Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-gq7q9 Total loading time: 0 Render date: 2024-07-18T06:42:14.506Z Has data issue: false hasContentIssue false

PART V - CRITICAL PEDAGOGY

Published online by Cambridge University Press:  04 July 2017

Michael Filimowicz
Affiliation:
Simon Fraser University, British Columbia
Veronika Tzankova
Affiliation:
Simon Fraser University, British Columbia
Get access

Summary

Abstract:

This chapter explores process and outcomes paradigms in media arts pedagogy in the context of new media information and communications technologies (ICTs) and the “contested” Internet – the highly controlled, surveilled, and commercialized networks we use. The paradigmatic notions of pedagogy as either process-based (Dewey) or outcomes-oriented (Niebuhr) are discussed in connection to studio-based learning. Process-based approaches to education have been dominant in the twentieth century and were developed by Dewey, Vygotsky, Schön, Kolb, and many others, while outcomes-oriented education developed later in the period. Originating with sociologist William Spady, outcomes-based education (OBE) (1994) has been implemented as an administrative tool both for measuring individual performance as well as course or program level assessments. Performance “metrics” in outcomes initiatives emphasize peer review and measurement, de-emphasizing flexible approaches such as allowing individual students to assess according to their own goals. This chapter draws on Niebuhr rather than Dewey for expanding OBE frameworks for the use of ICTs in media arts project-based learning. Students are technologically enabled in project-based learning to become agents of their own goals and learning agendas since ICTs provide capabilities for individually tailored learning experiences which contextualize knowledge and assist in developing informed Internet citizenship.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

References

Beaudin, B. and Quick, D. (1995). Experiential Learning: Theoretical Underpinnings. Fort Collins, CO: High Plains Intermountain Center for Agricultural Health and Safety, Colorado State University. Retrieved from http://users.ugent.be/∼mvalcke/LI_1213/experiencial_learning.pdf. Accessed online February 1, 2016.Google Scholar
Beetham, H. and Sharpe, R. (2013). Rethinking Pedagogy for a Digital Age: Designing for 21st Century Learning. London: Routledge.CrossRefGoogle Scholar
Brawley, S., Clark, J., Dixon, C. et al. (2013). Learning Outcomes Assessment and History: TEQSA, the After Standards Project and the QA/QI Challenge in Australia. Arts and Humanities in Higher Education, 12(1), 2035. http://doi.org/10.1177/1474022212460745. Accessed online December 7, 2016.Google Scholar
Burdick, A., Drucker, J., Lunenfeld, P., Presner, T., and Schnapp, J. (2012). Digital Humanities. Cambridge, MA: MIT Press. Retrieved from http://mitpress.mit.edu/sites/default/files/titles/content/9780262018470_Open_Access_Edition. Accessed online December 7, 2016.Google Scholar
Carver, R. (May/June 1996). Theory for Practice: A Framework for Thinking about Experiential Education. Journal of Experiential Education, 19(1), 149–58. Retrieved from https://rampages.us/utaproject/wp-content/uploads/sites/6546/2015/04/Carver-1996_Experiential-Education-Framework.pdf. Accessed online February 1, 2016.CrossRefGoogle Scholar
Creeber, G. and Martin, R. (Eds.) (2009). Digital Culture: Understanding New Media. Berkshire, England: Open University Press.Google Scholar
