génération France.fr, résume assez...

sac lancel bb pas cher

started by masquebf1 on 15 Dec 14 no follow-up yet
Yann Leroux

How Boxxy brought the web to its knees | Technology | guardian.co.uk - 0 views

  • A year ago a young, unnamed and heavily-eyelinered young woman who hung around on Gaia Online made a video. She went by the handle of Boxxy.
  • That's it. Or at least it was for nearly 12 months.At Christmas, the video - by then languishing in YouTube's vaults - got posted to i-am-bored, and from there hit 4Chan, and in particular the site's /b/ messageboard... the heartland for many memes (and definitely NSFW). Why? Nobody's sure. Was Boxxy herself behind it? Or was she simply a vehicle for fans who liked her camgirl approach, apparent ADD and weirdly excitable behaviour?Over the subsequent days and weeks, Boxxy became a topic of contention on 4Chan - with the site splitting into two groups; those who professed to love Boxxy and all she stood for and those who hated Boxxy and her fans. Every thread threaten to spill over into Boxxy spam or a flamewar, and hundreds of 4channers went hacking Boxxy's YouTube account and other websites in search of her true identity. So far they don't seem to have succeeded.
  • Things really came to a head, though, when Boxxy haters - sick of seeing so much about her on 4Chan - decided to launch a denial of service attack on the website itself, bringing it down for some hours as a protest.
  • ...7 more annotations...
  • OK, yes, the whole story is extremely convoluted. But it's the sort of thing that I saw in evidence at ROFLCon earlier this year: somebody who is entirely unknown can get picked up for basically doing nothing, but doing it in public. So when our future digital archaeologists start looking back at our actions, they'll come across Boxxy and look confused. How on earth do you relate that story in a way that makes sense in 100 years, given that it makes basically no sense right now? That's partly what I love about the internet - and partly what makes my brain hurt.
  • candleja 20 Jan 09, 6:48am posting about a site that shouldn't be talked about, much less visited, is unwise enough. gaining recognition as the person who's talking about it just doesn't make sense to me. plus the article itself is about some teen nobody, hardly worth putting yourself under that kind of scrutinyeven FOX news had more sense, and we all know how irresponsible their journalism is.this entry should probably be amended in some way, to protect the site, the poster, and the general population from exposure to one of the "darker corners of the internet." there's a reason people don't encourage others to walk down dark alleys in a bad part of town
  • the majority of people posting about boxxy were neither, they were people who didnt care less either way but decided to troll the boxxy haters by posting boxxy pictures of bawksey everywhere. they did it for the lulz
  • Please note that off-topic comments will be removed from this thread. Any users posting such comments may have their posting rights withdrawn and subsequently have to move with their auntie and uncle in Bel-Air.
  • @dvdhldnPerhaps I've got too much time on my hands, but I wrote about this because I find memes fascinating, and the idea of being internet famous is really intriguing. Add that to the violent, misogynistic tendencies of /b/ and the ability of the crowd to bully someone for basically nothing... this is - if we let it happen - the future of the internet.
  • Just looked up Anonymous on Wikipedia. Their 'demotivational logo' has the catchphrase 'Because none of us are as cruel as all of us'.What an incredible and disturbing concept - frightening because it is both barbaric and intelligent. Fodder for a Neal Stephenson novel, but in the real world. Anybody with an ounce of humanity would think these fascinating aspects of networked society very worthy of discussion.
  • I just lost the game. Boxxy isn't a meme, AT ALL. EFG is a meme. Boxxy = NOT.The old Anons will let this pass, new ones will get bored and eventually boxxy will be forgotten
  •  
    Short story about Boxxy, the latest meme to get picked up by 4chan.
Mike Wesch

