CINXE.COM
(PDF) Hacking Cyberspace - ch. 2 Ars Metaphorica | David Gunkel - Academia.edu
<!DOCTYPE html> <html > <head> <meta charset="utf-8"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <meta content="width=device-width, initial-scale=1" name="viewport"> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs"> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="VftowLDKqttto67b9u1n8SmvXYvb1GQzGRK+fgW5RwHKqutJ2zDuRufKB7kQBeb+5IioNADIqxaEcGoeMq3iWw==" /> <meta name="citation_title" content="Hacking Cyberspace - ch. 2 Ars Metaphorica" /> <meta name="citation_author" content="David Gunkel" /> <meta name="twitter:card" content="summary" /> <meta name="twitter:url" content="https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica" /> <meta name="twitter:title" content="Hacking Cyberspace - ch. 2 Ars Metaphorica" /> <meta name="twitter:description" content="The second chapter of &quot;Hacking Cyberspace&quot; bears the handle &quot;Ars Metaphorica,&quot; which designates literally the &quot;art or technique of metaphor.&quot; In its translated form, however, the title should be read as a double" /> <meta name="twitter:image" content="https://0.academia-photos.com/38706/12902/1444983/s200_david.gunkel.jpg" /> <meta property="fb:app_id" content="2369844204" /> <meta property="og:type" content="book" /> <meta property="og:url" content="https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica" /> <meta property="og:title" content="Hacking Cyberspace - ch. 2 Ars Metaphorica" /> <meta property="og:image" content="http://a.academia-assets.com/images/open-graph-icons/fb-book.gif" /> <meta property="og:description" content="The second chapter of &quot;Hacking Cyberspace&quot; bears the handle &quot;Ars Metaphorica,&quot; which designates literally the &quot;art or technique of metaphor.&quot; In its translated form, however, the title should be read as a double" /> <meta property="article:author" content="https://niu.academia.edu/DavidGunkel" /> <meta name="description" content="The second chapter of &quot;Hacking Cyberspace&quot; bears the handle &quot;Ars Metaphorica,&quot; which designates literally the &quot;art or technique of metaphor.&quot; In its translated form, however, the title should be read as a double" /> <title>(PDF) Hacking Cyberspace - ch. 2 Ars Metaphorica | David Gunkel - Academia.edu</title> <link rel="canonical" href="https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica" /> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "single_work", 'action': "show", 'controller_action': 'single_work#show', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script> var $controller_name = 'single_work'; var $action_name = "show"; var $rails_env = 'production'; var $app_rev = '49879c2402910372f4abc62630a427bbe033d190'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.require = { config: function() { return function() {} } } </script> <script> window.Aedu = window.Aedu || {}; window.Aedu.hit_data = null; window.Aedu.serverRenderTime = new Date(1732428425000); window.Aedu.timeDifference = new Date().getTime() - 1732428425000; </script> <script type="application/ld+json">{"@context":"https://schema.org","@type":"ScholarlyArticle","abstract":"The second chapter of \u0026amp;quot;Hacking Cyberspace\u0026amp;quot; bears the handle \u0026amp;quot;Ars Metaphorica,\u0026amp;quot; which designates literally the \u0026amp;quot;art or technique of metaphor.\u0026amp;quot; In its translated form, however, the title should be read as a double genitive. That is, it designates both the technique of metaphor and the metaphor of technique. What is at issue in the second hack is the conceptualization of cyberspace as a medium of communication. The computer and the computer network were not initially designed as a system of communication and information exchange. Indeed, as the name indicates, the computer was a machine that was to be employed for number crunching and calculation, and the computer network, which had its beginning with the mainframe computers of the late 1950\u0026amp;#39;s and early 1960\u0026amp;#39;s, was developed to permit time-shared access to computational devices. At some point, therefore, understanding of the computer and the network experienced a fundamental transformation. This point is demarcated by J. C. R. Licklider and Robert Taylor\u0026amp;#39;s influential article of 1968, \u0026amp;quot;The Computer as a Communication Device.\u0026amp;quot; The most important word in the title to this article is the smallest--the \u0026amp;quot;as.\u0026amp;quot; For the \u0026amp;quot;as\u0026amp;quot; signifies a metaphorical operation whereby the computational apparatus became understood in terms of communication. This transference of meaning necessarily mobilized all kinds of preconceptions and ideas about what communication is or can be. As a result, Licklider and Taylor\u0026amp;#39;s article, in its very title, puts in play a network of ideas and expectations about the association of computers and communication. The second chapter hacks this system by taking aim at the metaphors of communication that have been imported into and that currently shape understandings of the computer and the network.","author":[{"@context":"https://schema.org","@type":"Person","name":"David Gunkel"}],"contributor":[],"dateCreated":"2015-11-12","dateModified":"2015-11-12","datePublished":null,"headline":"Hacking Cyberspace - ch. 2 Ars Metaphorica","inLanguage":"en","keywords":["Critical Theory","History of Science and Technology","Cultural Studies","Computer Science","Philosophy","Philosophy of Technology","Communication","Media Studies","New Media","Digital Media","Computer Networks","Computer-Mediated Communication","Metaphor","Communication Studies","Information and Communication Technologies","Information and Communication Technologies (Social and cultural aspects of adoption and use of)","Internet Techologies","Science and Technology Studies"],"locationCreated":null,"publication":null,"publisher":{"@context":"https://schema.org","@type":"Organization","name":null},"image":null,"thumbnailUrl":null,"url":"https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica","sourceOrganization":[{"@context":"https://schema.org","@type":"EducationalOrganization","name":"niu"}]}</script><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/single_work_page/loswp-352e32ba4e89304dc0b4fa5b3952eef2198174c54cdb79066bc62e91c68a1a91.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/body-8d679e925718b5e8e4b18e9a4fab37f7eaa99e43386459376559080ac8f2856a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/text_button-73590134e40cdb49f9abdc8e796cc00dc362693f3f0f6137d6cf9bb78c318ce7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> </head> <body> <div id='react-modal'></div> <div class="js-upgrade-ie-banner" style="display: none; text-align: center; padding: 8px 0; background-color: #ebe480;"><p style="color: #000; font-size: 12px; margin: 0 0 4px;">Academia.edu no longer supports Internet Explorer.