Cubitt, S. (2009). Digital Theory. Case Study: Digital Aesthetics. In Creeber, G. and Martin, R. (Eds.), Digital Culture: Understanding New Media. Berkshire, England: Open University Press, pp. 23–9.Google Scholar
Dewey, J. (1897, January). My Pedagogic Creed. School Journal, 54, 7780.Google Scholar
Dewey, J. (1938). Experience and Education. New York: Collier Books.Google Scholar
Donath, J. (2014, November 8). The Social Machine: Designs for Living Online. Boston Book Festival panel: Howard Gardner, Judith Donath, Vikram Chandra, host Jason Pontin. Boston Old South Church. Book TV air date November 8, 2014 C-SPAN2, www.booktv.org. Original date October 25, 2014.Google Scholar
Eisner, E.W. (1979). The Educational Imagination: On the Design and Evaluation of School Programs. New York: Macmillan.Google Scholar
Fenwick, J.T. (2001). “Experiential Learning: A Theoretical Critique from Five Perspectives,” ERIC Information Series No. 385.Google Scholar
Ferry, N.M. and Ross-Gordon, J.M. (1998). An Inquiry into Schon's Epistemology of Practice: Exploring Links between Experience and Reflective Practice. Human Relations June 1, 2015, 68, 9731000.Google Scholar
Freire, M. and McCarthy, E. (March 2014). Four Approaches to New Media Art Education. Art Education, (67.2), 2831.Google Scholar
Galloway, A.R. (2004). Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press.CrossRefGoogle Scholar
Harries, R. and Platten, S. (2010). Reinhold Niebuhr and Contemporary Politics: God and Power. New York: Oxford University Press.CrossRefGoogle Scholar
Hazelkorn, E. (2014). Making an Impact: New Directions for Arts and Humanities Research. Articles. Arts and Humanities in Higher Education, 2013. Pre-print article. Retrieved from http://arrow.dit.ie/cserart/51. Accessed online December 7, 2016.Google Scholar
Kolb, D.A. (1984). Experiential Learning: Experiences as a Source of Learning and Development. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
Lewis, L.H. and Williams, C.J. (Summer 1994). Experiential Learning: Past and Present. New Directions for Adult and Continuing Education (62) pp. 516. Retrieved from www.sunyjcc.edu/files/Experiential%20Learning%20-%20Past%20and%20Present.pdf. Accessed online March 3, 2016.Google Scholar
MacKinnon, B. (1985). American Philosophy: A Historical Anthology. Albany, NY: State University of New York Press.Google Scholar
Moll, M. (2013, September 26). Do You Know Where Your Data Have Been? Ottawa Citizen. Retrieved from http://maritamoll.ca/content/do-you-know-where-your-data-have-been. Accessed online December 7, 2016.Google Scholar
Mughal, F. and Zafar, A. (2011). Experiential Learning from a Constructivist Perspective: Reconceptualizing the Kolbian Cycle. International Journal of Learning and Development, (1), 2737. Retrieved from http://eprints.lancs.ac.uk/62024/1/952.pdf. Accessed online February 1, 2016.CrossRefGoogle Scholar
Niebuhr, R. (1932). Moral Man and Immoral Society: A Study in Ethics and Politics. New York: Charles Scribner.Google Scholar
Paul, C. (2015, December 11–January 30). Little Sister (is Watching You, Too). Exhibition catalog. Pratt Manhattan Gallery, New York City.Google Scholar
Piaget, J. and Beth, E.W. (1966). Mathematical Epistemology and Psychology. Holland: Dordrecht.Google Scholar
Rice, D. (1993). Reinhold Niebuhr and John Dewey: An American Odyssey. Albany, NY: State University of New York Press.Google Scholar
Rice, D. (2009). Engagements with an American Original. Grand Rapids, MI: Wm. B. Eerdmans Publishing.Google Scholar
Schön, D. (1983). The Reflective Practitioner. How Professionals Think in Action. London: Temple Smith.Google Scholar