The Decline and Fall of the Private Self - 0 views

  • IRONICALLY, HUMANS NOW ENJOY MORE privacy than ever, says Aaron Ben-Ze'ev, president of the University of Haifa and author of Love Online: Emotions on the Internet. "Two hundred years ago, when people lived in villages or very dense cities, everyone's behavior was evident to many and it was extremely hard to hide it," he says. Today, e-mail and "chatting" online allow for completely anonymous interactions. We can talk and make plans without the whole household or office knowing. But if we're so able to keep things to ourselves, then why are we doing exactly the opposite?
  • the Internet can be more disinhibiting than the stiffest drink
  • "We've been shaped to be very sensitive to each other on a face-to-face basis," says Daniel Wegner, a Harvard psychologist When someone is in front of you, you can read how they're reacting to your admissions, keeping track-as you're hardwired to do-of whether they're comfortable, disapproving, or rapt. But when you're alone in a room and typing on a computer, explains Wegner, it's easy to forget there's somebody on the other end of the line and become oblivious to the consequences of sharing information.
  • ...3 more annotations...
  • Perhaps we simply have less to be ashamed of in an increasingly free-to-be-you-and-me era. "More and more people believe they are entitled to behave according to their own values and not the norms prevailing in society," Ben-Ze'ev says. That means there is less of a need to keep a protected private self, free from the scrutiny of strangers.
  • Nor do self-disclosers feel sheepish about craving the spotlight. "I've always thought of myself as being in a movie, that my world is larger than life," says Schaeffer.
  • Bookstores and talk shows have long trafficked in the confessions of not-necessarily-notables, but the Internet has democratized and amplified personal gut spilling. Web sites such as postsecret.com and mysecret.tv bring bathroom-wall-variety confessions, such as "I only love two of my children," "I had gay sex at church camp," and "I pee in the sink," to-and from-the masses. Meanwhile, teenagers telegraph their deep thoughts and petty observations for YouTube prowlers hungry for novelty and diversion.
Mike Wesch

How anonymous are you online? Examining online social behaviors from a cross-cultural p... - 0 views

  • Visual anonymity exists in an online community if individuals communicate with each other without their physical appearances attached to their messages.
  • A second level of anonymity is the dissociation of real and online identities. In online communities, there is ample anecdotal evidence that many individuals create a new persona for themselves using nicknames and avatars
  • A third level of anonymity is the concept of lack of identifiability, in which an individual’s behaviors are not distinguishable from others’ behaviors
  • ...3 more annotations...
  • A quick glimpse of the table confirms our prediction that Japanese people would prefer to discuss or voice their opinions when there is a lack of identifiability. The US Slashdot has a much lower rate of anonymous cowards, indicating a preference to be identifiable. For the most active topics, 25% of comments on average were made as anonymous coward in the US, compared to 69% in Japan.
  • Due to the industrialization and modernization of the past several decades, changes in social and economic structure have inevitably caused East Asian countries, such as Japan and Korea, to become more westernized. Due to this fact, some argue that Japan should not be considered as an exemplar of collectivistic societies (Takano and Osaka 1999). Yet the striking cultural differences, in the normative degree of anonymity, found in this study suggests that there continues to be a difference between Eastern and Western cultures in how people are motivated to seek and interact with others online.
Mike Wesch

'Online Social Networking on Campus' :: Inside Higher Ed :: Higher Education's Source f... - 0 views

  • Facebook, for example, is understood by students as “real” with a complex web of rules that guide playful misrepresentation, for example.
  • In our study, it was evident that student use of Facebook was governed by the degree to which students felt that they controlled self-presentation or digital agency
  • A code of Facebook ethics for faculty currently exists on the site and I would recommend that faculty review it.
  • ...3 more annotations...
  • I don’t see a problem with accepting a students’ friend request. And you can do so as a professor, and still make your profile as personal as you want it for your friends. How? Facebook has amazing privacy settings. You can make a friend list (all students, for instance) and then restrict how much of your profile they can see, and how much of your activity they can see. Students can see my basic work, school and contact info, but cannot see my status updates, photos tagged of me, or what my friends write on my wall.
  • There are ways to interact with students via Facebook without being friends. Facebook provides the Groups feature, but I recommend building your own application or choosing an application provider like ourselves. Applications allow users to interact with one another outside of being Facebook Friends. In our app, Instructors can send gifts, post on walls, share links, see status updates, and play a name game — all without being friends.
  • As someone who has built an LMS on Facebook, I can tell you the more you move towards “instructional tool” the more resistance and less use you will end up with.
Mike Wesch

Tracking the digital traces of social networks | Eureka! Science News - 0 views

  • So searching through vast amounts of anonymized data, Contractor and his collaborators found that teens had online friendships that were disproportionately with people in their immediate geographic area -- likely with people they already knew. "That finding really went against a lot of the media hype," Contractor said. "People were worried about helpless teenagers talking with strangers, but that is not what we found. This is the first time this has been based on solid evidence." Teenagers also tended to be friends with the friends of their friends, not with people who weren't part of their network already, the researchers found.
Adam Bohannon

Excessive texting may signal mental illness - web - Technology - smh.com.au - 0 views

  • Those with the condition suffered withdrawal symptoms of anger and tension when a computer was inaccessible, and often lost their sense of time through excessive use, Dr Block said.
  • Other symptoms included feeling "the need for better computer equipment, more software, or more hours of use", and having arguments, lying, social isolation and fatigue, he said. Excessive gaming, sexual preoccupations and excessive text messages and emails were all evidence of having the disorder, he said.
  •  
    People who send large numbers of text messages and emails may have a mental disorder, a doctor writing in a leading psychiatric journal said. Jerald Block, writing in the latest issue of the American Journal Of Psychiatry, said "internet addiction" was a "common disorder" that deserved inclusion in a manual of mental disorders used by health professionals.
Kevin Champion

