Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-x4r87 Total loading time: 0 Render date: 2024-04-27T02:41:03.328Z Has data issue: false hasContentIssue false

17 - Creativity Within Computer Science

from Part III - Creativity in the Sciences

Published online by Cambridge University Press:  15 September 2017

James C. Kaufman
Affiliation:
University of Connecticut
Vlad P. Glăveanu
Affiliation:
Universitetet i Bergen, Norway
John Baer
Affiliation:
Rider University, New Jersey
Get access

Summary

Abstract

This chapter focuses on creativity within computer science. We examine what those within the field have said about creativity and how it relates to computer science and to computer scientists. We also look at the results of creativity in the form of products of computer science. We often reference programing both directly and indirectly, but we also address areas of computer science beyond programing whenever possible. We address creativity from the perspective of those within the field. We discuss examples of how creativity in computer science is implemented in areas such as coding, open-source projects, video games, augmented reality, and artificial intelligence. We look at creativity in computer science education as both a method of instruction as well as a desired outcome. We then look at malevolent creativity and how different types of hackers use creativity with either malevolent or benevolent intent.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Amabile, T. M. (1988). A model of creativity and innovation in organizations. Research in Organizational Behavior, 10(1), 123167.Google Scholar
Anderson, M. (2015). Technology device ownership: 2015. Pew Research Center. Retrieved on August 14, 2016, from www.pewinternet.org/2015/10/29/technology-device-ownership-2015/Google Scholar
Bauer, W. F., Juncosa, M. L., & Perlis, A. J. (1959). ACM publication policies and plans. Journal of the ACM (JACM), 6(2), 121122.Google Scholar
Beghetto, R. A. (2014). Creative mortification: An initial exploration. Psychology of Aesthetics, Creativity, and the Arts, 8(3), 266.Google Scholar
Blackwell, A., & Collins, N. (2005). The programing language as a musical instrument. In Romero, P., Good, J., Chaparro, E. Acosta, & Bryant, S. (Eds.), Proceedings of Psychology of Programming Interest Group (PPIG), 17, pp. 120130.Google Scholar
Blue, V. (2016, October 28). That time your smart toaster broke the internet [Blog post]. Engadget. Retrieved on October 29, 2016, from www.engadget.com/2016/10/28/that-time-your-smart-toaster-broke-the-internet/Google Scholar
Bond, G. W. (2005). Software as art. Communications of the ACM, 48(8), 118125. DOI:10.1145/1076211.1076215.Google Scholar
Bowcott, O. (2012, October 16). Gary McKinnon: How unknown hacker sparked political and diplomatic storm. The Guardian. Retrieved on September 21, 2016, from www.theguardian.com/world/2012/oct/16/gary-mckinnon-hacker-sparked-stormGoogle Scholar
Brockwell, H. (2016, April 3). Forgotten genius: The man who made a working VR machine in 1957. TechRadar. Retrieved on September 21, 2016, from www.techradar.com/news/wearables/forgotten-genius-the-man-who-made-a-working-vr-machine-in-1957–1318253Google Scholar
Bromley, A. G. (1982). Charles Babbage’s analytical engine, 1838. Annals of the History of Computing, 4(3), 196217.Google Scholar
Broukhis, L., Cooper, S., and Noll, L. (n.d.). The international obfuscated C code contest. Retrieved on September 21, 2016 from http://www.ioccc.org/index.htmlGoogle Scholar
Brusilovsky, P., Calabrese, E., Hvorecky, J., Kouchnirenko, A., & Miller, P. (1997). Mini-languages: A way to learn programming principles. Education and Information Technologies, 2(1), 6583.Google Scholar
BusinessDictionary.com. (n.d.). Computer science Retrieved October 21, 2016, from www.businessdictionary.com/definition/computer-science.htmlGoogle Scholar