Shields, P. (2014). Borders as Information Flows and Transnational Networks. Global Media and Communication, 10(1), 333.CrossRefGoogle Scholar
Smith, M.K. (2012). What is Pedagogy? The Encyclopedia of Informal Education. Retrieved from http://infed.org/mobi/what-is-pedagogy/. Accessed online December 7, 2016.Google Scholar
Spady, W.G. (1994). Outcome-Based Education: Critical Issues and Answers. Arlington, VA: American Association of School Administrators.Google Scholar
Vygotsky, L.S. (1978). Mind in Society. Cambridge, MA: Harvard University Press. Retrieved from www.instructionaldesign.org/theories/social-development.html. Accessed online December 7, 2016.Google Scholar
Wells, G. (1995). Language and the Inquiry-Oriented Curriculum. Curriculum Inquiry, 25(3), 233–48.Google Scholar

References

47 U.S. Code § 230 – Protection for private blocking and screening of offensive material. (1996). Retrieved August 20, 2015, from www.law.cornell.edu/uscode/text/47/230. Accessed online March 3, 2016.Google Scholar
Abbott, et al. (2016). Observation of gravitational waves from a Binary Black Hole Merger. Physical Review Letters, 116(6). Retrieved from http://link.aps.org/doi/10.1103/PhysRevLett.116.061102. Accessed online March 3, 2016.Google Scholar
Abumrad, J. and Krulwich, R. (2015a, June 18). Eye in the Sky. Retrieved March 12, 2016, from www.radiolab.org/story/eye-sky/. Accessed online March 3, 2016.Google Scholar
Abumrad, J. and Krulwich, R. (2015b, June 6). Antibodies Part 1: CRISPR. Retrieved August 15, 2015, from www.radiolab.org/story/antibodies-part-1-crispr/. Accessed online March 3, 2016.Google Scholar
Ackerman, S. and Thielman, S. (2016, February 09). US intelligence chief: We might use the internet of things to spy on you. Retrieved February 09, 2016, from www.theguardian.com/technology/2016/feb/09/internet-of-things-smart-home-devices-government-surveillance-james-clapper. Accessed online March 3, 2016.Google Scholar
Aiyer, G.R., Glott, R., Krieger, B., and Robles, G. (2002, June). Free/Libre and open source software: Survey and study FLOSS. Retrieved February 05, 2016, from http://flossproject.org/report/Final4.htm#_Toc13908258. Accessed online March 3, 2016.Google Scholar
Amazon Mechanical Turk. (2005). Retrieved February 15, 2016, from www.mturk.com/mturk/help?helpPage=overview. Accessed online March 3, 2016.Google Scholar
Berridge, K.C. and Robinson, T.E. (1998). What is the role of dopamine in reward: Hedonic impact, reward learning, or incentive salience? Brain Research Reviews, 28(3), 309–69.Google Scholar
Biesecker, M. and Bykowicz, J. (2016, February 11). Cruz app data collection helps campaign read minds of voters. Retrieved February 22, 2016, from http://bigstory.ap.org/article/2db0fc93cf664a63909e26e708e91c67/cruz-app-data-collection-helps-campaign-read-minds-voters. Accessed online March 3, 2016.Google Scholar
Bilton, N. (2013, August 11). Disruptions: As new targets for hackers, your car and your house. Retrieved February 15, 2016, from http://bits.blogs.nytimes.com/2013/08/11/taking-over-cars-and-homes-remotely. Accessed online March 3, 2016.Google Scholar
Brandom, R. (2015, May 19). Scientists develop new ‘kill switch’ to destroy genetically-modified organisms that escape. Retrieved February 05, 2016, from www.theverge.com/2015/5/19/8625623/gmo-crispr-kill-switch-self-destructing-dna. Accessed online March 3, 2016.Google Scholar
Bratton, B.H. (2013, December 30). New perspectives – What's wrong with TED talks? Benjamin Bratton at TEDxSanDiego 2013 – Re:Think. Retrieved August 12, 2015.Google Scholar