</p><p style="color: #000; font-size: 12px; margin: 0;">To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.querySelector('.js-upgrade-ie-banner').style.display = 'block'; }</script> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "f072f27d54293047f0c5f360847966a6f01f2bd89c8647f30edfcf113650d347", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="fe4Az95pgsA+yeN7QUi2XJWpRKLYsm5UGlKlBrn2wYviv4NGtZPGXbSgShmnoDdTWI6xHQOuoXGHMHFmjuJk0Q==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="sNTMb/CTA7Q3I5+Lx3aAGtrxuWNuXGJS+SsFeD6ZWn4vhU/mm2lHKb1KNukhngEVF9ZM3LVArXdkSdEYCY3/JA==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><input class="btn btn-primary btn-block g-recaptcha js-password-reset-submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" type="submit" value="Email me a link" /></form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script> <div class="header--container" id="main-header-container"><div class="header--inner-container header--inner-container-ds2"><div class="header-ds2--left-wrapper"><div class="header-ds2--left-wrapper-inner"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="hide-on-desktop-redesign" style="height: 24px; width: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hide-on-mobile-redesign" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a><div class="header--search-container header--search-container-ds2"><form class="js-SiteSearch-form select2-no-default-pills" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><svg style="width: 14px; height: 14px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="search" class="header--search-icon svg-inline--fa fa-search fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M505 442.7L405.3 343c-4.5-4.5-10.6-7-17-7H372c27.6-35.3 44-79.7 44-128C416 93.1 322.9 0 208 0S0 93.1 0 208s93.1 208 208 208c48.3 0 92.7-16.4 128-44v16.3c0 6.4 2.5 12.5 7 17l99.7 99.7c9.4 9.4 24.6 9.4 33.9 0l28.3-28.3c9.4-9.4 9.4-24.6.1-34zM208 336c-70.7 0-128-57.2-128-128 0-70.7 57.2-128 128-128 70.7 0 128 57.2 128 128 0 70.7-57.2 128-128 128z"></path></svg><input class="header--search-input header--search-input-ds2 js-SiteSearch-form-input" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" /></form></div></div></div><nav class="header--nav-buttons header--nav-buttons-ds2 js-main-nav"><a class="ds2-5-button ds2-5-button--secondary js-header-login-url header-button-ds2 header-login-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/login" rel="nofollow">Log In</a><a class="ds2-5-button ds2-5-button--secondary header-button-ds2 hide-on-mobile-redesign" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a><button class="header--hamburger-button header--hamburger-button-ds2 hide-on-desktop-redesign js-header-hamburger-button"><div class="icon-bar"></div><div class="icon-bar" style="margin-top: 4px;"></div><div class="icon-bar" style="margin-top: 4px;"></div></button></nav></div><ul class="header--dropdown-container js-header-dropdown"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/login" rel="nofollow">Log In</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/signup" rel="nofollow">Sign Up</a></li><li class="header--dropdown-row js-header-dropdown-expand-button"><button class="header--dropdown-button">more<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-down" class="header--dropdown-button-icon svg-inline--fa fa-caret-down fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z"></path></svg></button></li><li><ul class="header--expanded-dropdown-container"><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/about">About</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/press">Press</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://medium.com/@academia">Blog</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/documents">Papers</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/terms">Terms</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/privacy">Privacy</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/copyright">Copyright</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://www.academia.edu/hiring"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="header--dropdown-row-icon svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>We're Hiring!</a></li><li class="header--dropdown-row"><a class="header--dropdown-link" href="https://support.academia.edu/"><svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="header--dropdown-row-icon svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>Help Center</a></li><li class="header--dropdown-row js-header-dropdown-collapse-button"><button class="header--dropdown-button">less<svg aria-hidden="true" focusable="false" data-prefix="fas" data-icon="caret-up" class="header--dropdown-button-icon svg-inline--fa fa-caret-up fa-w-10" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 320 512"><path fill="currentColor" d="M288.662 352H31.338c-17.818 0-26.741-21.543-14.142-34.142l128.662-128.662c7.81-7.81 20.474-7.81 28.284 0l128.662 128.662c12.6 12.599 3.676 34.142-14.142 34.142z"></path></svg></button></li></ul></li></ul></div> <script src="//a.academia-assets.com/assets/webpack_bundles/fast_loswp-bundle-bf3d831cde46cd0e142f29f81a3fc4ce5ab45a404c10c12a480e83de68aff851.js" defer="defer"></script><script>window.loswp = {}; window.loswp.author = 38706; window.loswp.bulkDownloadFilterCounts = {}; window.loswp.hasDownloadableAttachment = true; window.loswp.hasViewableAttachments = true; // TODO: just use routes for this window.loswp.loginUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F18200522%2FHacking_Cyberspace_ch_2_Ars_Metaphorica%3Fauto%3Ddownload"; window.loswp.translateUrl = "https://www.academia.edu/login?post_login_redirect_url=https%3A%2F%2Fwww.academia.edu%2F18200522%2FHacking_Cyberspace_ch_2_Ars_Metaphorica%3Fshow_translation%3Dtrue"; window.loswp.previewableAttachments = [{"id":39929700,"identifier":"Attachment_39929700","shouldShowBulkDownload":false}]; window.loswp.shouldDetectTimezone = true; window.loswp.shouldShowBulkDownload = true; window.loswp.showSignupCaptcha = false window.loswp.willEdgeCache = false; window.loswp.work = {"work":{"id":18200522,"created_at":"2015-11-12T06:03:46.674-08:00","from_world_paper_id":null,"updated_at":"2021-01-13T11:35:14.055-08:00","_data":{"abstract":"The second chapter of \"Hacking Cyberspace\" bears the handle \"Ars Metaphorica,\" which designates literally the \"art or technique of metaphor.\" In its translated form, however, the title should be read as a double genitive. That is, it designates both the technique of metaphor and the metaphor of technique. What is at issue in the second hack is the conceptualization of cyberspace as a medium of communication. The computer and the computer network were not initially designed as a system of communication and information exchange. Indeed, as the name indicates, the computer was a machine that was to be employed for number crunching and calculation, and the computer network, which had its beginning with the mainframe computers of the late 1950's and early 1960's, was developed to permit time-shared access to computational devices. At some point, therefore, understanding of the computer and the network experienced a fundamental transformation. This point is demarcated by J. C. R. Licklider and Robert Taylor's influential article of 1968, \"The Computer as a Communication Device.\" The most important word in the title to this article is the smallest--the \"as.