Carmody, T. (2013, January 24). Amazon acquires Kindle Fire text-to-speech provider, but this isn’t about Siri. The Verge. Retrieved on October 21, 2016 from www.theverge.com/2013/1/24/3911056/amazon-acquires-kindle-fire-text-to-speech-provider-but-this-isntGoogle Scholar
Cennamo, K., Douglas, S. A., Vernon, M., Brandt, C., Scott, B., Reimer, Y., & McGrath, M. (2011). Promoting creativity in the computer science design studio. Proceedings of the 42nd ACM Technical Symposium on Computer Science Education, 649654.Google Scholar
Cohen, H. (1999a). Colouring without seeing: A problem in machine creativity. AISB Quarterly, 102, 2635.Google Scholar
Cohen, H. (1999b). A self-defining game for one player. Proceedings of the 3rd conference on Creativity & Cognition, 14. DOI: 10.1145/317561.317564Google Scholar
Comer, D. E., Gries, D., Mulder, M. C., Tucker, A., Turner, A. J., Young, P. R., & Denning, P. J. (1989). Computing as a discipline. Communications of the ACM, 32(1), 923.Google Scholar
Cropley, D. H., Cropley, A. J., Kaufman, J. C., & Runco, M. A. (Eds.). (2010). The dark side of creativity. New York, NY: Cambridge University Press.Google Scholar
Cropley, D. H., Kaufman, J. C., & Cropley, A. J. (2008). Malevolent creativity: A functional model of creativity in terrorism and crime. Creativity Research Journal, 20(2), 105115.Google Scholar
Cropley, D. H., Kaufman, J. C., White, A. E., & Chiera, B. A. (2014). Layperson perceptions of malevolent creativity: The good, the bad, and the ambiguous. Psychology of Aesthetics, Creativity, and the Arts, 8(4), 400.Google Scholar
Denning, P. J. (2005). Is computer science science? Communications of the ACM, 48(4), 2731. DOI:10.1145/1053291.1053309Google Scholar
Denning, P. J. (2010). The great principles of computing: Computing may be the fourth great domain of science along with the physical, life and social sciences. American Scientist, 98(5), 369.Google Scholar
Dexter, S., & Kozbelt, A. (2013). Free and open source software (FOSS) as a model domain for answering big questions about creativity. Mind & Society, 12(1), 113123.Google Scholar
Dictionary.com Unabridged. (n.d.). Computer science. Retrieved on August 7, 2016, from http://www.dictionary.com/browse/computer-scienceGoogle Scholar
Ducklin, P. (2015, September 28). Why Word “macro malware” is back, and what you can do about it … [Blog post] Naked Security by Sophos. Retrieved September 22, 2016 from https://nakedsecurity.sophos.com/2015/09/28/why-word-macro-malware-is-back-and-what-you-can-do-about-it/Google Scholar
Edwards, L. (2016, June 16). What is Magic Leap and why might it kill all screens? Pocket-lint. Retrieved on October 30, 2016, from http://www.pocket-lint.com/news/135688-what-is-magic-leap-and-why-might-it-kill-all-screensGoogle Scholar
Fein, L. (1959). The role of the university in computers, data processing, and related fields. Communications of the ACM, 2(9), 714. DOI:10.1145/368424.368427Google Scholar
Fellows, M., & Parberry, I. (1993). SIGACT trying to get children excited about CS. Computing Research News, 5(1), 7.Google Scholar
Fieldman, T. (2015, May 13). Moore’s law turns 50. The New York Times. Retrieved on August 6, 2016 from http://nyti.ms/1IAnBxPGoogle Scholar
Fingas, J. (2016, August 7). IBM’s Watson AI saved a woman from leukemia. Engadget. Retrieved on September 21, 2016, from www.engadget.com/2016/08/07/ibms-watson-ai-saved-a-woman-from-leukemia/Google Scholar
Garrie, D. B. (2012). Effective keyword selection requires a mastery of storage technology and the law. Pace Law Review, 32(2), pp. 400406.Google Scholar
Germ, E. (2013, January 15). 6 Awesome Easter eggs hidden in programs you use every day. Cracked. Retrieved on October 21, 2016, from www.cracked.com/article_20174_6-awesome-easter-eggs-hidden-in-programs-you-use-every-day.htmlGoogle Scholar