Bratton, B.H. (2014, March). The black stack. Retrieved www.e-flux.com/journal/the-black-stack/. Accessed online August 23, 2015.Google Scholar
Bratton, B.H. (2016). The stack: On software and sovereignty. Cambridge, MA: MIT Press.Google Scholar
Brueck, H. (2016, February 26). Here's why Chicago just made computer science a graduation requirement. Retrieved March 07, 2016, from http://fortune.com/2016/02/26/chicago-computer-science/. Accessed online March 3, 2016.Google Scholar
Caliando, B.J. and Voigt, C.A. (2015). Targeted DNA degradation using a CRISPR device stably carried in the host genome. Nature Communications, 6, 6989.CrossRefGoogle ScholarPubMed
Callaway, E. (2015). Mosquitoes engineered to pass down genes that would wipe out their species. Nature. Retrieved from http://www.nature.com/news/mosquitoes-engineered-to-pass-down-genes-that-would-wipe-out-their-species-1.18974. Accessed online February 5, 2016.Google Scholar
Carpenter, R. (2011, September 3). Cleverbot comes very close to passing the Turing Test. Retrieved February 16, 2016, from www.cleverbot.com/. Accessed online March 3, 2016.Google Scholar
Crary, J. (2014). 24/7: Late capitalism and the ends of sleep (p. 144). London: Verso.Google Scholar
CURIA – Documents. (2014, May 13). Retrieved August 31, 2015, from http://curia.europa.eu/juris/document/document.jsf?docid=152065&mode=req&pageIndex=1&dir=&occ=first&part=1&text=&doclang=EN&cid=341631. Accessed online March 3, 2016.Google Scholar
Cyranoski, D. and Reardon, S. (2015, April 22). Chinese scientists genetically modify human embryos. Retrieved August 16, 2015, from www.nature.com/news/chinese-scientists-genetically-modify-human-embryos-1.17378. Accessed online March 3, 2016.Google Scholar
DARPA (2014). Defense Advanced Research Projects Agency: Where the future becomes now. Retrieved March 09, 2016, from www.darpa.mil/about-us/darpa-history-and-timeline. Accessed online March 3, 2016.Google Scholar
Deleuze, G. and Guattari, F. (1987). A thousand plateaus: Capitalism and schizophrenia. Minneapolis, MN: University of Minnesota Press.Google Scholar
Deresiewicz, W. (2015, September 1). The neoliberal arts: How college sold its soul to the market. Harper's Magazine, 2532. Retrieved August 16, 2015, from http://harpers.org/archive/2015/09/the-neoliberal-arts/. Accessed online March 3, 2016.Google Scholar
DiBona, C. (2015, March 12). Bidding farewell to Google Code. Retrieved September 21, 2015, from http://google-opensource.blogspot.com.es/2015/03/farewell-to-google-code.html. Accessed online March 3, 2016.Google Scholar
DoJ. (2016, February 19). Government's motion to compel Apple inc. to comply with this court's February 16, 2016 order compelling assistance in search. Retrieved February 22, 2016, from https://assets.documentcloud.org/documents/2715926/Motion-to-Compel-Apple-Compliance.pdf. Accessed online March 3, 2016.Google Scholar
Dredge, S. (2015, August 27). Facebook M virtual assistant will compete with Siri and Google Now. Retrieved August 31, 2015, from www.theguardian.com/technology/2015/aug/27/facebook-m-virtual-assistant-siri-google-now. Accessed online March 3, 2016.Google Scholar
Drucker, J. (2014). Graphesis: Visual forms of knowledge production. Cambridge, MA: Harvard University Press.Google Scholar
European Space Agency. (2016, February 12). LISA Pathfinder overview. Retrieved February 21, 2016, from www.esa.int/Our_Activities/Space_Science/LISA_Pathfinder_overview. Accessed online March 3, 2016.Google Scholar
Facebook: What types of ID does Facebook accept? (2015, December). Retrieved February 16, 2016, from www.facebook.com/help/159096464162185. Accessed online March 3, 2016.Google Scholar