Kevin Kelly -- The Technium - 0 views

  • In the case of the One Machine we should look for evidence of self-governance at the level of the greater cloud rather than at the component chip level. A very common cloud-level phenomenon is a DDoS attack. In a Distributed Denial of Service (DDoS) attack a vast hidden network of computers under the control of a master computer are awakened from their ordinary tasks and secretly assigned to "ping" (call) a particular target computer in mass in order to overwhelm it and take it offline. Some of these networks (called bot nets) may reach a million unsuspecting computers, so the effect of this distributed attack is quite substantial. From the individual level it is hard to detect the net, to pin down its command, and to stop it. DDoS attacks are so massive that they can disrupt traffic flows outside of the targeted routers - a consequence we might expect from an superorganism level event.
  • Unsurprisingly the vast flows of bits in the global internet exhibit periodic rhythms. Most of these are diurnal, and resemble a heartbeat. But perturbations of internet bit flows caused by massive traffic congestion can also be seen. Analysis of these "abnormal" events show great similarity to abnormal heart beats. They deviate from an "at rest" rhythms the same way that fluctuations of a diseased heart deviated from a healthy heart beat. Prediction: The One Machine has a low order of autonomy at present. If the superorganism hypothesis is correct in the next decade we should detect increased scale-invariant phenomenon, more cases of stabilizing feedback loops, and a more autonomous traffic management system.
  • 3) Perhaps 4chan is its face? Perhaps Anonymous speaks for the ii? Memes drift up out of the morass of /b/tards into the world, seemingly without a concrete source. “I CAN HAZ CHEEZBURGER” may be the global intelligence saying “hi”… or perhaps more poetically, babbling like a baby. http://online.wsj.com/article/SB121564928060441097.html?mod=rss_E-Commerce/Media
  •  
    Kevin Kelly is an amazing theorist about technology and here outlines the potential of it creating a global superorganism. Section II about autonomy is very interesting in context and a commenter suggests that perhaps Anonymous is the emerging face of this autonomous superorganism. Very intriguining indeed, but do you buy it?
Trapper Callender