\" For the \"as\" signifies a metaphorical operation whereby the computational apparatus became understood in terms of communication. This transference of meaning necessarily mobilized all kinds of preconceptions and ideas about what communication is or can be. As a result, Licklider and Taylor's article, in its very title, puts in play a network of ideas and expectations about the association of computers and communication. The second chapter hacks this system by taking aim at the metaphors of communication that have been imported into and that currently shape understandings of the computer and the network."},"document_type":"book","pre_hit_view_count_baseline":null,"quality":"low","language":"en","title":"Hacking Cyberspace - ch. 2 Ars Metaphorica","broadcastable":true,"draft":null,"has_indexable_attachment":true,"indexable":true}}["work"]; window.loswp.workCoauthors = [38706]; window.loswp.locale = "en"; window.loswp.countryCode = "SG"; window.loswp.cwvAbTestBucket = ""; window.loswp.designVariant = "ds_vanilla"; window.loswp.fullPageMobileSutdModalVariant = "control"; window.loswp.useOptimizedScribd4genScript = false; window.loswp.appleClientId = 'edu.academia.applesignon';</script><script defer="" src="https://accounts.google.com/gsi/client"></script><div class="ds-loswp-container"><div class="ds-work-card--grid-container"><div class="ds-work-card--container js-loswp-work-card"><div class="ds-work-card--cover"><div class="ds-work-cover--wrapper"><div class="ds-work-cover--container"><button class="ds-work-cover--clickable js-swp-download-button" data-signup-modal="{"location":"swp-splash-paper-cover","attachmentId":39929700,"attachmentType":"pdf"}"><img alt="First page of “Hacking Cyberspace - ch. 2 Ars Metaphorica”" class="ds-work-cover--cover-thumbnail" src="https://0.academia-photos.com/attachment_thumbnails/39929700/mini_magick20190222-22381-1lqarzt.png?1550837117" /><img alt="PDF Icon" class="ds-work-cover--file-icon" src="//a.academia-assets.com/assets/single_work_splash/adobe.icon-574afd46eb6b03a77a153a647fb47e30546f9215c0ee6a25df597a779717f9ef.svg" /><div class="ds-work-cover--hover-container"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span><p>Download Free PDF</p></div><div class="ds-work-cover--ribbon-container">Download Free PDF</div><div class="ds-work-cover--ribbon-triangle"></div></button></div></div></div><div class="ds-work-card--work-information"><h1 class="ds-work-card--work-title">Hacking Cyberspace - ch. 2 Ars Metaphorica</h1><div class="ds-work-card--work-authors ds-work-card--detail"><a class="ds-work-card--author js-wsj-grid-card-author ds2-5-body-md ds2-5-body-link" data-author-id="38706" href="https://niu.academia.edu/DavidGunkel"><img alt="Profile image of David Gunkel" class="ds-work-card--author-avatar" src="https://0.academia-photos.com/38706/12902/1444983/s65_david.gunkel.jpg" />David Gunkel</a></div><p class="ds-work-card--work-abstract ds-work-card--detail ds2-5-body-md">The second chapter of "Hacking Cyberspace" bears the handle "Ars Metaphorica," which designates literally the "art or technique of metaphor." In its translated form, however, the title should be read as a double genitive. That is, it designates both the technique of metaphor and the metaphor of technique. What is at issue in the second hack is the conceptualization of cyberspace as a medium of communication. The computer and the computer network were not initially designed as a system of communication and information exchange. Indeed, as the name indicates, the computer was a machine that was to be employed for number crunching and calculation, and the computer network, which had its beginning with the mainframe computers of the late 1950's and early 1960's, was developed to permit time-shared access to computational devices. At some point, therefore, understanding of the computer and the network experienced a fundamental transformation. This point is demarcated by J. C. R. Licklider and Robert Taylor's influential article of 1968, "The Computer as a Communication Device." The most important word in the title to this article is the smallest--the "as." For the "as" signifies a metaphorical operation whereby the computational apparatus became understood in terms of communication. This transference of meaning necessarily mobilized all kinds of preconceptions and ideas about what communication is or can be. As a result, Licklider and Taylor's article, in its very title, puts in play a network of ideas and expectations about the association of computers and communication. The second chapter hacks this system by taking aim at the metaphors of communication that have been imported into and that currently shape understandings of the computer and the network.</p><div class="ds-work-card--button-container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--work-card","attachmentId":39929700,"attachmentType":"pdf","workUrl":"https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica"}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--work-card","attachmentId":39929700,"attachmentType":"pdf","workUrl":"https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica"}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div></div><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-doc_id="39929700" data-landing_url="https://www.academia.edu/18200522/Hacking_Cyberspace_ch_2_Ars_Metaphorica" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><div class="ds-top-related-works--grid-container"><div class="ds-related-content--container ds-top-related-works--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="0" data-entity-id="24145696" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/24145696/Reading_lan_Hacking_s_The_Social_Construction_of_What">Reading lan Hacking’s The Social Construction of What?</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="88985" href="https://unak.academia.edu/GiorgioBaruchello">Giorgio Baruchello</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Symposium, 2001</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Reading lan Hacking’s The Social Construction of What?","attachmentId":50226311,"attachmentType":"pdf","work_url":"https://www.academia.edu/24145696/Reading_lan_Hacking_s_The_Social_Construction_of_What","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/24145696/Reading_lan_Hacking_s_The_Social_Construction_of_What"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="1" data-entity-id="265008" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/265008/Review_of_Douglas_Thomas_Hacking_The_Performance_of_Technology_">Review of Douglas Thomas, "Hacking: The Performance of Technology?"</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="91888" href="https://deakin.academia.edu/CathyLegg">Catherine Legg</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Techné, 2005</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Review of Douglas Thomas, \"Hacking: The Performance of Technology?