Facebook's Data Pool (2011). Retrieved August 20, 2015, from http://europe-v-facebook.org/EN/Data_Pool/data_pool.html. Accessed online March 3, 2016.Google Scholar
Peter Sloterdijk interview (2014, June 12). Retrieved February 01, 2016, from www.youtube.com/watch?v=N8x-cp7SXAs. Accessed online March 3, 2016.Google Scholar
Findings regarding the market events of May 6, 2010. (2010, September 30). Retrieved August 31, 2015, from www.sec.gov/news/studies/2010/marketevents-report.pdf. Accessed online March 3, 2016.Google Scholar
Foerster, H.V. (1982). To know and to let know: An applied theory of knowledge. Canadian Library Journal, 39, 277–82.Google Scholar
Freightliner, . (2015). Retrieved February 23, 2016, from www.freightlinerinspiration.com/. Accessed online March 3, 2016.Google Scholar
Galloway, A. (2004). Protocol how control exists after decentralization. Cambridge, MA: MIT Press.Google Scholar
Gibbs, S. (2015, November 13). Google's self-driving car gets pulled over for driving too slowly. Retrieved February 05, 2016, from www.theguardian.com/technology/2015/nov/13/google-self-driving-car-pulled-over-driving-too-slowly?INTCMP=sfl. Accessed online March 3, 2016.Google Scholar
GitHub Help. (2016). Retrieved March 12, 2016, from https://help.github.com/articles/fork-a-repo/. Accessed online March 3, 2016.Google Scholar
Grothoff, C. and Porup, J.M. (2016, February 16). The NSA's SKYNET program may be killing thousands of innocent people. Retrieved February 29, 2016, from http://arstechnica.co.uk/security/2016/02/the-nsas-skynet-program-may-be-killing-thousands-of-innocent-people/. Accessed online March 3, 2016.Google Scholar
Groys, B. (2009). Education by infection. In Madoff, H. (Ed.), Art school: Propositions for the 21st century (pp. 2632). Cambridge, MA: MIT Press.Google Scholar
Hayles, N.K. (1999). How we became posthuman: Virtual bodies in cybernetics, literature, and informatics. Chicago, IL: University of Chicago Press.CrossRefGoogle Scholar
Hayles, N.K. (2005). My mother was a computer: Digital subjects and literary texts. Chicago: University of Chicago Press.Google Scholar
Hayles, N.K. (2006a). Traumas of code. Critical Inquiry, 33(1), 136–57.CrossRefGoogle Scholar
Hayles, N.K. (2006b). Unfinished work: From Cyborg to cognisphere. Theory, Culture & Society, 23(7–8), 159–66. Doi:10.1177/0263276406069229.Google Scholar
Hern, A. (2015, July 30). Google says non to French demand to expand right to be forgotten worldwide. Retrieved February 10, 2016, from www.theguardian.com/technology/2015/jul/30/google-rejects-france-expand-right-to-be-forgotten-worldwide. Accessed online March 3, 2016.Google Scholar
Home Page of The Loebner Prize in Artificial Intelligence. (2015). Retrieved August 31, 2015, from www.loebner.net/Prizef/loebner-prize.html. Accessed online March 3, 2016.Google Scholar
InfoCuria. (2015). Retrieved from http://curia.europa.eu/juris/recherche.jsf?cid=716879. Accessed online March 3, 2016.Google Scholar
Jinek, M., Chylinski, K., Fonfara, I. et al. (2012). A programmable dual-RNA-guided DNA endonuclease in adaptive bacterial immunity. Science, 337(6096), 816–21. Retrieved from http://science.sciencemag.org/content/337/6096/816. Accessed online March 3, 2016.CrossRefGoogle ScholarPubMed
Job Search Results. Retrieved Labor Day, 2015, from www.upwork.com/o/jobs/browse/t/0/. Accessed online March 3, 2016.Google Scholar
Kaplan, E. (2015, March 1). The spy who fired me: The human costs of workplace monitoring. Harper's, 3140.Google Scholar