Man-Computer Symbiosis - 2 views

  • In short, it seems worthwhile to avoid argument with (other) enthusiasts for artificial intelligence by conceding dominance in the distant future of cerebration to machines alone.
  • There will nevertheless be a fairly long interim during which the main intellectual advances will be made by men and computers working together in intimate association. A multidisciplinary study group, examining future research and development problems of the Air Force, estimated that it would be 1980 before developments in artificial intelligence make it possible for machines alone to do much thinking or problem solving of military significance. That would leave, say, five years to develop man-computer symbiosis and 15 years to use it. The 15 may be 10 or 500, but those years should be intellectually the most creative and exciting in the history of mankind.
  • It is often said that programming for a computing machine forces one to think clearly, that it disciplines the thought process. If the user can think his problem through in advance, symbiotic association with a computing machine is not necessary.
  • ...25 more annotations...
  • They would be easier to solve, and they could be solved faster, through an intuitively guided trial-and-error procedure in which the computer cooperated, turning up flaws in the reasoning or revealing unexpected turns in the solution.
  • Poincare anticipated the frustration of an important group of would-be computer users when he said, "The question is not, 'What is the answer?' The question is, 'What is the question?'" One of the main aims of man-computer symbiosis is to bring the computing machine effectively into the formulative parts of technical problems.
  • It is to bring computing machines effectively into processes of thinking that must go on in "real time," time that moves too fast to permit using computers in conventional ways.
  • To think in interaction with a computer in the same way that you think with a colleague whose competence supplements your own will require much tighter coupling between man and machine than is suggested by the example and than is possible today.
  • Throughout the period I examined, in short, my "thinking" time was devoted mainly to activities that were essentially clerical or mechanical: searching, calculating, plotting, transforming, determining the logical or dynamic consequences of a set of assumptions or hypotheses, preparing the way for a decision or an insight. Moreover, my choices of what to attempt and what not to attempt were determined to an embarrassingly great extent by considerations of clerical feasibility, not intellectual capability.
  • the operations that fill most of the time allegedly devoted to technical thinking are operations that can be performed more effectively by machines than by men.
  • If those problems can be solved in such a way as to create a symbiotic relation between a man and a fast information-retrieval and data-processing machine, however, it seems evident that the cooperative interaction would greatly improve the thinking process.
  • Computing machines can do readily, well, and rapidly many things that are difficult or impossible for man, and men can do readily and well, though not rapidly, many things that are difficult or impossible for computers. That suggests that a symbiotic cooperation, if successful in integrating the positive characteristics of men and computers, would be of great value. The differences in speed and in language, of course, pose difficulties that must be overcome.
  • Men will fill in the gaps, either in the problem solution or in the computer program, when the computer has no mode or routine that is applicable in a particular circumstance.
  • Clearly, for the sake of efficiency and economy, the computer must divide its time among many users. Timesharing systems are currently under active development. There are even arrangements to keep users from "clobbering" anything but their own personal programs.
  • It seems reasonable to envision, for a time 10 or 15 years hence, a "thinking center" that will incorporate the functions of present-day libraries together with anticipated advances in information storage and retrieval and the symbiotic functions suggested earlier in this paper. The picture readily enlarges itself into a network of such centers, connected to one another by wide-band communication lines and to individual users by leased-wire services. In such a system, the speed of the computers would be balanced, and the cost of the gigantic memories and the sophisticated programs would be divided by the number of users.
  • The first thing to face is that we shall not store all the technical and scientific papers in computer memory. We may store the parts that can be summarized most succinctly-the quantitative parts and the reference citations-but not the whole. Books are among the most beautifully engineered, and human-engineered, components in existence, and they will continue to be functionally important within the context of man-computer symbiosis. (Hopefully, the computer will expedite the finding, delivering, and returning of books.)
  • The second point is that a very important section of memory will be permanent: part indelible memory and part published memory. The computer will be able to write once into indelible memory, and then read back indefinitely, but the computer will not be able to erase indelible memory. (It may also over-write, turning all the 0's into l's, as though marking over what was written earlier.) Published memory will be "read-only" memory. It will be introduced into the computer already structured. The computer will be able to refer to it repeatedly, but not to change it.
  • The basic dissimilarity between human languages and computer languages may be the most serious obstacle to true symbiosis.
  • In short: instructions directed to computers specify courses; instructions-directed to human beings specify goals.
  • We may in due course see a serious effort to develop computer programs that can be connected together like the words and phrases of speech to do whatever computation or control is required at the moment. The consideration that holds back such an effort, apparently, is that the effort would produce nothing that would be of great value in the context of existing computers. It would be unrewarding to develop the language before there are any computing machines capable of responding meaningfully to it.
  • By and large, in generally available computers, however, there is almost no provision for any more effective, immediate man-machine communication than can be achieved with an electric typewriter.
  • Displays seem to be in a somewhat better state than controls. Many computers plot graphs on oscilloscope screens, and a few take advantage of the remarkable capabilities, graphical and symbolic, of the charactron display tube. Nowhere, to my knowledge, however, is there anything approaching the flexibility and convenience of the pencil and doodle pad or the chalk and blackboard used by men in technical discussion.
  • 2) Computer-Posted Wall Display: In some technological systems, several men share responsibility for controlling vehicles whose behaviors interact. Some information must be presented simultaneously to all the men, preferably on a common grid, to coordinate their actions. Other information is of relevance only to one or two operators. There would be only a confusion of uninterpretable clutter if all the information were presented on one display to all of them. The information must be posted by a computer, since manual plotting is too slow to keep it up to date.
  • Laboratory experiments have indicated repeatedly that informal, parallel arrangements of operators, coordinating their activities through reference to a large situation display, have important advantages over the arrangement, more widely used, that locates the operators at individual consoles and attempts to correlate their actions through the agency of a computer. This is one of several operator-team problems in need of careful study.
  • 3) Automatic Speech Production and Recognition: How desirable and how feasible is speech communication between human operators and computing machines?
  • Yet there is continuing interest in the idea of talking with computing machines.
  • In large part, the interest stems from realization that one can hardly take a military commander or a corporation president away from his work to teach him to type. If computing machines are ever to be used directly by top-level decision makers, it may be worthwhile to provide communication via the most natural means, even at considerable cost.
  • It seems reasonable, therefore, for computer specialists to be the ones who interact directly with computers in business offices.
  • Certainly, if the equipment were already developed, reliable, and available, it would be used.
  •  
    Man-computer symbiosis is an expected development in cooperative interaction between men and electronic computers. It will involve very close coupling between the human and the electronic members of the partnership. The main aims are 1) to let computers facilitate formulative thinking as they now facilitate the solution of formulated problems, and 2) to enable men and computers to cooperate in making decisions and controlling complex situations without inflexible dependence on predetermined programs. In the anticipated symbiotic partnership, men will set the goals, formulate the hypotheses, determine the criteria, and perform the evaluations. Computing machines will do the routinizable work that must be done to prepare the way for insights and decisions in technical and scientific thinking. Preliminary analyses indicate that the symbiotic partnership will perform intellectual operations much more effectively than man alone can perform them. Prerequisites for the achievement of the effective, cooperative association include developments in computer time sharing, in memory components, in memory organization, in programming languages, and in input and output equipment.
Adam Bohannon