\"","attachmentId":3239732,"attachmentType":"pdf","work_url":"https://www.academia.edu/265008/Review_of_Douglas_Thomas_Hacking_The_Performance_of_Technology_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/265008/Review_of_Douglas_Thomas_Hacking_The_Performance_of_Technology_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="2" data-entity-id="5343529" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/5343529/The_Cold_Warmth_of_Communication_in_Computer_Networks">The Cold Warmth of Communication in Computer Networks</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="7401245" href="https://lmu-munich.academia.edu/RichardWJanney">Richard W. Janney</a></div><p class="ds-related-work--metadata ds2-5-body-xs">1997</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Cold Warmth of Communication in Computer Networks","attachmentId":39437553,"attachmentType":"pdf","work_url":"https://www.academia.edu/5343529/The_Cold_Warmth_of_Communication_in_Computer_Networks","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/5343529/The_Cold_Warmth_of_Communication_in_Computer_Networks"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="3" data-entity-id="20452848" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/20452848/From_the_myth_of_cyberspace_to_the_political_economy_of_computer_communication">From the myth of cyberspace to the political economy of computer communication</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="12681044" href="https://independent.academia.edu/vincentmoscocom">Vincent Mosco</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Comunicação e Sociedade, 2005</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"From the myth of cyberspace to the political economy of computer communication","attachmentId":41381975,"attachmentType":"pdf","work_url":"https://www.academia.edu/20452848/From_the_myth_of_cyberspace_to_the_political_economy_of_computer_communication","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/20452848/From_the_myth_of_cyberspace_to_the_political_economy_of_computer_communication"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="4" data-entity-id="41193364" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/41193364/The_Hacker_Imaginaire_Recoding_Futures_Technoscientific_Promises_from_the_Inventors_of_the_Internet">The Hacker Imaginaire: Recoding Futures? Technoscientific Promises from the Inventors of the Internet</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="6583232" href="https://uni-augsburg.academia.edu/SimoneLackerbauer">Simone Ines Watzinger (Lackerbauer)</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Sociální studia / Social Studies, 2019</p><p class="ds-related-work--abstract ds2-5-body-sm">In the 1970s, researchers and engineers built the technical predecessor of today's global digital networks, but more importantly, they created an "Internet Imaginaire" (Flichy 2007) with the aim of building a global virtual society. In the 1990s, most supporters of the utopian digital community fell silent. The hackers, however, remained, and they still adhere to rules put down in the so-called "hacker ethic" (Levy 1984; Coleman 2015), such as decentralization and freedom of information, which contribute to a sociotechnical "Hacker Imaginaire." With the Sociology of Knowledge Approach to Discourse (SKAD) as a research programme, this paper investigates the genesis and perseverance of this imaginary by uncovering technoscientific promises in media documents and interviews, which were formulated in response to the continued development of Internet-based technologies and fuel this imaginary; and by describing its phenomenal structure. KEY WORDS internet research, sociotechnical studies, sociology of knowledge approach to discourse (SKAD), discourse analysis, sociotechnical imaginary, cyberculture, hackers</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Hacker Imaginaire: Recoding Futures? Technoscientific Promises from the Inventors of the Internet","attachmentId":61432697,"attachmentType":"pdf","work_url":"https://www.academia.edu/41193364/The_Hacker_Imaginaire_Recoding_Futures_Technoscientific_Promises_from_the_Inventors_of_the_Internet","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/41193364/The_Hacker_Imaginaire_Recoding_Futures_Technoscientific_Promises_from_the_Inventors_of_the_Internet"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="5" data-entity-id="302119" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/302119/Book_Review_A_Hacker_Manifesto">Book Review: A Hacker Manifesto</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="59282" href="https://purdue.academia.edu/BrentJesiek">Brent Jesiek</a></div><p class="ds-related-work--metadata ds2-5-body-xs">New Media & Society, 2006</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Book Review: A Hacker Manifesto","attachmentId":51461956,"attachmentType":"pdf","work_url":"https://www.academia.edu/302119/Book_Review_A_Hacker_Manifesto","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/302119/Book_Review_A_Hacker_Manifesto"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="6" data-entity-id="15485246" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/15485246/Cyberspace_International_Encyclopedia_of_Communication_Theory_and_Philosophy">Cyberspace, International Encyclopedia of Communication Theory & Philosophy</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="252500" href="https://soton.academia.edu/SethGiddings">Seth Giddings</a></div><p class="ds-related-work--abstract ds2-5-body-sm">This entry traces the origins, development, and decline of the use of the term cyberspace as applied to computer-networked communication since the 1980s. It pays particular attention to the blurring, in critical studies of cyberspace, of fictional visions and futures from SF literature and film, with actual technological and cultural applications and practices.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Cyberspace, International Encyclopedia of Communication Theory \u0026 Philosophy","attachmentId":38693678,"attachmentType":"pdf","work_url":"https://www.academia.edu/15485246/Cyberspace_International_Encyclopedia_of_Communication_Theory_and_Philosophy","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/15485246/Cyberspace_International_Encyclopedia_of_Communication_Theory_and_Philosophy"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="7" data-entity-id="41626356" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/41626356/Hacking_Minds_Curriculum_Mentis_Noosphere_Internet_Matrix_Web">Hacking Minds: Curriculum Mentis, Noosphere, Internet, Matrix, Web</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="6494845" href="https://twu.academia.edu/YLee">Yu-Ling Lee</a><span>, </span><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1080533" href="https://rkus-ott.academia.edu/StephenPetrina">Stephen Petrina</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Hacking Education in a Digital Age: Teacher Education, Curriculum, and Literacies, 2018</p><p class="ds-related-work--abstract ds2-5-body-sm">This chapter sets the stage for problems of hacking minds, which have a deep history intertwined with the ancient Greek νοῦς and Latin curriculum mentis and the more contemporary noosphere and Internet. It aims to partially redress oversights in accounting for these histories. The chapter also provides a history of hacking relative to the early development of computers. Sketched as a chapter in the history of grammar and rhetoric, curriculum herein becomes a chapter in cosmology, metaphysics, and the philosophy of mind. Curriculum manifested as the noosphere, defined as the infrastructure of the mind and mindhacks, draws metaphysics into history. Tests of metaphysics, curriculum mentis and the noosphere are also important tests of the prehistory of cyberculture, the Internet, matrix, and web (Elton & Carey, 2013). All are intermixed with the history and metaphysics of curriculum as well as mind. The fate of curriculum is intertwined with the fate of mind and thought. In this storied teleology, things are hacked with resolve: Never expect a machine to limit its dealings with minds.