A Media Archaeology of Computer Viruses, Second Edition
At a time when our networks arguably feel more insecure than ever, the book provides an overview of how our fears about networks are part of a more complex story of the development of digital culture. It writes a media archaeology of computer and network accidents that are endemic to the computational media ecology. Viruses, worms, and other software objects are not seen merely from the perspective of anti-virus research or practical security concerns, but as cultural and historical expressions that traverse a non-linear field from fiction to technical media, from net art to politics of software.
Mapping the anomalies of network culture from the angles of security concerns, the biopolitics of computer systems, and the aspirations for artificial life in software, this second edition also pays attention to the emergence of recent issues of cybersecurity and new forms of digital insecurity. A new preface by Sean Cubitt is also provided.
Digital Formations is the best source for critical, well-written books about digital technologies and modern life. Books in the series break new ground by emphasizing multiple methodological and theoretical approaches to deeply probe the formation and reformation of lived experience as it is refracted through digital interaction. Each volume in Digital Formations pushes forward our understanding of the intersections, and corresponding implications, between digital technologies and everyday life. The series examines broad issues in realms such as digital culture, electronic commerce, law, politics and governance, gender, the Internet, race, art, health and medicine, and education. The series emphasizes critical studies in the context of emergent and existing digital technologies.
Other recent titles include:
To order other books in this series please contact our Customer Service Department:
(800) 770-LANG (within the US) (212) 647-7706 (outside the US) (212) 647-7707 FAX
To find out more about the series or browse a full list of titles, please visit our website:
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.Or login to access all content.