Kasperkevic, J. (2015, July 01). Google says sorry for racist auto-tag in photo app. Retrieved February 16, 2016, from www.theguardian.com/technology/2015/jul/01/google-sorry-racist-auto-tag-photo-app. Accessed online March 3, 2016.Google Scholar
Kim, K. and Wang, C. (2016, January 4). China's seven-minute selling Frenzy that shook global markets. Retrieved February 15, 2016, from www.bloomberg.com/news/articles/2016-01-04/china-s-seven-minute-selling-frenzy-shows-circuit-breaker-risks. Accessed online March 3, 2016.Google Scholar
Kirilenko, A.A., Kyle, A.S., Samadi, M., and Tuzun, T. (2015, December 28). The Flash Crash: The impact of high frequency trading on an electronic market. Available at SSRN: http://ssrn.com/abstract=1686004 or http://dx.doi.org/10.2139/ssrn.1686004. Accessed online March 3, 2016.Google Scholar
Latour, B. (1981). Visualisation and cognition: Drawing things together. In Jones, R.A. and Kurlick, H. (Eds.), Knowledge and society: Studies in the sociology of culture past and present (Vol. 6, 140). Greenwich, CT: Jai Press.Google Scholar
Ledford, H. and Callaway, E. (2015). ‘Gene drive’ mosquitoes engineered to fight malaria. Nature. Retrieved February 5, 2016, from www.nature.com/news/gene-drive-mosquitoes-engineered-to-fight-malaria-1.18858?WC.mc_id=TWT_NatureNews. Accessed online March 3, 2016.Google Scholar
Lessig, L. (2010). Code: Version 2.0. Retrieved February 15, 2016, from http://codev2.cc/download remix/Lessig-Codev2.pdf available at http://codev2.cc/download+remix/Lessig-Codev2.pdf. Accessed online March 3, 2016.Google Scholar
Lewis, M. (2014). Flash boys: A wall street revolt. New York, London: W.W. Norton & Company.Google Scholar
Lewis, R. (2015, December 03). A conversation with CRISPR-Cas9 inventors Charpentier and Doudna|DNA Science blog. Retrieved February 19, 2016, from http://blogs.plos.org/dnascience/2015/12/03/a-conversation-with-crispr-cas9-inventors-charpentier-and-doudna/. Accessed online March 3, 2016.Google Scholar
Liao, H.K., Gu, Y., Diaz, A. et al. (2015). Use of the CRISPR/Cas9 system as an intracellular defense against HIV-1 infection in human cells. Nature Communications 6. Article number: 6413. DOI: 10.1038/ncomms7413. Retrieved from www.nature.com/articles/ncomms7413. Accessed online August 15, 2015.Google Scholar
Lynch, P. (Director). (2002). Cyberman [Motion picture on DVD]. Canada.Google Scholar
Mann, S. (2004). EyeTap personal imaging lab. Retrieved February 20, 2016, from www.eyetap.org/about_us/hilab/index.html. Accessed online March 3, 2016.Google Scholar
Manovich, L. (2013). Software takes command: Extending the language of new media. New York, NY: Bloomsbury Academic.Google Scholar
Minsky, M. and Papert, S. (1969). Perceptrons: An introduction to computational geometry. Cambridge, MA: MIT Press.Google Scholar
Mordvintsev, A., Olah, C., and Tyka, M. (2015, June 17). Inceptionism: Going deeper into neural networks. Retrieved February 16, 2016, from http://googleresearch.blogspot.com/2015/06/inceptionism-going-deeper-into-neural.html. Accessed online March 3, 2016.Google Scholar
NASA's Toyota Study released by Dept. of Transportation. (2011, February 8). Retrieved August 27, 2015, from www.nasa.gov/topics/nasalife/features/nesc-toyota-study.html. Accessed online March 3, 2016.Google Scholar
Nanodegree Plus – Get a job guaranteed|Udacity. (2016). Retrieved February 15, 2016, from www.udacity.com/nanodegree/plus. Accessed online March 3, 2016.Google Scholar
Overbye, D. (2015, June 8). Black hole hunters. Retrieved August 16, 2015, from www.nytimes.com/2015/06/09/science/black-hole-event-horizon-telescope.html. Accessed online March 3, 2016.Google Scholar