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Hacking Minds: Curriculum Mentis, Noosphere, Internet, Matrix, Web","attachmentId":61782756,"attachmentType":"pdf","work_url":"https://www.academia.edu/41626356/Hacking_Minds_Curriculum_Mentis_Noosphere_Internet_Matrix_Web","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/41626356/Hacking_Minds_Curriculum_Mentis_Noosphere_Internet_Matrix_Web"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="8" data-entity-id="22377932" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/22377932/Metaphors_reflecting_and_shaping_the_reality_of_the_Internet_Tool_place_way_of_being">Metaphors reflecting and shaping the reality of the Internet: Tool, place, way of being</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="257303" href="https://uu.academia.edu/AnnetteMarkham">Annette Markham</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Association of Internet Researchers …, 2003</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Metaphors reflecting and shaping the reality of the Internet: Tool, place, way of being","attachmentId":43006406,"attachmentType":"pdf","work_url":"https://www.academia.edu/22377932/Metaphors_reflecting_and_shaping_the_reality_of_the_Internet_Tool_place_way_of_being","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/22377932/Metaphors_reflecting_and_shaping_the_reality_of_the_Internet_Tool_place_way_of_being"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-wsj-grid-card" data-collection-position="9" data-entity-id="182789" data-sort-order="default"><a class="ds-related-work--title js-wsj-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/182789/A_Hacker_Manifesto">A Hacker Manifesto</a><div class="ds-related-work--metadata"><a class="js-wsj-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="49965" href="https://newschool.academia.edu/McKenzieWark">McKenzie Wark</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2004</p><p class="ds-related-work--abstract ds2-5-body-sm">"A double is haunting the world--the double of abstraction, the virtual reality of information, programming or poetry, math or music, curves or colorings upon which the fortunes of states and armies, companies and communities now depend. The bold aim of this book is to make manifest the origins, purpose, and interests of the emerging class responsible for making this new world--for producing the new concepts, new perceptions, and new sensations out of the stuff of raw data. A Hacker Manifesto deftly defines the fraught territory between the ever more strident demands by drug and media companies for protection of their patents and copyrights and the pervasive popular culture of file sharing and pirating. This vexed ground, the realm of so-called ""intellectual property,"" gives rise to a whole new kind of class conflict, one that pits the creators of information--the hacker class of researchers and authors, artists and biologists, chemists and musicians, philosophers and programmers--against a possessing class who would monopolize what the hacker produces. Drawing in equal measure on Guy Debord and Gilles Deleuze, A Hacker Manifesto offers a systematic restatement of Marxist thought for the age of cyberspace and globalization. In the widespread revolt against commodified information, McKenzie Wark sees a utopian promise, beyond the property form, and a new progressive class, the hacker class, who voice a shared interest in a new information commons.</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"A Hacker Manifesto","attachmentId":257219,"attachmentType":"pdf","work_url":"https://www.academia.edu/182789/A_Hacker_Manifesto","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-wsj-grid-card-view-pdf" href="https://www.academia.edu/182789/A_Hacker_Manifesto"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div></div><div class="ds-sticky-ctas--wrapper js-loswp-sticky-ctas hidden"><div class="ds-sticky-ctas--grid-container"><div class="ds-sticky-ctas--container"><button class="ds2-5-button js-swp-download-button" data-signup-modal="{"location":"continue-reading-button--sticky-ctas","attachmentId":39929700,"attachmentType":"pdf","workUrl":null}">See full PDF</button><button class="ds2-5-button ds2-5-button--secondary js-swp-download-button" data-signup-modal="{"location":"download-pdf-button--sticky-ctas","attachmentId":39929700,"attachmentType":"pdf","workUrl":null}"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">download</span>Download PDF</button></div></div></div><div class="ds-below-fold--grid-container"><div class="ds-work--container js-loswp-embedded-document"><div class="attachment_preview" data-attachment="Attachment_39929700" style="display: none"><div class="js-scribd-document-container"><div class="scribd--document-loading js-scribd-document-loader" style="display: block;"><img alt="Loading..." src="//a.academia-assets.com/images/loaders/paper-load.gif" /><p>Loading Preview</p></div></div><div style="text-align: center;"><div class="scribd--no-preview-alert js-preview-unavailable"><p>Sorry, preview is currently unavailable. You can download the paper by clicking the button above.</p></div></div></div></div><div class="ds-sidebar--container js-work-sidebar"><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related papers</h2><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="0" data-entity-id="16339251" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/16339251/Editorial_introduction_to_hacking_and_hacktivism">Editorial: introduction to hacking and hacktivism</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="38706" href="https://niu.academia.edu/DavidGunkel">David Gunkel</a></div><p class="ds-related-work--metadata ds2-5-body-xs">New Media & Society, 2005</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Editorial: introduction to hacking and hacktivism","attachmentId":51166054,"attachmentType":"pdf","work_url":"https://www.academia.edu/16339251/Editorial_introduction_to_hacking_and_hacktivism","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/16339251/Editorial_introduction_to_hacking_and_hacktivism"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="1" data-entity-id="88509147" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/88509147/Cyberspace_to_boldly_go_">Cyberspace: to boldly go …</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="9286293" href="https://independent.academia.edu/jeromeravetz">jerome ravetz</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Futures, 1995</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Cyberspace: to boldly go …","attachmentId":92470205,"attachmentType":"pdf","work_url":"https://www.academia.edu/88509147/Cyberspace_to_boldly_go_","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/88509147/Cyberspace_to_boldly_go_"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="2" data-entity-id="68984377" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/68984377/A_Case_of_Bidirectional_Metaphor_a_Computer_as_a_Human_Being_and_the_Reverse">A