Heidegger 2 Twitter: Technology, Self & Social Networks. - 11 views

  • Both object and subject are converted to a “standing-reserve”, to be disaggregated, redistributed, recontextualized, and reaggregated.
  • And human individuals, who were once reduced to resources (Frederick Taylor, and the authoritarianism of Human Resource departments), or “eyeballs” in the terminology of internet marketing executives; are now the creative engines of growth, innovation, and creativity.
  • This becomes even more interesting when we wonder about the context and meaning of start-ups intentionally exposing their office space’s ductwork - as if the open office with exposed pipes re-instantiates a manifestation of the hearth, or at least ‘un-hides’ the circulatory system of commerce.
  • ...16 more annotations...
  • Postmodern technology uses the hyper-reality of simulations to get rid of the limitations imposed by reality. The limit of postmodern reality is not the total objectification of nature, but the replacement of reality by virtual reality totally under our control.
  • Borgmann’s antidote for losing our personality to the shallowness and superficiality of hyper-reality is to return to focal activities.
  • It takes commitment on our part to engage in focal activities, but the effort affords us a chance to maintain some sense of self in the technological world.
  • Thus technological rationality can claim that technologies are value neutral, and only uses are good or evil, despite the fact that the uses are shaped by the technologies.
  • And technology leads to new forms of domination. For the critical theorists history has always had domination, but in our time domination has changed from master over slave or lord over serf to the domination of humanity by economics and the market. We are given the illusion of liberty, but that is simply the freedom to choose between brands of mass-produced products.
  • Computer technology further de-contextualizes human experience by emphasizing information over understanding. And computers further domination by providing new means of tracking the productivity of workers to the corporation and depersonalizing supervision; very much a modern panopticon envisioned by Jeremy Bentham.
  • Foucault’s view allows for the possibility that information technology could be used to put people in more direct communication with each other and spread the concentration of power over society.
  • MS Word and freely available blogging software encourages us to constantly revise, so a work becomes a series of drafts, none of which is final (just like this post).
  • Gould’s attitude towards design finds philosophical support in pragmatism. Pragmatism recognizes that everyone is socially situated. Dewey taught that scientific theories or methods of logic are tools used in a certain social practice. Attention to the practices surrounding an object are important to understanding it. Since he viewed knowledge as participatory he argued that learning must come about by doing.
  • Metaphors provide us a way of understanding the world, by associating one thing with another. Powerful metaphors are like magic, and inform how we think of the objects described, revealing hidden aspects of the thing described. New metaphors for the forces in our lives will suggest new ways of living.
  • Metaphors interact with technology in several ways: technology serves as a source of metaphors, new technologies are understood metaphorically, and our metaphors in life pose problems to be solved technologically
  • By developing new metaphors, interface designers can suggest new ways of working with computers. If these metaphors are carefully chosen then they will provide a natural model which makes operation of the machine easy.
  • Just as metaphors can help us understand computers, computers can provide new metaphors for life. Postmodern theories of psychology suggest that there is no single unified “ego”, but that each of us is made up of a multiplicity of parts, while Minsky discusses the “agencies of mind” in his book “The Society of Mind.” Philip Bromberg claims that a healthy personality is one in which different aspects of the self can come to know one another and reflect upon each other.
  • This fluid multiplicity of personality is what gives us our flexibility and resilience.
  • Social networks allow participants to explore different aspects of their personality, to manufacture and evolve aspects of their personality depending on context and mood.
  • While some observers might see this activity as evidence of Heidegger’s disaggregation of the subject by technology, it can also be seen as a model for Bromberg’s self as being one while being many. This is just one way in which computer technology, the internet, and connected social networks can show us a new way of understanding ourselves.
xchen123

Mobile phones as fashion statements: evidence from student surveys in the US and Japan - 1 views

  •  
    a comparison of phone usage in the US and Japan, two societies that are believed to have contrast ideology of society, come up with a similar trend of new technology using...
frank weber

Why Resource-poor Dictators Allow Freer Media: A Theory and Evidence from Panel Data - 0 views

  •  
    Dictators and media and how resources factors into freedom
1 - 20 of 24 Next ›
Showing 20 items per page