Oye, K.A., Esvelt, K., Appleton, E. et al. (2014). Regulating gene drives. Science, 345(6197), 626–8.Google Scholar
Parker, A. and Corasaniti, N. (2014, October 30). Data-driven campaigns zero in on voters, but messages are lacking. Retrieved February 01, 2016, from www.nytimes.com/2014/10/31/us/politics/data-driven-campaigns-zero-in-on-voters-but-messages-are-lacking.html. Accessed online March 3, 2016.Google Scholar
Pearson, G. (2014, May 20). Will we still have fruit if bees die off? Retrieved September 7, 2015, from www.wired.com/2014/05/will-we-still-have-fruit-if-bees-die-off/. Accessed online March 3, 2016.Google Scholar
Reno v. American Civil Liberties Union, 117 S.Ct. 2329, 138 L.Ed.2d 874 (1997). (1997, March 19). Retrieved August 20, 2015, from www.law.cornell.edu/supct/html/96-511.ZS.html. Accessed online March 3, 2016.Google Scholar
Resnick, M. (1994). Turtles, termites, and traffic jams: explorations in massively parallel microworlds. Cambridge, MA: MIT Press.Google Scholar
Richtel, M. (2013, April 27). How big data is playing recruiter for specialized workers. Retrieved September 6, 2015, from http://nyti.ms/18JCAYS. Accessed online March 3, 2016.Google Scholar
Rogers, S. (2013, March 15). John Snow's data journalism: The cholera map that changed the world. Retrieved February 26, 2016, from www.theguardian.com/news/datablog/2013/mar/15/john-snow-cholera-map. Accessed online March 3, 2016.Google Scholar
Rosen, M., Weibel, P., Fritz, D., and Gattin, M. (2011). A little known story about a movement, a magazine and the computer's arrival in art: New Tendencies and Bit international, 1961–1973. Karlsruhe, Germany: ZKM/Center for Art and Media.Google Scholar
Safe Harbor: Advisory. (2015, February 11). Retrieved February 15, 2016, from www.export.gov/safeharbor/. Accessed online March 3, 2016.Google Scholar
Sang-hun, C. and Markoff, J. (2016, March 09). Master of go board game is walloped by Google Computer Program. Retrieved March 12, 2016, from www.nytimes.com/2016/03/10/world/asia/google-alphago-lee-se-dol.html. Accessed online March 3, 2016.Google Scholar
Schmidt, M.S. and Shear, M.D. (2015, January 26). A Drone, Too Small for Radar to Detect, Rattles the White House. Retrieved February 05, 2016, from www.nytimes.com/2015/01/27/us/white-house-drone.html?_r=0. Accessed online March 3, 2016.Google Scholar
Scott, M. (2015, October 06). Data transfer pact between U.S. and Europe is ruled invalid. Retrieved February 10, 2016, from www.nytimes.com/2015/10/07/technology/european-union-us-data-collection.html. Accessed online March 3, 2016.Google Scholar
Scott, M. (2016, January 24). Europe's top digital – Privacy watchdog zeros in on U.S. Tech giants. Retrieved January 28, 2016, from www.nytimes.com/2016/01/25/technology/europes-top-digital-privacy-watchdog-zeros-in-on-us-tech-giants.html. Accessed online March 3, 2016.Google Scholar
SEC approves new rule requiring consolidated audit trail to monitor and analyze trading activity. (2012, July 11). Retrieved August 30, 2015, from www.sec.gov/News/PressRelease/Detail/PressRelease/1365171483188. Accessed online March 3, 2016.Google Scholar
Section 230 of the Communications Decency Act (2015). Retrieved August 20, 2015, from https://en.wikipedia.org/wiki/Section_230_of_the_Communications_Decency_Act#Case_law. Accessed online March 3, 2016.Google Scholar
Sims, K. (1994, July 1). Evolving virtual creatures. Retrieved August 17, 2015, from www.karlsims.com/papers/siggraph94.pdf. Accessed online March 3, 2016.Google Scholar