Glass, R. L., & DeMarco, T. (2006). Software creativity 2.0. developer.* Books.Google Scholar
Glăveanu, V. P. (2014). Distributed creativity: Thinking outside the box of the creative individual. New York: Springer International Publishing.Google Scholar
Graham, P. (2004). Hackers & painters: Big ideas from the computer age. Sebastopol, CA: O’Reilly Media, Inc.Google Scholar
Graziotin, D., Wang, X., & Abrahamsson, P. (2014). Software developers, moods, emotions, and performance. IEEE Software, 31(4), 2427.Google Scholar
GReAT. (2016, August 9). The Project Sauron APT. Global Research and Analysis Team Kaspersky Lab. Retrieved September 21, 2016, from https://kas.pr/a9snGoogle Scholar
Green, G., & Kaufman, J. C. (Eds.). (2015). Video games and creativity. Academic Press.Google Scholar
Gu, M., & Tong, X. (2004). Towards hypotheses on creativity in software development. International Conference on Product Focused Software Process Improvement, 4761.Google Scholar
Guilford, J. P. (1950). Creativity. American Psychologist, 5(9), 444454. DOI:10.1037/h0063487Google Scholar
Hasselström, K., & Åslund, J. (2001, August 21). The Shakespeare programming language. Retrieved on August 16, 2016, from http://shakespearelang.sourceforge.net/report/shakespeare/Google Scholar
Hewitt, A. (2013, July 3). Discover the coded message hidden in campus floor tiles. UCLA Newsroom. Retrieved on October 17, 2016, from http://newsroom.ucla.edu/stories/a-coded-message-hidden-in-floor-247232Google Scholar
Hofstadter, D. R. (1996). Fluid concepts & creative analogies: Computer models of the fundamental mechanisms of thought. New York: Basic Books.Google Scholar
Hong, L. (2013, May 30). The 5 most creative ‘developer job ads.’ [Blog post]Smart Recruiters. Retrieved on October 23, 2016, from https://www.smartrecruiters.com/blog/the-5-most-creative-developer-job-ads/Google Scholar
Hopkins, S. (1995). Listen. In The Princeton Encyclopedia of Poetry and Poetics, 2012, 396397.Google Scholar
Res, H.. 269, 107th Cong., 148 Cong. Rec. H3308 (2002).Google Scholar
Virtual Reality Society (n.d.). How did virtual reality begin? Retrieved on September 21, 2016. from www.vrs.org.uk/virtual-reality/beginning.htmlGoogle Scholar
Howard, E. V., Bulach, T. M., Carver, L. A., Creekbaum, C. R., Parker, R. J., & Shockley, L. G. (2009). Perceptions of using creativity in an IT ethics course–A case study of students and instructor. Proceedings of the Information Systems Education Conference, 26.Google Scholar
International Telecommunication Union (ITU) (n.d.). Internet of things global standards initiative. Retrieved on September 21, 2016. from www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspxGoogle Scholar
Jordanous, A. (2014, April 10). What is computational creativity? [Blog post]. The Creativity Post. Retrieved on September 5, 2016. from www.creativitypost.com/science/what_is_computational_creativityGoogle Scholar
Kaufman, J. C. (2006). Self‐reported differences in creativity by ethnicity and gender. Applied Cognitive Psychology, 20(8), 10651082.Google Scholar
Kaufman, J. C. (2010). Using creativity to reduce ethnic bias in college admissions. Review of General Psychology, 14(3), 189.Google Scholar
Kaufman, J. C. (2016). Creativity 101. New York: Springer Publishing Company.Google Scholar
Kaufman, J. C., & Baer, J. (2004). Sure, I’m creative—but not in mathematics!: Self-reported creativity in diverse domains. Empirical Studies of the Arts, 22(2), 143155.Google Scholar
Kaufman, J. C., & Baer, J. (2002). Could Steven Spielberg manage the Yankees?: Creative thinking in different domains. Korean Journal of Thinking and Problem Solving, 12(2), 514.Google Scholar
Kaufman, J. C., & Baer, J. (2012). Beyond new and appropriate: Who decides what is creative? Creativity Research Journal, 24(1), 8391.Google Scholar