Case of Bidirectional Metaphor: a Computer as a Human Being and the Reverse</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="100160202" href="https://independent.academia.edu/EditaValiulien%C4%97">Edita Valiulienė</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2009</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"A Case of Bidirectional Metaphor: a Computer as a Human Being and the Reverse","attachmentId":79258928,"attachmentType":"pdf","work_url":"https://www.academia.edu/68984377/A_Case_of_Bidirectional_Metaphor_a_Computer_as_a_Human_Being_and_the_Reverse","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/68984377/A_Case_of_Bidirectional_Metaphor_a_Computer_as_a_Human_Being_and_the_Reverse"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="3" data-entity-id="28532093" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/28532093/Computer_Networks_A_system_Approach_pdf">Computer Networks - A system Approach.pdf</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="31915584" href="https://xn--gug-0gz.academia.edu/Cmiefang310">310 Cmiefang</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Computer Networks - A system Approach.pdf","attachmentId":48883706,"attachmentType":"pdf","work_url":"https://www.academia.edu/28532093/Computer_Networks_A_system_Approach_pdf","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/28532093/Computer_Networks_A_system_Approach_pdf"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="4" data-entity-id="79805144" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/79805144/Computers_metaphors_and_change">Computers, metaphors and change</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="265444" href="https://edinburgh.academia.edu/RichardCoyne">Richard Coyne</a></div><p class="ds-related-work--metadata ds2-5-body-xs">arq: Architectural Research Quarterly, 1995</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Computers, metaphors and change","attachmentId":86396270,"attachmentType":"pdf","work_url":"https://www.academia.edu/79805144/Computers_metaphors_and_change","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/79805144/Computers_metaphors_and_change"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="5" data-entity-id="7717049" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/7717049/Introduction_to_Cyberspace_First_Steps">Introduction to Cyberspace: First Steps</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="14119042" href="https://unitbv.academia.edu/AnnaMaracine">Anna Maracine</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Introduction to Cyberspace: First Steps","attachmentId":34243066,"attachmentType":"pdf","work_url":"https://www.academia.edu/7717049/Introduction_to_Cyberspace_First_Steps","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/7717049/Introduction_to_Cyberspace_First_Steps"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="6" data-entity-id="32045871" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/32045871/Computer_Networks_peterson">Computer Networks - peterson</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="62078836" href="https://independent.academia.edu/SaurabhMishra119">Saurabh Mishra</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Computer Networks - peterson","attachmentId":52307509,"attachmentType":"pdf","work_url":"https://www.academia.edu/32045871/Computer_Networks_peterson","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/32045871/Computer_Networks_peterson"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="7" data-entity-id="74582363" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/74582363/Hacking_and_Difference">Hacking and Difference</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="3318494" href="https://efluniversity.academia.edu/satishpoduval">satish poduval</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Postcolonial Piracy</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Hacking and Difference","attachmentId":82684218,"attachmentType":"pdf","work_url":"https://www.academia.edu/74582363/Hacking_and_Difference","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/74582363/Hacking_and_Difference"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="8" data-entity-id="72607864" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/72607864/How_the_World_got_into_the_Computer_The_Emergence_of_Digital_Reality">How the World got into the Computer The Emergence of Digital Reality</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="5571378" href="https://ethz.academia.edu/DavidGugerli">David Gugerli</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Chronos-Verlag, 2022</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"How the World got into the Computer The Emergence of Digital Reality","attachmentId":81890415,"attachmentType":"pdf","work_url":"https://www.academia.edu/72607864/How_the_World_got_into_the_Computer_The_Emergence_of_Digital_Reality","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/72607864/How_the_World_got_into_the_Computer_The_Emergence_of_Digital_Reality"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="9" data-entity-id="50283077" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/50283077/Shaping_the_philosophy_of_the_Internet">Shaping the philosophy of the Internet</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="419301" href="https://elte.academia.edu/LaszloRopolyi">Laszlo Ropolyi</a></div><p class="ds-related-work--metadata ds2-5-body-xs">PHILOSOPHY BRIDGING CIVILIZATIONS …, 2007</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Shaping the philosophy of the Internet","attachmentId":68326715,"attachmentType":"doc","work_url":"https://www.academia.edu/50283077/Shaping_the_philosophy_of_the_Internet","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/50283077/Shaping_the_philosophy_of_the_Internet"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="10" data-entity-id="28663146" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/28663146/METAPHORS_OF_TECHNOLOGY_AS_COLLABORATIVE_BEINGS_IN_POPULAR_COMPUTER_MAGAZINES">METAPHORS OF TECHNOLOGY AS COLLABORATIVE BEINGS IN POPULAR COMPUTER MAGAZINES</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="556539" href="https://uner.academia.edu/PatriciaWeller">Patricia Weller</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"METAPHORS OF TECHNOLOGY AS COLLABORATIVE BEINGS IN POPULAR COMPUTER MAGAZINES","attachmentId":49040468,"attachmentType":"docx","work_url":"https://www.academia.edu/28663146/METAPHORS_OF_TECHNOLOGY_AS_COLLABORATIVE_BEINGS_IN_POPULAR_COMPUTER_MAGAZINES","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/28663146/METAPHORS_OF_TECHNOLOGY_AS_COLLABORATIVE_BEINGS_IN_POPULAR_COMPUTER_MAGAZINES"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="11" data-entity-id="6883556" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/6883556/Computer_A_Communication_Device">Computer : A Communication Device</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="6654971" href="https://shooliniuniversity.academia.edu/AnuragRana">Anurag Rana</a></div><p class="ds-related-work--metadata ds2-5-body-xs">International Journal of Modern