Singer, P.W. (2009). Wired for war: The robotics revolution and conflict in the twenty-first century. New York: Penguin Press.Google Scholar
Sloterdijk, P. (2007, November 25). Optimierung des Menschen? Retrieved February 15, 2016, from www.tele-akademie.de/begleit/video_ta110116.php. Accessed online March 3, 2016. SWR Fernsehen Tele-Akademie.Google Scholar
Sloterdijk, P. (2011). Bubbles: Microspherology (W. Hoban, Trans.). Los Angeles, CA: Semiotext(e).Google Scholar
Sloterdijk, P. (2016). Stress and freedom. Cambridge: Polity.Google Scholar
State National Bank of Big Spring v. Jacob J. Lew. (2014, November 19). Retrieved from http://harvardlawreview.org/2016/01/state-national-bank-of-big-spring-v-lew/. Accessed online August 31, 2015.Google Scholar
Steve Fossett – Mechanical Turk results. (2007, September 24). Retrieved September 7, 2015, from http://s3.amazonaws.com/fossett/index.html. Accessed online March 3, 2016.Google Scholar
Steyerl, H. (2010). Politics of art: Contemporary art and the transition to post-democracy. E-flux Journal. Retrieved from www.e-flux.com/journal/21/67696/politics-of-art-contemporary-art-and-the-transition-to-post-democracy/. Accessed online August 5, 2015.Google Scholar
Steyerl, H. (2013). Freedom from everything: Freelancers and mercenaries. Retrieved September 6, 2015, from www.e-flux.com/journal/freedom-from-everything-freelancers-and-mercenaries/. Accessed online March 3, 2016.Google Scholar
Talking to Machines. (2015). Retrieved www.radiolab.org/story/137407-talking-to-machines/. Accessed online August 31, 2015.Google Scholar
The Trust Engineers. (2015, February 9). Retrieved www.radiolab.org/story/trust-engineers/. Accessed online August 31, 2015.Google Scholar
Turkle, S. (2011). Alone together: Why we expect more from technology and less from each other. New York: Basic Books.Google Scholar
Upwork, the world's largest online workplace. (2015). Retrieved http://upwork.com/. Accessed online February 15, 2016.Google Scholar
Wark, M. (2015, August 29). E-flux journal 56th Venice Biennale – SUPERCOMMUNITY – The vectoralist class. Retrieved September 21, 2015, from http://supercommunity.e-flux.com/texts/the-vectoralist-class/. Accessed online March 3, 2016.Google Scholar
Wenning, R. and Schunter, M. (2006, November 13). The platform for privacy preferences 1.1 (P3P1.1) specification. Retrieved February 22, 2016, from www.w3.org/TR/P3P11/#Introduction. Accessed online March 3, 2016.Google Scholar
Whalen, T. (1994). My experience with the 1994 Loebner competition. Retrieved January 29, 2016, from http://thomwhalen.com/nonfiction/ThomLoebner1994.html. Accessed online March 3, 2016.Google Scholar
Wiener, N. (1961). Cybernetics; or, control and communication in the animal and the machine 2nd ed. New York: MIT Press.Google Scholar
Willemsen, E. (2015, December 23). Ski federation bans drones after camera nearly hits racer. Retrieved February 19, 2016, from http://bigstory.ap.org/article/9680a8b4a3934750a8eeacd6594996cb/ski-federation-bans-drones-after-camera-nearly-hits-racer. Accessed online March 3, 2016.Google Scholar
Williams, T. (2015, August 12). Facial recognition software moves from overseas wars to local police. Retrieved August 16, 2015, from www.nytimes.com/2015/08/13/us/facial-recognition-software-moves-from-overseas-wars-to-local-police.html. Accessed online March 3, 2016.Google Scholar
Wingfield, N. (2015, June 10). How's my driving? The insurer knows. Retrieved September 5, 2015, from http://bits.blogs.nytimes.com/2015/06/10/hows-my-driving-the-insurer-knows/. Accessed online March 3, 2016.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×