Kaufman, J. C., Baer, J., & Gentile, C. A. (2004). Differences in gender and ethnicity as measured by ratings of three writing tasks. The Journal of Creative Behavior, 38(1), 5669.Google Scholar
Kaufman, J. C., & Sternberg, R. J. (2007). Resource review: Creativity. Change, 39(4), 5558.Google Scholar
Kemps, H. (2013, May 22). The funny, occasionally dirty, hidden messages in your favorite games. WIRED. Retrieved on October 21, 2016. from https://www.wired.com/2013/05/hidden-messages/Google Scholar
Khatchadourlan, R. (2015, May 18). World without end. The New Yorker. Retrieved on September 21, 2016. from www.newyorker.com/magazine/2015/05/18/world-without-end-raffi-khatchadourianGoogle Scholar
Kiefaber, D. (2013, May 28) Flickr recruits coders with ads hidden in its website’s source code. Adweek. Retrieved on August 16, 2016. from www.adweek.com/adfreak/flickr-recruits-coders-ads-hidden-its-websites-source-code-149818Google Scholar
King, A. (2015, April 10). The key design elements of Roguelikes. Envato. Retrieved on September 21, 2016. from https://gamedevelopment.tutsplus.com/articles/the-key-design-elements-of-roguelikes–cms–23510Google Scholar
Knobelsdorf, M., & Romeike, R. (2008). Creativity as a pathway to computer science. ACM SIGCSE Bulletin, 40(3) 286290.Google Scholar
Knuth, D. E. (2001). Things a computer scientist rarely talks about. Stanford, CA: CSLI Publications.Google Scholar
Knuth, D. E. (1974). Computer programming as an art. Communications of the ACM, 17(12), 667673. DOI:10.1145/361604.361612Google Scholar
Kozbelt, A. (2006). Dynamic evaluation of Matisse’s 1935 large reclining nude. Empirical Studies of the Arts, 24(2), 119137.Google Scholar
Kozbelt, A. (2009). Ontogenetic heterochrony and the creative process in visual art: A précis. Psychology of Aesthetics, Creativity, and the Arts, 3(1), 3537.Google Scholar
Kozbelt, A., Dexter, S., Dolese, M., & Seidel, A. (2012). The aesthetics of software code: A quantitative exploration. Psychology of Aesthetics, Creativity, and the Arts, 6(1), 57.Google Scholar
Lakhani, K., & Wolf, R. G. (2003). Why hackers do what they do: Understanding motivation and effort in free/open source software projects. Social Science Research Network (SSRN) Journal. DOI: 10.2139/ssrn.443040Google Scholar
Leach, R. J., & Ayers, C. A. (2005). The psychology of invention in computer science. In Romero, P., Good, J., Chaparro, E. Acosta, & Bryant, S. (Eds), Proceedings of Psychology of Programming Interest Group (PPIG), 17, pp. 131144.Google Scholar
Lewandowski, G., Johnson, E., & Goldweber, M. (2005). Fostering a creative interest in computer science. ACM SIGCSE Bulletin, 37(1), pp. 535539.Google Scholar
Lomas, N. (2015, March 2). Google’s Pichai talks up Magic Leap’s AR but says “It’ll take some time.” Tech Crunch. Retrieved on October 29, 2016, from https://techcrunch.com/2015/03/02/pichai-magic-leap/Google Scholar
London, E. (2013, May 30). Google Glass: inspired by Terminator [Blog post] Slice of MIT. Retrieved on September 18, 2016 from https://slice.mit.edu/2013/05/30/google-glass-inspired-by-terminator/Google Scholar
Luria, S. R., O’Brien, R. L., & Kaufman, J. C. (2016). Creativity in gifted identification: Increasing accuracy and diversity. Annals of the New York Academy of Sciences, 1377(1), 4452.Google Scholar
McCormack, J., & d’Inverno, M. (2012). Computers and creativity: The road ahead. In McCormack, J. & d’Inverno, M. (Eds.), Computers and creativity (pp. 421424) New York: Springer.Google Scholar
McKeand, K. (2015, October 10). Elite: Dangerous shows us the science and technology behind creating realistic planets [Blog post]. PCGamesN.com. Retrieved on September 21, 2016 from http://www.pcgamesn.com/elite-dangerous/elite-dangerous-shows-us-the-science-and-technology-behind-creating-realistic-planetsGoogle Scholar