EngineeringResearch</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Computer : A Communication Device","attachmentId":33568330,"attachmentType":"docx","work_url":"https://www.academia.edu/6883556/Computer_A_Communication_Device","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/6883556/Computer_A_Communication_Device"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="12" data-entity-id="11809255" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/11809255/The_semiotic_hacking">The semiotic hacking</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="29022890" href="https://univ-poitiers.academia.edu/ThomasBonnecarrere">Thomas Bonnecarrere</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The semiotic hacking","attachmentId":37220077,"attachmentType":"pdf","work_url":"https://www.academia.edu/11809255/The_semiotic_hacking","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/11809255/The_semiotic_hacking"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="13" data-entity-id="40117743" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/40117743/COMPUTER_NETWORKS_A_Systems_Approach">COMPUTER NETWORKS A Systems Approach</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="122931868" href="https://jiit.academia.edu/NSharma">Nikhil Sharma</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"COMPUTER NETWORKS A Systems Approach","attachmentId":60330622,"attachmentType":"pdf","work_url":"https://www.academia.edu/40117743/COMPUTER_NETWORKS_A_Systems_Approach","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/40117743/COMPUTER_NETWORKS_A_Systems_Approach"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="14" data-entity-id="25279861" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/25279861/The_Evolutive_History_of_Cyber_A_Logical_Continuation_for_The_Control_of_Global_Mankind">The Evolutive History of Cyber: A Logical Continuation for The Control of Global Mankind</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="36654701" href="https://mpkk.academia.edu/SakariAhvenainen">Sakari Ahvenainen</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Evolutive History of Cyber: A Logical Continuation for The Control of Global Mankind","attachmentId":45581805,"attachmentType":"pdf","work_url":"https://www.academia.edu/25279861/The_Evolutive_History_of_Cyber_A_Logical_Continuation_for_The_Control_of_Global_Mankind","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/25279861/The_Evolutive_History_of_Cyber_A_Logical_Continuation_for_The_Control_of_Global_Mankind"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="15" data-entity-id="87540767" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/87540767/A_Hitchhikers_Guide_to_the_Turing_Galaxy_On_naming_the_age_of_the_networked_digital_computer">A Hitchhiker's Guide to the Turing Galaxy: On naming the age of the networked digital computer</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1465193" href="https://leuphana.academia.edu/VolkerGrassmuck">Volker Grassmuck</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2009</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"A Hitchhiker's Guide to the Turing Galaxy: On naming the age of the networked digital computer","attachmentId":91720480,"attachmentType":"pdf","work_url":"https://www.academia.edu/87540767/A_Hitchhikers_Guide_to_the_Turing_Galaxy_On_naming_the_age_of_the_networked_digital_computer","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/87540767/A_Hitchhikers_Guide_to_the_Turing_Galaxy_On_naming_the_age_of_the_networked_digital_computer"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="16" data-entity-id="117817384" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/117817384/Thinking_About_How_to_Think_About_Cybersecurity">Thinking About How to Think About Cybersecurity</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="51214181" href="https://independent.academia.edu/RichardHarknett">Richard Harknett</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2011</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Thinking About How to Think About Cybersecurity","attachmentId":113582867,"attachmentType":"pdf","work_url":"https://www.academia.edu/117817384/Thinking_About_How_to_Think_About_Cybersecurity","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/117817384/Thinking_About_How_to_Think_About_Cybersecurity"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="17" data-entity-id="26544712" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/26544712/Programming_in_Network_Exchanges">Programming in Network Exchanges</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="25298" href="https://wvu.academia.edu/JohnJones">John Jones</a></div><p class="ds-related-work--metadata ds2-5-body-xs">2014</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Programming in Network Exchanges","attachmentId":46837779,"attachmentType":"pdf","work_url":"https://www.academia.edu/26544712/Programming_in_Network_Exchanges","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/26544712/Programming_in_Network_Exchanges"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="18" data-entity-id="34977174" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/34977174/The_History_of_the_Internet">The History of the Internet</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="70554099" href="https://independent.academia.edu/AlanLimo">Alan Limo</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The History of the Internet","attachmentId":54840697,"attachmentType":"docx","work_url":"https://www.academia.edu/34977174/The_History_of_the_Internet","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/34977174/The_History_of_the_Internet"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="19" data-entity-id="1103805" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1103805/Sociological_reflections_on_hackers_and_hacking">Sociological reflections on hackers and hacking</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="904038" href="https://cambridge.academia.edu/BrianAlleyne">Brian Alleyne</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Sociological reflections on hackers and hacking","attachmentId":6883691,"attachmentType":"pdf","work_url":"https://www.academia.edu/1103805/Sociological_reflections_on_hackers_and_hacking","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1103805/Sociological_reflections_on_hackers_and_hacking"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="20" data-entity-id="1529766" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/1529766/The_Rise_and_Fall_of_Cyberspace_or_how_cyberspace_turned_inside_out">The Rise and Fall of Cyberspace, or how cyberspace turned inside out</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="1639744" href="https://queensu.academia.edu/MartinHand">Martin Hand</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Rise and Fall of Cyberspace, or how cyberspace turned inside out","attachmentId":30930579,"attachmentType":"pdf","work_url":"https://www.academia.edu/1529766/The_Rise_and_Fall_of_Cyberspace_or_how_cyberspace_turned_inside_out","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/1529766/The_Rise_and_Fall_of_Cyberspace_or_how_cyberspace_turned_inside_out"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="21" data-entity-id="94353771" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/94353771/Review_Essay_Full_Bodied_Cyber_without_the_Hype">Review