Cryptography Reference
In-Depth Information
5. An eloquent articulation of this line of thought is provided by Michael Benedikt:
“Cyberspace: The realm of pure information, filling like a lake, siphoning the jangle
of messages transfiguring the physical world, decontaminating the natural and
urban landscapes, redeeming them, saving them from the chain-dragging bulldozers
of the paper industry, from the diesel smoke of courier and post office trucks, from
jet fuel fumes and clogged airports, from billboards, trashy and pretentious archi-
tecture, hour-long freeway commutes, ticket lines and choked subways . . . from all
the inefficiencies, pollutions (chemical and informational), and corruptions atten-
dant to the process of moving information attached to things —from paper to
brains—across, over, and under the vast and bumpy surface of the earth rather than
letting it fly free in the soft hail of electrons that is cyberspace.” Michael Benedikt,
Cyberspace: First Steps (Cambridge, MA: MIT Press, 1991), 3. For a discussion of the
immateriality trope in computing, see Jean-François Blanchette, “A Material History
of Bits,” Journal of the American Association for Information Science and Technology 62,
no. 6 (2011): 1042-1057.
6. John Perry Barlow, “A Declaration of the Independence of Cyberspace,” The
Humanist 56, no. 3 (1996): 18-19.
7. Nicholas Negroponte, Being Digital (New York: Vintage Books, 1996), 61.
8. George L. Paul, Foundations of Digital Evidence (Chicago: American Bar Associa-
tion, 2008), 19.
9. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of
Applied Cryptography (Boca Raton: CRC Press, 1997), 3.
10. Abigail J. Sellen and Richard H. R. Harper, The Myth of the Paperless Office, (Cam-
bridge, MA: MIT Press, 2002), 196.
11. Ibid., 187.
12. Phil Agre, Computation and Human Experience (Cambridge: Cambridge University
Press, 1997), 57-58. See also Lucille Alice Suchman, Human-Machine Reconfigurations:
Plans and Situated Actions (Cambridge: Cambridge University Press, 2007); John Seely
Brown and Paul Duguid, The Social Life of Information (Boston: Harvard Business
School Press, 2000); and Paul Dourish, Where the Action Is: The Foundations of Embod-
ied Interaction (Cambridge, MA: MIT Press, 2001).
13. Claudio Ciborra, The Labyrinths of Information: Challenging the Wisdom of Systems
(Oxford: Oxford University Press, 2002), 21.
14. Sellen and Harper, The Myth of the Paperless Office, , 198.
15. Whitfield Diffie and Martin E. Hellman, “New Directions in Cryptography,” IEEE
Transactions on Information Theory 22, no. 6 (1976): 644-654.
16. See Susan Landau, “Find Me a Hash,” Notices of the American Mathematical Society
53, no. 3 (March 2006): 330-332.
Search WWH ::




Custom Search