Milgram, P., & Kishino, F. (1994). A taxonomy of mixed reality visual displays. IEICE Transactions on Information and Systems, 77(12), 13211329.Google Scholar
Clay Mathematics Institute, (n.d.). Millennium Prize Problems. Retrieved on October 28, 2016 from www.claymath.org/millennium-problems/millennium-prize-problems.Google Scholar
Moore, G. E. (1975). Progress in digital integrated electronics. International Electron Devices Meeting Tech Digest, IEEE, 1113.Google Scholar
Moore, G. E. (2006). Cramming more components onto integrated circuits. Solid-State Circuits Newsletter, IEEE, 20(3), 3335. (Reprinted from Electronics, 38(8), April 19, 1965, p. 114). DOI:10.1109/N-SSC.2006.4785860Google Scholar
Newell, A., Perlis, A. J., & Simon, H. A. (1967). Computer science. Science, 157(3795), 13731374.Google Scholar
O’Brien, T. (2015, June 20). Watson’s South American spin on a Canadian classic. Engadget. Retrieved on September 21, 2016, from www.engadget.com/2015/06/20/cooking-with-watson-peruvian-potato-poutine/Google Scholar
Palande, S. (2014, June 23). 10 Best hackers the world has ever known. Thought Catalog. Retrieved August 16, 2016, from http://tcat.tc/1sA0fm6Google Scholar
Palermo, E. (2014, February 15) Who invented the light bulb? [Blog post]. Live Science. Retrieved on September 22, 2016, from www.livescience.com/43424-who-invented-the-light-bulb.htmlGoogle Scholar
Papert, S. (1980). Mindstorms: Children, computers, and powerful ideas. New York: Basic Books, Inc.Google Scholar
Park, R. (2015, November 9). Guide to zero-day exploits [Blog post] Symantec. Retrieved on October 21, 2016, from www.symantec.com/connect/blogs/guide-zero-day-exploitsGoogle Scholar
Peppler, K. and Kafai, Y. (2009): Creative coding: Programming for personal expression. Proceedings of the 9th International Conference on Computer Supported Collaborative Learning (CSCL), Rhodes, Greece.Google Scholar
Plucker, J. A., Beghetto, R. A., & Dow, G. T. (2004). Why isn’t creativity more important to educational psychologists? Potentials, pitfalls, and future directions in creativity research. Educational Psychologist, 39(2), 8396.Google Scholar
Przybylla, M., & Romeike, R. (2014) Overcoming issues with students’ perceptions of informatics in everyday life and education with physical computing. Proceedings of the 7th International Conference on Informatics in Schools: Situation, Evolution and Perspectives (ISSEP), (pp. 920).Google Scholar
Reiter-Palmon, R., & Robinson, E. J. (2009). Problem identification and construction: What do we know, what is the future? Psychology of Aesthetics, Creativity, and the Arts, 3(1), 43.Google Scholar
Resnick, M. (2008). Sowing the seeds for a more creative society. Learning & Leading with Technology, 35(4), 1822.Google Scholar
Rhodes, M. (1961). An analysis of creativity. The Phi Delta Kappan, 42(7), 305310.Google Scholar
Romeike, R. (2007). Applying creativity in CS high school education: Criteria, teaching example and evaluation. Proceedings of the Seventh Baltic Sea Conference on Computing Education Research-Volume 88, 8796.Google Scholar
Romeike, R. (2007). Three drivers for creativity in computer science education. Proceedings of the IFIP-Conference on “Informatics, Mathematics and ICT: a golden triangle.” Boston, USA.Google Scholar
Romeike, R. (2008). Workshop: A creative introduction to programming with scratch. In Learning to live in the knowledge society, 281 (pp. 341344). New York: Springer. DOI: 10.1007/978-0-387-09729-9_49Google Scholar
Romeike, R. (2008). What’s my challenge? The forgotten part of problem solving in computer science education. In Informatics Education – Supporting Computational Thinking, 5090 (pp. 122133). DOI:10.1007/978–3-540–69924-8_11Google Scholar
Rosett, M. (2015, August 24). Google has a secret interview process … and it landed me a job. [Blog post]. The Hustle. Retrieved on August 16, 2016 from http://thehustle.co/the-secret-google-interview-that-landed-me-a-jobGoogle Scholar