Essay: Full-Bodied Cyber without the Hype</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="59655248" href="https://independent.academia.edu/SamTangrediCIVNAVWARCOL">Sam Tangredi CIV NAVWARCOL</a></div><p class="ds-related-work--metadata ds2-5-body-xs">Naval War College Review, 2019</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Review Essay: Full-Bodied Cyber without the Hype","attachmentId":96833978,"attachmentType":"pdf","work_url":"https://www.academia.edu/94353771/Review_Essay_Full_Bodied_Cyber_without_the_Hype","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/94353771/Review_Essay_Full_Bodied_Cyber_without_the_Hype"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="22" data-entity-id="78242115" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/78242115/Hacking_the_Democratic_Mainframe_Dis_Organising_Transgressive_Computing">Hacking the Democratic Mainframe: (Dis)Organising Transgressive Computing</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="196838922" href="https://independent.academia.edu/JeffLewis38">Jeff Lewis</a></div><p class="ds-related-work--metadata ds2-5-body-xs">SSRN Electronic Journal, 2000</p><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"Hacking the Democratic Mainframe: (Dis)Organising Transgressive Computing","attachmentId":85357424,"attachmentType":"pdf","work_url":"https://www.academia.edu/78242115/Hacking_the_Democratic_Mainframe_Dis_Organising_Transgressive_Computing","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/78242115/Hacking_the_Democratic_Mainframe_Dis_Organising_Transgressive_Computing"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="23" data-entity-id="346622" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/346622/The_Art_of_Networking">The Art of Networking</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="229602" href="https://independent.academia.edu/TatianaBazzichelli">Tatiana Bazzichelli</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The Art of Networking","attachmentId":1762831,"attachmentType":"pdf","work_url":"https://www.academia.edu/346622/The_Art_of_Networking","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/346622/The_Art_of_Networking"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div><div class="ds-related-work--container js-related-work-sidebar-card" data-collection-position="24" data-entity-id="32298678" data-sort-order="default"><a class="ds-related-work--title js-related-work-grid-card-title ds2-5-body-md ds2-5-body-link" href="https://www.academia.edu/32298678/The_language_of_computers_doc">The language of computers.doc</a><div class="ds-related-work--metadata"><a class="js-related-work-grid-card-author ds2-5-body-sm ds2-5-body-link" data-author-id="44792204" href="https://independent.academia.edu/CMinnaja">Carlo Minnaja</a></div><div class="ds-related-work--ctas"><button class="ds2-5-text-link ds2-5-text-link--inline js-swp-download-button" data-signup-modal="{"location":"wsj-grid-card-download-pdf-modal","work_title":"The language of computers.doc","attachmentId":52513677,"attachmentType":"doc","work_url":"https://www.academia.edu/32298678/The_language_of_computers_doc","alternativeTracking":true}"><span class="material-symbols-outlined" style="font-size: 18px" translate="no">download</span><span class="ds2-5-text-link__content">Download free PDF</span></button><a class="ds2-5-text-link ds2-5-text-link--inline js-related-work-grid-card-view-pdf" href="https://www.academia.edu/32298678/The_language_of_computers_doc"><span class="ds2-5-text-link__content">View PDF</span><span class="material-symbols-outlined" style="font-size: 18px" translate="no">chevron_right</span></a></div></div></div><div class="ds-related-content--container"><h2 class="ds-related-content--heading">Related topics</h2><div class="ds-research-interests--pills-container"><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="8" href="https://www.academia.edu/Documents/in/Critical_Theory">Critical Theory</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="132" href="https://www.academia.edu/Documents/in/History_of_Science_and_Technology">History of Science and Technology</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="188" href="https://www.academia.edu/Documents/in/Cultural_Studies">Cultural Studies</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="422" href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="803" href="https://www.academia.edu/Documents/in/Philosophy">Philosophy</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="855" href="https://www.academia.edu/Documents/in/Philosophy_of_Technology">Philosophy of Technology</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="859" href="https://www.academia.edu/Documents/in/Communication">Communication</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="928" href="https://www.academia.edu/Documents/in/Media_Studies">Media Studies</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="933" href="https://www.academia.edu/Documents/in/New_Media">New Media</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="2869" href="https://www.academia.edu/Documents/in/Digital_Media">Digital Media</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="4252" href="https://www.academia.edu/Documents/in/Computer_Networks">Computer Networks</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="5401" href="https://www.academia.edu/Documents/in/Computer-Mediated_Communication">Computer-Mediated Communication</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="11712" href="https://www.academia.edu/Documents/in/Metaphor">Metaphor</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="52154" href="https://www.academia.edu/Documents/in/Communication_Studies">Communication Studies</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="89502" href="https://www.academia.edu/Documents/in/Information_and_Communication_Technologies">Information and Communication Te...</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="143968" href="https://www.academia.edu/Documents/in/Information_and_Communication_Technologies_Social_and_cultural_aspects_of_adoption_and_use_of_">Information and Communication Te...</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="971616" href="https://www.academia.edu/Documents/in/Internet_Techologies">Internet Techologies</a><a class="js-related-research-interest ds-research-interests--pill" data-entity-id="1744493" href="https://www.academia.edu/Documents/in/Science_and_Technology_Studies">Science and Technology Studies</a></div></div></div></div></div><div class="footer--content"><ul class="footer--main-links hide-on-mobile"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a href="https://support.academia.edu/"><svg style="width: 12px; height: 12px; position: relative; bottom: -1px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer--research-interests"><li>Find new research papers in:</li><li><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul><ul class="footer--legal-links hide-on-mobile"><li><a href="https://www.academia.edu/terms">Terms</a></li><li><a href="https://www.academia.edu/privacy">Privacy</a></li><li><a href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div> </body> </html>