Saunders, D., & Thagard, P. (2005). Creativity in computer science. In Kaufman, J. C. & Baer, J. (Eds.), Creativity across domains: Faces of the muse (pp. 153167). Psychology Press.Google Scholar
Shute, V. J., Ventura, M., & Kim, Y. J. (2013). Assessment and learning of qualitative physics in newton’s playground. The Journal of Educational Research, 106(6), 423430.Google Scholar
Shute, V., & Ventura, M. (2013). Stealth assessment: Measuring and supporting learning in video games. MIT Press.Google Scholar
Simonton, D. K. (2009). Varieties of (scientific) creativity: A hierarchical model of domain-specific disposition, development, and achievement. Perspectives on Psychological Science : A Journal of the Association for Psychological Science, 4(5), 441452. DOI:10.1111/j.1745–6924.2009.01152.xGoogle Scholar
Sirius, R. U. (2000). Superhacker Kevin Mitnick: Menace to fear or rogue to love? Village Voice, 22Google Scholar
Skibell, R. (2002). The myth of the computer hacker. Information, Communication & Society, 5(3), 336356.Google Scholar
Sneed, A. (2015, May 19). Moore’s law keeps going, defying expectations. Scientific America. Retrieved on August 6, 2016, from www.scientificamerican.com/article/moore-s-law-keeps-going-defying-expectations/Google Scholar
Somenkov, I. (2012a, March 7). The mstery of the Duqu framework [Blog post]. Securelist Kasperky Lab. Retrieved on October 21, 2016, from https://securelist.com/blog/research/32086/the-mystery-of-the-duqu-framework–6/Google Scholar
Somenkov, I. (2012b, March 19). The mystery of the Duqu framework solved [Blog post]. Securelist Kasperky Lab. Retrieved on October 21, 2016, from https://securelist.com/blog/research/32354/the-mystery-of-duqu-framework-solved–7/Google Scholar
Sternberg, R. J., Kaufman, J. C., & Pretz, J. E. (2001). The propulsion model of creative contributions applied to the arts and letters. Journal of Creative Behavior, 35(2), 75101.Google Scholar
Sternberg, R. J., Kaufman, J. C., & Pretz, J. E. (2004). A propulsion model of creative leadership. Creativity and Innovation Management, 13(3), 145153.Google Scholar
Tang, C., Baer, J., & Kaufman, J. C. (2015). Implicit theories of creativity in computer science in the United States and China. Journal of Creative Behavior, 49(2), 137156. doi:10.1002/jocb.61Google Scholar
Torrance, E. P. (2008). The Torrance Tests of Creative Thinking Norms-Technical Manual Figural (Streamlined) Forms A & B. Bensenville, IL: Scholastic Testing ServiceGoogle Scholar
Christie Medical Holdings, Inc (n.d.). Vein illumination. Retrieved on September 21, 2016, from www.christiemed.com/vein-illuminationGoogle Scholar
Verma, A. (2016, May 24). Japan just made computer programming a compulsory subject in its schools [Blog post]. fossBytes. Retrieved on November 4, 2016, from https://fossbytes.com/japan-computer-programming-compulsory-subject-schools/Google Scholar
Vollmer, J. (2016, July 14). The biggest hacker whodunit of the summer [Blog post]. Motherboard. Retrieved on September 22, 2016, from http://motherboard.vice.com/read/the-biggest-hacker-whodunnit-of-the-summerGoogle Scholar
Wing, J. (2014, January 10). Computational thinking benefits society [Blog post]. Social Issues in Computing. Retrieved on October 29, 2016, from http://socialissues.cs.toronto.edu/2014/01/computational-thinking/Google Scholar
Zetter, K. (2012, May 28). Meet ‘Flame,’ the massive spy malware infiltrating Iranian computers. WIRED. Retrieved on September 21, 2016, from www.wired.com/2012/05/flame/Google Scholar
Zimmer, B. (2011, February 17). Is it time to welcome our new computer overlords? The Atlantic. Retrieved on September 21, 2016, from www.theatlantic.com/technology/archive/2011/02/is-it-time-to-welcome-our-new-computer-overlords/71388/Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×